Warnings Over Cyber Security At The Paris Olympics

Organisers of the Olympic Games in Paris are reinforcing cyber security precautions as law enforcement and intelligence agencies warn of a surge in cyber attacks ahead of the Games, which commence on  Friday 26th July as experts predict that cyber threats will increase tenfold during these Paris Summer Games 2024. 

This international event will attract considerable attention, including from cyber criminals looking to exploit security vulnerabilities due to factors like the large amount of personal data collected, the complex IT infrastructures involved, and the significant increase in online activity. 

Previous Olympic Games in Rio de Janeiro and Korea have been subject to major online disruption.

Ilia Sotnikov, who is VP of User Experience at data security firm Netwrix,  explains what organisations involved in the Summer Games 2024 should do now to protect their business operations“Cyber criminals are adept at capitalising on the chaos of high-demand events like this one, where the urgency and high volume of online and physical transactions amplify the potential for fraudulent activities... Stores, restaurants, hotels, transport companies, and other local organisations can expect a significant increase in cyber threats, including phishing, ransomware, and business email compromise (BEC), as attackers look to take advantage of any vulnerability during this massive event." 

With global attention focused on the 2024 Olympics, organisations need to reassess their security efforts and Sotnikov offers five recommendations on improving security measures within the limited time remaining:-

Conduct Employee Training: Organisations must ensure that everyone is prepared to handle cyber threats, as well as that awareness remains high and best practices are applied throughout the event. “This training should include, explaining how to recognise and avoid common threats, establishing the procedures to follow in the event of a suspected cyber-attack, and ensuring that employees follow password management best practices, including the use of strong, unique passwords. 

Implement multifactor authentication (MFA: One of the most effective measures for reducing the risk of successful attacks is to step up from simple passwords to MFA. By requiring multiple forms of authentication, MFA makes it much more difficult for attackers to compromise user accounts.  

Review access rights: Every organisation should have its security specialists review the access rights of all identities in the system and remove excessive privileges, even if it has never been done before. The goal is to strictly enforce the least privilege principle, which means that each user has just enough privileges to perform their tasks. This step is crucial to reducing the attack surface because it minimises the damage that can be done by a malicious employee or an intruder who compromises their account. 

Create or improve an incident response plan (IRP):  An organisation’s IRP provides step-by-step guidance on responding to attacks, breaches, discovery of vulnerabilities, and other security events. However, simply creating an IRP is not sufficient; organisations need to practice their plan before the Games 2024 to make sure everything works properly, and everyone is aware of their responsibilities.

Ensure the security of the supply chain:  An organisation’s supply chain involves multiple parties and interconnected systems, each with varying levels of cyber security readiness. “Every organisation should keep in mind that every component of their supply chain can become a gateway for cyber criminals and that attacks on their service providers, suppliers, partners, and contractors will also intensify during the Summer Games 2024. 

“The over-arching goal for all organisations involved in the Paris Summer Games 2024, from the smallest to the largest, is to ensure that everyone is trained to deal with cyber threats and that necessary cyber security measures are in place to protect data, identities, and infrastructure.” Solnikov says.

Netwrix    |    WEF Forum   |    CheckPoint   |     Govtech   |    Reuters

Image: IoC

You Might Also Reaad:

Major Sporting Events Are Open Targets:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 




https://www.govtech.com/blogs/lohrmann-on-cybersecurity/guarding-gold-cybersecurity-challenges-ahead-of-the-paris-olympics#:~:text=“Paris%202024%20is%20getting%20ready,28%2DSept.%208%20Paralympics.
https://www.weforum.org/agenda/2024/06/paris-olympics-2024-cybersecurity-experts-cyber-threats/

 

« The Top Nine API Security Vulnerabilities
Are Any Of Your Suppliers A Security Risk Waiting To Happen? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

NetTech

NetTech

NetTech’s Managed CyberSecurity and Compliance/HIPAA services are designed to help your company prevent security breaches and quickly remediate events if they do happen to occur.

Bluerydge

Bluerydge

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.