Threat actors are opportunistic by nature, quickly evolving their attack methods to capitalize on new vulnerabilities or launch widespread attacks. Their latest target? High-profile sporting events and entertainment venues.\n\nSports organizers, regional host facilities, and even event attendees face a heightened degree of cyber risk due to increasingly connected environments. According to the United Kingdom\u2019s National Cyber Security Centre, 70% of sports organizations have faced at least one cyber attack per year\u2014a 119% increase over general UK business.\n\nTo help tackle this issue, Microsoft is sharing first-hand learnings about how threat actors attempt to infiltrate professional sports environments and event venues. Read on to learn more about our top recommendations for securing venues, teams, and more based on our cybersecurity support of critical infrastructure facilities during a large global sporting event.\n\nThe starting lineup of sport\u2019s biggest risk areas\n\nIt only takes one misconfigured device, exposed password, or overlooked third-party connection for cybercriminals to potentially launch a successful intrusion or breach data. This threat is particularly applicable in professional sports given the sheer scale of connected devices and interconnected networks involved in these environments. During a renowned worldwide sporting event, Microsoft performed more than 634.6 million authentications while helping provide cybersecurity defenses for host country\u2019s facilities and organizations.\n\nSome of top-of-mind concerns during the event included the risk of cyber disruptions to event services or local facilities. For example, some healthcare facilities were designated as urgent care units for the event. Because these facilities regularly deal with sensitive medical data, they were considered high-value targets. A successful attack could have limited the facilities\u2019 ability to utilize life-saving healthcare technology or opened the door to future data theft and extortion.\n\nOur team also focused on monitoring the behavior of identities, logins, and file access across a variety of sectors like transportation, telecommunications, and other essential functions.\n\nWhat we found was that cybersecurity threats to sporting events and venues are diverse and complex, requiring constant vigilance and stakeholder collaboration to prevent and mitigate escalation. Part of what makes these environments such an attractive target is the valuable information they hold. Information on athletic performance stats, team or company competitive advantages, and even personal consumer or athlete information can be vulnerable at scale due to the number of connected devices and interconnected networks in these environments.\n\nCyber vulnerabilities often span the teams themselves, as well as corporate sponsors, municipal authorities, and third-party contractors. Coaches, athletes, and fans can also be vulnerable to data loss and extortion. And that\u2019s before we consider the known and unknown venues and arena vulnerabilities that allow threat actors to target critical business services like point-of-sale devices, IT infrastructures, and visitor devices.\n\n5 tips for securing professional sports environments\n\nSo, now that we understand some of the main risk areas for professional sports environments, what can you do to better secure them?\n\nCyber threats for large-scale events can look different than their enterprise counterparts. These threats can be less perceptible due to the complex nature of these types of events and how they often come together quickly. As new partners and vendors acquire access to enterprise and shared networks for a specific period of time, security teams can struggle to develop clear visibility and control of devices and data flows.\n\nHowever, by sharing best practices on how to better secure these events, we can raise the barrier for cyber attacks and make professional sports safer for all. For more information on cybersecurity for high-profile sporting events, check out the full Cyber Signals report and explore Microsoft Security Insider for the latest threat intelligence updates.