There are cyber risks in sports! Here is how to safeguard both data and fans

In major sporting events like the FIFA World Cup Qatar 2022 and the Winter Olympics, cyber risks for companies and fans skyrocketed. Valuable data on athletic performance, competitive advantage, and personal information becomes an attractive target for malicious actors.

By: HT TECH
| Updated on: Aug 16 2023, 18:21 IST
Microsoft Security offers crucial recommendations to safeguard against data loss and extortion threats. Follow the suggested ways to protect your data.
Microsoft Security offers crucial recommendations to safeguard against data loss and extortion threats. Follow the suggested ways to protect your data. (Pexels)
1/5 Microsoft Security offers crucial recommendations to safeguard against data loss and extortion threats. Follow the suggested ways to protect your data. (Pexels)
Connected video boards, digital signage: Disable any unnecessary ports and ensure proper network scanning for rogue or ad hoc wireless access points update, patch software and opt for applications with a layer of encryption for all data.  
Connected video boards, digital signage: Disable any unnecessary ports and ensure proper network scanning for rogue or ad hoc wireless access points update, patch software and opt for applications with a layer of encryption for all data.   (Microsoft)
image caption
2/5 Connected video boards, digital signage: Disable any unnecessary ports and ensure proper network scanning for rogue or ad hoc wireless access points update, patch software and opt for applications with a layer of encryption for all data.   (Microsoft)
Wi-Fi hotspots, mobile apps, and QR codes  Encourage attendees to: ·       secure their apps and devices with latest updates and patches, ·       avoid accessing sensitive information from public Wi-Fi, ·       avoid links, attachments, and QR codes from unofficial sources. 
Wi-Fi hotspots, mobile apps, and QR codes  Encourage attendees to: ·       secure their apps and devices with latest updates and patches, ·       avoid accessing sensitive information from public Wi-Fi, ·       avoid links, attachments, and QR codes from unofficial sources.  (Pexels)
image caption
3/5 Wi-Fi hotspots, mobile apps, and QR codes  Encourage attendees to: ·       secure their apps and devices with latest updates and patches, ·       avoid accessing sensitive information from public Wi-Fi, ·       avoid links, attachments, and QR codes from unofficial sources.  (Pexels)
Point of sale (POS) and wider commerce systems : Ensure POS devices are patched, up to date, and connected to a separate network. Also, attendees should beware of unfamiliar kiosks and ATMs and limit transactions to areas officially endorsed by the event host. 
Point of sale (POS) and wider commerce systems : Ensure POS devices are patched, up to date, and connected to a separate network. Also, attendees should beware of unfamiliar kiosks and ATMs and limit transactions to areas officially endorsed by the event host.  (Microsoft)
image caption
4/5 Point of sale (POS) and wider commerce systems : Ensure POS devices are patched, up to date, and connected to a separate network. Also, attendees should beware of unfamiliar kiosks and ATMs and limit transactions to areas officially endorsed by the event host.  (Microsoft)

You may be interested in

MobilesTablets Laptops
7% OFF
Apple iPhone 15 Pro Max
  • Black Titanium
  • 8 GB RAM
  • 256 GB Storage
28% OFF
Samsung Galaxy S23 Ultra 5G
  • Green
  • 12 GB RAM
  • 256 GB Storage
Google Pixel 8 Pro
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage
Stadium access and infrastructure equipment : Develop logical network segmentations to create divisions between IT and OT systems and limit cross-access to devices and data to mitigate the consequences of a cyberattack.   
Stadium access and infrastructure equipment : Develop logical network segmentations to create divisions between IT and OT systems and limit cross-access to devices and data to mitigate the consequences of a cyberattack.    (Pexels)
image caption
5/5 Stadium access and infrastructure equipment : Develop logical network segmentations to create divisions between IT and OT systems and limit cross-access to devices and data to mitigate the consequences of a cyberattack.    (Pexels)
First Published Date: 16 Aug, 16:45 IST
NEXT ARTICLE BEGINS