Skip to main content

Home/ Hospitality Technology/ Group items tagged Card

Rss Feed Group items tagged

wenzheng guo

What Are the Different Types of Key Card Systems? - 2 views

  • Metal keys with a jagged row of teeth are becoming increasingly rare as technology improves.
  • In locations as diverse as hotels
    • wenzheng guo
       
      4 kinds of keys mention in the article.
  • using key cards instead of traditional keys.
  • ...17 more annotations...
  • four types of key card systems: holecards, bar code cards, magnetic strip key cards and radio frequency identification (RFID) cards
  • Holecards are the earliest type of key card systems
  • An individual key card is programmed by a computer with a unique electronic signature.
  • If stolen, magnetic strip cards and RFID cards can have the signatures changed, adding security protection from theft.
  • Key card systems operate on the relationship between a plastic card and electronic access control locks
  • Bar code cards were the next innovation in key card technology.
  • The technology used by this type of card includes microchips and radio technology, so it is considered the most difficult to forge and provides the highest level of security.
  • Sornes devised a system that would punch a series of 32 holes into a plastic card. The card would correspond to a lock and would open a door when it was inserted into a slot in the door.
  • his key card type lost popularity when magnetic strips became more readily available,
  • because bar codes could be forged and the electronic reader easily fooled.
  • Magnetic strip key card systems are widely used in the hotel industry and in workplace security. This card looks like a credit card with a thin metallic strip on the back.
  • This type of card is much more difficult to forge than holecards and bar codes, providing an added layer of security.
  • RFID key card systems are a more recent form of technology than holecards, bar code cards or magnetic strip cards. RFID cards have a radio sensor chip embedded inside the card.
  • When brought into close proximity of a correspondingly programmed reader, the door unlocks.
  • an individual bar code is created to correspond with a particular lock and is printed on a card.
  • The technology used by this type of card includes microchips and radio technology, so it is considered the most difficult to forge and provides the highest level of security.
    • wenzheng guo
       
      Later biological key like facial identification may be the next era of keys.
  • In 1975, inventor Tor Sornes devised a system that would punch a series of 32 holes into a plastic card. The card would correspond to a lock and would open a door when it was inserted into a slot in the door.
    • wenzheng guo
       
      first step of security keys.
  •  
    This article is about the different keys available for hotels to use for their rooms. Metal keys which are like what we use everyday for our homes is an outdated form of security key in the world of technology. The key card system is a plastic card with electronic access. Hole cards seen rarely today is a plastic card with a series of holes to correspond to a specific door in the hotel. Bar code cards is exactly that a card with a bar code, like you see at the supermarket, which is placed under an electronic reader. This type of key has been fazed out due to easily being fooled. The magnetic strip key card are widely used in the hotel industry. They look like a credit card with a metallic strip on the back. It has extra protection unlike other types of keys. The newest system is the RFID key card system, which has a radio sensor chip embedded inside. It works with a programmed reader and when the key is brought in close range the door unlocks and opens. This article was about the security keys being used in hotels.
  •  
    Marilyn, This is an interesting article because I never knew the progression of hotel key cards. I do not think anyone did and we just assume they started somewhere simple and got to where they are at now. Key Cards with RFID seem as though they are the best type of key but also very expensive for the hotels, especially if it is a large property. We only see the one kind of key card now in hotels and to me it seems secure but who knows what information is actually stored on that card. Great article !
  •  
    This article is about the different keys available for hotels to use for their rooms. Metal keys which are like what we use everyday for our homes is an outdated form of security key in the world of technology. The key card system is a plastic card with electronic access. Hole cards seen rarely today is a plastic card with a series of holes to correspond to a specific door in the hotel. Bar code cards is exactly that a card with a bar code, like you see at the supermarket, which is placed under an electronic reader. This type of key has been fazed out due to easily being fooled. The magnetic strip key card are widely used in the hotel industry. They look like a credit card with a metallic strip on the back. It has extra protection unlike other types of keys. The newest system is the RFID key card system, which has a radio sensor chip embedded inside. It works with a programmed reader and when the key is brought in close range the door unlocks and opens. This article was about the security keys being used in hotels.
marilyn diaz

Thieves Won't Wait. Neither Should You. | hospitalityupgrade.com - 3 views

  • data is under attack
  • the most afflicted industry was accommodation/foodservice
  • use a combination of hacking and malware (61 percent).
  • ...11 more annotations...
  • success stealing data “in transit” (62.5 percent) versus stored data (28 percent)
  • What this tells us is hotels and restaurants need to do more to protect sensitive payment data and be proactive in keeping up with the hackers and thieves. We also need to pay particular attention to properly securing data as it moves through the merchant IT environment.
  • Point-to-point encryption (P2PE) is a technology
  • has only recently gained momentum in the hospitality sector.
  • P2PE places “data in motion” in a wrapper that can only be decrypted by an endpoint that has the requisite key.
  • The goal of point-to-point encryption technologies is to encrypt as close to the point of entry as possible and guard against thieves who attempt to install sniffing/hacking software on a merchant’s network.
  • P2PE solutions can significantly reduce a merchant’s card data environment, mitigate potential breaches and simplify PCI DSS validation efforts.”
  • You should also understand the types of cards and transactions that can be encrypted. Does the solution encrypt both swiped cards and manually entered cards? Does it encrypt online transactions, as well as on-site or card-present transactions? Is the solution tamper resistant and, what happens if an attempted breach occurs? Where is the HSM (hardware security module) located? Even if data were to be intercepted, is it rendered unusable to cyber thieves?
  • A hosted solution will shift much of the burden of responsibility to the third-party provider and free you from having decrypted data in your environment.
  • Keep in mind, there is no single silver bullet when it comes to payment security. Even with EMV, stolen cardholder data could be used for a fraudulent online transaction. Merchants should implement a variety of technologies and techniques as part of a multi-layered approach to security that ultimately includes EMV to protect against counterfeit card fraud, tokenization to protect data at rest, and P2PE to protect data in-flight.
  • Thieves won’t wait for a unified approach and specification, and are looking to access your valuable data now. By taking a proactive approach to security that includes point-to-point encryption, asking the right questions, choosing trusted partners and keeping yourself updated, you can protect your customers’ data and your reputation.
  •  
    This article deals with the theft that happens on a daily basis in the hospitality field. It happens when credit cards are used to pay for something, like a reservation, and thieves want the information, so they can use your credit card number for whatever intentions they may have. As the article states, "our data is under attack". I can relate to those people that have had credit card numbers stolen, because it has happened to my husband and me, and it is a horrible feeling trying to get your life back on track and recover your money.  I think it would be a great idea, with some research, to get the point to point encryption technology in a field where credit cards are used so often, not only to cover the business (hotel), but also to protect the guest, so they feel at easy when they travel on vacation or business.  The overall point of this technology is to encrypt the information as close to the point of entry, i.e. the swiping of the credit card, as possible. This would in turn "significantly reduce a merchant's card data environment", as the program would encrypt the information so that hackers cannot access the customer's information. As I mentioned earlier, questions should be asked before buying this technology, as there is always something new on the market that may be better. Credit cards are not always swiped, but can also be manually placed in the system, so you want to make sure, that both transactions are protected. Overall, the establishment should always be concerned about the customer and their safety, whether physical or mental and always be prepared for the worse.
  • ...1 more comment...
  •  
    Marilyn, This is a great article and I wish this type of technology was everywhere because like yourself I have credit card numbers stolen before and it is a long process to end that. Working in the hospitality industry we would need to make sure that it is everywhere that a credit card is entered whether that being swiped in house, typed in the system manually, or even processed via the internet. In the hospitality industry we should be very aware of our guests safety and like you mention it is not only just physical safety that is a concern it is the mental state as well making sure the guests credit cards are safe and do not have a chance of being stolen by a hacker. This is a great article, keep up the good work!
  •  
    Great article! Personally after being a victim of credit card fraud, I'm very apprehensive of where I shop, who handles my card and how long it takes them to return it. I recently cancelled a large purchased after the cashier insisted on rubbing my card number on the reciept after the transactions had be approved. In my mind, I was thinking "If I let you do that, then I've open the door for anyone to charge thousand of dollars. I don't think so." As a manager, who hands credit card numbers for manual input, I'm very cautious of them and want to insure that they don't get into the wrong hand. Aftern each transactions is approved, that number is shredded and the credit card machine is batched out. Companies don't realize how important it is to PCI compliant. The risk in exposing sensitive information of our clients and customers can cost thousand of dolllars in fines and fee, in addition to the lost of that customer/client.
  •  
    Marilyn, Great Article...as a Front Desk Manager, it is my responsibility to randomly check our computers to ensure employees are not placing USB driver to collect data from our system. Our company has taking this a step further by putting metal locked case around the PC to avoid possible fraudulent activity. If we have to open a PC, we must log it to show proof why a PC became unlock. Companies should adopt similar procedures to protect the consumers/guests. Nelson
lalle044

The smart card: Apple Pay competitor or simple stopgap? - CNET - 0 views

  • Paying with a Stratos may not be as seamless as holding your iPhone near the register and using Apple Pay. Apple's mobile payments service lets iPhone 6 and iPhone 6 Plus owners use their smartphones and their fingerprints to charge purchases to their credit cards just by holding their iPhone near a terminal. And while technologists rejoice at Apple Pay's security, only 6 percent of iPhone 6 and iPhone 6 Plus owners used Apple Pay as of March, according to market researcher InfoScout.
  • ow so-called smart cards like Stratos, Coin, Plastc and Swyp have come on the scene. When coupled with a smartphone app, these devices -- which cost around $100 -- let users store and toggle among different payment cards on the fly. Cards are scanned in using a small card reader and managed with a smartphone app.
  • It would be awesome if every single merchant took Apple Pay," he said. But that's not the reality. "It's kind of crazy that we're in 2015 and we're still paying with cash and plastic, and we have a computer in our pocket." Until the computers in our pocket become the main way to pay, he has a Coin card.
  • ...3 more annotations...
  • If you have a chip in your card, the POS system is going to prompt you to put your card in the [chip] slot," Mulpuru said. That becomes a problem with products like Stratos, which do not contain chips. That means you'll still need to carry around a backup card.
  • By October 2015, merchants that haven't upgraded their terminals to accept the new cards will be the ones liable for fraud, not the credit card companies. The result: we'll start to see many more EMV-ready point-of-sale (POS) systems.
  • What's more, Stratos, Coin and their rivals don't directly store credit or debit card information unencrypted -- and only transmit sensitive data from your smartphone. That makes devices inherently more secure than the standard magnetic stripe credit card. There are also options to deactivate the card if it loses communication with your phone
  •  
    I was listening to the news over the week end and was intrigued about a story on a new smart card that would one day take the place of all of our credit cards. My mind started reeling and could not grasp the concept especially with technology and hackers in the forefront of any credit card online usage. I read this article several times and it helped me understand the simplicity of this card and also the fact that your credit/debit account numbers are not stored on the card just a chip then the consumer either uses a PIN number or signature as authorization for payment. Fingerprint technology will be added in the future, which will bring about an evolution into the use of the Smart Card.
paige rosenberg

The Future of Hotel Security - AOL Travel News - 1 views

  • Technology is opening new doors to hotel safety
  • Yet more card-free security systems are on the way
  • eventually new security measures will become such a part of our everyday lives that they will become the norm.
  • ...12 more annotations...
  • Systems that track the other qualities that make each human unique are in development as well.
  • here are some systems being explored that can allegedly sniff someone, and also systems that can recognize the pattern of blood veins on a human being which are apparently unique to the individual,
  • new thing is contact-less Smartcards and RFID (Radio Frequency Identification) cards that need just be waved to allow room access.
  • Kimpton's 190-room Nine Zero Hotel in Boston was the first hotel to install a biometric iris scanner back in 2004
  • we navigate hotels is set to change in the blink of an eye. Or the swipe of a cellphone. Or the print of a finger. With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the next level. #plain_module { width: 590px; height:170px; border: none; float:left; margin:0px; font-size:12px;} #plain_module img {border:none; width: 13px; height:14; border: 0px; margin:0px; } #plain_module .mini_main { margin: 0px; padding:0px; width:585px; height:220px; repeat scroll 0 0} #plain_module .mini_item_header {padding:10px 0px; margin: 0px 0px; font-size:16px; color: #555555; border-bottom:1px dotted #CCCCCC;} #plain_module .mini_item {padding:5px 0px; margin: 0px 0px;} #plain_module a { color: #49A3CA; text-decoration:none; } #plain_module a:hover { color: #F98419; text-decoration:underline;} span.gray {color:#949494;} .mini_main li{list-style-type: none;background-image: url(http://www.aolcdn.com/travel/bullet);background-repeat: no-repeat;background-position: 0 1px;padding-left: 10px;}
  • Those plastic key cards that once seemed so innovative will soon go the way of the actual key
  • "In addition to Radio Frequency Identification, there are also systems that use a smartphone, such as an iPhone,"
  • When a guest checks into a hotel and provides their phone number, they get an encrypted sound code via text message
  • Many industry watchers are keeping an eye on Houston's largest hotel, the vast 1,200-room Hilton Americas–Houston. The hotel has a facial recognition system that can identify and track guests, employees, and even suitcases
  • 1,200 rooms worth of luggage in transit, the system makes it a lot easier to find lost or misdirected bags.
  • Returning guests will be recognized and greeted by nam
  • "Hospitality all over the world has become more aware of past vulnerabilities that they might have had and have closed these holes by more in-depth training and awareness of guests and staff," he says. "In today's society, all travelers are becoming interdependent on each other for safety and security."
  •  
    This article talks about the future trend of the hospitality security, which is technology is opening new doors to hotel safety.  The author introduces some different technologies such as Contact-less Smartcards and RFID that hotels like New York's Plaza Hotel are currently using. Finger print or cellphone wipe technology is also used instead of card, which should be more safe. Some hotels even use video-capture systems to make sure the security is perfect. After introducing these technologies, the author also talks about the privacy issues. Because some customers are not willing to be on cameras. However, though some of them are concerning about this issue, an expert predicts that new security measures will eventually become such a part of everyone's everyday lives that he or she will become the norm. All in all, this article gives us the trend that more and more technologies will be used for hotel security in the future.
  • ...7 more comments...
  •  
    I think PR representatives should address the privacy controversy surrounding radio frequency identification technology with a safety campaign. This may help consumers realize that they are not in the privacy of their own home when they are in the hallways of hotels and cruise ships and the cameras/tracking could help protect them. As long as the data collected is not misused these technologies will continue to be present in these locations.
  •  
    It's pretty important for the hospitality industry to present these new technologies as wonderful security measures. People could be put off by knowing they have to swipe their finger to get into a bathroom. The success of these technologies depends on effective marketing and proven security measures that ensure collected information about a traveller will not be used in unethical ways.
  •  
    Interesting article it is. Security is always the big issue for hospitality. I would like to stay in a hotel that is using finger print as the key card of the hotel because i believe that is much safer than cards that anybody can access my room by using the card.
  •  
    In this article all of the new trends for hotel security are described and examples of where they are being implemented are given. Thanks to technological innovations hotel safety is heading into a whole different level. Now key cards are being change to more sophisticated ones that need just to be waved to open a room door. In the near future it is expected for these cards to be used as a payment method and to check-in and check-out. In the U.S biometrics technology is starting to be used by a small number of properties not only for guests to access their rooms but for employees. Facial recognition systems with the ability of tracking guests and employees are also being implemented. This system helps to improves customer service as it helps to really understand guest's preferences, as enormous amount of information can be extracted as they are constantly being monitored. Other technologies are also being developed. The most amazing ones are the systems that track other unique human characteristics as the way a person walks or it's DNA.
  •  
    The technology of hotel changes very fast, such as swipe of a cellphone or print of a finger, or the contact cards that need just be waved to allow room access. It is like the cruise world's one card system, these cards may soon make hotel stays easier by allowing guests to pay for services, as well as to check- in and check-out, through a single device. If customers lost their cards on cruise, the radio frequency identification and smartphone will provide customers their code via text message, so they can play back the code to unlock your room door. But more card free security systems are on the way. If you want to get into your room at New York's SoHo Loft , you are going to have to lift a finger. The Nine Zero Hotel in Boston us the technology to make the property safer all round ,that means non-staff members and intruders can not access the property. Systems that track the other qualities that make each human unique in development as well. The Houston's largest hotel has a facial recognition system that can identify and track guests and an annual $16 million payroll ,the system offers benefits such as employee time theft monitoring and prevention for the hotel. But with 1200 rooms worth of luggage in transit the system makes it a lot easier to find lost or misdirected bags The Wolfe feels that in addition to the biometrics and high-tech methods currently being deployed ,one of the greatest security measures of late is actually low tech.
  •  
    The full name of RFID is radio-frequency identification. RFID is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered by the electromagnetic fields used to read them. Others use a local power source and emit radio waves (electromagnetic radiation at radio frequencies). The tag contains electronically stored information which can be read from up to several metres (yards) away. Now RFID in hospitality industry as a tool is used for improving service quality, customer satisfaction, market share, and profitability. As the new technology apply into hotel security, the hotels change their ways in the blink of an eye, or the swipe of a cell phone, or the print of a finger. With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the high level and some of the luxury hotels begin to use RFID system. Usually customers will worry about lose the card of hotel. Then they can not open the door and even need to pay extra money to buy a new card. But now security systems in some hotels do away with cards altogether. Because of RFID system, customers can use the iPhone connect with the system. When a guest checks into a hotel and provides their phone number, they get an encrypted sound code via text message. Guests can play back the code to unlock your room door.
  •  
    i think there are some factors to consider. Customer Service - Many opportunities for "great" customer service are lost if guest and employee interaction is diminished. In many cases, the front desk staff give the first impression that a guest experiences. This first "experience" can be crucial for referring the guest to other property amenities, i.e. spa, restaurants, lounge, pool, attractions, etc. Often, the front desk staff are acting as the concierge and resolvers of guest issues.
  •  
    this article talks about new technology that is being implemented throughout out US and the world. Old key cards are now going to be replaced with even older standard keys or the radio frequency identification card that can be waived in front of the door to gain access. Also, there is a technology that will sent an encrypted sound text to guest;s cell phone, which when played back will open the door.  It talks about technology that tracks all employees, guests and their luggage.  There are several concerned that travelers have about their privacy, but article stated that it all depends on the type of the traveler.  Also, the face recognition technology used in Houston's largest hotel remembers guests names and when they return, guests are greeted by name.  Article concludes that even with all this technology, the best security is provided through interdependence of travelers and employees.  
  •  
    Technology in the hotel travel and tourism industry will be changing drastically in the near future, from the swipe of a cell phone, print of a finger, facial recognition, iris scanners, security is going to be taken to the next level. the plastic key cards will soon no longer exist. Radio frequency I'd cards are the new thing, where guest will use this for preferences for everything, from charging things to your room, preference of floor type to pillow choice, chick in and out etc. systems that track the other qualities of a person instead of using a key or card are in development as well. There are research going on how to open the door and. Lose wi just the persons walk and movements. Some people think these new security technologies are awesome, while some think they are not, people dont want to be watched 24/7while on vacation they just want to enjoy there stay. But in today's society all travelers are becoming interdependent on each other for safety and security.
kelseybarton

Meyers Develops Single-Use Paper RFID Hotel Key Card | Hospitality Technology - 2 views

  • Meyers, a brand marketing and high-end commercial printing company, announced that it has created a solution that will help the hotel industry offer contactless check-in and room access.
  • Meyers has developed a paper RFID key card — called the AssureCard — that looks and feels like a plastic key card but is made from renewable paper pulp and may be disposed of after a single use.
  • In addition, Meyers has developed a low-cost key card dispenser that allows the customer to get their own card(s) while maintaining appropriate physical distancing with hotel employees.
  • ...10 more annotations...
  • Hotels typically reuse key cards for multiple guests, and in today’s environment, this practice has become unacceptable,
  • it can be contaminated with germs and bacteria. Now more than ever, there is a need for safe, sustainable alternatives for hotel check-in and room access.
  • In many cases, paper key cards may be printed at a cost that matches the cost of producing plastic cards, and the design options for custom branding are extensive (e.g., printing with graphics, foils, and glitter) and may include the option of an anti-microbial coating.
  • The single-user key concept provides a fresh card to each guest and prevents germs from getting passed to your guests or your employees,
  • Plus, hotels that use AssureCards can do so with the environment in mind by helping to reduce the plastic that goes into landfills
  • Paper cards are a proven technology and have been used for years as gift, loyalty, and product activation cards.
  • Meyers has developed a paper RFID key card — called the AssureCard — that looks and feels like a plastic key card but is made from renewable paper pulp and may be disposed of after a single use.
  • Meyers, a brand marketing and high-end commercial printing company, announced that it has created a solution that will help the hotel industry offer contactless check-in and room access.
  • with hotel employees.
  • AssureCard is made with a responsibly sourced paper fiber that offers all of the plastic key card’s best features — durability, convenience, and low cost
  •  
    Meyers have created a new way for hotels to avoid physical contact and contamination by using a disposable paper room card. This kind of card also has the advantage of reducing plastic waste and allow hotels to customize their cards. The article also has mentioned that the card can have a layer of anti-microbial coating if needed. Generally, this kind of card is a nice solution to be more eco-friendly and safe.
  •  
    The company Meyers has created a new, safe way for guests to enter their hotel rooms with the current conditions of the world today. "Meyers has developed a paper RFID key card - called the AssureCard - that looks and feels like a plastic key card but is made from renewable paper pulp and may be disposed of after a single use." It has been customary in the past for hotels to reuse plastic room keys from guest to guest. This practice is often a deterrent for guests and is also quite unsanitary. Provenance Hotels has been using this technology since January of 2020. Their corporate director, Christopher Bebo stated, "the single-user key concept provides a fresh card to each guest and prevents germs from getting passed to your guests or your employees... Plus, hotels that use AssureCards can do so with the environment in mind by helping to reduce the plastic that goes into landfills." I believe that this technology is an amazing advancement for the health and safety of our guests. The keys are produced at similar costs to what organizations are already paying for plastic keys and they can still provide guests with something that meets their brand standard and expectations. AssureCard is a "proven technology" that is good for the environment and it is going to help to keep our staff and guests safe in a time that is so uncertain.
xsun015

The Future of Hotel Security - AOL Travel Ideas - 0 views

  • With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the next level. #plain_module { width: 590px; height:170px; border: none; float:left; margin:0px; font-size:12px;} #plain_module img {border:none; width: 13px; height:14; border: 0px; margin:0px; } #plain_module .mini_main { margin: 0px; padding:0px; width:585px; height:220px; repeat scroll 0 0} #plain_module .mini_item_header {padding:10px 0px; margin: 0px 0px; font-size:16px; color: #555555; border-bottom:1px dotted #CCCCCC;} #plain_module .mini_item {padding:5px 0px; margin: 0px 0px;} #plain_module a { color: #49A3CA; text-decoration:none; } #plain_module a:hover { color: #F98419; text-decoration:underline;} span.gray {color:#949494;} .mini_main li{list-style-type: none;background-image: url(http://www.aolcdn.com/travel/bullet);background-repeat: no-repeat;background-position: 0 1px;padding-left: 10px;}
  • The new thing is contact-less Smartcards and RFID (Radio Frequency Identification) cards that need just be waved to allow room access.
  • But travelers worried they will constantly have to traipse back to reception every time they lose their card need not despair. Security systems in some hotels do away with cards altogether.
  • ...8 more annotations...
  • "I think that you will begin to see more hotels going to RFID and smartphone entry before using biosystem recognition," says Wolfe. "These systems are expensive, and there are many consumers who just don't want this information stored somewhere -- for a variety of reasons."
  • Systems that track the other qualities that make each human unique are in development as well.
  • Yet more card-free security systems are on the way.
  • Many industry watchers are keeping an eye on Houston's largest hotel, the vast 1,200-room Hilton Americas–Houston. The hotel has a facial recognition system that can identify and track guests, employees, and even suitcases. With 700 employees and an annual $16 million payroll, the system offers benefits such as employee time-theft monitoring and prevention for the hotel. But travelers aren't that concerned about employees taking an extra cigarette break. What it means for you is that the system includes alerts if unwanted people are on the property and a response time of mere seconds if there's an incident. Customer service is heightened as well: Returning guests will be recognized and greeted by name. And with 1,200 rooms worth of luggage in transit, the system makes it a lot easier to find lost or misdirected bags.
  • not everyone wants to be on-camera, all the time. With concerns about "snooping" and a Truman Show-like lack of privacy, might guests feel that systems such as this are too intrusive in our hotels? "
  • Technology is opening new doors to hotel safety, and the way we navigate hotels is set to change in the blink of an eye. Or the swipe of a cellphone. Or the print of a finger. With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the next level. #plain_module { width: 590px; height:170px; border: none; float:left; margin:0px; font-size:12px;} #plain_module img {border:none; width: 13px; height:14; border: 0px; margin:0px; } #plain_module .mini_main { margin: 0px; padding:0px; width:585px; height:220px; repeat scroll 0 0} #plain_module .mini_item_header {padding:10px 0px; margin: 0px 0px; font-size:16px; color: #555555; border-bottom:1px dotted #CCCCCC;} #plain_module .mini_item {padding:5px 0px; margin: 0px 0px;} #plain_module a { color: #49A3CA; text-decoration:none; } #plain_module a:hover { color: #F98419; text-decoration:underline;} span.gray {color:#949494;} .mini_main li{list-style-type: none;background-image: url(http://www.aolcdn.com/travel/bullet);background-repeat: no-repeat;background-position: 0 1px;padding-left: 10px;} Those plastic key cards that once seemed so innovative will soon go the way of the actual key. The new thing is contact-less Smartcards and RFID (Radio Frequency Identification) cards that need just be waved to allow room access. Much like the cruise world's one card system, these cards may soon make hotel stays easier by allowing guests to pay for services, as well as to check-in and check-out, through a single device. Travelers may even be able to save preferences on the cards, from pillow type to floor choice. RFID cards are already in use at New York's Plaza Hotel, and Starwood Hotels are considering introducing them into their hip Aloft and Element properties. But travelers worried they will constantly have to traipse back to reception every time they lose their card need not despair. Security systems in some hotels do away with cards altogether. "In addition to Radio Frequency Identification, there are also systems that use a smartphone, such as an iPhone," says Frank Wolfe, CEO of Hospitality Financial and Technology Professionals. "When a guest checks into a hotel and provides their phone number, they get an encrypted sound code via text message." You can then play back the code to unlock your room door.
  • Systems that track the other qualities that make each human unique are in development as well. Movement-activated video-capture systems were showcased in New Zealand in September 2010. Researchers are at work on devices capable of recognizing an individual's gait or walk and even their DNA. Frank Wolfe says, "If you want to go 'way out there', there are some systems being explored that can allegedly sniff someone, and also systems that can recognize the pattern of blood veins on a human being which are apparently unique to the individual," says Wolfe. Quite common in Japan, vascular-recognition systems such as this are still "several years off," according to Wolfe. "I think that you will begin to see more hotels going to RFID and smartphone entry before using biosystem recognition," says Wolfe. "These systems are expensive, and there are many consumers who just don't want this information stored somewhere -- for a variety of reasons."
    • xsun015
       
      Nowadays, more and more hotels pay attention to IT security. They use high technology security equipment to protect the security of hotel and customers. These equipments will record every details about the hotel and customers. One one hand, this is a way to protect the security of the hotel. But they forget to care about the customers' feeling. Not all customers like it. Some customers want to protect their privacy. So I think that hotel needs to  consider the boundary about the hotel security. Keep the benefit and privacy for the customer. Then compare all the security devices, which is the best.
  •  
    This article is about the advanced hotel security achieved through improved technology. Today's hotels tend to integrate the existing technology with high-tech methods, such as iris scanners and digital facial-recognition, to increase security. There are newly introduced contact-less Smartcards and RFID cards. These cards enable people not only to pay for service but also check-in and check-out on a cruise ship. Thus, there is double security system that uses their Smartphone to unlock the door in addition to RFID cards. Even, card-free security systems like finger print entry system and an iris scanner are in progress. These systems are developed for providing guests as well as increasing their property security by identifying employees. Moreover, a camera system that verifies individual's identity through tracking the human unique characteristics like a gait, walk, and DNA is being developed. However, any novelty and valuable technology is useless, if the consumers do not accept. Therefore, considering guest's unwillingness, hotels are going to employ RFID or Smartphone entry system first, not biometric systems. Lastly, the low tech, such as hotel staffs who get in-depth training and awareness of guests and staff and your fellow travelers who are interdependent on one another, is one of the greatest security measures in addition to biometric and high-tech method ironically.
  • ...3 more comments...
  •  
    The hotel security will be raised to a new and next level with s lot of new technology. The plastic key will be innovated to smartcard with RFID. By usting the smartcard, the customer can stay easier by using it to check in or check out, also to choose the type of the pillow. Also, without the smartcard, the smartphone also can be that role and will become more popular and more easier. The card free security systems are on the way. The fingerprint may be used to enter the room. The Houston's largest hotel has a facial recognition that can identify and track guests and employees. This system will improve the security and the business. However, not everyone wants to be on camera, it sometimes depends on the background of the customers. New security measures will become such a part of our daily life that they will become the norm. One of the greatest security measures of late is actually low tech.
  •  
    The article highlighted reports the advancements in technology in the hospitality industry. These technologies are presented as security features as well. The highlights are about RFID cards, biometrics, hand scanners, iris scanners, facial recognition and even veins scanners. RFID cards is presented also as a security feature, however, it may give margin to a lot of fraud. Facial recognition systems are presented with a lot of emphasis and could be a great security feature if monitored for unwanted people. Some hotels have introduced iris scanners for special rooms such as presidential suites. Biometrics are being installed in hotels where your key card or credit card is replaced by your fingerprint. In order to add security, these hotels have added a password after fingerprints are placed on the reader. This extra security step will change consumer's perspective and maybe increase acceptance. The author also mentions that customers may not accept intrusive methods. The facial recognition seems to be a great advancement in hotel security; however, customer may feel uncomfortable to know that they are being recorded on cameras at all times. It is also mentioned that this may be a cultural issue. London was mentioned because it is very common to find security cameras in public areas and street in London . The main message transmitted is that no matter which one but technology and security will be taken to next level in the next few years. Security will have to move along with technology to avoid the downfalls of technology. It shouldn't hindrance the guests' security.
  •  
    It's amazing how technology can aid in hotel security and this article describes just that. The future will be bright with all the new and innovative security opportunities for the hospitality industry. The main points of security mentioned in this article include the finger print entry system where they would have a touch screen where a guest would put their finger and that's how they would get in their room, saying goodbye to key cards. There is also a system that can track a person such as a movement activated video capture, where it can actually recognize an individual. Another security system that is coming into development can identify guests, employees, and suitcases. For instance, if a suitcase was lost or misplaced the system makes it easier to find the lost bags.
  •  
    The uniqueness of human has been used for security tech in many ways, such as finger print, movement pattern, blood veins etc. And facial recoginition system is used by Hilton Americas-Houston now. It can be used to track guests, employees and even suitcases. However some customer feel unconfortable for the survillance everywhere and don't want to be on-camera all the time.
  •  
    The article described the future of hotel security systems. The security level is more and more important in hotel, for customer when they travel to a unacquainted place they need a safe hotel to guarantee them safety. Not only the security systems but also the details in everywhere the hotel management team must be pay more attention.
armanyleblanc767

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • challenge to maintain teams of well-trained staff.
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • Reliance on Paying By Card
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Insider Threats
  • Compliance
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
mmdmd99999

Credit Card Fraud 2021 Annual Report: Prevalence, Awareness, and Prevention - Security.org - 0 views

  • Nearly half of all American adults have had a fraudulent charge on their credit or debit cards, amounting to around 127 million people. More than one in three credit or debit card holders has experienced card fraud more than once. The median charge was $62, equating to approximately $8 billion in attempted fraudulent charges on Americans’ credit and debit cards. Almost 40 percent of card holders do not have email or text alerts from their credit card company or bank enabled. Around 81 percent of victims without these notifications had to take additional action to reverse fraudulent charges, compared to just 19 percent of those with alerts enabled.
  • Unfortunately, credit card fraud has also become even more common since the start of the pandemic. Reports of credit card fraud increased by 44 percent between 2019 and 2020 according to the Federal Trade Commission (FTC).3 The FTC also estimated that there has been $38 million dollars in reported credit card fraud tied directly to COVID-19.4
  • Nearly 60 percent of credit card holders reported they’d had an unauthorized transaction appear on a credit or debit account at some point in their lives.
  • ...1 more annotation...
  • According to our research, almost 70 percent of fraud victims noted their most recent fraudulent charge within hours of its occurrence. Today, most banks and credit card companies have systems that can detect suspicious charges and alert account holders of potential fraud before transactions are processed. Around 61 percent of credit and debit card holders in our study had enabled email or text alerts from their card servicers that would help them act quickly on fraud attempts. These individuals were more likely to block transactions before money was taken from their accounts.
  •  
    Statistics on credit card fraud to support why PCI compliance is important to protect consumers
Melisah Miller

Hotel Security: Locking Systems | Hotel Industry Magazine - 0 views

  • Historically, hotel users travelled with less high value transportable goods. However, in today’s world this is no longer the case. Most clients now travel with laptops, mobile phones, iPads and so on. This obviously appeals to the less law abiding members of society and today’s conscientious hoteliers are addressing this threat with increased traceability and security.
  • Mechanical keys are no longer an acceptable security measure in the Hotel sphere. They are easily lost and readily duplicated. A lost Key will necessitate the changing of the entire Lock at the guest room if security is to be maintained. Modern RFiD card systems negate the need for concern in this area, a lost card can simply be deactivated and rendered useless to a potential intruder, when combined with the audit trail of events at the lock this inspires guest confidence.
  • RFiD locking systems are becoming the technology of choice in today’s market. As there is no physical contact between the card and the lock there is no need for open channels for card insertion or interference from external sources. The cards themselves have no magnetic strip or microchip on the surface of the card and the limited information on the card is securely encrypted (No personal information is contained on the card at all).
  • ...2 more annotations...
  • Today’s biometric locks are reliable, cost effective and aesthetically pleasing. I think it is only a question of time before we see the emergence of cost effective systems based at reception that will read the clients print and update the room lock remotely.
  • Security requirements in hotels will inevitably become more of a deciding factor for consumers when booking rooms. As consumers become more aware of the technology hoteliers with a blasé attitude to security will inevitably see their occupancy rates suffer.
  •  
    Nowadays, people are traveling with more valuables than they used to years ago. As a result, "hotel security measures are now paramount for hoteliers, and selecting the right type of locking system for the property can be a minefield for owners". Mechanical keys and poorly maintained electronic door locks do not offer guests a sense of security. Modern RFiD card systems are becoming the popular technological choice for hoteliers. Biometric locks, which read a fingerprint or face, are reliable and cost-effective, as well. However, they are more of an ideal security solution for offices, back-of-house, or wine stores. Not only are the RFID locks harder to hack, they are cost-effective as well. The lack of physical contact between the card and the lock makes open channels for card insertion unnecessary. The cards do not have a magnetic strip or contain microchips. The card itself only has encrypted non-personal information associated with it. In addition, since there is no contact between the card and lock, "there is no requirement for read head cleaning or replacement of read heads due to wear". As a result, the amount of faulty cards is minimized and guest satisfaction increases.
  •  
    As this article mentioned, more and more people pay attention on the issue of hotel security because of the development of modern technology. People began to worry about their safety. For the locking system, we use RFID card systems to ensure the safety. Even though it is lost, we can deactivate it at soon. It also reduce the burden of employees in Front Desk. At the same time, we should observe surrounding environment and learn to protect ourselves. In my opinion, the updating of this locking system is a very good idea to save cost and more efficiently.
  •  
    This article answers questions that summarize the change in hotel security. The article explains why hotels have taken a new route in locks for the guests, stating that the needs of a secure stay has grown with the changes in the value of goods that each customer brings.  The article concludes with a brief description of how hotel security will evolve over the next 5-10 years.  overall i think this is a good article that explains some of the questions that many people have.
lin liu

The latest from HTNG - Hotels unpack the future of credit card security | Hotel Management - 0 views

  • The Framework is aimed at reducing the cost and complexity of satisfying the Payment Card Industry Data Security Standards (PCI-DSS),
  • Travel Daily News reports that the new Framework calls for tokenization to encrypt the credit card information at the point-of-swipe.
  • Bloomberg BNA reports that on Feb. 14, the Council released new guidance for merchants who accept payments on mobile devices.
  • ...2 more annotations...
  • February also saw the release of the Council’s guidance on security and cloud computing.
  • The Council goes on to note that cloud computing remains an evolving technology, and merchants must be careful to evaluate competing cloud services and establish clear security policies and procedures.
  •  
    Hotels have to comply with Payment Card Industry Data Security Standards, which are constantly updated since technology is developing. Also, 'the hotel industry has unique vulnerabilities to credit card theft', since the cards should be available over the long period of time, and to different 3rd parties as well. The new technology will encrypt credit card information at the point-of-swipe, and the number never gets to any other place in the hotel or other business. The other issue is payments on mobile devices. Where it is advised to encrypt information prior to using the device, and avoid "bring you own device policy'.
  •  
    This article introduces the Secure Payments Framework in Hotel Technology Next Generation (HTNG) Conference. The Framework applies mobile payment and cloud computing technology to reduce the cost and complexity of satisfying the Payment Card Industry Data Security Standards. The credit card security is a big challenge for all hotels, especially for the small hotels, lacking expertise and budget to protect customers' card information. There are many advantages of the new card framework. Firstly, the new Framework can encrypt the credit card information at the point-of-swipe. In this way, the card number can't be stolen by other systems. Secondly, it is scalable for different sizes of hotel. Thirdly, new guidance is made for accepting payments on mobile devices. Before processing payment, the merchant need encrypt cardholder, to make sure more security. What is more, new policy on cloud computing. The cloud service provider and its clients are both responsible for the security of cloud data. The policy also need merchants to evaluate competing cloud services and carefully pay procedures.
Marcos Oliveira

Mobile Restaurant POS Technology Helps Payment Flexibility - QSR magazine - 0 views

  • With smartphones getting smarter, smaller, and speedier all the time, concurrent advances in mobile point-of-sale technology are presenting restaurants with the opportunity to make their POS systems mobile.
  • There are now numerous POS platforms that leverage the iPhone and other mobile devices, including Android-powered smartphones and tablet computers like the iPad, so that restaurants can process payments in the field with a credit-card reader
  • Traditional POS has been very regimented and costly, but mobile is very adaptable, not only in terms of payment but in terms of marketing tools from an ever-growing number of third parties.”
  • ...8 more annotations...
  • While mobile POS is often touted as a boon to full-service restaurants—it can allow customers to pay at the table through a credit-card reader attached to a mounted iPad, for example, and waiters can log orders on a smartphone that zip back to the kitchen at 4G speed—the technology also has service-oriented benefits for quick serves
  • Beyond mobile POS’s value as a portable cash register is its potential as a conduit for invaluable consumer insight. Whereas restaurants are able to glean very little personalized information from credit-card transactions, they can learn a lot when customers use the mobile payment apps or opt in for an array of alerts and updates via their smartphones.
  • The mobile POS … allows us to capture valuable data that gives us a better idea of our customers’ spending and buying habits
  • mobile POS platform called Sage Payment Solutions for processing credit cards
  • Smartphones open up very exciting opportunities when it comes to business-consumer communication
  • As mobile POS technology evolves, an operator will be able to send coupons to opted-in customers’ phones based on their shopping habits or geographic location.
  • the potential of mobile POS far outweighs the peril. The technology is in its infancy, and new developments are on the horizon. These include near-field communication, which allows smartphones to share data with other devices that are in close physical proximity, and EMV cards, which have microchips that allow them to interface with mobile phones.
  • “mobile technology is in the first inning
  •  
    With smartphones evlving and getting smarter, smaller and speedier it is allowing for advances in mobile point-of-sale technology especially in the restaurant industr. There are now numerous POS platforms that support both iPhone as well as android. Tablets and iPads are also supported so that restaurants can process payments in the field with a credit card reader. Traditionally POS have been very costly and structured; now with mobile technology the flexibility is convenient, fast and user friendly. New applications allow restaurants to store customer spending patterns without retaining their personal credit card information. the use of smartphones also opens up very exciting opportunities when it comes to business-consumer communication. Restaurants can send text messages containg discounted coupons to their establishments. The key is to not over do it as customers may become annoyed with too many text messages. This article delat mainly with the restaurant industry but did mention the evolution of technological advances with the use of smart phones. Form personal experience I have used my iphone and ipad to conduct credit card transactions utilzing squareD which provides free of charge a mobile credit card swiper that is connected to the microphone port of either the iphone or Ipad. there is not monthly contract or fee. The only charge is 2.5% per settled credit card transaction and the amount is automatically deducted from the batched amount and within 1-2 business days the funds are deposited directly into ones checking/savings account. This is convenient, fast, and easy. I have been able to secure payment right on the spot instead of either handling cash which is always a ahzard or the risk of accepting checks. the use of smartphones and tbalets have revolutionozed the way business is being conducted making it fast, easy, and convenient to both cutomer and busoness owner alike.
earagon22

PCI and PSD2 Compliance: Why Are Hotels on the Hook? - 0 views

  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • Established in 2006, PCI stands for the Payment Card Industry Data Security Standard, which contains guidelines for accepting, storing, and processing credit card information
  • ...12 more annotations...
  • These days, cyber security and regulatory compliance aren’t just necessary skills for the IT team. Every hotel manager - even the “non-tech savvy” ones - must understand these crucial components of data protection in order to protect their businesses.
  • A few rules of thumb include using PCI-compliant POS and PMS providers, storing both digital and paper data securely, and limiting access to sensitive data to only the employees who truly need it.
  • Examples of these guidelines include using an online checkout/payment page controlled by a licensed 3rd-party service provider, storing credit card data via a 3rd-party “vault” provider rather than in your own system, and masking the full credit card number on receipts, showing only the last 4 digits instead.
    • earagon22
       
      As an example, if guests book through a 3rd-party like Expedia then I at the front desk see an Expedia card not the guest's card. The card I see is pre-loaded with the amount of the stay ONLY. Even then, I cannot see the 3rd party's full cc number. I only see the last 4 digits just like guest credit cards.
  • “The attack on Marriott was hapless and still has many gaps to fill on what actually happened. A popular entry point for adversaries is through email spoofing. This tactic is used in phishing in order to get malware onto a target network to then move laterally across all systems,” Ryan Cornateanu, Application Security Engineer @ CrowdStrike.
    • earagon22
       
      This attack mentioned compromised cc details, passport numbers, and dates of birth for 300 million guests in their database. This happened in 2014. https://hoteltechreport.com/news/marriott-data-breach#:~:text=And%2C%20the%20financial%20burden%20is,the%20largest%20data%20breaches%20ever.
  • because of increased payment security, the amount of chargebacks will likely become much lower, which is something all hoteliers can celebrate.
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should still comply, since regulations like these are often mirrored in the United States and other countries soon after.
  • PSD2 includes enhanced guidelines for online payments and the handling of sensitive data to reduce the risk of credit theft, fraud, and security breaches. One major change is the requirement of Strong Customer Authentication (SCA) for online transactions. With SCA, rather than simply typing in a credit card number and clicking “pay,” consumers will need to provide a second layer of authentication, which could be a PIN code or an SMS verification code, before the payment can go through.
  • Guests book nearly three-quarters of hotel reservations online, so PSD2 will likely impact every hotelier as Strong Customer Authentication (SCA) becomes a requirement for payment processing.
  • Are any charges processed after the guest has checked out, such as minibar chargers? To prevent any hiccups with payment after check-out, charge an authorization on the guest’s card for the full incidental amount and have the guest provide two-factor authentication in person, such as chip-and-pin, when the guest checks in.
    • earagon22
       
      A property rule where I work is that each guest must insert or tap their cc at check-in in order to follow this rule and we take an incidental hold each night. Guests that have not traveled for years are surprised by incidental holds which makes sense based on when this was implemented.
  • The key takeaway here is that transactions initiated by the hotel at a time when the guest isn’t present won’t comply with PSD2 requirements.
  • protect consumers’ sensitive data, and, as a result, every merchant that uses credit card information must follow these rules, from small businesses to large corporations.
  • By partnering with a trusted technology solution and investing in PCI and PSD2 compliance now, hoteliers can prevent the potential catastrophe that could come with the theft of sensitive data.
  •  
    PCI compliance is a crucial and necessary set of guidelines that all hotels must follow. The Payment Card Industry Security Standard was created in 2006 and outlines rules regarding accepting, storing, and/or processing card information. These rules were put into place to protect consumers sensitive information. For example, in 2014 Marriott hotels was attacked and 300 million guests information was compromised. This attack led to new regulations being put into place, the Payment Services Directive 2 (PSD2). These regulations take into account international customers and enhanced guidelines for sensitive data.
Allen Lok

New Retail Credit Card Standards Affect Quick Service Restaurants | QSR magazine - 0 views

  • By October 2015, all restaurants and other merchants will be subjected to new Europay, Mastercard, and Visa (EMV) standards, which reflect a shift from magnetic-stripe credit cards to chip-and-pin cards.
  • , the chip-based cards require insertion of the card into a terminal throughout the entire transaction.
  • chip-based cards are less susceptible to fraud.
  • ...1 more annotation...
  • It’s a rather slow conversion over to EMV. But it’s definitely coming.” View the discussion thread. Subscribe Subscribe to QSR Renew Update Address eLetters Advertising Contact &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Articles Food &amp; BeverageMenu Innovations Marc Halperin: Resident F&amp;B Expert Food Safety Health Ingredients &amp; Dayparts ExpansionQSR 50 Franchising Growth Fast Casual George Green: Fast-Casual Expert Emerging Concepts TechnologyOrdering Social Media Promotions Sustainability Denise Lee Yohn: QSR’s Marketing Guru OperationsExecutive Insights Competition In the Store Consumer Trends Charitable Giving Outside Insights Women in Foodservice Human Resources Alan Philips: Trends to Watch Research QSR 50 OneSource Drive-Thru Study Growth 40 Smart Chain Franchise Opportunities Find a Supplier Find a Job Restaurant Management Events NRA Show <a h
  •  
    A new set of standards is coming up for credit card transactions. EMV or Europay, Mastercard, Visa, standards include a chip-and-pin device on the card that requires the card to be inserted into the card processing terminal. While this does not prevent all fraud, it's important that this standard is mandatory by 2015 and business operators should be preparing for changes.
Eissy de la Moneda

Hotels don't have to waste energy: Key-card management systems should be "business as u... - 0 views

  • most people don't think about energy savings when staying in a hotel.
  • key-card energy management is a simple and effective way to conserve energy
  • link the heating, cooling and lighting in a room to an illuminated key-card slot near the entrance.
  • ...4 more annotations...
  • adoption has been slow in the U.S. because hotels are unwilling to place what is perceived as an energy management "burden" on guests
  • guests can no longer lock themselves out of their rooms
  • can save 25 to 45% of the energy used by each room
  • past few years have shown that Americans do care about their environmental impact.
  •  
    This article introduced a technology has been applied in Europe and Asia for years that is Key-card management. This key-card management system links to heating, cooling and lighting system in guestroom with a monitoring in a slot besides door. In Europe and Asia, it has been demonstrated key-card management system is a successful system, that can save 20%-40% energy bill inside guest room. Although US hotels don't apply this system at beginning, now, more and more hotels has taken key-card management system. The hotel GM which taken this system said that is save a lot of energy bill after using this system.
  •  
    This article talks about how hotels have the opportunity to conserve energy. It is known that many hotel guests are usually unaware or disinterested on how much energy they waste in their hotel room because they've already paid for the room. However, many of us are very conscious of how much energy we waste at home because we do in fact need to pay for that. So why don't we do it in hotel rooms? It comes down to convenience. When you're in a hotel, you don't worry about bills or energy or what harm you are doing to the environment or to the hotel's wallet because you are simply on vacation. However, key card management systems allow guests to save energy without the hassle of walking throughout the room turning off every light, faucet and air conditioning. Instead, saving energy is now as simple as leaving your room. With the key card management, energy management is in affect as soon as the guest pulls out the key card when leaving their room, and as easy as placing it back in the slot when they return. This is an effective, simple way for guests to save energy, while still on vacation.   
Lu Zhang

Hotel Industry Risk: Cybercrime Has Targeted Hotel Wireless Networks To Steal Credit Ca... - 0 views

  • While financial services companies used to receive the bulk of hacker attacks, last year hotels emerged as the new choice target among hackers-out of 218 breaches in a total of 24 countries, 70 of those breaches took place through hotel networks, according to a report by security firm Trustwave SpiderLabs.
  • Even larger hotel chains are often poorly protected against cybercrime dangers, making it very easy for hackers to gain access to one computer and then use it as a doorway into the hotel’s central computer system, from where they can lift the credit card data of guests staying at the hotel along with other sensitive information.
  • It often takes hotels months before they notice the hack-last year, the average time between a security breach and discovery was over five months.
  • ...1 more annotation...
  • While credit card companies, ultimately, are on the hook for fraudulent charges, you do have to report unauthorized activity, and catching credit card fraud early can save much time and hassle down the road.
  •  
    This article report that sensitive data such as credit card information can be easily received through hotel wireless networks by cybercriminals due to the poor protection network. With the information, cybercriminals can make clone credit cards, which are indistinguishable from the real one and difficult to be traced. What worse is it takes months for hotels, customer and credit card companies to find out this criminal activity. Although hotels have began to step up security, this article notice that customers, especially those travel a lot, need to pay attention to their bank statement since the trend of hacker attacks didn't go down.
lumduan roth

2013 POS Trends: The Year of Customer Experience | Retail Trends | RIS News: Business/T... - 1 views

  • &nbsp; Another trend we expect to hit the POS space in full force next year is the integration of more loyalty programs and customized advertising and marketing promotions to engage with customers at each stage of the purchase process; from driving impulse consideration, all the way to the final purchase. Loyalty programs have been picking up momentum for the past couple of years and are now becoming fully integrated into on-site POS systems, both mobile and traditional. With customer loyalty software programs launching in every type of retail venue imaginable, cashiers are able to sign customers up within one to two minutes, meeting the easy and quick transaction consumers' today demand while also reminding them of the added-value offered by the vendor.
  •  
    I have a key chain full of membership cards, tiny ones. I have Wallgreen Balance rewards card, Salon Centric professional store card, PetSmart PetPerks card, Winn Dixie Grocery store card, my vehical elite member card, and my gym membership card to name a few. I think those business (retails) got me. I can't resist their benefits even though I know they try to get my money. It's nice to get a discount here and there, and it really makes shopping fun and keeps me coming back for more with coupons and stuff. I think having a customer loyalty program within POS systems is a great idea especially when enabled via mobile devices.
Dian Peng

credit card safety - 0 views

  •  
    The article mainly talks about how to use your credit card safely when you do shopping or other consumption. At first, only tell it to those who really need to know and don't say it or lay it where others can find it out. Before entering your credit card number into any website or giving it to anyone over the phone, make sure you know exactly who you're dealing with and that their reasons for needing your credit card number are legitimate. Then, lock it up. Only carry the credit cards that you absolutely need and keep your other credit cards locked up in a personal safe. Three, each month when your credit card statement comes in, don't automatically assume everything on it is accurate. Read every line item on your credit card statement and make sure each and every charge is legitimate. Fourth, be careful with your email. It means that If you have a street-side mailbox, don't leave your credit card payments in there for the postal carrier to pick up and make sure you pick up your mail each and every day. At last, gets credit card monitoring service. If you can follow the tips above, you will use your card safely.
Ganna Gorbachuk

Transforming Business with Mobile Payments - 12 views

  • Mobile systems are transforming the payment environment. According to investment bank Barclays Capital, U.S. mobile commerce sales--that is, purchases made on smartphones and tablets--hit $5.3 billion in 2011, up 83 percent from the year before. Generator Research, a consulting firm specializing in digital media, projects that by 2014, usage by consumers will grow 600 percent to 490 million worldwide.
    • Joe Cilli
       
      Interesting information. Keep in mind there is a high level of cannibalization in that mobile sales are increasing, but the bottom line is unchanged because in-store sales are decreasing. In short, the amount of transactions and dollar amount is roughly the same; it is, however, important to recognize the shift in consumer purchasing patterns.
  •  
    Great article on the rise of mobile payment systems and how businesses who in the past may have been cash only or otherwise are seeing increased sales as the ability to take credit card payments with little hardware and software infrastructure costs. Down the street from me is probably my favorite Rib joint in town, Uncle Rodney's House of Ribs is the name. I love that place, but rarely go because they are a cash only business due in large part to the fact that the owner does not wish to pay for wireless or otherwise internet related services to make his business able to accept credit cards. What are everyone's thought to the increased use of mobile payment systems for restaurants and other businesses?
  • ...6 more comments...
  •  
    I think mobile payment systems are great. I personally have not used them very much but I think they would be very handy at events. I am a Timberwolves season ticket holder and my seats are close to the court where a serving staff is able to get food and beverages for you. Fans are able to pay with credit cards but the server has to take your card to the back area to ring everything up. If the servers were able to carry mobile credit card readers they would be able to speed up transactions and take more orders. It would be a benefit to everyone - the team would be able to sell more items, the servers would make more tips, and the fans would be more satisfied. If someone wanted to keep an open tab until the end of the game I'm sure there could be an app for adding items to a specific seat location instead of doing multiple credit card transactions. I'm sure mobile payment devices are being used by staff at many events and I'm a little surprised it hasn't made it's way into the Target Center yet.
  •  
    That is an interesting artivle talking about the mobile payment that i have not seen in my life. If i was a owner of a store or a restaurant, i would like to try this technology that help to save my money and increase my businesses. On the other hand, as a customer who is asked to pay in this way, i would worry about the security problem because i dont know how it works.
  •  
    It sounds great. I think it is convenience, cause I can pay by my phone whenever I need. But maybe the biggest problem is the security. How to guarantee it, we always use mobile connect ing internet which increase the danger coefficient.
  •  
    I like this idea of mobile payments. It saves business people time and money which they were supposed to spend on the traditional way of credit card payment. It turns out more likely to be a self-monitored business transaction way. However, before signing the contract, the business owner should consider the security level of this payment method from the customers's standpoint. I'm pretty sure that some customers may feel weird and unsecured when they swipe their card on a mobile device.
  •  
    This is a fascinating article. On one hand I can absolutely see the benefits for a mobile business or a business that increases it's sales by accepting mobile payments. It also seems that security would be increased for the merchant as there is not much cash available on hand for petty thieves. The crooks of the future will need to be technologically sophisticated. The increased use of smart phones has greatly increased my small business as many of my customers make their purchases through their smart phones. My personal concern is that our country will see an increase in debt and over spending as purchasing with your credit card account becomes even easier. Will it even be possible to pay with cash in the future or will it all be electronic? Also, what happens if your cell phone is stolen and all of your financial world is on there. Do these scanning systems have much security if there is not a credit card to verify a signature against? Is everything stored in cyber space where the phone thief cannot reach it without expensive technical knowledge?
  •  
    While a few hundred years ago a life of an average person in a small town could consist of two or three events as a war in his country, governor's marriage and a crime in the neighborhood. In today's world the same as centuries ago every moment is full of things which happen somewhere but now we have a unique opportunity to know about them almost few seconds after they happen. Technology can make a huge difference in a small business when an employer finds a right time to use innovation, as Miki Nishihata and Joey Garza did. Their companies got an advantages of using card readers. Mobile systems are transforming the environment of sales and payment processing. A thing which simplifies the prosess of transaction is a benefit because a lot of consumers prefer FAST and EASY shopping when every minute may cost. Assuming all this information a Square company was created by Twitter co-founder Jack Dorsey and glass artisan Jim McKelvey. Nowadays almost everybody has a mobile phone and credit card and combining those two things with an innovative technologies of online sales is a fantastic invention!
  •  
    This is an interesting article, and it is quite amazing to see how the way of payment is drastically shifting with new technological devices such as smartphones, card readers. Just a couple of years ago, if I wanted to buy something online, I had to start my computer then go on whatever website I bought something from which took some time. Now, however, I don't even have to turn on my computer to purchase something on the web because I can buy many things through my smartphone whenever and wherever I want. It is a lot easier and faster than what it used to be.
  •  
    Spasibo bolshoe za interesting article! Ona mne ochen pomozhet v moem research!
Michaela Gave

Digital Gifting Is Trending in the Hospitality Industry - 0 views

  • Mercator further projects the 2013 holiday volume of digital gifting will exceed $1 billion
  • Some related consumer m-commerce facts include: 59 percent are interested in using mobile as a form of payment 50 percent of U.S. consumers shop with mobile devices 61 percent are interested in checking balances 59 percent are interested in organizing and tracking gift cards and loyalty via mobile 76 percent want an alternative to carrying everything in their wallets 12 percent of mobile U.S. subscribers who receive a text message (SMS) advertisement&nbsp; tend to respond quickly; practitioners claim that offers sent via SMS convert 10 times to 20 times higher than either email or direct mail deals.
  •  
    Summary: The variety of gifting options has grown from a simple plastic gift card to virtual cards delivered by email, text, debit/credit cards and more. The prediction for 2013 will exceed a billion dollars of digital gifting for the holiday season and continue to grow. Digital gift cards have made giving easy due to the convenience of redemption. Paper coupons have proven to be successful to draw in consumer activity, but the digital revolution in virtual gifting is expected to explode as people are so connected to their mobile devices. Even with the convenience and growing popularity of digital gifting comes barriers and security issues. Such issues include personal banking security and privacy. Some small to midsize businesses may not be able to participate in digital gifting due to cost barriers or lack of technology. Due to electronic process, paper receipts will be obsolete. Computers aren't perfect so how does one resolve dollar discrepancies. One benefit of virtual giving is the bar codes/QR codes. Companies are able to collect and retain additional information of givers and receivers by scanning the bar code/QR Code. Often people are reluctant to provide contact information, but in this case they aren't being asked, they have no choice. This is a benefit to the companies because they can make other promotional offers to engage and possibly retain both parties, thereby increasing sales. There are a variety of methods of virtual gifting and redemption. One example is Giftly. Giftly adds the value of the gift to the recipient's credit or debit card which can be used anywhere. This is super convenient for many people and they are able to choose whatever they wish rather than receive a gift chosen for them. This is certainly the digital age version of sending a check via mail to a loved one. Other corporate examples that have impacted the transition from plastic gift cards to virtual gifting are Burger King, Dunkin Donuts, Applebee's and Starbu
Marcos Oliveira

Security Expert Exploits Hotel Network Vulnerabilities | Top Stories | Hospitality Maga... - 0 views

  • IP Telephone
  • unplugged the IP Phone and plugged the phone's Ethernet cable into his laptop. It booked up to his Backtrack Live CD
  • Jason Ostrom, Vigilar senior security consultant, was given access to a hotel room and told to find out if he could break into their corporate network through the IP TelephoneÃÆ’Æ'Ãâ€&nbsp;'ÃĥÂ.ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¡Ãĥ¬ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¾ÃĥÂ.s network connection
  • ...7 more annotations...
  • Jason was able to penetrate through to the data network by using a combination of techniques he calls VoIP Hopping.&nbsp;This type of VLAN hopping attack is just one of the attack vectors being used by attackers today
  • As traditional voice and data networks converge, more avenues of attack open up
  • A regular PC should never have access to the Voice VLAN
  • Defense methodologies are in their infancy and are sure to improve in the near future
  • protect against VoIP attacks Ostrom recommends putting a firewall between the Voice and Data VLANs. By putting the Voice VLAN on a separate DMZ of a firewall, many current attacks can be thwarted. It is important to lock down the firewall so that only protocols used by IP Telephony are allowed to flow
  • Intrusion Prevention System (IPS
  • VoIP Hopper is available at http://voiphopper.sourceforge.net.
  •  
    An unssuspecting person check into a hotel like any normal person would. The ever so common exchange, credit card for room key took place. The only difference was that the person that checked had done so with other intentions. The "guest" utilized an IP Telephone that was in this hotel room to hack into the hotel credit card database and steal credit cards, transmit them to a foreign country and then have money transferred to his offshore bank account. This happened but at the hands of Jason Ostrom, aa Vigilar senior security consultant. Ostrom was able to unplug teh telephone in his room, plug in the phone's ethernet canle into his laptop and hack away. Of course, he did this as part of his job in testing a company's security agaisnt viral hackers. His company offers free security testing using a downloadable software called VolP Hopper This article was extremely interesting because as a frequrnt traveler as well as a perosn in the hospitlaity industry I was very shocked at the ease that the credit card information could be stolen. When it comes to credit card security it is of the utmost importance for companies to be PCI compliant and spend whatever it is necessary to safeguard the information of their customers. The detrimental damage that a security breach can have on a person can be debilitating as leaders in the hospitality industry we must do everything possible to prevent attacks like this from happening. made me become extra cautious about using my credit cards.
1 - 20 of 624 Next › Last »
Showing 20 items per page