Skip to main content

Home/ Hospitality Technology/ Group items tagged credit card

Rss Feed Group items tagged

wenzheng guo

What Are the Different Types of Key Card Systems? - 2 views

  • Metal keys with a jagged row of teeth are becoming increasingly rare as technology improves.
  • In locations as diverse as hotels
    • wenzheng guo
       
      4 kinds of keys mention in the article.
  • using key cards instead of traditional keys.
  • ...17 more annotations...
  • four types of key card systems: holecards, bar code cards, magnetic strip key cards and radio frequency identification (RFID) cards
  • Holecards are the earliest type of key card systems
  • An individual key card is programmed by a computer with a unique electronic signature.
  • If stolen, magnetic strip cards and RFID cards can have the signatures changed, adding security protection from theft.
  • Key card systems operate on the relationship between a plastic card and electronic access control locks
  • Bar code cards were the next innovation in key card technology.
  • The technology used by this type of card includes microchips and radio technology, so it is considered the most difficult to forge and provides the highest level of security.
  • Sornes devised a system that would punch a series of 32 holes into a plastic card. The card would correspond to a lock and would open a door when it was inserted into a slot in the door.
  • his key card type lost popularity when magnetic strips became more readily available,
  • because bar codes could be forged and the electronic reader easily fooled.
  • Magnetic strip key card systems are widely used in the hotel industry and in workplace security. This card looks like a credit card with a thin metallic strip on the back.
  • This type of card is much more difficult to forge than holecards and bar codes, providing an added layer of security.
  • RFID key card systems are a more recent form of technology than holecards, bar code cards or magnetic strip cards. RFID cards have a radio sensor chip embedded inside the card.
  • When brought into close proximity of a correspondingly programmed reader, the door unlocks.
  • an individual bar code is created to correspond with a particular lock and is printed on a card.
  • The technology used by this type of card includes microchips and radio technology, so it is considered the most difficult to forge and provides the highest level of security.
    • wenzheng guo
       
      Later biological key like facial identification may be the next era of keys.
  • In 1975, inventor Tor Sornes devised a system that would punch a series of 32 holes into a plastic card. The card would correspond to a lock and would open a door when it was inserted into a slot in the door.
    • wenzheng guo
       
      first step of security keys.
  •  
    This article is about the different keys available for hotels to use for their rooms. Metal keys which are like what we use everyday for our homes is an outdated form of security key in the world of technology. The key card system is a plastic card with electronic access. Hole cards seen rarely today is a plastic card with a series of holes to correspond to a specific door in the hotel. Bar code cards is exactly that a card with a bar code, like you see at the supermarket, which is placed under an electronic reader. This type of key has been fazed out due to easily being fooled. The magnetic strip key card are widely used in the hotel industry. They look like a credit card with a metallic strip on the back. It has extra protection unlike other types of keys. The newest system is the RFID key card system, which has a radio sensor chip embedded inside. It works with a programmed reader and when the key is brought in close range the door unlocks and opens. This article was about the security keys being used in hotels.
  •  
    Marilyn, This is an interesting article because I never knew the progression of hotel key cards. I do not think anyone did and we just assume they started somewhere simple and got to where they are at now. Key Cards with RFID seem as though they are the best type of key but also very expensive for the hotels, especially if it is a large property. We only see the one kind of key card now in hotels and to me it seems secure but who knows what information is actually stored on that card. Great article !
  •  
    This article is about the different keys available for hotels to use for their rooms. Metal keys which are like what we use everyday for our homes is an outdated form of security key in the world of technology. The key card system is a plastic card with electronic access. Hole cards seen rarely today is a plastic card with a series of holes to correspond to a specific door in the hotel. Bar code cards is exactly that a card with a bar code, like you see at the supermarket, which is placed under an electronic reader. This type of key has been fazed out due to easily being fooled. The magnetic strip key card are widely used in the hotel industry. They look like a credit card with a metallic strip on the back. It has extra protection unlike other types of keys. The newest system is the RFID key card system, which has a radio sensor chip embedded inside. It works with a programmed reader and when the key is brought in close range the door unlocks and opens. This article was about the security keys being used in hotels.
marilyn diaz

Thieves Won't Wait. Neither Should You. | hospitalityupgrade.com - 3 views

  • data is under attack
  • the most afflicted industry was accommodation/foodservice
  • use a combination of hacking and malware (61 percent).
  • ...11 more annotations...
  • success stealing data “in transit” (62.5 percent) versus stored data (28 percent)
  • What this tells us is hotels and restaurants need to do more to protect sensitive payment data and be proactive in keeping up with the hackers and thieves. We also need to pay particular attention to properly securing data as it moves through the merchant IT environment.
  • Point-to-point encryption (P2PE) is a technology
  • has only recently gained momentum in the hospitality sector.
  • P2PE places “data in motion” in a wrapper that can only be decrypted by an endpoint that has the requisite key.
  • The goal of point-to-point encryption technologies is to encrypt as close to the point of entry as possible and guard against thieves who attempt to install sniffing/hacking software on a merchant’s network.
  • P2PE solutions can significantly reduce a merchant’s card data environment, mitigate potential breaches and simplify PCI DSS validation efforts.”
  • You should also understand the types of cards and transactions that can be encrypted. Does the solution encrypt both swiped cards and manually entered cards? Does it encrypt online transactions, as well as on-site or card-present transactions? Is the solution tamper resistant and, what happens if an attempted breach occurs? Where is the HSM (hardware security module) located? Even if data were to be intercepted, is it rendered unusable to cyber thieves?
  • A hosted solution will shift much of the burden of responsibility to the third-party provider and free you from having decrypted data in your environment.
  • Keep in mind, there is no single silver bullet when it comes to payment security. Even with EMV, stolen cardholder data could be used for a fraudulent online transaction. Merchants should implement a variety of technologies and techniques as part of a multi-layered approach to security that ultimately includes EMV to protect against counterfeit card fraud, tokenization to protect data at rest, and P2PE to protect data in-flight.
  • Thieves won’t wait for a unified approach and specification, and are looking to access your valuable data now. By taking a proactive approach to security that includes point-to-point encryption, asking the right questions, choosing trusted partners and keeping yourself updated, you can protect your customers’ data and your reputation.
  •  
    This article deals with the theft that happens on a daily basis in the hospitality field. It happens when credit cards are used to pay for something, like a reservation, and thieves want the information, so they can use your credit card number for whatever intentions they may have. As the article states, "our data is under attack". I can relate to those people that have had credit card numbers stolen, because it has happened to my husband and me, and it is a horrible feeling trying to get your life back on track and recover your money.  I think it would be a great idea, with some research, to get the point to point encryption technology in a field where credit cards are used so often, not only to cover the business (hotel), but also to protect the guest, so they feel at easy when they travel on vacation or business.  The overall point of this technology is to encrypt the information as close to the point of entry, i.e. the swiping of the credit card, as possible. This would in turn "significantly reduce a merchant's card data environment", as the program would encrypt the information so that hackers cannot access the customer's information. As I mentioned earlier, questions should be asked before buying this technology, as there is always something new on the market that may be better. Credit cards are not always swiped, but can also be manually placed in the system, so you want to make sure, that both transactions are protected. Overall, the establishment should always be concerned about the customer and their safety, whether physical or mental and always be prepared for the worse.
  • ...1 more comment...
  •  
    Marilyn, This is a great article and I wish this type of technology was everywhere because like yourself I have credit card numbers stolen before and it is a long process to end that. Working in the hospitality industry we would need to make sure that it is everywhere that a credit card is entered whether that being swiped in house, typed in the system manually, or even processed via the internet. In the hospitality industry we should be very aware of our guests safety and like you mention it is not only just physical safety that is a concern it is the mental state as well making sure the guests credit cards are safe and do not have a chance of being stolen by a hacker. This is a great article, keep up the good work!
  •  
    Great article! Personally after being a victim of credit card fraud, I'm very apprehensive of where I shop, who handles my card and how long it takes them to return it. I recently cancelled a large purchased after the cashier insisted on rubbing my card number on the reciept after the transactions had be approved. In my mind, I was thinking "If I let you do that, then I've open the door for anyone to charge thousand of dollars. I don't think so." As a manager, who hands credit card numbers for manual input, I'm very cautious of them and want to insure that they don't get into the wrong hand. Aftern each transactions is approved, that number is shredded and the credit card machine is batched out. Companies don't realize how important it is to PCI compliant. The risk in exposing sensitive information of our clients and customers can cost thousand of dolllars in fines and fee, in addition to the lost of that customer/client.
  •  
    Marilyn, Great Article...as a Front Desk Manager, it is my responsibility to randomly check our computers to ensure employees are not placing USB driver to collect data from our system. Our company has taking this a step further by putting metal locked case around the PC to avoid possible fraudulent activity. If we have to open a PC, we must log it to show proof why a PC became unlock. Companies should adopt similar procedures to protect the consumers/guests. Nelson
lalle044

The smart card: Apple Pay competitor or simple stopgap? - CNET - 0 views

  • Paying with a Stratos may not be as seamless as holding your iPhone near the register and using Apple Pay. Apple's mobile payments service lets iPhone 6 and iPhone 6 Plus owners use their smartphones and their fingerprints to charge purchases to their credit cards just by holding their iPhone near a terminal. And while technologists rejoice at Apple Pay's security, only 6 percent of iPhone 6 and iPhone 6 Plus owners used Apple Pay as of March, according to market researcher InfoScout.
  • ow so-called smart cards like Stratos, Coin, Plastc and Swyp have come on the scene. When coupled with a smartphone app, these devices -- which cost around $100 -- let users store and toggle among different payment cards on the fly. Cards are scanned in using a small card reader and managed with a smartphone app.
  • It would be awesome if every single merchant took Apple Pay," he said. But that's not the reality. "It's kind of crazy that we're in 2015 and we're still paying with cash and plastic, and we have a computer in our pocket." Until the computers in our pocket become the main way to pay, he has a Coin card.
  • ...3 more annotations...
  • If you have a chip in your card, the POS system is going to prompt you to put your card in the [chip] slot," Mulpuru said. That becomes a problem with products like Stratos, which do not contain chips. That means you'll still need to carry around a backup card.
  • By October 2015, merchants that haven't upgraded their terminals to accept the new cards will be the ones liable for fraud, not the credit card companies. The result: we'll start to see many more EMV-ready point-of-sale (POS) systems.
  • What's more, Stratos, Coin and their rivals don't directly store credit or debit card information unencrypted -- and only transmit sensitive data from your smartphone. That makes devices inherently more secure than the standard magnetic stripe credit card. There are also options to deactivate the card if it loses communication with your phone
  •  
    I was listening to the news over the week end and was intrigued about a story on a new smart card that would one day take the place of all of our credit cards. My mind started reeling and could not grasp the concept especially with technology and hackers in the forefront of any credit card online usage. I read this article several times and it helped me understand the simplicity of this card and also the fact that your credit/debit account numbers are not stored on the card just a chip then the consumer either uses a PIN number or signature as authorization for payment. Fingerprint technology will be added in the future, which will bring about an evolution into the use of the Smart Card.
armanyleblanc767

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • challenge to maintain teams of well-trained staff.
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • Reliance on Paying By Card
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Insider Threats
  • Compliance
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
mmdmd99999

Credit Card Fraud 2021 Annual Report: Prevalence, Awareness, and Prevention - Security.org - 0 views

  • Nearly half of all American adults have had a fraudulent charge on their credit or debit cards, amounting to around 127 million people. More than one in three credit or debit card holders has experienced card fraud more than once. The median charge was $62, equating to approximately $8 billion in attempted fraudulent charges on Americans’ credit and debit cards. Almost 40 percent of card holders do not have email or text alerts from their credit card company or bank enabled. Around 81 percent of victims without these notifications had to take additional action to reverse fraudulent charges, compared to just 19 percent of those with alerts enabled.
  • Unfortunately, credit card fraud has also become even more common since the start of the pandemic. Reports of credit card fraud increased by 44 percent between 2019 and 2020 according to the Federal Trade Commission (FTC).3 The FTC also estimated that there has been $38 million dollars in reported credit card fraud tied directly to COVID-19.4
  • Nearly 60 percent of credit card holders reported they’d had an unauthorized transaction appear on a credit or debit account at some point in their lives.
  • ...1 more annotation...
  • According to our research, almost 70 percent of fraud victims noted their most recent fraudulent charge within hours of its occurrence. Today, most banks and credit card companies have systems that can detect suspicious charges and alert account holders of potential fraud before transactions are processed. Around 61 percent of credit and debit card holders in our study had enabled email or text alerts from their card servicers that would help them act quickly on fraud attempts. These individuals were more likely to block transactions before money was taken from their accounts.
  •  
    Statistics on credit card fraud to support why PCI compliance is important to protect consumers
Marcos Oliveira

Mobile Restaurant POS Technology Helps Payment Flexibility - QSR magazine - 0 views

  • With smartphones getting smarter, smaller, and speedier all the time, concurrent advances in mobile point-of-sale technology are presenting restaurants with the opportunity to make their POS systems mobile.
  • There are now numerous POS platforms that leverage the iPhone and other mobile devices, including Android-powered smartphones and tablet computers like the iPad, so that restaurants can process payments in the field with a credit-card reader
  • Traditional POS has been very regimented and costly, but mobile is very adaptable, not only in terms of payment but in terms of marketing tools from an ever-growing number of third parties.”
  • ...8 more annotations...
  • While mobile POS is often touted as a boon to full-service restaurants—it can allow customers to pay at the table through a credit-card reader attached to a mounted iPad, for example, and waiters can log orders on a smartphone that zip back to the kitchen at 4G speed—the technology also has service-oriented benefits for quick serves
  • Beyond mobile POS’s value as a portable cash register is its potential as a conduit for invaluable consumer insight. Whereas restaurants are able to glean very little personalized information from credit-card transactions, they can learn a lot when customers use the mobile payment apps or opt in for an array of alerts and updates via their smartphones.
  • The mobile POS … allows us to capture valuable data that gives us a better idea of our customers’ spending and buying habits
  • mobile POS platform called Sage Payment Solutions for processing credit cards
  • Smartphones open up very exciting opportunities when it comes to business-consumer communication
  • As mobile POS technology evolves, an operator will be able to send coupons to opted-in customers’ phones based on their shopping habits or geographic location.
  • the potential of mobile POS far outweighs the peril. The technology is in its infancy, and new developments are on the horizon. These include near-field communication, which allows smartphones to share data with other devices that are in close physical proximity, and EMV cards, which have microchips that allow them to interface with mobile phones.
  • “mobile technology is in the first inning
  •  
    With smartphones evlving and getting smarter, smaller and speedier it is allowing for advances in mobile point-of-sale technology especially in the restaurant industr. There are now numerous POS platforms that support both iPhone as well as android. Tablets and iPads are also supported so that restaurants can process payments in the field with a credit card reader. Traditionally POS have been very costly and structured; now with mobile technology the flexibility is convenient, fast and user friendly. New applications allow restaurants to store customer spending patterns without retaining their personal credit card information. the use of smartphones also opens up very exciting opportunities when it comes to business-consumer communication. Restaurants can send text messages containg discounted coupons to their establishments. The key is to not over do it as customers may become annoyed with too many text messages. This article delat mainly with the restaurant industry but did mention the evolution of technological advances with the use of smart phones. Form personal experience I have used my iphone and ipad to conduct credit card transactions utilzing squareD which provides free of charge a mobile credit card swiper that is connected to the microphone port of either the iphone or Ipad. there is not monthly contract or fee. The only charge is 2.5% per settled credit card transaction and the amount is automatically deducted from the batched amount and within 1-2 business days the funds are deposited directly into ones checking/savings account. This is convenient, fast, and easy. I have been able to secure payment right on the spot instead of either handling cash which is always a ahzard or the risk of accepting checks. the use of smartphones and tbalets have revolutionozed the way business is being conducted making it fast, easy, and convenient to both cutomer and busoness owner alike.
Lu Zhang

Hotel Industry Risk: Cybercrime Has Targeted Hotel Wireless Networks To Steal Credit Ca... - 0 views

  • While financial services companies used to receive the bulk of hacker attacks, last year hotels emerged as the new choice target among hackers-out of 218 breaches in a total of 24 countries, 70 of those breaches took place through hotel networks, according to a report by security firm Trustwave SpiderLabs.
  • Even larger hotel chains are often poorly protected against cybercrime dangers, making it very easy for hackers to gain access to one computer and then use it as a doorway into the hotel’s central computer system, from where they can lift the credit card data of guests staying at the hotel along with other sensitive information.
  • It often takes hotels months before they notice the hack-last year, the average time between a security breach and discovery was over five months.
  • ...1 more annotation...
  • While credit card companies, ultimately, are on the hook for fraudulent charges, you do have to report unauthorized activity, and catching credit card fraud early can save much time and hassle down the road.
  •  
    This article report that sensitive data such as credit card information can be easily received through hotel wireless networks by cybercriminals due to the poor protection network. With the information, cybercriminals can make clone credit cards, which are indistinguishable from the real one and difficult to be traced. What worse is it takes months for hotels, customer and credit card companies to find out this criminal activity. Although hotels have began to step up security, this article notice that customers, especially those travel a lot, need to pay attention to their bank statement since the trend of hacker attacks didn't go down.
Dian Peng

credit card safety - 0 views

  •  
    The article mainly talks about how to use your credit card safely when you do shopping or other consumption. At first, only tell it to those who really need to know and don't say it or lay it where others can find it out. Before entering your credit card number into any website or giving it to anyone over the phone, make sure you know exactly who you're dealing with and that their reasons for needing your credit card number are legitimate. Then, lock it up. Only carry the credit cards that you absolutely need and keep your other credit cards locked up in a personal safe. Three, each month when your credit card statement comes in, don't automatically assume everything on it is accurate. Read every line item on your credit card statement and make sure each and every charge is legitimate. Fourth, be careful with your email. It means that If you have a street-side mailbox, don't leave your credit card payments in there for the postal carrier to pick up and make sure you pick up your mail each and every day. At last, gets credit card monitoring service. If you can follow the tips above, you will use your card safely.
xsun015

The Future of Hotel Security - AOL Travel Ideas - 0 views

  • With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the next level. #plain_module { width: 590px; height:170px; border: none; float:left; margin:0px; font-size:12px;} #plain_module img {border:none; width: 13px; height:14; border: 0px; margin:0px; } #plain_module .mini_main { margin: 0px; padding:0px; width:585px; height:220px; repeat scroll 0 0} #plain_module .mini_item_header {padding:10px 0px; margin: 0px 0px; font-size:16px; color: #555555; border-bottom:1px dotted #CCCCCC;} #plain_module .mini_item {padding:5px 0px; margin: 0px 0px;} #plain_module a { color: #49A3CA; text-decoration:none; } #plain_module a:hover { color: #F98419; text-decoration:underline;} span.gray {color:#949494;} .mini_main li{list-style-type: none;background-image: url(http://www.aolcdn.com/travel/bullet);background-repeat: no-repeat;background-position: 0 1px;padding-left: 10px;}
  • The new thing is contact-less Smartcards and RFID (Radio Frequency Identification) cards that need just be waved to allow room access.
  • But travelers worried they will constantly have to traipse back to reception every time they lose their card need not despair. Security systems in some hotels do away with cards altogether.
  • ...8 more annotations...
  • "I think that you will begin to see more hotels going to RFID and smartphone entry before using biosystem recognition," says Wolfe. "These systems are expensive, and there are many consumers who just don't want this information stored somewhere -- for a variety of reasons."
  • Systems that track the other qualities that make each human unique are in development as well.
  • Yet more card-free security systems are on the way.
  • Many industry watchers are keeping an eye on Houston's largest hotel, the vast 1,200-room Hilton Americas–Houston. The hotel has a facial recognition system that can identify and track guests, employees, and even suitcases. With 700 employees and an annual $16 million payroll, the system offers benefits such as employee time-theft monitoring and prevention for the hotel. But travelers aren't that concerned about employees taking an extra cigarette break. What it means for you is that the system includes alerts if unwanted people are on the property and a response time of mere seconds if there's an incident. Customer service is heightened as well: Returning guests will be recognized and greeted by name. And with 1,200 rooms worth of luggage in transit, the system makes it a lot easier to find lost or misdirected bags.
  • not everyone wants to be on-camera, all the time. With concerns about "snooping" and a Truman Show-like lack of privacy, might guests feel that systems such as this are too intrusive in our hotels? "
  • Technology is opening new doors to hotel safety, and the way we navigate hotels is set to change in the blink of an eye. Or the swipe of a cellphone. Or the print of a finger. With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the next level. #plain_module { width: 590px; height:170px; border: none; float:left; margin:0px; font-size:12px;} #plain_module img {border:none; width: 13px; height:14; border: 0px; margin:0px; } #plain_module .mini_main { margin: 0px; padding:0px; width:585px; height:220px; repeat scroll 0 0} #plain_module .mini_item_header {padding:10px 0px; margin: 0px 0px; font-size:16px; color: #555555; border-bottom:1px dotted #CCCCCC;} #plain_module .mini_item {padding:5px 0px; margin: 0px 0px;} #plain_module a { color: #49A3CA; text-decoration:none; } #plain_module a:hover { color: #F98419; text-decoration:underline;} span.gray {color:#949494;} .mini_main li{list-style-type: none;background-image: url(http://www.aolcdn.com/travel/bullet);background-repeat: no-repeat;background-position: 0 1px;padding-left: 10px;} Those plastic key cards that once seemed so innovative will soon go the way of the actual key. The new thing is contact-less Smartcards and RFID (Radio Frequency Identification) cards that need just be waved to allow room access. Much like the cruise world's one card system, these cards may soon make hotel stays easier by allowing guests to pay for services, as well as to check-in and check-out, through a single device. Travelers may even be able to save preferences on the cards, from pillow type to floor choice. RFID cards are already in use at New York's Plaza Hotel, and Starwood Hotels are considering introducing them into their hip Aloft and Element properties. But travelers worried they will constantly have to traipse back to reception every time they lose their card need not despair. Security systems in some hotels do away with cards altogether. "In addition to Radio Frequency Identification, there are also systems that use a smartphone, such as an iPhone," says Frank Wolfe, CEO of Hospitality Financial and Technology Professionals. "When a guest checks into a hotel and provides their phone number, they get an encrypted sound code via text message." You can then play back the code to unlock your room door.
  • Systems that track the other qualities that make each human unique are in development as well. Movement-activated video-capture systems were showcased in New Zealand in September 2010. Researchers are at work on devices capable of recognizing an individual's gait or walk and even their DNA. Frank Wolfe says, "If you want to go 'way out there', there are some systems being explored that can allegedly sniff someone, and also systems that can recognize the pattern of blood veins on a human being which are apparently unique to the individual," says Wolfe. Quite common in Japan, vascular-recognition systems such as this are still "several years off," according to Wolfe. "I think that you will begin to see more hotels going to RFID and smartphone entry before using biosystem recognition," says Wolfe. "These systems are expensive, and there are many consumers who just don't want this information stored somewhere -- for a variety of reasons."
    • xsun015
       
      Nowadays, more and more hotels pay attention to IT security. They use high technology security equipment to protect the security of hotel and customers. These equipments will record every details about the hotel and customers. One one hand, this is a way to protect the security of the hotel. But they forget to care about the customers' feeling. Not all customers like it. Some customers want to protect their privacy. So I think that hotel needs to  consider the boundary about the hotel security. Keep the benefit and privacy for the customer. Then compare all the security devices, which is the best.
  •  
    This article is about the advanced hotel security achieved through improved technology. Today's hotels tend to integrate the existing technology with high-tech methods, such as iris scanners and digital facial-recognition, to increase security. There are newly introduced contact-less Smartcards and RFID cards. These cards enable people not only to pay for service but also check-in and check-out on a cruise ship. Thus, there is double security system that uses their Smartphone to unlock the door in addition to RFID cards. Even, card-free security systems like finger print entry system and an iris scanner are in progress. These systems are developed for providing guests as well as increasing their property security by identifying employees. Moreover, a camera system that verifies individual's identity through tracking the human unique characteristics like a gait, walk, and DNA is being developed. However, any novelty and valuable technology is useless, if the consumers do not accept. Therefore, considering guest's unwillingness, hotels are going to employ RFID or Smartphone entry system first, not biometric systems. Lastly, the low tech, such as hotel staffs who get in-depth training and awareness of guests and staff and your fellow travelers who are interdependent on one another, is one of the greatest security measures in addition to biometric and high-tech method ironically.
  • ...3 more comments...
  •  
    The hotel security will be raised to a new and next level with s lot of new technology. The plastic key will be innovated to smartcard with RFID. By usting the smartcard, the customer can stay easier by using it to check in or check out, also to choose the type of the pillow. Also, without the smartcard, the smartphone also can be that role and will become more popular and more easier. The card free security systems are on the way. The fingerprint may be used to enter the room. The Houston's largest hotel has a facial recognition that can identify and track guests and employees. This system will improve the security and the business. However, not everyone wants to be on camera, it sometimes depends on the background of the customers. New security measures will become such a part of our daily life that they will become the norm. One of the greatest security measures of late is actually low tech.
  •  
    The article highlighted reports the advancements in technology in the hospitality industry. These technologies are presented as security features as well. The highlights are about RFID cards, biometrics, hand scanners, iris scanners, facial recognition and even veins scanners. RFID cards is presented also as a security feature, however, it may give margin to a lot of fraud. Facial recognition systems are presented with a lot of emphasis and could be a great security feature if monitored for unwanted people. Some hotels have introduced iris scanners for special rooms such as presidential suites. Biometrics are being installed in hotels where your key card or credit card is replaced by your fingerprint. In order to add security, these hotels have added a password after fingerprints are placed on the reader. This extra security step will change consumer's perspective and maybe increase acceptance. The author also mentions that customers may not accept intrusive methods. The facial recognition seems to be a great advancement in hotel security; however, customer may feel uncomfortable to know that they are being recorded on cameras at all times. It is also mentioned that this may be a cultural issue. London was mentioned because it is very common to find security cameras in public areas and street in London . The main message transmitted is that no matter which one but technology and security will be taken to next level in the next few years. Security will have to move along with technology to avoid the downfalls of technology. It shouldn't hindrance the guests' security.
  •  
    It's amazing how technology can aid in hotel security and this article describes just that. The future will be bright with all the new and innovative security opportunities for the hospitality industry. The main points of security mentioned in this article include the finger print entry system where they would have a touch screen where a guest would put their finger and that's how they would get in their room, saying goodbye to key cards. There is also a system that can track a person such as a movement activated video capture, where it can actually recognize an individual. Another security system that is coming into development can identify guests, employees, and suitcases. For instance, if a suitcase was lost or misplaced the system makes it easier to find the lost bags.
  •  
    The uniqueness of human has been used for security tech in many ways, such as finger print, movement pattern, blood veins etc. And facial recoginition system is used by Hilton Americas-Houston now. It can be used to track guests, employees and even suitcases. However some customer feel unconfortable for the survillance everywhere and don't want to be on-camera all the time.
  •  
    The article described the future of hotel security systems. The security level is more and more important in hotel, for customer when they travel to a unacquainted place they need a safe hotel to guarantee them safety. Not only the security systems but also the details in everywhere the hotel management team must be pay more attention.
Marcos Oliveira

Security Expert Exploits Hotel Network Vulnerabilities | Top Stories | Hospitality Maga... - 0 views

  • IP Telephone
  • unplugged the IP Phone and plugged the phone's Ethernet cable into his laptop. It booked up to his Backtrack Live CD
  • Jason Ostrom, Vigilar senior security consultant, was given access to a hotel room and told to find out if he could break into their corporate network through the IP TelephoneÃÆ’Æ'Æ'ÃĥÂ.ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¡Ãĥ¬ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¾ÃĥÂ.s network connection
  • ...7 more annotations...
  • Jason was able to penetrate through to the data network by using a combination of techniques he calls VoIP Hopping. This type of VLAN hopping attack is just one of the attack vectors being used by attackers today
  • As traditional voice and data networks converge, more avenues of attack open up
  • A regular PC should never have access to the Voice VLAN
  • Defense methodologies are in their infancy and are sure to improve in the near future
  • protect against VoIP attacks Ostrom recommends putting a firewall between the Voice and Data VLANs. By putting the Voice VLAN on a separate DMZ of a firewall, many current attacks can be thwarted. It is important to lock down the firewall so that only protocols used by IP Telephony are allowed to flow
  • Intrusion Prevention System (IPS
  • VoIP Hopper is available at http://voiphopper.sourceforge.net.
  •  
    An unssuspecting person check into a hotel like any normal person would. The ever so common exchange, credit card for room key took place. The only difference was that the person that checked had done so with other intentions. The "guest" utilized an IP Telephone that was in this hotel room to hack into the hotel credit card database and steal credit cards, transmit them to a foreign country and then have money transferred to his offshore bank account. This happened but at the hands of Jason Ostrom, aa Vigilar senior security consultant. Ostrom was able to unplug teh telephone in his room, plug in the phone's ethernet canle into his laptop and hack away. Of course, he did this as part of his job in testing a company's security agaisnt viral hackers. His company offers free security testing using a downloadable software called VolP Hopper This article was extremely interesting because as a frequrnt traveler as well as a perosn in the hospitlaity industry I was very shocked at the ease that the credit card information could be stolen. When it comes to credit card security it is of the utmost importance for companies to be PCI compliant and spend whatever it is necessary to safeguard the information of their customers. The detrimental damage that a security breach can have on a person can be debilitating as leaders in the hospitality industry we must do everything possible to prevent attacks like this from happening. made me become extra cautious about using my credit cards.
taurus1313

Credit Card Protection and Credit Safety Tips - 0 views

  • You’re probably already practicing basic online and mobile safety, but consider taking these credit card-specific measures as well: Know your merchant. When shopping online, look for sites with “https” in their web addresses (the “s” stands for “secured”) and the green lock icon; make sure the URL includes the correct company’s name, rather than a close-but-not-correct version; and, even on a secured site, share your information only if you know how it will be used. Type for each transaction. Never allow your credit card number to be stored on an online shopping site. Add a layer. Consider using an online payment system or mobile payment service like PayPal, Apple Pay, Samsung Pay or Android Pay to keep your credit card number out of the hands of merchants, so that if a merchant is hacked, it can’t leak your account number. Watch out for public Wi-Fi. Don’t shop or conduct financial transactions, including checking your accounts, using public Wi-Fi. Because it’s a public network, your information can easily be viewed by anyone.
  •  
    "You're probably already practicing basic online and mobile safety, but consider taking these credit card-specific measures as well: Know your merchant. When shopping online, look for sites with "https" in their web addresses (the "s" stands for "secured") and the green lock icon; make sure the URL includes the correct company's name, rather than a close-but-not-correct version; and, even on a secured site, share your information only if you know how it will be used. Type for each transaction. Never allow your credit card number to be stored on an online shopping site. Add a layer. Consider using an online payment system or mobile payment service like PayPal, Apple Pay, Samsung Pay or Android Pay to keep your credit card number out of the hands of merchants, so that if a merchant is hacked, it can't leak your account number. Watch out for public Wi-Fi. Don't shop or conduct financial transactions, including checking your accounts, using public Wi-Fi. Because it's a public network, your information can easily be viewed by anyone."
lin liu

The latest from HTNG - Hotels unpack the future of credit card security | Hotel Management - 0 views

  • The Framework is aimed at reducing the cost and complexity of satisfying the Payment Card Industry Data Security Standards (PCI-DSS),
  • Travel Daily News reports that the new Framework calls for tokenization to encrypt the credit card information at the point-of-swipe.
  • Bloomberg BNA reports that on Feb. 14, the Council released new guidance for merchants who accept payments on mobile devices.
  • ...2 more annotations...
  • February also saw the release of the Council’s guidance on security and cloud computing.
  • The Council goes on to note that cloud computing remains an evolving technology, and merchants must be careful to evaluate competing cloud services and establish clear security policies and procedures.
  •  
    Hotels have to comply with Payment Card Industry Data Security Standards, which are constantly updated since technology is developing. Also, 'the hotel industry has unique vulnerabilities to credit card theft', since the cards should be available over the long period of time, and to different 3rd parties as well. The new technology will encrypt credit card information at the point-of-swipe, and the number never gets to any other place in the hotel or other business. The other issue is payments on mobile devices. Where it is advised to encrypt information prior to using the device, and avoid "bring you own device policy'.
  •  
    This article introduces the Secure Payments Framework in Hotel Technology Next Generation (HTNG) Conference. The Framework applies mobile payment and cloud computing technology to reduce the cost and complexity of satisfying the Payment Card Industry Data Security Standards. The credit card security is a big challenge for all hotels, especially for the small hotels, lacking expertise and budget to protect customers' card information. There are many advantages of the new card framework. Firstly, the new Framework can encrypt the credit card information at the point-of-swipe. In this way, the card number can't be stolen by other systems. Secondly, it is scalable for different sizes of hotel. Thirdly, new guidance is made for accepting payments on mobile devices. Before processing payment, the merchant need encrypt cardholder, to make sure more security. What is more, new policy on cloud computing. The cloud service provider and its clients are both responsible for the security of cloud data. The policy also need merchants to evaluate competing cloud services and carefully pay procedures.
earagon22

PCI and PSD2 Compliance: Why Are Hotels on the Hook? - 0 views

  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • Established in 2006, PCI stands for the Payment Card Industry Data Security Standard, which contains guidelines for accepting, storing, and processing credit card information
  • ...12 more annotations...
  • These days, cyber security and regulatory compliance aren’t just necessary skills for the IT team. Every hotel manager - even the “non-tech savvy” ones - must understand these crucial components of data protection in order to protect their businesses.
  • A few rules of thumb include using PCI-compliant POS and PMS providers, storing both digital and paper data securely, and limiting access to sensitive data to only the employees who truly need it.
  • Examples of these guidelines include using an online checkout/payment page controlled by a licensed 3rd-party service provider, storing credit card data via a 3rd-party “vault” provider rather than in your own system, and masking the full credit card number on receipts, showing only the last 4 digits instead.
    • earagon22
       
      As an example, if guests book through a 3rd-party like Expedia then I at the front desk see an Expedia card not the guest's card. The card I see is pre-loaded with the amount of the stay ONLY. Even then, I cannot see the 3rd party's full cc number. I only see the last 4 digits just like guest credit cards.
  • “The attack on Marriott was hapless and still has many gaps to fill on what actually happened. A popular entry point for adversaries is through email spoofing. This tactic is used in phishing in order to get malware onto a target network to then move laterally across all systems,” Ryan Cornateanu, Application Security Engineer @ CrowdStrike.
    • earagon22
       
      This attack mentioned compromised cc details, passport numbers, and dates of birth for 300 million guests in their database. This happened in 2014. https://hoteltechreport.com/news/marriott-data-breach#:~:text=And%2C%20the%20financial%20burden%20is,the%20largest%20data%20breaches%20ever.
  • because of increased payment security, the amount of chargebacks will likely become much lower, which is something all hoteliers can celebrate.
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should still comply, since regulations like these are often mirrored in the United States and other countries soon after.
  • PSD2 includes enhanced guidelines for online payments and the handling of sensitive data to reduce the risk of credit theft, fraud, and security breaches. One major change is the requirement of Strong Customer Authentication (SCA) for online transactions. With SCA, rather than simply typing in a credit card number and clicking “pay,” consumers will need to provide a second layer of authentication, which could be a PIN code or an SMS verification code, before the payment can go through.
  • Guests book nearly three-quarters of hotel reservations online, so PSD2 will likely impact every hotelier as Strong Customer Authentication (SCA) becomes a requirement for payment processing.
  • Are any charges processed after the guest has checked out, such as minibar chargers? To prevent any hiccups with payment after check-out, charge an authorization on the guest’s card for the full incidental amount and have the guest provide two-factor authentication in person, such as chip-and-pin, when the guest checks in.
    • earagon22
       
      A property rule where I work is that each guest must insert or tap their cc at check-in in order to follow this rule and we take an incidental hold each night. Guests that have not traveled for years are surprised by incidental holds which makes sense based on when this was implemented.
  • The key takeaway here is that transactions initiated by the hotel at a time when the guest isn’t present won’t comply with PSD2 requirements.
  • protect consumers’ sensitive data, and, as a result, every merchant that uses credit card information must follow these rules, from small businesses to large corporations.
  • By partnering with a trusted technology solution and investing in PCI and PSD2 compliance now, hoteliers can prevent the potential catastrophe that could come with the theft of sensitive data.
  •  
    PCI compliance is a crucial and necessary set of guidelines that all hotels must follow. The Payment Card Industry Security Standard was created in 2006 and outlines rules regarding accepting, storing, and/or processing card information. These rules were put into place to protect consumers sensitive information. For example, in 2014 Marriott hotels was attacked and 300 million guests information was compromised. This attack led to new regulations being put into place, the Payment Services Directive 2 (PSD2). These regulations take into account international customers and enhanced guidelines for sensitive data.
Ganna Gorbachuk

Transforming Business with Mobile Payments - 12 views

  • Mobile systems are transforming the payment environment. According to investment bank Barclays Capital, U.S. mobile commerce sales--that is, purchases made on smartphones and tablets--hit $5.3 billion in 2011, up 83 percent from the year before. Generator Research, a consulting firm specializing in digital media, projects that by 2014, usage by consumers will grow 600 percent to 490 million worldwide.
    • Joe Cilli
       
      Interesting information. Keep in mind there is a high level of cannibalization in that mobile sales are increasing, but the bottom line is unchanged because in-store sales are decreasing. In short, the amount of transactions and dollar amount is roughly the same; it is, however, important to recognize the shift in consumer purchasing patterns.
  •  
    Great article on the rise of mobile payment systems and how businesses who in the past may have been cash only or otherwise are seeing increased sales as the ability to take credit card payments with little hardware and software infrastructure costs. Down the street from me is probably my favorite Rib joint in town, Uncle Rodney's House of Ribs is the name. I love that place, but rarely go because they are a cash only business due in large part to the fact that the owner does not wish to pay for wireless or otherwise internet related services to make his business able to accept credit cards. What are everyone's thought to the increased use of mobile payment systems for restaurants and other businesses?
  • ...6 more comments...
  •  
    I think mobile payment systems are great. I personally have not used them very much but I think they would be very handy at events. I am a Timberwolves season ticket holder and my seats are close to the court where a serving staff is able to get food and beverages for you. Fans are able to pay with credit cards but the server has to take your card to the back area to ring everything up. If the servers were able to carry mobile credit card readers they would be able to speed up transactions and take more orders. It would be a benefit to everyone - the team would be able to sell more items, the servers would make more tips, and the fans would be more satisfied. If someone wanted to keep an open tab until the end of the game I'm sure there could be an app for adding items to a specific seat location instead of doing multiple credit card transactions. I'm sure mobile payment devices are being used by staff at many events and I'm a little surprised it hasn't made it's way into the Target Center yet.
  •  
    That is an interesting artivle talking about the mobile payment that i have not seen in my life. If i was a owner of a store or a restaurant, i would like to try this technology that help to save my money and increase my businesses. On the other hand, as a customer who is asked to pay in this way, i would worry about the security problem because i dont know how it works.
  •  
    It sounds great. I think it is convenience, cause I can pay by my phone whenever I need. But maybe the biggest problem is the security. How to guarantee it, we always use mobile connect ing internet which increase the danger coefficient.
  •  
    I like this idea of mobile payments. It saves business people time and money which they were supposed to spend on the traditional way of credit card payment. It turns out more likely to be a self-monitored business transaction way. However, before signing the contract, the business owner should consider the security level of this payment method from the customers's standpoint. I'm pretty sure that some customers may feel weird and unsecured when they swipe their card on a mobile device.
  •  
    This is a fascinating article. On one hand I can absolutely see the benefits for a mobile business or a business that increases it's sales by accepting mobile payments. It also seems that security would be increased for the merchant as there is not much cash available on hand for petty thieves. The crooks of the future will need to be technologically sophisticated. The increased use of smart phones has greatly increased my small business as many of my customers make their purchases through their smart phones. My personal concern is that our country will see an increase in debt and over spending as purchasing with your credit card account becomes even easier. Will it even be possible to pay with cash in the future or will it all be electronic? Also, what happens if your cell phone is stolen and all of your financial world is on there. Do these scanning systems have much security if there is not a credit card to verify a signature against? Is everything stored in cyber space where the phone thief cannot reach it without expensive technical knowledge?
  •  
    While a few hundred years ago a life of an average person in a small town could consist of two or three events as a war in his country, governor's marriage and a crime in the neighborhood. In today's world the same as centuries ago every moment is full of things which happen somewhere but now we have a unique opportunity to know about them almost few seconds after they happen. Technology can make a huge difference in a small business when an employer finds a right time to use innovation, as Miki Nishihata and Joey Garza did. Their companies got an advantages of using card readers. Mobile systems are transforming the environment of sales and payment processing. A thing which simplifies the prosess of transaction is a benefit because a lot of consumers prefer FAST and EASY shopping when every minute may cost. Assuming all this information a Square company was created by Twitter co-founder Jack Dorsey and glass artisan Jim McKelvey. Nowadays almost everybody has a mobile phone and credit card and combining those two things with an innovative technologies of online sales is a fantastic invention!
  •  
    This is an interesting article, and it is quite amazing to see how the way of payment is drastically shifting with new technological devices such as smartphones, card readers. Just a couple of years ago, if I wanted to buy something online, I had to start my computer then go on whatever website I bought something from which took some time. Now, however, I don't even have to turn on my computer to purchase something on the web because I can buy many things through my smartphone whenever and wherever I want. It is a lot easier and faster than what it used to be.
  •  
    Spasibo bolshoe za interesting article! Ona mne ochen pomozhet v moem research!
Allen Lok

New Retail Credit Card Standards Affect Quick Service Restaurants | QSR magazine - 0 views

  • By October 2015, all restaurants and other merchants will be subjected to new Europay, Mastercard, and Visa (EMV) standards, which reflect a shift from magnetic-stripe credit cards to chip-and-pin cards.
  • , the chip-based cards require insertion of the card into a terminal throughout the entire transaction.
  • chip-based cards are less susceptible to fraud.
  • ...1 more annotation...
  • It’s a rather slow conversion over to EMV. But it’s definitely coming.” View the discussion thread. Subscribe Subscribe to QSR Renew Update Address eLetters Advertising Contact &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Articles Food &amp; BeverageMenu Innovations Marc Halperin: Resident F&amp;B Expert Food Safety Health Ingredients &amp; Dayparts ExpansionQSR 50 Franchising Growth Fast Casual George Green: Fast-Casual Expert Emerging Concepts TechnologyOrdering Social Media Promotions Sustainability Denise Lee Yohn: QSR’s Marketing Guru OperationsExecutive Insights Competition In the Store Consumer Trends Charitable Giving Outside Insights Women in Foodservice Human Resources Alan Philips: Trends to Watch Research QSR 50 OneSource Drive-Thru Study Growth 40 Smart Chain Franchise Opportunities Find a Supplier Find a Job Restaurant Management Events NRA Show <a h
  •  
    A new set of standards is coming up for credit card transactions. EMV or Europay, Mastercard, Visa, standards include a chip-and-pin device on the card that requires the card to be inserted into the card processing terminal. While this does not prevent all fraud, it's important that this standard is mandatory by 2015 and business operators should be preparing for changes.
Sungoo Kang

A New Meaning to "Eat and Run"? Restaurants and Mobile Payments | Davis Wright Tremaine... - 1 views

  • Many mobile payment systems tailored for restaurants and other food vendors were introduced in 2011. Restaurant-industry insiders say 2012 will be the year of widespread adoption – and possibly a shakeout. A brief overview of the main contenders and considerations follows:
  •  
    This article basically talks about four different types of POSs for restaurants, a brief overview of the main contenders and considerations.  The one of the interesting POS systems in the article is The Rail which is introduced last month, a digital bill folder that enables restaurant customers to self-swipe credit or debit cards at the table without the cards ever leaving their possession, thereby protecting against credit card and identity theft.  The basic Rail system includes POS integration, the BaseStation, a secure wireless system, a set of Rail devices (generally 1 device per every 3 tables), and monthly maintenance. Basic Rail devices incorporate a credit card swiper with encryption, billing touch screen display, bill splitting, tip calculator, signature field, NFC payment capabilities, LED stage lights, and receipt email program. The other POSs in the article are Card Case, Tabbedout which are a mobile payment system with smart phone, Square which is mobile card reader, and Chain-Specific Apps which permit the patron to call up menus, locations and nutritional data, as well as to order and pay on-line. Nowadays, many mobile payment systems tailored for restaurants and other food vendors are being introduced. Since they are new and challenges to restaurateur, considering what the pros and cons are and what kinds of POSs best fit to their establishments will be necessary and critical to remain competitive with others.
anonymous

Credit Card Security Systems: 3-D Secure™ and SecureCode™ / GSPAY - 0 views

  • Many Ecommerce merchants and credit card holding online consumers are concerned with credit card fraud. CNP transactions and with them credit card fraud cases have become too popular lately.
  • Visa’s 3-D Secure™ and MasterCard’s SecureCode™
  • Visa’s 3-D Secure™, a key component of The Visa Authenticated Payment Program, adds extra security protection to SSL (secure socket layer) secure forms. The 3-D Secure™ system is supposed to decrease the number of chargeback disputes and fraud cases by 80%
  • ...5 more annotations...
  • The benefits or Visa’s 3-D Secure™ are clearly seen: high level of security for consumers, a significantly lower chance of chargeback and credit card fraud, and overall confidence in CNP transactions.
  • As for MasterCard’s SecureCode™ is resembles Visa’s 3-D Secure™. MasterCard credit card holders register at MasterCard’s SecureCode™ website and asked to provide a personal secure code, which will then be asked for when purchasing online.
  • he benefits for e-Commerce merchants using Visa’ 3-D Secure™ and MasterCard’ SecureCode™ technologies are:
  • The benefits for consumers who make purchases at e-Commerce online stores bearing the 3-D Secure™ or SecureCode™ logos, thus using 3-D Secure™ or SecureCode™ for safe processing are:
  • 3-D Secure™ and SecureCode™ will definitely improve the world of e-Commerce and CNP online shopping.
  •  
    This article is about the concern of customers paying their purchase online, and not through a machine as is the most typical way to do it. But for many this transaction is not safe at all, there could be hackers that can make fraud. This is why two of the most popular CC companies has developed the Visa's 3-D Secure™ and MasterCard's 28SecureCode™ to keep their customers safe, these cards requires a personal security code for every transactions and other personal information in order to keep the purchase safe and some others requires a monthly fee to obtain this service.
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&amp;LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
natalieemmanuel

Point-of-sale malware has now infected over 1,000 companies in US | Ars Technica - 0 views

  • According to the US-CERT advisory, the group behind the Backoff malware operation scanned the Internet to find potential victims by detecting installations of the remote-desktop software frequently used by service providers to manage the point-of-sale systems of their retail clients. The attackers look for remote desktop solutions like Microsoft’s Remote Desktop, Apple's Remote Desktop, Chrome Remote Desktop, Splashtop 2, Pulseway, and LogMeIn, according to the advisory. Once a potential target is identified, the group uses the equivalent of a digital sledgehammer, attempting to break into the system using a list of common passwords.
  • Such techniques are a common threat to small retail businesses, according to Trustwave, who helped the government agencies in their analysis of and response to the 'Backoff' program. A third of cybercrime attacks on businesses focused on the point-of-sales systems in 2013, according to the company's&nbsp;2013 Global Security Report. In 31 percent of incidents, attackers exploited weak passwords to gain access to targeted systems
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
apate114

Top 5 risks and security challenges for hotels in 2015 - eHotelier - 0 views

  • 1. Identity theft leading to credit card fraud
  • Identity theft and credit card fraud is the new form of pick pocketing, but on a much larger scale. The number of compromised credit cards is expected to increase this year.
  • 2. Silent invasions
  • ...11 more annotations...
  • 3. Longer or no security audit cycles
  • APTS are considered the most dangerous type of cyber-attack as they simply bypass the defenses that are in place.
  • Cyber-crime shows up on the security radar as the second highest risk the hotel industry is exposed to.
  • The gap between the low number of qualified security auditors worldwide and new hotels built is getting bigger and bigger.
  • Nearly 1.26 million hotels worldwide are dealing with all sorts of safety &amp; security issues.
  • 4. Physical crime will remain an issue for hotels
  • Physical crime ranges from professional burglaries using nifty social engineering techniques to temporary drug laps in hotel rooms.
  • Holdups at night involving firearms have increased since hotels are easily accessible and less protected compared to other industries operating at night.
  • 5. Loss of competitive advantage after a major security incident
  • The recovery costs after a security incident, including the attention of the media, are often much higher than the investment in security and risk management.
  • Reputation is a vital yet fragile advantage that requires its very own security plan in a strong competitive market where guests nowadays love to make their booking decisions with the help of online travel review sites such as Tripadvisor &amp; Co.
  •  
    The article highlights the top five risks and security challenges in the hospitality industry. The following are the top five security risks according to the article. 1. Identity theft leading to credit card fraud - compared to other industries, the hotel industry is at more risk for credit card fraud and identity theft. This is because hotels are highly targeted by hackers. Hotel properties for the most part have credit card information for each and every guest that has stayed at a specific property. Hotels must be ahead of the technology curve when it comes to security however this is not always the case. 2. Silent invasions - This consists of all the cyber attacks that can affect a business by infecting the network. As discussed during the first module, hotels run majority if not all of their business using technology. If a hotel were to have their networks hacked it would leave them in a very bad situation. Since hotels operate their entire business using technology and multiple different systems, they would not be able to operate if they experienced a network breach. 3. Longer or no security audit cycles - Most branded hotels are required by the franchise to have consistent security audits done for each property. Independent hotels are deemed greater at risk for a security attack because they are not mandated to have security audits. These hotels sometimes skip audit cycles to save money. 4. Physical crime - This ranges from professional robberies to drug laps in hotel rooms. Hotels are at risk for armed robbery due to to lower chance of security compared to other industries that operate overnight. 5. Reputation risk - Hotels that experience a security breach almost always will see some sort of loss in competitive advantage. Nowadays with social media and the news travelers are more aware with what is going on and they would be more inclined to book their reservation somewhere else if they heard of the property having a security breach.
1 - 20 of 368 Next › Last »
Showing 20 items per page