IMOLA, Italy – Formula 1 racing once revolved around speed, and little else.
There was always drama and politics on the racing circuit — now part of the binge-worthy Netflix series Drive to Survive<!–> – but at its heart, Formula 1 teams used to focus purely on engineering feats resulting in the best and quickest cars destined to win race after race.
Also: The best antivirus software and apps (and why you need to protect your devices)
As technologies evolved throughout the decades, racing car designs followed suit. F1 became a hotbed of innovation, helped along by the millions of dollars poured into research efforts every year. Gone are the clunky, unwieldy motors, replaced with aerodynamic, sleek cars and components designed for eking out performance gains within tenths of a second.
The halo barrier, which Chinese driver Zhoe Guanyu said saved his life during a 2022 crash, is one of Formula 1’s latest enhancements intended to stop large objects from entering the cockpit.
However, safety is no longer purely about cars and drivers. Formula 1 teams and their parent organizations must now also secure themselves against cyberattacks.
–>
It’s easy to forget that sports teams face the same threats as companies in other sectors and industries. Ransomware, blackmail, the theft of intellectual property, the compromise of customer, employee, or investor data, insiders willing to work for competitors — the list of threats and attack vectors is endless.
Also: 8 habits of highly secure remote workers
There’s a fortune at play for points in each race, and these teams are financial powerhouses. Indeed, some are worth upward of a billion dollars, making them lucrative targets for today’s cybercriminals.
While there have been past security incidents, such as alleged espionage, a recent ransomware attack emphasized how threat actors are taking a serious interest in Formula 1.
Ferrari, known for its cars, fashion, and the Scuderia Ferrari F1 team, said in March that its wholly owned Italian subsidiary, Ferrari S.p.A., suffered a data breach in which attackers “were able to access a limited number of systems in its IT environment.”
Also: The best security keys you can buy (and how they work)
Names, addresses, email addresses, and telephone numbers were exposed. However, the company doesn’t believe financial data was involved.