NIL Zone logo
Fitbit on watch

Digital Defense Playbook: Safeguarding Athletes’ NIL in the Online Arena

One the commonality we find with websites, social media personas, and email is that each requires credentials (username and password) for access.

In our increasingly complex world, it always good go back to the basics from time-to-time. This especially true for athletes, whose livelihood is their personal brand on the internet. From that perspective, personal athlete brands online includes: websites (owned/official, sponsored/sponsors, or governing bodies), social media personas (Instagram, Twitter, Facebook), and email (addresses). As the world sits back to watch the amazing spectacle of the Tokyo Olympics and considering recent warning about cyber threats to the Games by Russia, China, and others, there is no better time to discuss cybersecurity basics for athletes.

One the commonality we find with websites, social media personas, and email is that each requires credentials (username and password) for access. Here are four things athletes or their proxies can do right now to improve cybersecurity in these areas:

portrait of confident American football player holding ball while standing on the big field with particles effects and lights

For websites, there are two areas to consider that will improve cybersecurity:

If you are using the WordPress engine to deliver your content, ensure that any/all plugins are updated regularly. Additionally, check for misconfigurations that might allow a threat actor to serve malicious content such as malware from your website without your knowledge.

High angle view of basketball player dunking basketball in hoop

Always employ Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocols and associated certificates on your website. Sites that only support Hypertext Transfer Protocol (HTTP) traffic can expect frequent incursion attempts.

Finally, for email usage, there is one key cybersecurity item to remember:

Do not click on stuff! If you receive an email from someone you do not know asking you to click for access to a critical document, stop and ask for help. When it comes to both scattershot and targeted phishing campaigns, if you are looking at any email and something does not feel right, it probably is not. Trust your gut!

By following one or more of them items described, you will improve your personal cybersecurity posture, protect your brand, and frustrate threat actors so they move on to the next athlete who is not quite as tech savvy as you. If you have any questions about improving your cybersecurity posture, please reach out to us.

Runner on dirt trail with sunshine

We are happy to help!

Share the Post:

Related Posts