SHARE
Facebook X Pinterest WhatsApp

March Madness Provides Plethora of Opportunities for Online Predators

Top 10 Tips for Educating Employees About Cybersecurity Although my team isn’t playing in the tournament, and I’m really not much of a basketball fan, I do realize we’re in the midst of March Madness. I suspect I will be like millions of others who will log on to sports sites to check the scores […]

Written By
SP
Sue Poremba
Mar 16, 2015
Slide Show

Top 10 Tips for Educating Employees About Cybersecurity

Although my team isn’t playing in the tournament, and I’m really not much of a basketball fan, I do realize we’re in the midst of March Madness. I suspect I will be like millions of others who will log on to sports sites to check the scores and watch for upsets. I know I won’t be watching any of the games online, but I’m not like the millions who plan to stream at least part of the Thursday and Friday games on their work devices.

At this time of the year, there is usually a lot of discussion about the toll the tournament takes on networks. We know that all of the streaming video and constant score updates eat up a lot of bandwidth that slows down production and actual work-related transmissions. But does it also pose security concerns?

According to TEKsystems, 47 percent of IT staff worries that the network will be at a greater risk because of all the March Madness online activities – with many of them done without permission or against company rules. Indeed, security needs could strain IT departments this week. In an email to me, Mark Parker, senior product manager at iSheriff, listed a few security risks that companies and basketball fans need to be aware of:

  • SEO poisoning has skewed the results of March Madness related searches so effectively that links to malware-infected pages were on the first page of search results of every major search engine.
  • Thousands of drive-by and download-and-install malware infections from March Madness-related sites, both legitimate and spoofed.
  • Phishing attacks targeting users following their March Madness brackets on popular sites such as ESPN and Yahoo.
  • Malware masquerading as video players that will allow the user to stream the games.
  • Links posted in forums, comments and social media that promise March Madness info or streams, but only direct the user to an infected site.
  • A large influx of fake betting sites used to grift the credit card info of unsuspecting users.

Sports1

Parker also described to me how the hackers consider their targets:

As with anything popular, criminals and ne’er-do-wells are drawn to an easy-to-exploit opportunity. Just as pickpockets target frequently visited locations that provide a target-rich environment, so do the online criminals behind malware. Predators hang out near the watering holes that draw the prey, because it is easier than hunting the prey outright. March Madness provides that easy-to-access watering hole for online criminals.

Today is the time to start preparing employees and networks for the onslaught coming later in the week. If you wait until Thursday to warn people of the security risks, you might be too late.

And since my own team won’t be playing until next November, I’m rooting for a never-done-before Sixteen Seed upset over a Number One. If that actually happens, heaven help the Internet!

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.