Warnings Over Cyber Security At The Paris Olympics

Organisers of the Olympic Games in Paris are reinforcing cyber security precautions as law enforcement and intelligence agencies warn of a surge in cyber attacks ahead of the Games, which commence on  Friday 26th July as experts predict that cyber threats will increase tenfold during these Paris Summer Games 2024. 

This international event will attract considerable attention, including from cyber criminals looking to exploit security vulnerabilities due to factors like the large amount of personal data collected, the complex IT infrastructures involved, and the significant increase in online activity. 

Previous Olympic Games in Rio de Janeiro and Korea have been subject to major online disruption.

Ilia Sotnikov, who is VP of User Experience at data security firm Netwrix,  explains what organisations involved in the Summer Games 2024 should do now to protect their business operations“Cyber criminals are adept at capitalising on the chaos of high-demand events like this one, where the urgency and high volume of online and physical transactions amplify the potential for fraudulent activities... Stores, restaurants, hotels, transport companies, and other local organisations can expect a significant increase in cyber threats, including phishing, ransomware, and business email compromise (BEC), as attackers look to take advantage of any vulnerability during this massive event." 

With global attention focused on the 2024 Olympics, organisations need to reassess their security efforts and Sotnikov offers five recommendations on improving security measures within the limited time remaining:-

Conduct Employee Training: Organisations must ensure that everyone is prepared to handle cyber threats, as well as that awareness remains high and best practices are applied throughout the event. “This training should include, explaining how to recognise and avoid common threats, establishing the procedures to follow in the event of a suspected cyber-attack, and ensuring that employees follow password management best practices, including the use of strong, unique passwords. 

Implement multifactor authentication (MFA: One of the most effective measures for reducing the risk of successful attacks is to step up from simple passwords to MFA. By requiring multiple forms of authentication, MFA makes it much more difficult for attackers to compromise user accounts.  

Review access rights: Every organisation should have its security specialists review the access rights of all identities in the system and remove excessive privileges, even if it has never been done before. The goal is to strictly enforce the least privilege principle, which means that each user has just enough privileges to perform their tasks. This step is crucial to reducing the attack surface because it minimises the damage that can be done by a malicious employee or an intruder who compromises their account. 

Create or improve an incident response plan (IRP):  An organisation’s IRP provides step-by-step guidance on responding to attacks, breaches, discovery of vulnerabilities, and other security events. However, simply creating an IRP is not sufficient; organisations need to practice their plan before the Games 2024 to make sure everything works properly, and everyone is aware of their responsibilities.

Ensure the security of the supply chain:  An organisation’s supply chain involves multiple parties and interconnected systems, each with varying levels of cyber security readiness. “Every organisation should keep in mind that every component of their supply chain can become a gateway for cyber criminals and that attacks on their service providers, suppliers, partners, and contractors will also intensify during the Summer Games 2024. 

“The over-arching goal for all organisations involved in the Paris Summer Games 2024, from the smallest to the largest, is to ensure that everyone is trained to deal with cyber threats and that necessary cyber security measures are in place to protect data, identities, and infrastructure.” Solnikov says.

Netwrix    |    WEF Forum   |    CheckPoint   |     Govtech   |    Reuters

Image: IoC

You Might Also Reaad:

Major Sporting Events Are Open Targets:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 




https://www.govtech.com/blogs/lohrmann-on-cybersecurity/guarding-gold-cybersecurity-challenges-ahead-of-the-paris-olympics#:~:text=“Paris%202024%20is%20getting%20ready,28%2DSept.%208%20Paralympics.
https://www.weforum.org/agenda/2024/06/paris-olympics-2024-cybersecurity-experts-cyber-threats/

 

« The Top Nine API Security Vulnerabilities
Are Any Of Your Suppliers A Security Risk Waiting To Happen? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Seedcamp

Seedcamp

Seedcamp identify and invest early in world-class founders attacking large and global markets through disruptive technology in areas including AI, cybersecurity, and Fintech.

Arakyta

Arakyta

Arakÿta specializes in business strategy, work flow process and IT systems for organizations.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.

PriorityZero

PriorityZero

PriorityZero is a European company focused on remote security assessments and consulting services that operates on a global scale.