There are cyber risks in sports! Here is how to safeguard both data and fans

In major sporting events like the FIFA World Cup Qatar 2022 and the Winter Olympics, cyber risks for companies and fans skyrocketed. Valuable data on athletic performance, competitive advantage, and personal information becomes an attractive target for malicious actors.

By: HT TECH
| Updated on: Aug 16 2023, 18:21 IST
Icon
Microsoft Security offers crucial recommendations to safeguard against data loss and extortion threats. Follow the suggested ways to protect your data.
Microsoft Security offers crucial recommendations to safeguard against data loss and extortion threats. Follow the suggested ways to protect your data. (Pexels)
1/5 Microsoft Security offers crucial recommendations to safeguard against data loss and extortion threats. Follow the suggested ways to protect your data. (Pexels)
Icon
Connected video boards, digital signage: Disable any unnecessary ports and ensure proper network scanning for rogue or ad hoc wireless access points update, patch software and opt for applications with a layer of encryption for all data.  
Connected video boards, digital signage: Disable any unnecessary ports and ensure proper network scanning for rogue or ad hoc wireless access points update, patch software and opt for applications with a layer of encryption for all data.   (Microsoft)
image caption
2/5 Connected video boards, digital signage: Disable any unnecessary ports and ensure proper network scanning for rogue or ad hoc wireless access points update, patch software and opt for applications with a layer of encryption for all data.   (Microsoft)
Icon
Wi-Fi hotspots, mobile apps, and QR codes  Encourage attendees to: ·       secure their apps and devices with latest updates and patches, ·       avoid accessing sensitive information from public Wi-Fi, ·       avoid links, attachments, and QR codes from unofficial sources. 
Wi-Fi hotspots, mobile apps, and QR codes  Encourage attendees to: ·       secure their apps and devices with latest updates and patches, ·       avoid accessing sensitive information from public Wi-Fi, ·       avoid links, attachments, and QR codes from unofficial sources.  (Pexels)
image caption
3/5 Wi-Fi hotspots, mobile apps, and QR codes  Encourage attendees to: ·       secure their apps and devices with latest updates and patches, ·       avoid accessing sensitive information from public Wi-Fi, ·       avoid links, attachments, and QR codes from unofficial sources.  (Pexels)
Icon
Point of sale (POS) and wider commerce systems : Ensure POS devices are patched, up to date, and connected to a separate network. Also, attendees should beware of unfamiliar kiosks and ATMs and limit transactions to areas officially endorsed by the event host. 
Point of sale (POS) and wider commerce systems : Ensure POS devices are patched, up to date, and connected to a separate network. Also, attendees should beware of unfamiliar kiosks and ATMs and limit transactions to areas officially endorsed by the event host.  (Microsoft)
image caption
4/5 Point of sale (POS) and wider commerce systems : Ensure POS devices are patched, up to date, and connected to a separate network. Also, attendees should beware of unfamiliar kiosks and ATMs and limit transactions to areas officially endorsed by the event host.  (Microsoft)
Icon
Stadium access and infrastructure equipment : Develop logical network segmentations to create divisions between IT and OT systems and limit cross-access to devices and data to mitigate the consequences of a cyberattack.   
Stadium access and infrastructure equipment : Develop logical network segmentations to create divisions between IT and OT systems and limit cross-access to devices and data to mitigate the consequences of a cyberattack.    (Pexels)
image caption
5/5 Stadium access and infrastructure equipment : Develop logical network segmentations to create divisions between IT and OT systems and limit cross-access to devices and data to mitigate the consequences of a cyberattack.    (Pexels)
First Published Date: 16 Aug, 16:45 IST
NEXT ARTICLE BEGINS