Network bandwidth and security problems likely The London Olympics kick off on July 27, about 5 weeks from now. Naturally, the Olympics represents international competition, athletic achievement, and host-country pomp and circumstance. Great entertainment as always but CIOs and CISOs should pay more than casual attention to the London games for several reasons:In the US, NBC/Universal says it will broadcast more than 5500 hours of Olympic coverage using a combination of cable TV and wired/wireless Internet. There are even special viewing apps for mobile devices. Cyber criminals are lining up with all kinds of Olympic phishing and malware distribution scams while Hacktivist groups may use the publicity of the Olympics to target nation states and major sponsors. Here’s a link to a DHS report with more details. IT executives should take note as there are a few ramifications worth preparing for:Your employees could bury the network with streaming media. A compelling event at 6pm GMT would disrupt corporate networks across the USA. CIOs may want to create/communicate acceptable use policies, block URLs, or throttle bandwidth on a proactive basis. Since these types of broadcast events will become more and more common, it is also worth looking into network caching technologies specifically designed for video broadcast storms such as BlueCoat CacheFlow appliance. CISOs may want to educate employees about Olympic cyber crime scams. If so, it is worth summarizing the DHS report linked above. Organizations in the hacktivist bull’s-eye should be doing extensive penetration testing now. Pay special attention to DDOS and web application vulnerabilities. Company’s with complex revenue-producing web applications should also be on the look out for automated attacks. It may be worthwhile to look into tools from company’s like SilverTail offering session intelligence and behavior analysis to monitor for cybercrime activities.The London Olympics should be a wonderful spectacle but smart IT executives will also recognize that they could be disruptive and plan accordingly. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe