Skip to main content

Home/ Hospitality Technology/ Group items tagged best practices

Rss Feed Group items tagged

anonymous

10 Best E-commerce Practices for Hotels - SmartGuests.com Blog - 1 views

  • With 57% of all hotel bookings made online and 97% of all travelers searching for a place to stay using the Internet, the importance for hotels to adapt best ecommerce practices is more important today more than ever.
  • 1. Use High Res Photos
  • No guest in his or her right mind would book a hotel without seeing photos of the property first. Beautiful photos is a deal breaker when it comes to almost all hotel bookings. Make sure that you use high res photos on your hotel website and make sure that you upload new ones regularly.
  • ...12 more annotations...
  • 2. Build Your Credibility
  • Let’s face it – there are unscrupulous hotels who don’t care an iota about their guests. They trick their guests, overpromising in terms of their facilities and amenities and delivering sub-par service. This is why a lot of travelers have developed a healthy level of skepticism toward hotels and this is why it is important that you convey credibility on your website.
  • 3. Make It Extremely Easy To Book a Room in Your Hotel
  • 4. Display Customer Service Channels Prominently
  • 7. Ensure That Your Website is Mobile Friendly
  • 5. Make Your Website Easy to Navigate
  • 6. Have a Single Call to Action Per Page
  • Best e-commerce practice dictates that you should always be reachable to answer questions from those who want to book a room with your hotel, but need their questions answered first. Not having this information prominently displayed on your site can spell a difference between a non-booking and a successful booking.
  • 8. Ensure That Your Website is Secure for Financial Transactions
  • The Internet is always under attacked by various security threats and one of the issues that always make people wary is the security of their financial information online. This is why it is important for you to demonstrate that your website can handle financial transactions safely.
  • 9. Always Have an Email Collection Mechanism in Place
  • 10. Use Persuasion Elements
  •  
    With the majority of bookings done through the internet, hotels need to find the best ways to make their websites attractive and engaging for a guest. Here are the ten e-commerce ideas that a hotel should strongly focus on. Number one, high quality images. A guest wants to see your property, and see the amenities that are offered. Provide a clear image of these items to them, so that they are aware of what makes the location great. Two, focus on the location's credibility. and build a reputation of trust for your location. Guests do not like to be fooled, so you must prove that you have integrity to gain business. Three, simplify the booking process. For many people it might not be an issue to navigate through the internet and book a room, but for some people it is. Make sure that the process of booking a room at your sight is very easy, and is comfortable for any guest. Four, integrate customer service channels. If your guests have questions before booking, then try to answer them as fast as possible. This works with the second step of improving credibility. Five, not only should you make the booking process simple, but the navigation process as well. Your layout should be clear, and guests should easily be able to figure out where it is that specific information is found. Six, have only one call to action per page. A call to action is a phrase that when clicked on, creates a certain thing to happen. Like clicking on a button that says "Reserve now", and then being led to a reservation page. It is important to only put one on a page, because several can seem cluttered and confusing. Seven, make the site friendly to cellular devices. Many of the reservations are done last minute, and on a cellular device. Make sure this is easy for your guests to do. Eight, the importance of PCI. There are many threats out there to our finances, and as a place of business it is up to you to secure the financial information of the guests, to avoid any fraud or theft. Nine, optimize o
  •  
    In today's society it is extremely important for the hotel industry to make use of the e-commerce technology. This article focuses on the ten best e-commerce practices. Best practice number one is to use high resolution photos that are a true representation of your hotel. These photos should be frequently changed and of good quality. Secondly, show your guests that they can trust you and your website, by building credibility. E-commerce is designed to make the process better, thus, thirdly, ensure that it is easy to book a room through your website. The fourth best practice is to ensure that you are clear about ways that your customer can reach out to you for information. show that you are accessible. Next, the author mentioned the importance of making your website user friendly and easy to navigate. Additionally, have one call to action button so that customers are not confused as to where to make their selection or booking. Consumers are now using cellphones more to book hotel accommodations, thus, another best practice is to ensure that your website is mobile friendly. Internet security is a concern for consumers. Best practice number eight is to ensure that your website is secure for financial transactions. The ninth best practice is ensure that you make use of email marketing. Your website should have the ability to collect emails from each user. The final best practiced listed in the article is to use marketing techniques like persuasion elements that go the extra mile to convince guests to book their hotel. The ten best practices outlined were listed for hotel operates to analyze their website and identify ways to improve if necessary.
  •  
    My company works specifically in the short term rental space, and I wanted to comment on number 9 and offer some insight and results from properly managing your email list. First and foremost, having an email list increases return customers to your platform or rental site by over 300%. Most companies in this space have spent countless hours creating and defining specific messages to potential guests, which begin from the first time they visit the site, all the way until they checkout. Each time these touch points, through email or other communications, increase the likelihood of the guest to use the rental company, condo association, or hotel year in and year out. A new method of communication that is being used industry wide is through text messaging. I believe that this form of e-commerce will enable faster delivery of information to customers and allow managers to personalize experiences at the hotel or property. This follows along the lines of remote locks and other services that are technology based rather than requiring personnel to execute, greatly reducing overhead costs.
Ruoxi Wang

[Update] Global Hospitality Accounting System Project - HFTP Connect - 0 views

  • ecognizing that operating hotels is a global industry, HFTP determined that there is not a globally accepted method that financial professionals, ownership structures, investors and benchmarking information services can use to support efficient operations. There is also not a globally accepted method to monitor investment performance from region to region without significant assumptions and data mining.
  • Currently, research is being conducted into current practices. This research will identify who is doing what in different parts of the world, with a view to establishing best practice and providing practical guidance for students, practitioners and professionals involved in the industry.
  • In order to create a global resource for the hospitality finance industry, Hospitality Financial and Technology Professionals (HFTP®) began development on a global hospitality accounting system users guide this past March. Recognizing that operating hotels is a global industry, HFTP determined that there is not a globally accepted method that financial professionals, ownership structures, investors and benchmarking information services can use to support efficient operations. There is also not a globally accepted method to monitor investment performance from region to region without significant assumptions and data mining. HFTP’s Global Hospitality Accounting System Users Guide (GHASUG) will address this need. Where does the project stand right now? Currently, research is being conducted into current practices. This research will identify who is doing what in different parts of the world, with a view to establishing best practice and providing practical guidance for students, practitioners and professionals involved in the industry. The guidance will be formulated by industry experts, based on the research findings. To date HFTP has commitments from major information benchmarking companies, hotel corporations, hospitality associations and globally recognized hospitality schools around the world. Once completed, HFTP will make the outcome accessible online, together with analytical tools. It will be available at a minimal cost and users will have the capability to print versions if they desire. The hotel sector currently enjoys the benefits of an accounting structure developed in the USA specifically for the industry.  The Uniform System of Accounts for the Lodging Industry has been widely adopted, principally by US based operating companies, and linked to management contract terms.  HFTP has been involved in this project for many years and will continue to sponsor the 11th edition in support and via a monetary contribution.
  • ...1 more annotation...
  • The Global Hospitality Accounting System Users Guide will provide for a wider community of information users, and demonstrate approaches to the production of alternative analysis of data for hotel performance measurement.
  •  
    In 01 Mar 12 someone share a article about the global hospitality accounting system. That article talks about how the Hospitality Financial and Technology Professionals (HFTP) are in the process of making a user guide for the global hospitality accounting system. This article is an update that publish recently. It shows where does the project stand right now and what is next for the project. However, the first part of phase one- covering the UK and continental Europe- is now well in progress.
  • ...2 more comments...
  •  
    It has been found by the Hospitality Financial and Technology Professionals that a global hospitality system needs to be developed. They recognized that there is no globally accepted method that can be used to support an efficient operation. "There is also not a globally accepted method to monitor investment performance from region to region without significant assumptions and data mining." The hotel sector in the USA currently has in place an accounting structure, but based on this research that is going on comparison will be made of what is happening globally and they will devise some best practices for persons involved in the industry.
  •  
    Hospitality Financial and Technology Professionals began to create a global hospitality accounting system for the hospitality finance industry. Currently, the research is being conducted into current practices. This will give a view to establishing best practice and providing practical guidance for students, practitioners and professionals involved in the industry. Once it is completed, it will provide for a wider community of information users, and demonstrate approaches to the production of alternative analysis of data for hotel performance measurement. Now, the first part is in well progress covering the UK and continental Europe. And the project will still take a further 12 months to complete.
  •  
    HFTP's Global Hospitality Accounting System Users Guide will set a global method for hospitality industry.   Recently, research is being conducted into current practices. This research will identify who is doing what in different parts of the world, with a view to establishing best practice and providing practical guidance for students, practitioners and professionals involved in the industry.
  •  
    Hospitality Financial and technology professionals was developing a global hospitality accounting system in the past year. Their fist step is to cover the UK and continental Europe. The second step is to do search about South and central America and cover them. The third step will begin for China and India, and the last two segments will be Russia and North America. This is quite a large program. If the program was completed, a globally accepted method that financial professional, ownership structure, investors and benchmarking information services can use to support  efficient operations will be formed, and a globally accepted method to monitor investment performance from region to region will also be formed.
armanyleblanc767

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Reliance on Paying By Card
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • challenge to maintain teams of well-trained staff.
  • Compliance
  • Insider Threats
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
mmdmd99999

Disadvantages of Cloud Computing - Cloud Academy Blog - 0 views

    • darielmolano
       
      Despite its benefits, cloud computing has its disadvantages. An outage could happen as well as downtime. Now, there are ways to minimize the effects of downtime and outage such as multi-region deployments
  • Cloud computing has benefited many enterprises by reducing costs and enabling a focus on one’s core business competence
  • here can be disadvantages to cloud computing, especially in smaller operations.
  • ...15 more annotations...
  • key disadvantages and share tips and best practices that your teams can employ to address them.
  • Since cloud computing systems are internet-based, service outages are always an unfortunate possibility and can occur for any reason.
  • Best practices for minimizing planned downtime in a cloud environment
  • storing data and important files on external service providers always opens up risks.
  • Their dependence on remote cloud-based infrastructure meant taking on the risks of outsourcing everything.
  • Best practices for minimizing security and privacy risks
  • Even the best teams suffer severe attacks and security breaches from time to time.
  • Best practices to help you reduce cloud attacks
  • Since the cloud infrastructure is entirely owned, managed, and monitored by the service provider, it transfers minimal control over to the customer.
  • Best practices for maintaining control and flexibility
  • asy switching between cloud services is a service that hasn’t yet completely evolved, and organizations may find it difficult to migrate their services from one vendor to another.
  • Best practices to decrease dependency
  • Pay-as-you-go cloud services can provide more flexibility and lower hardware costs, but the overall price tag could end up being higher than you expected.
  • Best practices to reduce costs
  • the suitability of cloud computing for your specific use case should be assessed in a risk-based evaluation.
  •  
    Cloud computing has its disadvantages like outage and downtime
  •  
    This article speaks on some disadvantages of Cloud computing all while providing ways to tackle these threats. For example, other than the main and common disadvantages it also touches on is the switching between cloud services. This can be seen due to the lack of growth within the cloud system. Eventually the gaps between servers can cause risk of security and loss of information.
  •  
    cloud computing disadvantages: downtime, security and privacy, vulnerability to attack, limited control and flexibility, vendor lock-in, cost concerns
augu010

5 Best Practices to Prevent Insider Threat - 0 views

  • Insider threat continues to be a problem with approximately 50 percent of organizations experiencing at least one malicious insider incident per year, according to the 2017 U.S. State of Cybercrime Survey.
  • While intellectual property (IP) theft, IT sabotage, fraud, and espionage have continued to appear as the primary forms of malicious insider threats, new research has led us to understand the patterns related to unintentional insider threats. These threats represent a significant risk for organizations and potential attack vectors for malicious insiders and external adversaries.
  • Know and protect your critical assets Develop a formalized insider threat program Deploy solutions for monitoring employees actions and correlating information from multiple data sources Clearly document and consistently enforce policies and controls Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees
  • ...18 more annotations...
  • The trust that organizations place in their workforce can leave them vulnerable to malicious insiders, who often use particular methods to hide their illicit activities.
  • Current technology allows seamless collaboration, but also allows the organization's sensitive information to be easily removed from the organization. A complete understanding of critical assets (both physical and logical) is invaluable in defending against attackers who will often target the organization's critical assets.
  • Critical assets can be both physical and logical and can include facilities, systems, technology, and people. An often-overlooked aspect of critical assets is intellectual property.
  • Insider Threat Incident Response Plan:
  • Organization-wide Participation:
  • versight of Program Compliance and Effectiveness:
  • Confidential Reporting Mechanisms and Procedures:
  • Formalized and Defined Program:
  • ommunication of Insider Threat Events:
  • Protection of Employees' Civil Liberties and Rights:
  • Policies, Procedures, and Practices that support the InTP:
  • Data Collection and Analysis Techniques and Practices:
  • Prevention, Detection, and Response Infrastructure:
  • Insider Threat Practices Related to Trusted Business Partners:
  • Insider Threat Integration with Enterprise Risk Management:
  • Organizations should ensure policies and controls provide: concise and coherent documentation, including reasoning behind the policy, where applicable consistent and regular employee training on the policies and their justification, implementation, and enforcement Organizations should be particularly clear on policies regarding acceptable use and disclosure of the organization's systems, information, and resources use of privileged or administrator accounts ownership of information created as a work product evaluation of employee performance, including requirements for promotion and financial bonuses processes and procedures for addressing employee grievances
  • wareness training for the unintentional insider threat should encourage employees to identify potential actions or ways of thinking that could lead to an unintentional event, including level of risk tolerance--someone willing to take more risks than the norm attempts at multi-tasking--individuals who multi-task may be more likely to make mistakes large amounts of personal or proprietary information shared on social media lack of attention to detail
  • Our intent was to develop a single definition for insider threat that covers malicious and non-malicious (unintentional) insider threats covers cyber and physical impacts applies to both government and industry is clear, concise, consistent with existing definitions of 'threat', and broad enough to cover all insider threats
  •  
    This article goes into detail about various safe practices that can prevent cyber threats. Policies and procedures must be created in order to protect us from cyber crimes. Governments have worked hard to protect data from being hacked.
Alyssa Westmeyer

Hotel technology trends that are changing how hotels do business - 1 views

  • Choice created the software in 2003 as an inexpensive solution for franchisees of its economy brands.
  • The PMS had a lot of growing pains at first, but eventually it became more and more cloud enabled and was adopted across the company.
  • “A lot of companies had outsourced their IT and now they’re bringing it back in house because they can do almost everything they need on the cloud or through software as a service.
  • ...4 more annotations...
  • pects of a franchisee’s business, from guest check-ins and housekeeping services to billing and finances. Over time new features have been rolled into the software platform making it more robust and useful for hotel owners—it’s currently distributed in eight countries and available in four languages. And while plenty of cloud-based PMS packages are now available from third-party vendors like Micros, Maestro, and RoomKey, Choice’s internal solution has garnered its fair share of attention. “We had been getting knocks on the door from IT vendors at other hotel companies and individual Choice franchisees that own other brands, saying they were interested in our product,” says Pacious, “So we set up a new division so we could take a look at other opportunities we could develop.” This led the company to launch SkyTouch last year, a new division that develops and markets cloud-based software solutions to hotels inside and outside the Choice system. Pages: 1 2 3 4 2013-06-18 Sean Downey !function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })(); (function() { var li = document.createElement('script'); li.type = 'text/javascript'; li.async = true; li.src = ('https:' == document.location.protocol ? 'https:' : 'http:') + '//platform.stumbleupon.com/1/widgets.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(li, s); })(); inShare0 Related Articles attachment-3
  • Switching to the cloud from a client server platform pays off with a big drop in both the initial capital outlay and the ongoing operating costs for the property management and other systems.
  • his led the company to launch SkyTouch last year, a new division that develops and markets cloud-based software solutions to hotels inside and outside the Choice system. Pages: 1 2 3 4 2013-06-18 Sean Downey !function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })(); (function() { var li = document.createElement('script'); li.type = 'text/javascript'; li.async = true; li.src = ('https:' == document.location.protocol ? 'https:' : 'http:') + '//platform.stumbleupon.com/1/widgets.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(li, s); })(); inShare0 Related Articles Hotel Market Insight: Cleveland a
  • This led the company to launch SkyTouch last year, a new division that develops and markets cloud-based software solutions to hotels inside and outside the Choice system.
  •  
    Choice Hotels has been a industry leader in the cloud PMS movement. They identified the opportunity to create their own platform 10 years ago when cloud was barely on the radar and have now successfully distributed it to 5,500 of their properties. Unique functionality built into the system is internet redundancy via cellular data plan, company-wide campaign pop-up messages to staff, interface to Pegasus and revenue management through predictive analytics. The platform has been so successful that, in response to inquiries from other companies who wanted to use Choice's proprietary system themselves, they created an additional revenue stream by establishing a separate company that sells and creates custom cloud PMS systems. One advantage pointed out is that managers no longer need to be on property to access and make changes to their PMS. While this is hugely beneficial to the majority of the industry (who already work long hours and visit the property on their day off), there may be some who take advantage of the situation. If this becomes the case, less oversight at the property means that operations has the potential to slip. It doesn't seem that this is a concern for Choice Hotels but it should be considered.
mannypjr

The Best HR Practices in the Hospitality Industry - 0 views

  • the quality of your customer services and staff responsiveness has a direct impact on the image and reputation of your hotel
  • Hotel executives need to devise a well-managed and robust talent management strategy that creates a culture of ongoing development, high performance, and organization-wide commitment to providing top-notch service in a practical way.
  • recruiting, hiring, and retaining skilled and experienced employees
  • ...9 more annotations...
  • Many hotels are incorporating web-based solutions to optimize their key management functions in order for managers, HR executives, and employees to shift their focus to other high value activities.
  • Within just a year, the hotel experienced significant positive results in terms of better alignment and lower turnover.
  • scale, magnitude, duration, and strategic importance
  • experience and knowledge must be readily available to employees, and must be proactively delivered to the right person at the right time.
  • The senior management needs to outline such customer service values of their hotel, and ensure that their staff at all levels has clear understanding of how their individual actions contribute to providing these values.
  • senior executives also need to empower employees to ensure they deliver them in a way that adds values to the customer experience.
  • hotels are cultivating talent pools internally and preparing their employees to assume leadership roles whenever the time comes.
  • they need to reinforce core messages through timely advice, which should be both practical and inspirational.
  • Each employee needs to know this change is going to affect their work, what they are expected during and after the transformation process, on what basis their performance will be measured, and what is the altered definition of success and failure.
  •  
    This article outlines some best practices in the hospitality industry. These include: Talent Mgmt. & High Levels of Customer Centricity, Executing Enterprise-Wide Transformation, and Lessons from Industry Leaders.
khadija2050

50 Facilities Management Tips and Best Practices - Camcode - 0 views

  • Cut night site lighting. “Depending upon how your site lighting is operated and circuited, you can create an ‘economize mode’ for overnight when the site is at its lowest occupancy. Keep perimeter site lighting on around your property and all entrances and main drives lit.
  •  Replace older lighting with LEDs. “Memorial Sloan-Kettering Cancer Center chose LEDs to replace existing lighting in a parking garage open 24/7, halving the garage’s power consumption. Meanwhile, Mediapolis Community Schools in Mediapolis, IA, also embarked on a retrofit of LED exterior lighting.
  • Implement a sustainable facility design plan. “Sustainable design is more attainable and affordable than it’s ever been, especially when you think in terms of years instead of days and weeks. It’s also worth noting that sustainable design is very well favored among the public, which is an extra incentive for companies interested in reinforcing their reputation as socially responsible and environmentally concerned
  • ...47 more annotations...
  • Know the total cost of all facility work done both directly and indirectly. “To the untrained eye, the facilities maintenance arm of a business appears to be a black hole of cost. The costs of these FM services add up, and unless discrepancies arise, that is where most of the business analysis ends. However, facilities maintenance managers, who are privy to all of the nuances that make up eac
  • h work order, understand the complexities and overhead involved in this sector of business.
  • Consider less obvious improvements that impact facility energy use. “Some energy-related projects will be more or less hidden from the users and primarily pursued to reduce energy demand, such as chiller and fan-unit upgrades. Such projects may end up providing the building users with better temperature control, but this is not the primary goal of the upgrade
  • Operational changes such as reducing the hours of HVAC and lighting operation, and changing setback temperatures, which require very little expenditure (if any at all) do not directly affect user experience, but can produce large reductions in electricity loads. In general, working with the building operations team to reduce energy use can produce impressive reductions in loa
  • his allows building and facility management professionals to determine whether the cost to improve a particular element of a building or a system in it against the cost savings over the same period. If the cost of an upgrade over its lifetime offers an advantage over the building operational costs it will save, then it’s generally considered a good investmen
  • “Finding the right suppliers to maintain your facilities can be difficult and time-consuming. From janitorial services, to groundskeeping and maintenance supplies, ensuring suppliers are providing apples-to-apples quotes, developing contracts with clear service levels, and validating that supplier quality
  • “Boilers today can reach efficiencies of up to 96 percent using condensing technology; however, a typical building, including new buildings, uses atmospheric type boilers which, for all intents and purposes, are only slightly more advanced than a science lab Bunsen burner. This technology is reliable and it works, but it is expensive to operate
  • An energy audit systematically identifies and develops opportunities to help reduce energy use in an institutional or commercial facility and, as a result, decrease building operating costs. Focusing the audit is imperative for maintenance and engineering managers.
  • “Commercial kitchens are high energy users, consuming roughly 2.5 times more energy per square foot than any other commercial space, according to the US Environmental Protection Agency (EPA).  Of that, as little as 40% is used in the preparation and storage of food, says the UK’s Carbon Trust; much of the wasted energy is dispersed into the kitchen.
  • All commercial buildings are insulated; building codes make it mandatory to insulate up to  a certain level. Unfortunately, because most buildings are put up under strict guidance to budgets, they are usually put up with only the minimal amount of insulation
  • Develop performance measures for your PM process with an emphasis on measuring the amount of PM that is work completed compared to all other work. Total PM hours should be the highest percentage of all the department’s maintenance work. This goal might seem impossible, but over time, it is very achievable
  • “Preventative maintenance is all about planning, plain and simple. Every piece of equipment or machinery at your disposal or under your care should have a schedule of what type of maintenance it requires and when it requires that check-up.
  • “Failure modes are defined as “how something fails.” Let’s use a flat/membrane roof to show an example of what a failure mode is. On a flat/membrane roof, one failure mode may be “penetration of roof membrane,” and the causes of this failure mode could be many. Knowing the failure mode(s) of a specific maintainable item such as a membrane roof and its causes can be key to early detection of roof failure (not meeting the intent of the end user) so the repair can be made before it affects an operatio
  • “Catch small problems now before they become big ones. Addressing small details can add up to huge improvements in appearance and functionality. Ask your facilities services provider, janitorial company
  • You may schedule preventive maintenance based on meter readings on an equipment. However, equipment meters usually do not differentiate between work time and idle time
  • Greasing the rack and pinion of a beam saw, for instance, can cause grease and saw dust to solidify inside the gears over time, eventually preventing them from moving. If you’re unsure which tasks are beneficial to each piece of equipment, ask your equipment representative.”
  • Having spare parts and supplies around the time of a major preventive maintenance schedule is absolutely critical. Asset management software allows you to check the availability of the spare parts for dates when the work orders are due. This report can help you identify parts that are insufficient for the required work orders in the future. If you know which parts you are falling short on, you can order them in advance from suppliers rather than waiting till re-order limits are reached
  • “Appropriate repetition and reinforcement are necessary. The average person is bombarded with more than 300 messages while at work, and multiples of that outside of work, Finney says. Getting a message to land with an audience might take as many as 12 repetitions, in some cases, he says
  • Let’s get together: when you’re designing your facilities, design social spaces for your employees. These might be lunch or break rooms, games rooms, gyms, or even community gardens.
  • While other managers may work to manage clients or staff, your job is to manage facilities and all that occurs in them. Your corporation’s physical assets are just as important as your human resources, and you are the expert in this field. Whether it’s collating data or contributing to the organization’s bottom line, your input is a valuable part of corporate decision-making
  •  “Workplace inclusion has to be clearly defined before any initiatives can be pushed forward. One useful definition of an inclusive office is a workplace in which all staff are treated with respect and have equal access to resources and opportunities. Facility managers should build on this high-level description to create an idea of what concepts like equal access, diversity and fairness look like in their own facilities
  • Space costs money. Knowing that we are moving towards a working environment consisting of virtual or mobile workers, investing time in developing new workplace designs that can suit these new ways of working while increasing space utilization rates can result in impressive cost savings
  • Performing facility maintenance and engineering tasks is like sailing among icebergs. What technicians can’t see will sink them — or their facilities. Thermal imaging technology gives technicians the ability to see the unseen, making it easier to spot failing motors and electrical components,
  • This concept is broadly used to describe our attempt to formally identify in-house talent in many of our labor shops. We identify talent through a competitive selection process based on potential vs. skills and promote our selected personnel to the worker and helper level while training them to achieve appropriate full mechanic level with associated certifications/licenses
  • This directly leads to the client receiving a more fit-for-purpose solution and ultimately receiving greater value which grows a greater relationship.
  • In other words, there has to be a compelling reason based on our mission for why we would submit budgets for anything.” By presenting specific information on how and why you’ve chosen your budget numbers, you can help the C-suite see that your budget is well within reason
  • When you automate the work order process, you remove human error associated with it. Essentially, you’re taking the people out of the process and ensuring nothing gets missed or overlooked
  • “There are many different software options out there than can aid FMs in organizing and streamlining their everyday tasks. This ranges from software designed to help manage all maintenance activities to logging and tracking facility visitors for security purposes. 
  • uch smart sensors, operating costs are dramatically reduced, productivity is enhanced, and occupants’ comfort is improved.
  • “One of the most exciting features of Facilities Management software is the ability to manage heating and cooling remotely, or set a programmable thermostat to move set temperatures up or down throughout the day. Facilities planners love the ability to analyze and explore energy use from heating and cooling systems
  • “Maintenance and facilities administration systems must frequently abide by national and global regulatory requirements. All maintenance administrators face occasional random or audits inspections by regulatory authorities. Maintenance software enables you to prove regulatory conformity and decrease the amount of paperwork and preparation that is needed for an audit.
  • KPIs allude to opportunities and errors in your company. Paired with the Internet of Things (IoT) and energy management systems, KPIs can be used to highlight missed maintenance tasks, greater traffic area of your business or problems with machinery
  • “Closely monitoring energy and water use to reduce building-operating costs is another benefit. By allowing owners to monitor and analyze the performance of multiple systems—air-conditioning levels, lights on automatic dimmers, water usage
  • “A feature that’s gaining a lot of ground is using facial recognition technology to let people in and out of the building. It’s more secure than key fobs or cards, and unlike cards and fobs, you can’t forget your face at home. It’s like batting a triple, or killing three birds with one stone
  • You cannot do your job properly without the correct information. If you don’t have proper records on the state of your facilities, you can’t do your job as a facilities manager.
  • “A surprising number of facilities managers have no true system in place for managing their space.  More than a quarter of everyone interviewed – 28 percent –
  • . It may help significantly with compliance with various industry standards, such as HIPAA in the healthcare industry and Sarbanes-Oxley in the financial field. It can help to document best practices for avoiding accidents, or in the worst case scenario,
  • This method identifies how critical a piece of equipment or maintenance task is to your business and will ultimately show you where it should land in your prioritization process
  • Smartsheet is a spreadsheet that you share with your co-workers, but its features go far beyond Excel. This tool combines the traditional spreadsheet with project management tools, templates, and forms and allows you and your colleagues to access spreadsheets on mobile devices and work on them collaboratively
  • The business world is increasingly embracing a larger remote workforce. Offices are used as areas to collaborate, develop, and design new ideas. The day-to-day work can be, and often is, done from home
  • “Another possibility for cutting costs, say experts, is not just moving staff around, but moving work around also. This means carefully examining all outsourcing contracts to see if they can be scaled back and the work completed by in-house staff
  • “Verify assets from a minimum of two data points, such as the barcode and the item’s serial number.
  • After collecting data and developing a maintenance schedule for your assets, you need to plan for the long-term maintenance of your asset inventory
  • However good asset management and maintenance planning is, there comes a time when an asset reaches the end of its useful life and should be disposed of.
  • “If you’re trying to get a handle of your documents, the first thing you should do is an asset assessment. Detail the condition of all the main equipment and systems, and document those conditions
  • Strategic asset management integrates key relationships between planning and delivery activities.
  • Maximize your use of vertical cubic footage by placing seasonal products or those that move less frequently in harder-to-reach vertical storage areas
  •  
    the article highlights how companies can benefit from sustainable design and gives tips on preventive maintenance
damanigoode

Environmental Sustainability in the Hospitality Industry: Best Practices, Guest Partici... - 0 views

  • To learn about guest participation and satisfaction in sustainability programs for over 89 hotel brands, we draw from a broad survey of 120,000 customers in the J.D.Power database over a period of five years, 2006 through 2010.
  • Hotel operators are well aware of the potential ben-efits of sustainability, and many of them publicly promote resource conservation.
  • Guest satisfaction with hotels’ sustainability programs is seen as essential for their success
  • ...7 more annotations...
  • Based on these surveys, the most effective and widely used environmentally sustainable best practice among resorts is towel and linen reuse programs.
  • Offering sustainable programs does increase guest satisfac-tion, but the effects are modest, as shown in Exhibit 7, which shows the statistical effects by segment and overall.
  • Although studies from the general sustainability and marketing literature suggest that consumers do value envi-ronmentally sustainable products (although with limits), we believe that the relationship between hotel’s environmental sustainability-related initiatives and customer satisfac-tion measures reported by hotel guests remains uncertain.
  • Although hotels’ sustainability efforts are essential for saving energy and resources, a key element of any green program is guests’ reaction and participation.
  • The traditional drivers of satisfaction (room, facilities, and food and beverage quality) still overwhelm the effects of green operations. That said, green programs do not diminish guest satisfaction, so hotels may consider their cost-benefit analysis, potential for improved employee relations, and reduced risk in addition to “green” satisfaction to determine whether these investments are beneficial.
  • The LEED certification system’s new v4 scorecard is specifically designed for the hospitality industry and is intended to create incentives for new lodging construc-tion that meets sustainability criteria.
  • It has also been found that water-saving notices in bathrooms that encourage custom-ers to regulate their water use are effective.
  •  
    This article shares results from an environmental sustainability study of 100 US resorts and a separate survey of 120,000 hotel guests. It discusses a variety of sustainability initiatives such as water and energy conservation, recycling and waste reduction, LEED construction, and guest engagement. While guest engagement was significant, indicating 75% of guests surveyed actually participated in sustainability initiatives during their stay, the effect on guest satisfaction is modest at best. At best, only 0.6% of guests selected specific properties based on environmental sustainability. Guest participation in sustainability efforts were highest at extended stay locations, followed by luxury and upscale properties, with economy properties placing last. The most effective and commonly used aspect of sustainability efforts was towel and linen reuse, showing up in 91% of the survey responses. Overall, while the traditional drivers of guest satisfaction remain consistent across brands and property types (room, facilities, food and beverage quality), sustainability programs do not lower guest satisfaction, but are increasingly becoming a standard expectation of both guests and employees, and have significant cost-savings potential when implemented and managed effectively.
kdibe001

About SERI | SERI - Sustainable Electronics Recycling International - 1 views

  • Recognizing the need for comprehensive best-practices 
  • that addressed the operational and environmental challenges in electronics recycling and repair, the US Environmental Protection Agency convened a multi-stakeholder process to create a voluntary, market-based mechanism for ensuring best practices in electronics recycling.  What emerged from that process was the “Responsible Recycling practices for Use in Accredited Certifications Programs” (R2) Standard.   
  •  
    SERI is multi-stakeholder group made up of the Environmental Protection Agency, Regulators, Trade Associations, and many others to commit to recycling in a non-harmful way electronic waste, more commonly known as e-waste. This group certifies recycling centers to ensure that the most environmentally friendly practices are put into place and a locator can be found on their website for one to use. It is estimated currentlybthat at this rate, wasted electonics will increase 33% by the end of the decade, which is an alarming amount. This shows that governement officials are starting to take a stance.
hui wang

The Advantages of Point-of-Sale Systems | eHow.com - 0 views

  • Point-of-sale systems have replaced traditional cash registers
  • Price Adjustments
  • With a point-of-sale system, you can enter promotion codes for customer discounts
  • ...1 more annotation...
  • You can have your point-of-sale system tailored to your industry
  •  
    This article is to emphasize the importance of point of sales system, including the advantages that help restaurant operating business every. For instance, counting is the simplest approach to checking your inventory on the shelves in a small business and this is called stocktaking, especially, for small businesses, like a small toyshop, stocktaking is a thoroughly practical approach. However, most of the time stock management is not that simple, and sometimes the practical option is not the best option. There can be discrepancies between the physical and the stock records, especially when it concerns annual stock management. This is why it is advisable for every business owner to use computerized POS systems in stock management. The best thing about having a computerized POS System in the retail business is: as new stocks arrives and as it is sold, it keeps the stock levels current and updated, hence making it is easier to identify which items are selling and which items are not. A POS System is also good in checking for any obsolete or out of date stock that needs to be disposed. For the managers, if they are still counting the inventory manually on the shelves or in the warehouse, something should be thought twice about the lacking of efficiency method, for there are many advantages in using a POS System mentioned in this article. One advantage of a POS System is its ability to help the business achieve detailed real-time stock level information. In addition, a POS System can also give some information such as weather forecasts, public holidays and major sporting events, which can be of great help in determining the stock level of seasonal products. Managers can now efficiently and effectively handle their stock management accurately.
shuo zhang

Feds Offer Best Practices for Customer Privacy | Top Stories | | Hospitality Magazine (HT) - 0 views

  • Hospitality industry operators often collect information to better serve their customers.  Information may be collected during various touch points, including employee-guest interactions, the company website, and through business partners, and may include personal identifiable information, preferences, groups with which customers are affiliated, etc.  While customers understand that sharing their personal information helps businesses better serve their needs, they also have a right to know how that personal information is being collected, used and shared.
  • Protecting Consumer Privacy in an Era of Rapid Change:  A Proposed Framework for Business and Policymakers
  • This final report calls on Congress to enact general privacy, data security and breach notification, and data broker legislation in order to protect consumer privacy.
  • ...5 more annotations...
  • The privacy framework applies only to commercial entities that collect non-sensitive data from more than 5,000 customers per year
  • This element recommends that entities build in privacy at every stage of product development. Substantive protections include data security efforts such as encryption, reasonable collection limits, sound retention and disposal practices, and data accuracy. Policies and procedures should be designed that:
  • •Protect personal information from unauthorized access; •Keep personal information accurate and up-to-date; •Require that business partners with which information is shared exercise reasonable efforts to maintain the confidentiality of personal information about customers; •Educate employees regarding privacy and best practices for protecting customer information; •Protect personal information transmitted via websites during online transactions or when using other technology.
  • : A customer should be offered a choice at the time, and in the context, that his or her data would be used.
  • A customer should be provided with reasonable access to company-maintained data.
  •  
    The problem of the security in the internet is always risky for companies. Even though the customer trust the companies, but acctually, the companies sell your information without ask you if you want to share your information. For me, the organization for keeping the customers' information secured is useful and make sense, but I don't believe any companies want to pay for such service. They want to get income through selling the customers' information to other for comercial using. However, if the government make policy and establish law for protecting the customers information, it will be different. I think it will become a trend to promote. 
sharlabrunsvold

Best Practices for Sustainable Hospitality from Florida's Green Lodging Program - 2 views

  • Once awarded, the designation is good for three years, and to maintain it, properties have to submit environmental performance data on water, waste and energy every year.
  • In addition to the recognition, Green Lodging properties get preference for state-run meetings and conferences.
  • Florida is fortunate to have an entire program focused on sustainable hospitality and eco-friendly best practices. With incentives for state business and statistics on how sustainability saves money, the program makes eco-friendly practices a win all around.
  •  
    This article provides in-depth information regarding Florida's Department of Environmental Protections' Green Lodging Program which "recognizes lodging facilities that make a commitment to conserve and protect Florida's natural resources." The program has four tiers and pays close attention to communication and education, waste reduction, water conservation, energy efficiency and indoor air quality. This program not only benefits the planet, but it benefits the hotel industry by cutting back costs.
wenzheng guo

Security best practices in hotels - Information Security Magazine - 1 views

  • To better understand the security issues in the hospitality industry, we need to examine two distinct parts: the hotel network that processes payments, stores personal information about guests and conducts routine services as a part of everyday business, and the Internet connectivity offered as an amenity to guests.
  • Most of the reports tend to label the industry as one of the worst with regard to information security
  • To better understand the security issues in the hospitality industry, we need to examine two distinct parts: the hotel network that processes payments, stores personal information about guests and conducts routine services as a part of everyday business, and the Internet connectivity offered as an amenity to guests.
    • wenzheng guo
       
      This classify of two ways is a new idea. We may seprate duties by it.
  •  
    IT security is an important part for hotel operation and attracts enough attention by hotel operators. We are eager to seek best approach related to IT security application. As we all konw, depnding on some competent applications, the operation can efficiently maintained and the overall performance will also be improved. For this reason, the best practice of security issues in hotels should be a professional work process, which must be supported by both human and technology resources. I believe regardless of whether the investment is high or low, we need try our best to achieve it and as a result, it will bring a desirable return for us.
delaneyverger

Evaluating Hotel and Hospitality Management Software | By Ahmed Mahmoud - 0 views

  • The growth in the world economy and the hospitality industry has resulted in a clutter of new Hotel Management software companies vying to increase their footprint around the market. This has not only started a price and promise war amongst the new entrants, but has also been creating immense doubt and confusion in the minds of the IT Managers and decision makers in order to differentiate between many. Besides this, the assumption that the value of a Hotel Management Software is obvious and can be rarely defined either in abstract or practical terms fuels the confusion further.
  • For all hotels, resort or Inn and in order not to get confused when deciding to purchase any management software please consider the below 12 steps:- Select the Project Manager. Determine the budget and get sign off. Select the Evaluation Team. Define the property type and identify who the guests are. Identify business needs and identify guest needs. Drill down and identify specific needs in relation to the property management system. Research property management system vendors that offer the majority of features that match the needs assessment. Create a potential vendor list. From the potential Vendor list, break it down to a short list of 5 or less PMS Vendors. Arrange and participate in system demonstrations by Vendors from the short list. Make the decision. Ask for references and contact them.
  • Once you have a good business case with regard to ROI, conducting a TCO analysis helps to conclude the analysis. A thorough TCO analysis will pinpoint where the differences are in solution costs, over a multi-year timeframe. This two-pronged approach ensures that you will not only get a good return, but that you ultimately will work with the most cost-effective solution.
  • ...3 more annotations...
  • In this rapidly changing industry, hoteliers should always look for property management tools that will ease operations, automate procedures, reduce the risk of human errors and give hoteliers enough time to attend to guests.
  • When evaluating the TCO of software, one should not restrict the calculation to the initial cost of purchase, but should also calculate the cost of managing the software to its complete life and should incorporate the following points in their calculations. Cost of initial deployment and employee training. On-going fees for maintenance, software updates and upgrades as well as help-desk support. Costs associated with downtime Cost associated with the business process re-engineering.
  • As technologies advance, the old clears a path for the new. Some individuals may be inclined to hang on to what they are comfortable with, but they won't advance if they don't make room for the best and brightest
  •  
    This article talks about how important software is in the hospitality management industry and the different types of software that particularly businesses may use to best serve their needs. Property Management Systems provide a whole host of functions for hotels, including keeping track of guests checking in and out, monitoring room charges, and supervising the housekeeping of rooms. Because this software is so vital to the hospitality industry, there has been an upsurge by software companies trying to make their mark in the industry, which has led to a market fragmentation due to the numerous options available. This also puts a strain on managers, as there is much confusion about which software is best and the most cost-effective. There is a system to determining which management software best suits any particular company. Two key features in this process are the ROI, Return on Investment, and TCO, Total Cost of Ownership. ROI provides a cost-benefit analysis of a particular software with regards to the speed with which a company will make the money back that they invested in it, as well as the numerous features that a company would need from the software. TCO is an analysis that companies use to accurately ascertain the costs of the software. Companies should seek a lower TCO and a higher ROI when making any software purchase decisions. Because the technology market is ever changing, companies must stay up-to-date with the newest software in order to provide the best service for, and to keep up with the demands of, their guests. This can be exemplified with the recent trend in cloud-based PMS.
jingyaoxie

Hospitality Solution - 1 views

  • POS systems have revolutionized the Hospitality industry. The deployment of these systems have decreased service times and increased efficiency of the orders.As a result, the hospitality industry is able to provide better and efficient services to their guests. Further, these systems help the hosts differentiate themselves from their competition; thereby increasing their market share and improving their revenues.
  •  
    POS systems have become a key in the hospitality industry. With these invention the hospitality industry, is able to provide the best and efficient service to their guests. Also, POS systems allows to have the correct information on profit, inventory, etc. In the market, we have hundreds of companies that are competing in providing the best prices and services....
  • ...2 more comments...
  •  
    There are so many reasons why a business should choose to go with a point of sales. The ability to track and record sales, marketing and promotional sales allows you to gather data from previous promotions and security is also a plus for adding a point of sales. You can monitor sales without being present; instead of focusing on ensuring that employees don't take money, POS would allow you to perform other jobs within your role.
  •  
    This article discusses only the positives of POS systems. I do agree with the fact that there are many advantages of these systems such as monitoring sales. These systems are also cost-effective and convenient. However, I personally would have liked to see some disadvantages in the article, even though I do feel that these systems are very advantageous to the hospitality industry.
  •  
    POS systems have revolutionized the Hospitality industry. The deployment of these systems have decreased service times and increased efficiency of the orders.As a result, the hospitality industry is able to provide better and efficient services to their guests. Further, these systems help the hosts differentiate themselves from their competition; thereby increasing their market share and improving their revenues. Moreover, these systems help the industry in managing compliance & regulations into their business practices. Hospitality is the act or practice of reception and entertainment of guests with kind and generous liberality. It is a relationship between a guest and a host. The hospitality industry includes hotels, restaurants ,casinos,catering, resorts, membership clubs, conventions, attractions, special events,and other service for travelers and tourists.
  •  
    POS systems have revolutionized the Hospitality industry. The deployment of these systems have decreased service times and increased efficiency of the orders.As a result, the hospitality industry is able to provide better and efficient services to their guests. Further, these systems help the hosts differentiate themselves from their competition; thereby increasing their market share and improving their revenues. Moreover, these systems help the industry in managing compliance & regulations into their business practices. Hospitality is the act or practice of reception and entertainment of guests with kind and generous liberality. It is a relationship between a guest and a host. The hospitality industry includes hotels, restaurants ,casinos,catering, resorts, membership clubs, conventions, attractions, special events,and other service for travelers and tourists.
Yanique Coach

Green Hotels - Marketing and Profitability Advantages of Environmentally Friendly Pract... - 1 views

  •  
    Hotels and restaurants that have gone green, try to analyze how to effectively market the facet of their operation or how to market themselves going green. Some factors they would have to acknowledge about going green are how the practices can affect them and also where these supplies come from. Hotels can follow concepts of restaurant that focus on supply chain and local sourcing which might be an effective way of communicating environmental priorities. Front line employees are the best way to start with convincing customers that the establishment is committed  to being green.
kabir joshi

Hotels taking steps to improve data protection - 2 views

  • This being the case, it is encouraging to see some hotels are making moves to lock down their data security practices. There is clearly a great deal of work that needs to be done, but if a hotel can demonstrate it is capable of protecting customer information, it may be more likely to inspire confidence in consumers, which, in turn, could afford the hotel a competitive edge.
  • According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information. To overcome some of these and other concerns, McBeth said hotel operators are applying the best practices detailed by the Payment Card Industry Data Security Standard (PCI DSS), which aims to address data security for businesses that handle payment cards. However, he admitted that the task of ensuring protection throughout an organization is difficult, given the number of channels where vulnerabilities could be uncovered.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • ...21 more annotations...
  • This type of situation was brought to a head earlier this year when marketing services giant Epsilon experienced a massive breach to its email systems. According to a SecurityWeek report, among those impacted by the breach were several hotel operators, including Hilton, Ritz-Carlton and Marriott.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information
  • According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • Hotels
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • otels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • Hotels
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  •  
    This article is related to IT security in hotels. Around six months back a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators met at the LodgeNet's Customer Technology Symposium in Chicago to discuss on how protecting customer data is becoming their top priority. This type of situation was brought to a head earlier this year when marketing services giant Epsilon experienced a massive breach to its email systems. According to a SecurityWeek report, among those impacted by the breach were several hotel operators, including Hilton, Ritz-Carlton and Marriott. According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information. To overcome some of these and other concerns, McBeth said hotel operators are applying the best practices detailed by the Payment Card Industry Data Security Standard (PCI DSS), which aims to address data security for businesses that handle payment cards. However, he admitted that the task of ensuring protection throughout an organization is difficult, given the number of channels where vulnerabilities could be uncovered. This being the case, it is encouraging to see some hotels are making moves to lock down their data security practices. There is clearly a great deal of work that needs to be done, but if a hotel can demonstrate it is capable of protecting customer information, it may be more likely to inspire confidence in consumers, which, in turn, could afford the hotel a competitive edge.
  •  
    Its a tough task to monitor this, because at the end of the day, the responsibility is at the property level to ensure that data is secure across the board. So training employees on the importance of data security and what a breach means could go along way.
tredunbar

Cybersecurity Best Practices for Restaurants | QSR magazine - 0 views

  • In the case of a restaurant, a cyber attack would likely be seeking;Employee details stored by the restaurantCustomer bank details obtained by the restaurantThe restaurant’s business bank account details
  • A restaurant’s POS system could see hundreds of different bank account details every day
  • Internal software used by restaurant staff is likely to contain sensitive information such as employee details (on an HR system), as well as accounting information for the restaurant
  • ...8 more annotations...
  • Restaurant owners and/or accountants who use online banking facilities must be aware of the possibility of this being targeted
  • Shoulder-surfing is a very real security concern, and hackers have been known to place recording devices in computer rooms, enabling them to physically see passwords being entered
  • Restaurants that use a website on which customers can order food need to consider its security. If cybercriminals manage to hack into the site, they will be able to obtain customers’ personal information such as addresses and bank details
  • Create a human firewall by educating your staff
  • Use reputable, recommended providers and suppliers
  • Keep computers away from the front of house
  • Carry out background checks on employees
  • Introduce unique identification numbers for staff
  •  
    The focus of this article is to point out why restaurants are targets for cyber attacks, what information hackers are looking to obtain and to identify what steps can be taken to protect consumer information. Hackers target a restaurant's POS system for the large amount of bank data it may record as well as any online banking occuring in the restaurant. The personal information from employees as well as any app or website utilized by guests, is prone to cyber attacks. The most important solutions rely on conducting background checks on employees and making sure that they are trained on what to look for. Restaurants can also put practices in place that involve using unique employee numbers, keeping computers out of guests' view, and using vendors with a stellar reputation.
zihanwang

Data Security in the Hospitality Industry | CSU-Global Blog - 0 views

  • Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there’s a franchisor, an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. In fact, it was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • Well-trained staff also know how to recognize social engineering attempts, and they understand an organization’s compliance requirements. The risk is that the hospitality industry involves a great deal of of seasonal work in which people might move on after only a few months, or they might be transferred.
  • ...14 more annotations...
  • This type of data risk is more subtle, and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests’ data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data.
  • the job turnover rate in hospitality is as high as 90 percent
  • High Staff Turnover
  • From the perspective of cyber criminals, hospitality appears to offer an ideal target for conducting crimes, such as identity theft and credit card fraud, due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • Information security is a pivotal aspect of many industries
  • Complex Ownership Structures
  • Reliance on Paying By Card
  • Here are five of the biggest data security concerns in the hospitality industry:
  • Compliance
  • Insider Threats
  • Best data-protection practices for companies in the hospitality sector include… Always encrypting payment card information.Operating a continuous training program in cybersecurity to maintain a well-trained workforce.Always adhering to relevant regulations, such as PCI DSS.Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats.Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker.Know where your data is and enforce the principle of least privileges to limit acce
  • ss to sensitive information.
  • organizations in the hospitality sector are better placed to implement a comprehensive information security strategy that entails the necessary procedures, processes, and people to improve cybersecurity within the hospitality industry.
  •  
    The article talks about cyber security threats in the hospitality industry. Threats range from high staff turn over so staff isn't trained thoroughly, to insider threats where employees can sell information to third parties, to Cyber-criminals who infect POS systems with credit cards.
  •  
    Data information security is very important to a business development.In my opinion, I think the relationship is inversely proportional. In other words, the more effective cyber security budget is invested, the less potential impact there is of customer information being stolen (being hacked). Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
1 - 20 of 183 Next › Last »
Showing 20 items per page