Skip to main content

Home/ Hospitality Technology/ Group items tagged Booby

Rss Feed Group items tagged

Grant Beck

FBI: Beware Of Malware Installed Via Hotel Networks - Forbes - 0 views

  • fake software updates booby trapped with malware that are being pushed through hotel internet connections .
  • malware that are being pushed through hotel internet connections.
  •  
    This article brings to light security threats that are transfered via hotel networks. Fake software updates are used to hide malware which is installed on the computer when the update is accepted. The FBI offers tips on how to avoid being exposed to this after data on several hundred firms was stolen by hackers. The hackers broke into Marriott International Inc.'s records and had access confidential information. This article is important because firms have the responsibility of providing security for the clients as well as themselves. It is important to be aware of threats like this and of how it can be avoided so that the firm isn't put in a bad situation and have to deal with stolen information. With mobile devices and wireless networks becoming more common these types of threats need to be taken into consideration. Most users don't read the fine print or consider where software updates are coming from, especially if it looks like the source is a hotel they are staying at. This makes it even more critical that the hotel is aware of and blocking these threat because claiming that it was done without the knowledge of the hotel may not always be enough and looks badly for the security.
kingleo7

Google (not the GDS) is the new enemy in airline distribution - 1 views

  • GFS is “very bad” for the airline industry (and travel in general), airline.com and future distribution. He sees the roll out of the service enables Google to extend its reach to the top of the trip planning funnel – i.e where consumers go first to start planning a trip. And, Healy thinks airlines need to evaluate GFS in a different way to other potential threats because of Google’s power and the data it has on consumers and their purchase intent. He says that “in good times” a GDS makes about $3 per booking, an airline makes about $21 but currently, according to Healy, Google is making $16 per online airline booking.
peacejj22

POV: IHG's Recent Data Breach Wasn't Due to a Weak Password | Hospitality Technology - 0 views

  • come to light regarding the recent IHG data breach, one thing becomes clear: employee training to detect suspicious phishing emails must become a priority. Many news outlets have made it seem that a weak password was the cause for the company’s recent security breach, but if the hackers -- TeaPea -- who are claiming responsibility for the breach are to be believed, this really isn’t the case. TeaPea told the BBC that they were only able to gain access to the company’s internal IT network after an employee was tricked into downloading a malicious piece of software via a booby-trapped email attachment.
  • MPLOYEES ARE THE WEAKEST LINK
  • Unfortunately, in an industry where hospitality and customer service is the primary directive, employees are predisposed for being kind and willing to give to much information," says Andy Rogers, Senior Assessor of Schellman, a global cybersecurity assessor. 
  • ...5 more annotations...
  • or hoteliers, recognizing this as a true weakness and doing what they can to remediate this problem is a necessity
  • MAKE CYBER SECURITY TRAINING A PRIORITYOnce employees are aware of the role they play in protecting the company, they must then receive regular and high-quality training on a variety of phishing attacks
  • remember, an hour long security training session once a year is likely to be highly ineffective. Instead, consider multiple short training sessions regularly.
  • GO BEYOND TRAINING
  • Email systems are too intimate with business applications and are typically installed on the same workstations for convenience," Sackowitz says. "Perhaps, as a safer alternative, it's time to look at sandboxing or bifurcating critical systems over one’s that converge with public delivery. Perimeters are still necessary. Additionally, there are technologies that can block or proxy any outbound URL from email that will minimize risk."
  •  
    this article is about a recent data breach. in essence this article provides an outline for how to possibly prevent something this devastating from happening. the general consensus is that training employees is of the utmost importance because there the weak link.
1 - 3 of 3
Showing 20 items per page