{"id":10679,"date":"2024-06-05T15:40:39","date_gmt":"2024-06-05T13:40:39","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/jo-et-cybersecurite-risques-et-bonnes-pratiques-pour-proteger-les-infrastructures-de-messagerie\/"},"modified":"2024-06-06T14:56:55","modified_gmt":"2024-06-06T12:56:55","slug":"the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/","title":{"rendered":"The Olympics and cybersecurity: risks and best practices for protecting email infrastructures"},"content":{"rendered":"\n

Cyberattacks targeting the public and private sectors in France are becoming increasingly common. In the run-up to the Olympic Games, warnings are multiplying.<\/p>\n\n\n\n

An overview of the risks during the Games<\/h2>\n\n\n\n

Private companies, particularly those involved in the Olympic Games, will certainly be a prime target for cyberattackers. During the last Olympic Games in Tokyo, more than 815 cyber incidents per second were recorded. For the Paris Games, some cybersecurity professionals are predicting up to 10 times that number. Companies therefore need to be prepared to ensure business continuity while securing their data.<\/p>\n\n\n\n

An event on the scale of the Olympics can be an opportunity for hackers to destabilize companies that are already cyber-defective or less prepared. The surface of attacks will be multiplied, and email is usually the first entry point for cybercriminals. It will therefore be crucial to secure communication channels centrally and independently of arrival points. The dissemination of official information from the organizations, institutions and companies involved in the Olympic Games may make it more difficult to identify spam. This can be explained by the fact that many users usually receive few emails of this type, and therefore find it difficult to recognize spam \u2013 or are simply less careful. The risk of QR code phishing (quishing) will also be amplified because of the widespread use of this format as a means of communicating official information and traffic in the Ile-de-France region.<\/p>\n\n\n\n

How can companies equip themselves to reduce risks?<\/h2>\n\n\n\n

Outsourcing certain security services is an appropriate strategy, particularly for securing email flows and ensuring their continuity in the event of a breakdown in the email infrastructure caused by a cyberattack. Retarus’ Email Security<\/a> solution guarantees this protection. <\/p>\n\n\n\n

The use of effective solutions against phishing, spam or zero-day attacks is also an essential investment. Priority should be given to the use of cloud solutions that operate completely independently of the company’s sites and the devices used. The cloud solutions offered by Retarus rely on a variety of integrated and always up-to-date data sources, as well as AI-based technologies to detect even the most recent or as yet unknown attack patterns. New types of phishing, such as QR codes, can also be identified more easily. This is particularly important in the context of evolving events that take place over time.<\/p>\n\n\n\n

The Olympic Games are a good exercise in cyber-resilience, and companies should encourage the use of innovative tools to minimize the risks and their consequences!<\/p>\n\n\n\n

Would you like to update your protection tools ahead of the Olympic Games \u2013 and beyond? Contact us<\/a>!<\/p>\n\n\n\n

To dive deeper into the topic, read the opinion article on Silicon.fr<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Cyberattacks targeting the public and private sectors in France are becoming increasingly common. In the run-up to the Olympic Games, warnings are multiplying.<\/p>\n","protected":false},"author":12,"featured_media":10680,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"yes","footnotes":""},"categories":[8],"tags":[102],"dipi_cpt_category":[],"class_list":["post-10679","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-email-security"],"acf":[],"yoast_head":"\nThe Olympics and cybersecurity: risks and best practices for protecting email infrastructures - Retarus Corporate Blog - EN<\/title>\n<meta name=\"description\" content=\"Cyberattacks targeting the public and private sectors in France are becoming increasingly common. In the run-up to the Olympic Games, warnings are multiplying.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Olympics and cybersecurity: risks and best practices for protecting email infrastructures\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks targeting the public and private sectors in France are becoming increasingly common. In the run-up to the Olympic Games, warnings are multiplying.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Corporate Blog - EN\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-05T13:40:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-06T12:56:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/06\/AdobeStock_731771601-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"S\u00f6ren Schulte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"S\u00f6ren Schulte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/\",\"name\":\"The Olympics and cybersecurity: risks and best practices for protecting email infrastructures - Retarus Corporate Blog - EN\",\"isPartOf\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/06\/AdobeStock_731771601-scaled.jpeg\",\"datePublished\":\"2024-06-05T13:40:39+00:00\",\"dateModified\":\"2024-06-06T12:56:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d\"},\"description\":\"Cyberattacks targeting the public and private sectors in France are becoming increasingly common. In the run-up to the Olympic Games, warnings are multiplying.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#primaryimage\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/06\/AdobeStock_731771601-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/06\/AdobeStock_731771601-scaled.jpeg\",\"width\":2560,\"height\":1435},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.retarus.com\/blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Olympics and cybersecurity: risks and best practices for protecting email infrastructures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#website\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/\",\"name\":\"Retarus Corporate Blog - EN\",\"description\":\"Always up to date\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d\",\"name\":\"S\u00f6ren Schulte\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/author\/sschulte\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Olympics and cybersecurity: risks and best practices for protecting email infrastructures - Retarus Corporate Blog - EN","description":"Cyberattacks targeting the public and private sectors in France are becoming increasingly common. In the run-up to the Olympic Games, warnings are multiplying.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/","og_locale":"en_US","og_type":"article","og_title":"The Olympics and cybersecurity: risks and best practices for protecting email infrastructures","og_description":"Cyberattacks targeting the public and private sectors in France are becoming increasingly common. In the run-up to the Olympic Games, warnings are multiplying.","og_url":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/","og_site_name":"Retarus Corporate Blog - EN","article_published_time":"2024-06-05T13:40:39+00:00","article_modified_time":"2024-06-06T12:56:55+00:00","og_image":[{"width":2560,"height":1435,"url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/06\/AdobeStock_731771601-scaled.jpeg","type":"image\/jpeg"}],"author":"S\u00f6ren Schulte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"S\u00f6ren Schulte","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/","url":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/","name":"The Olympics and cybersecurity: risks and best practices for protecting email infrastructures - Retarus Corporate Blog - EN","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/06\/AdobeStock_731771601-scaled.jpeg","datePublished":"2024-06-05T13:40:39+00:00","dateModified":"2024-06-06T12:56:55+00:00","author":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d"},"description":"Cyberattacks targeting the public and private sectors in France are becoming increasingly common. In the run-up to the Olympic Games, warnings are multiplying.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#primaryimage","url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/06\/AdobeStock_731771601-scaled.jpeg","contentUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/06\/AdobeStock_731771601-scaled.jpeg","width":2560,"height":1435},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/blog\/en\/the-olympics-and-cybersecurity-risks-and-best-practices-for-protecting-email-infrastructures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"The Olympics and cybersecurity: risks and best practices for protecting email infrastructures"}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/blog\/en\/#website","url":"https:\/\/www.retarus.com\/blog\/en\/","name":"Retarus Corporate Blog - EN","description":"Always up to date","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d","name":"S\u00f6ren Schulte","url":"https:\/\/www.retarus.com\/blog\/en\/author\/sschulte\/"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/10679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=10679"}],"version-history":[{"count":6,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/10679\/revisions"}],"predecessor-version":[{"id":10687,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/10679\/revisions\/10687"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media\/10680"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=10679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=10679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=10679"},{"taxonomy":"dipi_cpt_category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/dipi_cpt_category?post=10679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}