Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsArenas / Stadiums / Leagues / Entertainment

Cybercriminals can leverage March Madness as bait for attacks

By Security Staff
Crowded basketball stadium

Image via Unsplash

March 26, 2024

Major events can be used by malicious actors to bait the general public. Events that gain traffic among consumers can be leveraged to release malicious emails, links and other forms of communication. During March Madness, security leaders are encouraged to remind their organization's employees to remain vigilant against phishing campaigns or other scams. 

Security leaders weigh in

Jason Soroko, Senior Vice President of Product at Sectigo:

“Especially with remote workers, it’s imperative that employees understand the basics of digital hygiene and are trained to recognize social engineering attempts like phishing. All staff should understand the basics of avoiding malware, viruses and phishing — as well as the bare bones of digital identity.

  • Stick to reputable sites: Whether betting online or joining a fantasy league, do your research. Choose established platforms with strong reputations for security. Ensure the website you're visiting has https:// in the address bar.
  • Keep it personal: When it comes to personal information, less is more. Share only what's absolutely necessary.
  • Beware the phish: Don't click on suspicious links or attachments, especially in emails related to fantasy sports or online betting.
  • Strong authentication: It may not be enough to use unique and complex passwords for all your online accounts.  If the online betting service or office pool system utilizes multi-factor authentication, then use it.  Better yet, choose a reputable site that offers Passkey authentication, which is far better than anything using passwords and is less vulnerable to social engineering.”

Krishna Vishnubhotla, Vice President of Product Strategy at Zimperium:

“With the NCAA March Madness Tournament approaching, there's an expected surge in online activities related to office pools and online betting, significantly increasing cyber risks. As it is so popular and online activity spikes, it's a prime target for cyber criminals. Fans' emotional investment makes the event a perfect storm for cybercriminals. Fraudsters exploit the increased volume of legitimate communications and people's distracted, relaxed vigilance to launch scams and phishing attacks. 

“Cybercriminals exploit these events to launch attacks via phishing emails, malicious links, or fake betting websites and mobile apps. Due to the prevalence of smartphones for these activities, they often target mobile users.

“What's obvious: 

  • Phishing scams: Phishing scams are common during events like March Madness. They often involve emails or messages mimicking legitimate tournament updates or betting sites, aiming to steal credentials or personal information. Since the games are going on during the workday, many of these emails will also target your business email.
  • Unsecured Wi-Fi networks: Using public or unsecured Wi-Fi to participate in pools or watch games can expose users to eavesdropping and data theft.

“What's not: 

  • Social engineering beyond email: Cybercriminals may use social media or messaging apps to target individuals with scams related to bracket picks or betting pools, leveraging the informal nature of these platforms. Messaging apps like WhatsApp and Telegram and in-app messages on social apps are great for these.
  • Compromised mobile apps: Not all apps related to March Madness are legitimate; some may be designed to look genuine but are actually created to install malware or steal data from mobile devices. In particular, betting and gambling apps will lure you into installing them by promising exponential returns.

“Organizations should proactively educate their employees about these risks, advise caution with unsolicited communications related to March Madness, ensure the security of their devices, and verify the legitimacy of websites and apps used for betting or streaming. The security team should consider deploying MFA and mobile endpoint protection tools as part of a multi-layer defense strategy. Implementing and reinforcing cybersecurity best practices during this period can help mitigate the risks associated with the heightened online activities driven by the tournament.”

Darren Guccione, CEO and Co-Founder at Keeper Security:

“Phishing and online scams are two of the biggest cyber threats for March Madness fans leading up to, and during, the NCAA Tournament. Throughout the tournament, cybercriminals may send phishing emails or text messages with malicious links or attachments disguised as updates on games and brackets. I recommend that you do not open attachments or click on any links from unknown sources. Scammers may also use social media to learn more about you or to request money. They may impersonate a friend or family member claiming to be in need of money to buy tickets or place bets on games, or even impersonate an athlete themselves. Along with being wary of fake tickets, fans should also be careful about fake bracket contests promising large prizes to the winners. Once they collect your entry fee or personal information, scammers will disappear and the winners will never receive their prizes.

“When creating accounts to follow the games, create a bracket or take part in the fun of the tournament any other way, it may be tempting to reuse passwords. Make sure you have different, high-strength passwords for all of your accounts. This way, if one account is breached, a cybercriminal does not gain access to all your accounts. Passwords should be at least 16 characters in length with both upper and lowercase letters, numbers and special characters, as well as a random assortment of numbers. Also, consider creating a passphrase rather than using a single word. A secure password manager can help create and store those passwords.”

Patrick Harr, CEO at SlashNext:

“With an event as popular as March Madness, it’s easy for cyber criminals to prey on the excitement. With money on the line for many employees participating in office pools and brackets, cyber criminals serve fake sporting-themed websites, free streaming of games, private VPNs, contests, and browser extensions that claim to keep track of scores and stats of the games.

“The sophistication of these phishing threats is becoming more difficult to detect, especially for users. With the tournament starting next week, March Madness-themed phishing sites will quickly pop up to steal credentials for future corporate-based attacks or to commit credit card fraud.

“Organizations must educate their employees and, most importantly, be proactive in securing employees devices. With the increased use of dual-purpose devices, it’s important to avoid giving away login credentials or accidentally adding malicious browser extensions which can be used to breach corporate assets.

“Protect your organization by encouraging users to exercise extreme caution when participating in brackets and office contests. Most importantly, have the right security tools, including real-time mobile and browser security solutions.”

KEYWORDS: email security NCAA basketball phishing campaigns social engineering social media security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Basketball

    $20B loss estimated from potential March Madness hacks

    See More
  • basketball-unsplash-1170.jpg

    Avoid costly cybersecurity turnovers during March Madness

    See More
  • phishing

    Cybercriminals Using Coronavirus to Carry Out Phishing Attacks

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing