Free Guide
16 Questions You MUST Ask Before Hiring Any IT Company
In the last few years, the implementation of the Internet has improved and transformed how people and organizations interact. In today’s world, it is possible to follow a soccer match live from a mobile device. You can check the results of the match, buy a plane ticket, pay and book a ticket to go to the stadium all at once.
The World Cup has seen an exponential increase in fraudulent e-mails, malicious files and connections to unsecured networks that seek to steal people’s data and sensitive information, as well as users’ and companies’ money.
In one of its latest studies, the sports research agency “Marketing Registrado” estimated that the World Cup’s total revenue would be around 17 billion dollars. Similarly, it is expected that the event (which will be held from November 20 to December 18, 2022) will be attended by more than 1.2 million travellers (almost half the population of Qatar, around 2.8 million people).
Recently, the Qatar Computer Emergency Response Team (Q-Cert), an automated threat monitoring system that collects stability-related data, was set up. To this end, 25,000 employees have been trained in areas related to technological stability. However, there are still concerns about the cybersecurity dangers to which the territory of Qatar, the main venue for the World Cup, continues to be exposed.
Some of the repercussions that organizations in the industrial sector could have with attacks throughout the development of the World Cup are:
“Adopting a proactive stance concerning cybersecurity involves companies assuming that they may be involved leading up to the World Cup, and working to show otherwise”, mentioned Germán Patiño, Vice President of Sales for Latin America at Lumu Technologies.
As we already mentioned, during the development of one of the world’s largest events, the cyber risks to which we are exposed increase exponentially, which is why we offer you the following tips so that you can avoid being a victim of these catastrophic attacks on the network:
Source: ComputerWeekly.es