Saturday, June 25, 2022
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home Article

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Henrietta Ijenebe by Henrietta Ijenebe
May 19, 2022
in Article, security tips
0
Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Source:https://www.gettyimages.com

Share on FacebookShare on Twitter

Due to the sensitive personal information and proprietary data collected and generated in the course of sports betting, these systems are high-value targets for malicious cyber actors. Providers of sports betting services must ensure that their cybersecurity protocols and data privacy policies adequately protect their systems and users.

Cybersecurity and Data Privacy Risks Associated with Sports Betting

As sports betting becomes more pervasive, so do the cybersecurity and data privacy vulnerabilities that the industry presents. When placing a sports bet, bettors are required to disclose a large amount of personal information. This can include the individual’s date of birth, Social Security number, physical address, email address, financial and banking information, and location data. In addition to the data that users contribute to place bets, the platforms used to place bets also use and generate a lot of data about the sports themselves.

Most sports betting platforms allow bettors to bet on a wide variety of events such as which team will win the game, the score of a game, the performance of a certain player and whether a game will go into overtime. These bets remain open throughout the game, and the odds are driven by data. The data used to calculate these odds include statistics relating to the performance of the players and teams, the composition of the league, the time in the season which games are scheduled and other factors. The privacy and integrity of this data is crucial to a properly regulated sports gambling industry. If this data is compromised, it could have drastic effects both for bettors and for the integrity of the sports betting industry.

Due to the sensitive information that sports betting technology holds, these systems are ripe for cyberattack. Across the board, cyberattacks are on the rise. The highly valuable personal information held by sports gambling providers makes these companies catchy targets for malicious cyber actors. Malicious cyber actors have already executed hacks of similar gambling operations, such as lotteries and casinos, to access this type of information. In 2016, the United Kingdom’s national lottery was hacked, and more than 26,500 online lottery accounts were compromised. As a result of this attack, malicious cyber actors gained access to personal information of those individuals whose accounts were compromised.

In February 2020, MGM Resorts and Casino experienced a cyberattack in which 142 million individuals’ personal details were stolen and placed for sale on the dark web. Information accessed in the intrusion included private information about guests and players, including names, home addresses, phone numbers, emails and dates of birth. Moreover, there has already been one reported cyberattack on an online sports betting portal. In March 2020, the Oregon lottery had to shut down its online sports betting platform, SBTech Scoreboard, due to a suspected breach. Ultimately, no information was compromised in the attack because SBTech was able to take its systems offline and resolve the intrusion before the hackers accessed any of this data.

Best Practices for Cybersecurity and Data Privacy

Countries and companies that are operating sports betting platforms should invest in implementing cybersecurity and data privacy best practices. Cybersecurity best practices for these organizations align with general cybersecurity best practices and can include:

  • Following best practices policies and procedures issued by government agencies and industry groups.
  • Creating proactive connections with law enforcement agencies and third-party cybersecurity providers.
  • Having in place cybersecurity incident response policies and procedures.
  • Utilizing threat intelligence services (both public and private) to manage emerging threats.
  • Adopting a “zero-trust” cybersecurity model so that there is equal importance placed on both stopping attacks and recovering from them.
  • Ensuring that executives, including board members, are briefed on cyber threats and cybersecurity measures.
  • Mandating multifactor identification for users and employees.
  • Employing endpoint detection and response technologies.
  • Investing in secure payment systems to process transactions.

Companies involved in sports betting should also be aware of any laws in their Country that concern safe storage of data as well as their obligations to consumers in the case of a data breach. Many Country’s data privacy regulations will cover obligations in both instances.

Conclusion

The bottom line is that cyber criminals, like any other criminals follow the money. This implies that the massive increase in sports betting in most Countries is bound to attract hackers looking to steal funds and disrupt platforms. Venue owners and operators as well as sports betting platforms are advised to take steps that would minimize the possibility of suffering cyberattacks.

Tags: IntrusionMaliciousProprietary DataProtocols
Henrietta Ijenebe

Henrietta Ijenebe

Another Breed striving to make our cyber.space a better state of existence. CyberContent Writer at Cybersecfill. Cybersecurity Threat Intelligence Analysis... Penetration Testing... I code in Javascript...Python...PHP I convey with HTML I beautify with CSS

Next Post
Types of Hackers and Hacking Protection Tips…

Types of Hackers and Hacking Protection Tips...

0 0 votes
Article Rating
Login
guest
guest
0 Comments
Inline Feedbacks
View all comments
  • Trending
  • Comments
  • Latest
CEH_PRACTICAL

CEH PRACTICAL EXAM – TICKET TO CEH MASTER

February 6, 2021
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

9
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
Suspected Head of Cybercrime Gang Arrested in Nigeria…

Suspected Head of Cybercrime Gang Arrested in Nigeria…

June 17, 2022
Types of Hackers and Hacking Protection Tips….

Types of Hackers and Hacking Protection Tips….

June 6, 2022
Types of Hackers and Hacking Protection Tips…

Types of Hackers and Hacking Protection Tips…

May 31, 2022
Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022

Recommended

Suspected Head of Cybercrime Gang Arrested in Nigeria…

Suspected Head of Cybercrime Gang Arrested in Nigeria…

June 17, 2022
Types of Hackers and Hacking Protection Tips….

Types of Hackers and Hacking Protection Tips….

June 6, 2022
Types of Hackers and Hacking Protection Tips…

Types of Hackers and Hacking Protection Tips…

May 31, 2022
Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply

Privacy Policy - Terms and Conditions