Skip to main content

Home/ Hospitality Technology/ Group items tagged #cybersecurity

Rss Feed Group items tagged

mtorres619

Travel and Hospitality: Delivering Safety, Service, Sustainability and Security | SGS - 0 views

  •  
    The importance of delivering safety, security, sustainability, and service in the hospitality industry is becoming an important aspect of our society. This article discusses each principle and addresses essential information that can help deliver legendary experiences to guests. As social media and review sites become a way to engage costumers in expressing their overall experiences it is important that you ensure the up most excellent experience in every aspect to create consumer loyalty. * Safety - must be the number one priority in any hospitality business. Any issue that violates the duty of care of any guest should be addressed and taken very seriously to avoid negative affects to the brand. * Service - Excellent and hospitable accommodations is the reason why frequent travelers return to the same establishments. Training your staff to be diligent and welcoming will help promote the brand values. * Sustainability - one of the latest trends is environmental sustainability within the industry. Guests are conscious of the importance of sustainability and want to feel like they are part of the movement by booking hotels that are "Green". * Security - due to the large risks of security breaches any business is susceptible to be a victim of cyber attacks. It is important to promote security by having a proactive and preventive plan in case of a security breach.
Yueyu Peng

What Recruiters Need To Know About What Makes Cybersecurity Unique - 0 views

  • Cybersecurity is under pressure. There are an increasing number of attacks, an increasing amount of regulation and a predicted skills shortage of 1.8 million workers by 2022.
  • Just knowing about the job or the client is not enough; they expect their recruitment partner to know details about a huge number of qualifications and different security tools.
  • Candidates can obtain job offers very quickly, and there is a gap between the number of vacancies and the number of skilled people available.
  • ...5 more annotations...
  • Unemployment within cybersecurity is effectively zero,
  • gender diversity
  • We discovered that the number of women in cybersecurity has increased from 11% to 18% since 2011.
  • Paying the right amount for the role shows candidates that you understand their industry, which is very important to them.
  • Candidates can obtain multiple job offers within weeks of applying for a job. At the senior end of the market, this takes a little longer due to the number of roles available. They will still most likely have several opportunities tracking.
  •  
    This article is about the cybersecurity recruitment. It point out some points to ask the recruiters to pay attention.
sbarr011

Who takes responsibility for cyber security in a hotel? - 0 views

  • it is vital that franchisors and their corporate security teams communicate franchisees’ contractual duties;
  • It’s you who may need to ensure all policies are upheld, that’s why it pays to provide incentives that will make it worth franchisees’ while to comply.
  • The study also reported that the cost for each lost or stolen record containing sensitive and confidential information increased from an average of $154 to $158.
  • ...9 more annotations...
  • And, while there’s no definitive answer to who owns cyber security in a hotel franchise, hotel owners or franchisees can take measures, such as investing in cyber insurance and maintaining updated systems, to prevent a cyber attack.
  • there have been multiple data breaches in some of the biggest hotel chains, with 55% of data compromises resulting from a corporate/internal network breach.
  • If the lines are still blurred come May 2018 – when GDPR is implemented – hotels may not be compliant and will face strict penalties.
  • Last year’s Ponemon study found the average total cost of a data breach is $4 million.
  • Adding to the cyber security difficulty: most franchisees have multiple properties, each with their own brands and contracts, making it even more important for cyber security policies to be implemented and upheld.
  • However, currently, too many hotel owners rely heavily on central reservation systems; thus, they don’t have much, if any, involvement in data collection or storage. That makes it difficult to implement an effective cyber security policy.
  • Many of the vulnerabilities are due to a gap in hotel franchise’s cyber security responsibility.
  • Unfortunately, this industry is a popular target for attack, because of the type of data it holds – credit card data, frequently used throughout the hotel either at check-in, in bars, restaurants, or shops – as well as relatively poor cyber security.
  • According to a recent Trustwave 2016 Global Security Report, the hospitality industry accounted for the second largest share of data compromises among any other last year.
  •  
    This article discusses the liability for a cyber breach at various branded hotels between the franchise owner or the corporation. The Trustwave 2016 Global Security Report stated that the hospitality industry had the second largest amount of data breaches. Additionally, more than half of the breaches are from a corporate/internal network breach. According to a Ponemon study, the average cost of a data breach is $4 million. While this is alarming, it is a surprise since hotels store numerous amounts of personal customer data including guest's credit card information. The article states that cyber hacks are largely due to the gap in not knowing who is responsible for the cyber security. There is an issue of control of data versus franchise network requirements. The hotel brand places individual franchisees in control of their own cyber security. However; they must rely on many centralized corporate owned reservation systems that could be possible access point for cyber attacks. The article suggests that the individual franchisee should make more effort in protecting their customers information as the hotel brand will take most of the blame. This does not help either side. Also, it mentions that in order to protect the hotel franchise it is important to have updated systems and should consider investing in cyber insurance.
hannahamorton

Marriott Breach Exposes Far More Than Just Data - 0 views

  • for about 327 million victims, compromised data may include names, addresses and passport numbers
  • "they should have been able to isolate hackers back in 2015."
  • Currently many companies opt for inadequate data security because it's cheaper than the consequences of a data breach,"
  • ...5 more annotations...
  •  "The Consumer Privacy Act fixes that and would hold companies accountable."
  • The CCPA — which gives Californians the right to know what personal information is collected about them, whether and to whom it is sold or disclosed, as well as the power to prevent such sales — takes effect in 2020 and, while it may sound like reasonable legislation, has already faced a grueling uphill battle.
  • Fancy Bear, which has been tied to Moscow's military intelligence service GRU, was found to be using the leaked NSA hacking tool Eternal Blue to hack victims via their hotel WiFi connections.
  • This is much more than a consumer data breach. When you think of this from an intelligence gathering standpoint, it is illuminating the patterns of life of global political and business leaders, including who they traveled with, when and where. That is incredibly efficient reconnaissance gathering and elevates this breach to a national security problem.”
  • Hotels are easy targets, constituting 92% of all point-of-sale intrusions in 2017, and hotel mergers are only expected to accelerate.
  •  
    Marriott's data breach in 2018 exposed the information of over 500,000 guests including names, addresses, and passport numbers - leading to a class-action lawsuit and falling share values. The California Consumer Privacy Act, taking effect in 2020, gives Californians the right to know what information is collected about them and where this information goes. Amazon, Facebook, Google, Microsoft, Twitter, Uber, AT&T and Verizon are lobbying against the CCPA, but data-security regulations are being enacted regardless to protect customers against these breaches.
upasnab

Hotel Security: How to Protect Your Hotel and Your Guests from a Data Breach - By Kevin... - 0 views

  • Information thieves are increasingly targeting hotels due to the large amount of personal information collected from guests.
  • hospitality industry accounts for 87% of point of sale breaches
  • Failure to take precautionary measures can ultimately affect your hotel’s bottom line, and lead guests to feel unsafe and not wanting to return.
  • ...9 more annotations...
  • surprising 74% of hotels do not have proper protection measures in place
  • Destroy information you no longer needed.
  • Provide on-going staff training
  • Continuously update crisis plans
  • Implement a mobile security policy.
  • A Ponemon report shows that 63% of organizations have had a data breach as a result of employees using their mobile devices to access the company’s sensitive and confidential information.
  • Create a document destruction schedule.
  • Despite the fact that 86% of companies have document destruction procedures in place, only 40% of businesses have a system followed by employees.
  • With technology changing hotel operating systems, it is important for the hotel industry to re-visit information security procedure and continuously educate themselves on data security protocols.
  •  
    This article talks about the increasing cyber threats in hotels and its consequences for the guests. The hotel guests are paying more attention to how their data is being stored, pushing hotels to make some much needed changes in their data security plan. Despite these pressures, many hotels do not have any proper protection measures. "The Hospitality Technology's 2017 Lodging technology Study showed that a surprising 74% of hotels do not have proper protection measures in place". Steps to prevent such breaches and avoid millions of dollars in loss and reputation damages are mentioned in this article. Some practical ways highlighted in this article are: Provide on-going staff training, implement mobile security plan etc.
lderi004

Cyberattacks on Hotels -- What Should Hotel Owners and Operators Do? - Cybersecurity La... - 0 views

  • Almost as soon as there were data breaches, hotels became a prime target of hackers, and the hospitality industry has consistently been one of the most commonly targeted businesses
  • Most commonly, hackers compromise systems so that they can obtain credit card numbers and sell them on the dark web.
  • More sophisticated hackers collect information on individuals as a means of compromising other computer systems and to impersonate individuals
  • ...3 more annotations...
  • As further described below, the hospitality industry possesses a number of factors that make them attractive to hackers: large volumes of valuable information, multiple vectors for accessing information, large workforces and dependence on vendors, to name a few.
  • First, the increasing incorporation of technology into hotel operations can lead to more breaches.
  • Predicting the future is a difficult and fraught task, but in this case, it is straightforward – there is no reason to expect that the number of cyberattacks will drop
  •  
    I was very intrigued with this article, as Braun mentions cyberattacks on hotels in a very straightforward manner. Hotels are in a competition of enhancing their technology everyday, however, with this enhancement comes more of a liability of getting cyber hacked. In addition, our industry deals with a lot of third party companies, making it easier to hack information as well. As Braun mentions, attacks nowadays, are not only for credit card information, but also simple data on guests, such as passwords to loyalty programs, and other credentials. Therefore, as technology grows, the only thing predictable is that hacks will get more dangerous. So, the one true thing our industry must do is prepare ourselves as best as we can. 
allisonweets

Guests: Hotels are not investing enough in cybersecurity | Hotel Management - 0 views

  • More than 22 million U.S. travelers self-report as being the victim of a cyberattack through their business with hotels, according to the Morphisec 2019 Hospitality Guest Threat Index.
  • Following the Marriott International/Starwood Hotels & Resorts Worldwide breach that was discovered nearly a year ago, U.S. Commerce Secretary Wilbur Ross noted that “many companies have been scrimping on the cybersecurity budget” — both in the hospitality sector and beyond.
  • Almost 60 percent of consumers said restaurant point-of-sale systems are the most susceptible to cyberattacks within the hospitality industry.
  • ...4 more annotations...
  • Millennials (24- to 35-year-olds) believe they are most vulnerable to a cybersecurity breach when staying at a traditional hotel rather than when booking with Airbnb.
  • More than 25 million U.S. consumers self-reported that a restaurant visit has resulted in a data breach.
  • Earlier this year, Morphisec discovered FIN8, a cybercrime group most known for targeting the retail industry, was actively targeting POS systems within hospitality companies in the U.S. and abroad.
  • “Increasingly, attackers are targeting weakly defended point-of-sale systems as an entry point into the broader hospitality organization network. With many POS devices in the hospitality industry still running on Windows 7 or even Windows XP-based embedded operating systems, they are increasingly vulnerable to breaches, and cybercrime groups are taking notice.”
  •  
    This article discuss the idea that cybersecurity has been neglected according to consumers and more emphasis should be placed on protecting their private information. It has been found that point-of-sale systems are the most common victims of these breaches, and most often at restaurants. Attackers are targeting systems with weak points and outdated software, making them at a considerably higher risk for breaches and cybercrime. Companies must start investing more in heightened security measures in order to retain consumer loyalty.
kdibe001

Budgeting for Cybersecurity: Risk vs Reward - NuData Blog - 0 views

  • Companies are facing an onslaught of cybercrime – everything from DDoS attacks to breaches to insider theft – and the numbers are staggering. Cyberattacks typically cost large businesses $861,000 and small business on average about $86,500, according to Kaspersky Labs. Jupiter Research is estimating that the cost of data breaches will reach $2.1 trillion globally by 2019. It is the frequency of attacks and the cascade of numbers which now makes this a CEO and Boardroom issue as cyberattacks could cause some major damage or even take whole businesses down.
  • IT Security budgets are set to grow 14% on average over the next three years with small business spending as little as a $1,000 all the way to a million dollars for large companies. While some analysts like Cybersecurity Ventures predict that there will be a burst of spending – 12-15% year over year growth through 2021, Gartner Research reports that IT security spending will account for less than 5% of worldwide IT spending.
  • You can also get more budgeting dollars by leveraging bottom line increases such as incentives for VIP customers, revenue increases, and spend increases throughout the customer lifecycle.
  • ...1 more annotation...
  • Security spending does not equal security effectiveness
  •  
    I found with this article that cyber attacks are becoming alarmingly more common than we have prepared ourselves for. Businesses now need to invest in their own cyber security department or, as the article suggests, apply a cyber security budget to each department. With security budgets predicted to increase 14%, money should be collected through the customers over a lifetime of the customer so that the budget is continually there. I found this article to stand out to me because I never thought of cyber security being so crucial, but it easily makes sense. I think a lot of business lack in providing the proper amount of security to prevent cyber attacks. Personally, I never heard of a cyber security department so this was new for me to read about.
azephyr

Cybersecurity in Hospitality Industry - Types of Threats - Logsign - 0 views

  • implementation of electronic devices and similar conveniences also pose serious threats regarding the security of our sensitive information. That is why cyber security practices gain much more importance in the hospitality industry. I
  • The term cyber security is used to refer to the methods and practices that aim to defend devices, networks, servers, electronic systems and all kinds of data from ill intended attacks.
  • Cyber security professionals aim to keep such malicious intended individuals away from your systems.
  • ...7 more annotations...
  • Cyber security practices often involve the use of a tool or software such as antivirus programs, firewalls, anti malware software and such. In accordance with the needs and vulnerabilities of your organization, various cyber security solutions can be employed and configured. You can opt for getting professional help and/or hiring a team of cyber security professionals for this task.
  • In the past years, we have witnessed many hotels being victims of cyber criminals. Such incidents lead serious data leakages and hurt the reputation of the organization.
  • Customer Data/Identity Theft: When booking a hotel room, we share some of the most sensitive pieces information regarding us: Our name, address, payment information. That is why most hackers try to steal customer information from the hotels using malware, computer viruses and social engineering methods.
  • he term phishing refers to the techniques used to deceive and convince professionals to leak information. The most popular phishing techniques include fake web pages, phone calls, text messages and e-mails.
  • Darkhotel hacking: This technique involves hacking the hotel WiFi and steal information from the visitors.
  • If you want to protect your organization from cyber threats, first you need to inform your employees.
  • Secondly, you must invest in some bullet-proof cyber security software including but not limited to antivirus, antimalware and firewalls. You must also hire a team of IT specialists to ensure that your organization is protected 24/7.
  •  
    This article talks about the type of threats the hospitality industry can face, an explanation of cybersecurity, and how to protect your organization from cyber threats, especially phishing.
ahart054

How Hotel Cybersecurity Threats Have Changed During the Pandemic - 0 views

  • Hotel industry cybersecurity experts say both the "nature and velocity" of cybersecurity threats have changed for the worse during the course of the COVID-19 pandemic.
  • the onset of the pandemic spurred many bad actors to quickly pivot and use "COVID as a theme and as a way to try to infiltrate their way into hotels."
  • He said the volume of threats and who they threatened also shifted.
  •  
    Cybersecurity has changed both in nature and velocity during the COVID-10 pandemic. Hackers used COVID-19 to contact hotels under the guise of safety and security suggesting products to sell. There have also been an increase in phishing attacks at the outset of the COVID-19 pandemic. The threats targeted financial instruments such as loyalty points conduct fraud, to credit card information. The good news is both Hyatt and Choice hotels have executives that buy into the importance of cybersecurity.
leahesper

Cybersecurity and the hospitality industry - Cyber Security Review - 0 views

  • The hospitality and restaurant industries in particular, are high-value targets for cybercriminals.
  • In addition to larger brands, cybercriminals are now finding it easier to target multiple small restaurants.
  • In fact, nearly half of cyberattacks worldwide in 2015 were against small businesses with fewer than 250 workers.
  • ...9 more annotations...
  • Restaurateurs are not technology experts.
  • The cost of cybercrime is on the rise around the globe.
  • Stealing our personal and payment information is something cybercriminals do over breakfast.
  • For the global economy, cybercrime is one of the greatest collective threats of our time.
  • It might come as a surprise to many that almost all of the headline-grabbing payment card data breaches we’ve seen over the past few years were entirely preventable.
  • Most breaches involving credit card data have been neither sophisticated nor “new.”
  • A study by Verizon stated that 99 percent of breaches in 2014 were caused by known vulnerabilities with fixable patches.
  • Strong security protection principles that involve people, process and technology all working together in an atmosphere that prioritizes data security are vital for all of us to protect ourselves, our families and our companies.
  • So what actions can we take today to protect ourselves and our customers? For starters, many companies need to change the way they view security and make it a 24/7 priority. Data security must be deeply ingrained into an organization’s culture, not layered like frosting on a cake but baked in from the start.
  •  
    This article discusses cybersecurity in the hospitality industry. It presents the question of what actions can we take to protect ourselves and our customers which is exactly what we are talking about in this module. It states facts related to security breaches in the hospitality industry in the year 2015.
kuhang

Cybersecurity in Tourism & Hospitality: the urge of protecting customer data - NTG - 0 views

  • Organizations in tourism and hospitality have massive databases of personal data nowadays as they ask their consumers to leave their data for better and optimized services.
  • Cybersecurity is defined as the area related to computing and telematics that focuses on protecting the computer infrastructure and avoiding all types of threats, which put at risk the information that is processed, transported and stored in any device.
  • The accommodation industry is beginning to be aware of the relevance of this topic: if hotels do not manage this issue properly, they lose the opportunity to give the clients the reliability and security they need.
  • ...3 more annotations...
  • n many cases, it is the employees themselves who fall into errors that expose the security of the hotel and the privacy of their clients through a lack of cyber security. Incorrectly shared passwords, professional accounts that link to personal devices or the dissemination of internal company information are some of the mistakes employees make. In order to correct these errors and ensure that they do not happen again, training and awareness-raising are the keys.
  • Employees must be informed at all times about the correct practices to be followed, thus avoiding making mistakes that in most cases have terrible consequences, both for the hotel and for the customers themselves.
  • For the peace of mind of the guests, the hotels should complete constant intrusion tests to evaluate the state of the systems, auditing their security from the point of view of possible external attacks. In order to make an optimal security assessment, it is best to carry out controlled attacks on the systems.
  •  
    This paper mainly discusses the importance of network security in tourism and hotel industry. Due to the characteristics of the industry, it is inevitable for hotels to manage and protect their customers' personal data. Therefore, network security is very important for hotels. Then the author analyzes the reasons of the hotel data breach and puts forward solutions. The main approach is conduct network security training for employees and regularly evaluates the system status.
lwu014

The top 10 fastest-growing cybersecurity skills | 2020-10-30 | Security Magazine - 0 views

  • The top 10 fastest-growing cybersecurity skills
  • The two fastest-growing skills, Application Development Security and Cloud Security, both involve proactively building secure systems from the start rather than responding to attacks
  • A new examination of the top 10 fastest-growing cybersecurity skills shows employers are ready to pay more for workers who can prevent attacks before they occur by building a secure digital ecosystem from the ground up, according to data from Burning Glass Technologies.
  • ...1 more annotation...
  • While many of these skills are highly technical, the demand is not limited to information technology jobs. An increasing number of job postings for attorneys, for example, require expertise in data privacy and security. J
  •  
    This article is about 10 fastest-growing cybersecurity skills in the future.
anonymous

Survey Shows US Cybersecurity Attacks Costing Orgs More Money - 0 views

  • Survey Shows US Cybersecurity Attacks Costing Orgs More Money
  • Cybersecurity attacks are leading to estimated financial losses of an average of $884,000, according to an IDG survey.
  • "As organizations prepare for various attacks and breaches, hackers continue to be savvier in their approaches,”
  • ...6 more annotations...
  • “Resilient organizations must have all employees embrace security practices, from awareness training to behavior monitoring to gap protections."
  • Firewalls, spam filtering, network-based antivirus tools, access controls, and encryption were listed as the most effective solutions for detecting or deterring external threat factors.
  • The top three types of cybersecurity incidents also differ depending on whether it was an insider or outsider threat. The report found that outsider threats tend to consist of the following: Unauthorized access to/use of information, systems, or networks Customer records compromised or stolen Confidential records (trade secrets or intellectual property) compromised or stolen
  • The average cost of a data breach is $3.62 million globally, according to the 2017 Cost of a Data Breach Study: Global Overview sponsored by IBM Security and conducted by Ponemon Institute.
  • "Data breaches and the implications associated continue to be an unfortunate reality for today's businesses," Ponemon Institute Chairman and Founder Dr. Larry Ponemon said in a statement. "Year-over-year we see the tremendous cost burden that organizations face following a data breach.”
  • Cybersecurity incidents stemming from insider threats will include private or sensitive information being unintentionally exposed, customer records being compromised or stolen, and employee records being compromised or stolen.
guanhuahao

Top Cybersecurity Tools for Business - 0 views

  • All cyber threats are not equal. Some may hold your data for ransom, while others may destroy your information for good.
  • Digital tech analysis firm Juniper Research predict that the cost of data breaches will rise from $3 trillion annually to over $5 trillion in 2024.
  • organizations should look to Next Generation Anti-Virus solutions (NGAV) to protect their assets. NGAV takes traditional AV and then adds advanced analytics, behavioral analysis powered in real-time by large scale cloud back-ends to thwart known and unknown attacks. Leading NGAV solutions include Sentinel One, Carbon Black, and CrowdStrike.
  • ...16 more annotations...
  • The National Institute of Standards and Technology (NIST) offers cybersecurity guidelines for best practices to manage cyber risk. These include identify, protect, detect, respond and recover. Another resource is the NCSA’s national program, CyberSecure My Business.
  • Firewall Often referred to as a company's "first line of defense," a firewall is a security control that filters and screens network traffic entering and exiting your corporate network.
  • People can rely on the password manager to create and store dozens of passwords in an encrypted database without having to remember them.
  • Password managers are quite helpful, and some are even free.
  • store the first part of sensitive site passwords
  • but keep the last few digits memorized and fill them manually.
  • This way, if there is ever a compromise of the password database, hackers don't have those full passwords.
  • You should also consider implementing multi-factor authentication (MFA). MFA authentication uses more than one thing or "factor" to log you in
  • , biometrics is part of this last category
  • SPAM & Malware filters screen email for unwanted and dangerous elements, blocking them before they ever reach your users.
  • In the world of cybersecurity, there's a phrase, "humans are the weakest link." An employee who accidentally clicks on the wrong link or email attachment can put in motion a chain of events that results in a cyber breach. Security awareness training is an anti-phishing tactic all organizations should employ.
  • RDP access must be protected by a VPN connection.
  • reduce the risk of getting hacked is to ensure your systems and software are updated regularly, or "patched.
  • patching shouldn't end with the operating system. Your patch program should also look to patch all other applications running on your systems
  • regardless of the security tools implemented to prevent a data breach, you should plan for a compromise occurring.  
  • That's where 24/7/365 network and endpoint monitoring comes in
  •  
    Cyber attacks open more and more often and varied since cybercriminals are becoming more cunning and their methods more challenging to detect. This article introduces some types of strategies implemented to protect companies' businesses from cyber threats and cybercriminals. Including using Anti-virus software, firewalls, password managers (very useful while some even free), VPN, patch management program which not only for operating program but also for other applications running on your system, consider the email SPAM/Malware filters and security awareness training for the employee since "humans are the weakest link." An employee who accidentally clicks on the wrong link can put in motion a chain of events that results in a cyber breach. Finally, plan a 24/7/365 network and endpoint monitoring.
jackyreis

The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was ... - 0 views

  • The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was short on details.
  • It took just three days for Facebook to notify authorities and the public that  hackers had compromised as many as 50 million user accounts on the social media platform.
  • Facebook leaders did not have enough information to paint a clear picture of the hack and the risk to its users during the announcement.
  • ...12 more annotations...
  • Europe’s new privacy law, the General Data Protection Regulation, imposes massive fines on companies if they don’t notify privacy regulators about a data breach within 72 hours. The rule took effect in May and applies to any company with E.U. customers. U.S. lawmakers have proposed similar a 72-hour rule to replace the patchwork of state data breach laws that exist here
  • The company said Friday it had notified European data privacy regulators of the breach, in accordance with GDPR. Shortly after doing so, Ireland’s Data Protection Commission, the watchdog that monitors Facebook’s GDPR compliance, said Facebook’s disclosure “lacks detail” and criticized the company for being “unable to clarify the nature of the breach and the risk for users at this point.”
  •  Equifax waited six weeks to reveal that the Social Security numbers and other sensitive information on 143 million Americans had been exposed in a data breach. Uber waited a year to reveal a hack affecting tens of millions of drivers — and just last week paid a $148 million settlement in connection with the incident. Yahoo also paid a fine earlier this year for waiting two years to tell investors that Russian hackers stole information on 500 million users. 
  • Wray stressed that cyberattacks and theft of intellectual property can inflict long-term damage on American companies,
  • The Senate Commerce Committee should hear from consumer privacy experts as lawmakers consider whether to develop data privacy legislation, a coalition of consumer and privacy groups said Monday
  • The Energy Department on Monday announced awards of up to $28 million to help fund 11 cybersecurity research projects to strengthen the defenses of America's critical energy infrastructure,
  • Karen Evans, the assistant secretary for the department's Office of Cybersecurity, Energy Security, and Emergency Response, said “energy cybersecurity and resilience” is one of the “most important security challenges” that the United States faces.
  • “The frequency, scale, and sophistication of cyber threats have increased and attacks can be much easier to launch,”
  • “Cyber incidents have the potential to interrupt energy services, damage highly specialized equipment and threaten human health and safety.”
  • No country poses a broader, more severe intelligence collection threat than China.
  • And while civilian agencies generally face the most lopsided age disparities, the importance departments place on building a long-term talent pipeline varies greatly
  • That means federal technologists at or approaching retirement age outnumbered their 20-something counterparts roughly 4.6 to 1.”
  •  
    This article highlights the importance of announcing a security breach quickly, and explains the argument on whether it needs to be carefully analyzed before releasing the breach. It explains the importance of releasing the understanding of a hack as quickly as possible to maintain people's information (i.e. bank information) safe.
yijingyang

Marriott is victim of another massive data breach - 1 views

  • 攻击是利用特许经营物业中两名雇员的登录凭证来访问万豪酒店品牌经营和特许经营的酒店所使用的财产系统
  • According to the company, the attack was made using the login credentials of two employees at a franchise property to access a property system used by hotels operated and franchised under Marriott’s brands.
  • The stolen data covers approximately 5.2 million guests and includes contact details such as mailing address, email and phone number; loyalty account information; personal details such as gender and birthday; linked loyalty programs and numbers; and stay preferences.
  • ...5 more annotations...
  • “ ATO攻击是对任何企业的主要威胁。
  • 在2018年11月,万豪表示,它已经发现了数据泄露的喜达屋预订系统影响5分亿的记录。
  • ATO attacks are a major threat to any business.
  • In November 2018, Marriott said it had uncovered a data breach impacting 500 million records in the Starwood reservation system.
  • Marriott has sent an email to the guests impacted by this breach and has set up a dedicated website with additional information.
  •  
    Marriott suffered a massive data breach, affecting approximately 5.2 million customers. "ATO attacks are a major threat to any business." This is the second time Marriott has suffered a massive data breach in the past two years. Marriott has responded accordingly to this incident.
mtedd003

Cyber Security Marketing Tactics That Actually Work - 0 views

  • Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping.
  • This should come as no surprise given that the average annual cost of cyberattacks worldwide is about $9.5 million, according to Ponemon Institute.
  • clearly a need for effective cyber security products and services, there are also many solutions on the market, making it more difficult to capture the attention of your target audience.
  • ...22 more annotations...
  • New cyber security companies are popping up all the time in response to the heightened demand. This can make it hard to stand out in the crowd, and it makes it essential for you to communicate what makes your brand different.
  • you also want to be credible.
  • your potential customers need a significant amount of education to understand what threats they face and what solutions they may need.
  • This is especially true given that CEOs and other C-level executives are not as well versed in information security, which can impact a company’s decision to include cyber security as part of their overall preparedness plan.
  • Though there is plenty of evidence pointing to the necessity of cyber security in protecting valuable data, the truth is that many businesses just don’t prioritize cyber security until it is too late.
  • only one in five, or 22% of those surveyed said that they fully incorporate information security into their strategy and planning.
  • data suggests that cyber security marketers must find ways to create a sense of urgency for potential customers
  • Content marketing can help you build credibility while addressing the major challenge of educating your prospects. In order for your content to be effective,
  • ensure that it is unique.
  • Use data in your messaging. 
  • Offering downloadable content like e-books and whitepapers is also an excellent way to convert your site traffic into leads that you can later nurture.
  • Another aspect of downloadable content that you’ll need to consider is the landing page.
  • case studies are one of the most important tactics for B2B companies.
  • Email Marketing
  • Downloadable content like e-books, case studies, and reports that provide readers with a more in-depth understanding of important cyber security topics. Links to your most recent blog posts talking about recent attacks or security concerns and those that break down complex cyber security topics for a wider reading audience. Video content that emphasizes the importance of cyber security and communicates the value of your company’s offering. A digest of relevant articles from reputable industry publications that helps readers better understand hot topics in cyber security. Monthly offers and sales promotions like a free trail, which can encourage prospects to sign up.
  • Webinars are a great way for cyber security marketers to connect with bottom-of-the-funnel leads.
  • interactive element.
  • Webinars can sometimes be costly to produce. However, as with other parts of your marketing campaign, there is also an opportunity to repurpose your webinar to get more out of this content.
  • Paid campaigns are great at accomplishing two goals – amplifying your content marketing efforts and getting prospects to arrive at your demo request landing page.
  • Don’t exaggerate your solution’s results.
  • Blogs are great for attracting prospects in every stage of the buyer’s journey. Try to create some evergreen blog content that will be universally relevant
  • Create an easy-to-navigate library of premium content. 
  •  
    The Cyber-security Market report has predicted worldwide spending on cyber-security will surpass $1 trillion by 2021. This is a result of annual cyber-attacks costing $9.5 million in global damages. The many solutions on the market require cyber-security services to be innovative on how they market. Cyber security companies want to stand out to customers while still remaining credible. Many businesses are also uneducated and/or don't prioritize cyber-security. The use of blogs and downloadable e-books allow marketers to educate while promoting their product. Cyber security marketers have to make sure they have an easy user-interface, use data in messaging, and don't over exaggerate the capabilities of their products.
mcont036

Cybersecurity guide for the hospitality industry - Help Net Security - 1 views

  • A practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive target for hackers: the hotel property management system
  • allowing hotel owners to control and limit access to their PMS and protect guest privacy and payment card information.
  • According to a recent industry report, hospitality ranked third among industries compromised by cybersecurity breaches in 2019, and the industry suffered 13% of the total incidents.
  • ...3 more annotations...
  • About two-thirds of these breaches were attacks on corporate servers, which often store guest information and communicate with on-site property management systems.
  • The design protects data moving within this environment, and it prevents user access to the various systems and services.
  • “Zero trust principles mean access is not granted to devices or user accounts based solely on their physical or network location or who owns them. Instead, authentication and authorization of both subject and device are required before users can access a network’s resources
  •  
    The National Institute of Standards and Technology created a practical cybersecurity guide to help hotel owners protect their PMS from hackers. Hotel owners can learn to protect the privacy of the data stored in their systems, which is highly vulnerable. The guide also advocates for the zero trust principle, which dictates that access to a system is never fully granted, but must be continually evaluated through authentication and authorization.
1 - 20 of 24 Next ›
Showing 20 items per page