Warnings Over Cyber Security At The Paris Olympics

Organisers of the Olympic Games in Paris are reinforcing cyber security precautions as law enforcement and intelligence agencies warn of a surge in cyber attacks ahead of the Games, which commence on  Friday 26th July as experts predict that cyber threats will increase tenfold during these Paris Summer Games 2024. 

This international event will attract considerable attention, including from cyber criminals looking to exploit security vulnerabilities due to factors like the large amount of personal data collected, the complex IT infrastructures involved, and the significant increase in online activity. 

Previous Olympic Games in Rio de Janeiro and Korea have been subject to major online disruption.

Ilia Sotnikov, who is VP of User Experience at data security firm Netwrix,  explains what organisations involved in the Summer Games 2024 should do now to protect their business operations“Cyber criminals are adept at capitalising on the chaos of high-demand events like this one, where the urgency and high volume of online and physical transactions amplify the potential for fraudulent activities... Stores, restaurants, hotels, transport companies, and other local organisations can expect a significant increase in cyber threats, including phishing, ransomware, and business email compromise (BEC), as attackers look to take advantage of any vulnerability during this massive event." 

With global attention focused on the 2024 Olympics, organisations need to reassess their security efforts and Sotnikov offers five recommendations on improving security measures within the limited time remaining:-

Conduct Employee Training: Organisations must ensure that everyone is prepared to handle cyber threats, as well as that awareness remains high and best practices are applied throughout the event. “This training should include, explaining how to recognise and avoid common threats, establishing the procedures to follow in the event of a suspected cyber-attack, and ensuring that employees follow password management best practices, including the use of strong, unique passwords. 

Implement multifactor authentication (MFA: One of the most effective measures for reducing the risk of successful attacks is to step up from simple passwords to MFA. By requiring multiple forms of authentication, MFA makes it much more difficult for attackers to compromise user accounts.  

Review access rights: Every organisation should have its security specialists review the access rights of all identities in the system and remove excessive privileges, even if it has never been done before. The goal is to strictly enforce the least privilege principle, which means that each user has just enough privileges to perform their tasks. This step is crucial to reducing the attack surface because it minimises the damage that can be done by a malicious employee or an intruder who compromises their account. 

Create or improve an incident response plan (IRP):  An organisation’s IRP provides step-by-step guidance on responding to attacks, breaches, discovery of vulnerabilities, and other security events. However, simply creating an IRP is not sufficient; organisations need to practice their plan before the Games 2024 to make sure everything works properly, and everyone is aware of their responsibilities.

Ensure the security of the supply chain:  An organisation’s supply chain involves multiple parties and interconnected systems, each with varying levels of cyber security readiness. “Every organisation should keep in mind that every component of their supply chain can become a gateway for cyber criminals and that attacks on their service providers, suppliers, partners, and contractors will also intensify during the Summer Games 2024. 

“The over-arching goal for all organisations involved in the Paris Summer Games 2024, from the smallest to the largest, is to ensure that everyone is trained to deal with cyber threats and that necessary cyber security measures are in place to protect data, identities, and infrastructure.” Solnikov says.

Netwrix    |    WEF Forum   |    CheckPoint   |     Govtech   |    Reuters

Image: IoC

You Might Also Reaad:

Major Sporting Events Are Open Targets:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 




https://www.govtech.com/blogs/lohrmann-on-cybersecurity/guarding-gold-cybersecurity-challenges-ahead-of-the-paris-olympics#:~:text=“Paris%202024%20is%20getting%20ready,28%2DSept.%208%20Paralympics.
https://www.weforum.org/agenda/2024/06/paris-olympics-2024-cybersecurity-experts-cyber-threats/

 

« The Top Nine API Security Vulnerabilities
Are Any Of Your Suppliers A Security Risk Waiting To Happen? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

Flare Systems

Flare Systems

Flare proactively detects and remediates exposure across the clear & dark web, providing organizations with the equivalent of an automated cyber reconnaissance team.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.