Skip to main content

Home/ Hospitality Technology/ Group items tagged Credit

Rss Feed Group items tagged

marilyn diaz

Thieves Won't Wait. Neither Should You. | hospitalityupgrade.com - 3 views

  • data is under attack
  • the most afflicted industry was accommodation/foodservice
  • use a combination of hacking and malware (61 percent).
  • ...11 more annotations...
  • success stealing data “in transit” (62.5 percent) versus stored data (28 percent)
  • What this tells us is hotels and restaurants need to do more to protect sensitive payment data and be proactive in keeping up with the hackers and thieves. We also need to pay particular attention to properly securing data as it moves through the merchant IT environment.
  • Point-to-point encryption (P2PE) is a technology
  • has only recently gained momentum in the hospitality sector.
  • P2PE places “data in motion” in a wrapper that can only be decrypted by an endpoint that has the requisite key.
  • The goal of point-to-point encryption technologies is to encrypt as close to the point of entry as possible and guard against thieves who attempt to install sniffing/hacking software on a merchant’s network.
  • P2PE solutions can significantly reduce a merchant’s card data environment, mitigate potential breaches and simplify PCI DSS validation efforts.”
  • You should also understand the types of cards and transactions that can be encrypted. Does the solution encrypt both swiped cards and manually entered cards? Does it encrypt online transactions, as well as on-site or card-present transactions? Is the solution tamper resistant and, what happens if an attempted breach occurs? Where is the HSM (hardware security module) located? Even if data were to be intercepted, is it rendered unusable to cyber thieves?
  • A hosted solution will shift much of the burden of responsibility to the third-party provider and free you from having decrypted data in your environment.
  • Keep in mind, there is no single silver bullet when it comes to payment security. Even with EMV, stolen cardholder data could be used for a fraudulent online transaction. Merchants should implement a variety of technologies and techniques as part of a multi-layered approach to security that ultimately includes EMV to protect against counterfeit card fraud, tokenization to protect data at rest, and P2PE to protect data in-flight.
  • Thieves won’t wait for a unified approach and specification, and are looking to access your valuable data now. By taking a proactive approach to security that includes point-to-point encryption, asking the right questions, choosing trusted partners and keeping yourself updated, you can protect your customers’ data and your reputation.
  •  
    This article deals with the theft that happens on a daily basis in the hospitality field. It happens when credit cards are used to pay for something, like a reservation, and thieves want the information, so they can use your credit card number for whatever intentions they may have. As the article states, "our data is under attack". I can relate to those people that have had credit card numbers stolen, because it has happened to my husband and me, and it is a horrible feeling trying to get your life back on track and recover your money.  I think it would be a great idea, with some research, to get the point to point encryption technology in a field where credit cards are used so often, not only to cover the business (hotel), but also to protect the guest, so they feel at easy when they travel on vacation or business.  The overall point of this technology is to encrypt the information as close to the point of entry, i.e. the swiping of the credit card, as possible. This would in turn "significantly reduce a merchant's card data environment", as the program would encrypt the information so that hackers cannot access the customer's information. As I mentioned earlier, questions should be asked before buying this technology, as there is always something new on the market that may be better. Credit cards are not always swiped, but can also be manually placed in the system, so you want to make sure, that both transactions are protected. Overall, the establishment should always be concerned about the customer and their safety, whether physical or mental and always be prepared for the worse.
  • ...1 more comment...
  •  
    Marilyn, This is a great article and I wish this type of technology was everywhere because like yourself I have credit card numbers stolen before and it is a long process to end that. Working in the hospitality industry we would need to make sure that it is everywhere that a credit card is entered whether that being swiped in house, typed in the system manually, or even processed via the internet. In the hospitality industry we should be very aware of our guests safety and like you mention it is not only just physical safety that is a concern it is the mental state as well making sure the guests credit cards are safe and do not have a chance of being stolen by a hacker. This is a great article, keep up the good work!
  •  
    Great article! Personally after being a victim of credit card fraud, I'm very apprehensive of where I shop, who handles my card and how long it takes them to return it. I recently cancelled a large purchased after the cashier insisted on rubbing my card number on the reciept after the transactions had be approved. In my mind, I was thinking "If I let you do that, then I've open the door for anyone to charge thousand of dollars. I don't think so." As a manager, who hands credit card numbers for manual input, I'm very cautious of them and want to insure that they don't get into the wrong hand. Aftern each transactions is approved, that number is shredded and the credit card machine is batched out. Companies don't realize how important it is to PCI compliant. The risk in exposing sensitive information of our clients and customers can cost thousand of dolllars in fines and fee, in addition to the lost of that customer/client.
  •  
    Marilyn, Great Article...as a Front Desk Manager, it is my responsibility to randomly check our computers to ensure employees are not placing USB driver to collect data from our system. Our company has taking this a step further by putting metal locked case around the PC to avoid possible fraudulent activity. If we have to open a PC, we must log it to show proof why a PC became unlock. Companies should adopt similar procedures to protect the consumers/guests. Nelson
mmdmd99999

Credit Card Fraud 2021 Annual Report: Prevalence, Awareness, and Prevention - Security.org - 0 views

  • Nearly half of all American adults have had a fraudulent charge on their credit or debit cards, amounting to around 127 million people. More than one in three credit or debit card holders has experienced card fraud more than once. The median charge was $62, equating to approximately $8 billion in attempted fraudulent charges on Americans’ credit and debit cards. Almost 40 percent of card holders do not have email or text alerts from their credit card company or bank enabled. Around 81 percent of victims without these notifications had to take additional action to reverse fraudulent charges, compared to just 19 percent of those with alerts enabled.
  • Unfortunately, credit card fraud has also become even more common since the start of the pandemic. Reports of credit card fraud increased by 44 percent between 2019 and 2020 according to the Federal Trade Commission (FTC).3 The FTC also estimated that there has been $38 million dollars in reported credit card fraud tied directly to COVID-19.4
  • Nearly 60 percent of credit card holders reported they’d had an unauthorized transaction appear on a credit or debit account at some point in their lives.
  • ...1 more annotation...
  • According to our research, almost 70 percent of fraud victims noted their most recent fraudulent charge within hours of its occurrence. Today, most banks and credit card companies have systems that can detect suspicious charges and alert account holders of potential fraud before transactions are processed. Around 61 percent of credit and debit card holders in our study had enabled email or text alerts from their card servicers that would help them act quickly on fraud attempts. These individuals were more likely to block transactions before money was taken from their accounts.
  •  
    Statistics on credit card fraud to support why PCI compliance is important to protect consumers
Lu Zhang

Hotel Industry Risk: Cybercrime Has Targeted Hotel Wireless Networks To Steal Credit Ca... - 0 views

  • While financial services companies used to receive the bulk of hacker attacks, last year hotels emerged as the new choice target among hackers-out of 218 breaches in a total of 24 countries, 70 of those breaches took place through hotel networks, according to a report by security firm Trustwave SpiderLabs.
  • Even larger hotel chains are often poorly protected against cybercrime dangers, making it very easy for hackers to gain access to one computer and then use it as a doorway into the hotel’s central computer system, from where they can lift the credit card data of guests staying at the hotel along with other sensitive information.
  • It often takes hotels months before they notice the hack-last year, the average time between a security breach and discovery was over five months.
  • ...1 more annotation...
  • While credit card companies, ultimately, are on the hook for fraudulent charges, you do have to report unauthorized activity, and catching credit card fraud early can save much time and hassle down the road.
  •  
    This article report that sensitive data such as credit card information can be easily received through hotel wireless networks by cybercriminals due to the poor protection network. With the information, cybercriminals can make clone credit cards, which are indistinguishable from the real one and difficult to be traced. What worse is it takes months for hotels, customer and credit card companies to find out this criminal activity. Although hotels have began to step up security, this article notice that customers, especially those travel a lot, need to pay attention to their bank statement since the trend of hacker attacks didn't go down.
Marcos Oliveira

Mobile Restaurant POS Technology Helps Payment Flexibility - QSR magazine - 0 views

  • With smartphones getting smarter, smaller, and speedier all the time, concurrent advances in mobile point-of-sale technology are presenting restaurants with the opportunity to make their POS systems mobile.
  • There are now numerous POS platforms that leverage the iPhone and other mobile devices, including Android-powered smartphones and tablet computers like the iPad, so that restaurants can process payments in the field with a credit-card reader
  • Traditional POS has been very regimented and costly, but mobile is very adaptable, not only in terms of payment but in terms of marketing tools from an ever-growing number of third parties.”
  • ...8 more annotations...
  • While mobile POS is often touted as a boon to full-service restaurants—it can allow customers to pay at the table through a credit-card reader attached to a mounted iPad, for example, and waiters can log orders on a smartphone that zip back to the kitchen at 4G speed—the technology also has service-oriented benefits for quick serves
  • Beyond mobile POS’s value as a portable cash register is its potential as a conduit for invaluable consumer insight. Whereas restaurants are able to glean very little personalized information from credit-card transactions, they can learn a lot when customers use the mobile payment apps or opt in for an array of alerts and updates via their smartphones.
  • The mobile POS … allows us to capture valuable data that gives us a better idea of our customers’ spending and buying habits
  • mobile POS platform called Sage Payment Solutions for processing credit cards
  • Smartphones open up very exciting opportunities when it comes to business-consumer communication
  • As mobile POS technology evolves, an operator will be able to send coupons to opted-in customers’ phones based on their shopping habits or geographic location.
  • the potential of mobile POS far outweighs the peril. The technology is in its infancy, and new developments are on the horizon. These include near-field communication, which allows smartphones to share data with other devices that are in close physical proximity, and EMV cards, which have microchips that allow them to interface with mobile phones.
  • “mobile technology is in the first inning
  •  
    With smartphones evlving and getting smarter, smaller and speedier it is allowing for advances in mobile point-of-sale technology especially in the restaurant industr. There are now numerous POS platforms that support both iPhone as well as android. Tablets and iPads are also supported so that restaurants can process payments in the field with a credit card reader. Traditionally POS have been very costly and structured; now with mobile technology the flexibility is convenient, fast and user friendly. New applications allow restaurants to store customer spending patterns without retaining their personal credit card information. the use of smartphones also opens up very exciting opportunities when it comes to business-consumer communication. Restaurants can send text messages containg discounted coupons to their establishments. The key is to not over do it as customers may become annoyed with too many text messages. This article delat mainly with the restaurant industry but did mention the evolution of technological advances with the use of smart phones. Form personal experience I have used my iphone and ipad to conduct credit card transactions utilzing squareD which provides free of charge a mobile credit card swiper that is connected to the microphone port of either the iphone or Ipad. there is not monthly contract or fee. The only charge is 2.5% per settled credit card transaction and the amount is automatically deducted from the batched amount and within 1-2 business days the funds are deposited directly into ones checking/savings account. This is convenient, fast, and easy. I have been able to secure payment right on the spot instead of either handling cash which is always a ahzard or the risk of accepting checks. the use of smartphones and tbalets have revolutionozed the way business is being conducted making it fast, easy, and convenient to both cutomer and busoness owner alike.
taurus1313

Credit Card Protection and Credit Safety Tips - 0 views

  • You’re probably already practicing basic online and mobile safety, but consider taking these credit card-specific measures as well: Know your merchant. When shopping online, look for sites with “https” in their web addresses (the “s” stands for “secured”) and the green lock icon; make sure the URL includes the correct company’s name, rather than a close-but-not-correct version; and, even on a secured site, share your information only if you know how it will be used. Type for each transaction. Never allow your credit card number to be stored on an online shopping site. Add a layer. Consider using an online payment system or mobile payment service like PayPal, Apple Pay, Samsung Pay or Android Pay to keep your credit card number out of the hands of merchants, so that if a merchant is hacked, it can’t leak your account number. Watch out for public Wi-Fi. Don’t shop or conduct financial transactions, including checking your accounts, using public Wi-Fi. Because it’s a public network, your information can easily be viewed by anyone.
  •  
    "You're probably already practicing basic online and mobile safety, but consider taking these credit card-specific measures as well: Know your merchant. When shopping online, look for sites with "https" in their web addresses (the "s" stands for "secured") and the green lock icon; make sure the URL includes the correct company's name, rather than a close-but-not-correct version; and, even on a secured site, share your information only if you know how it will be used. Type for each transaction. Never allow your credit card number to be stored on an online shopping site. Add a layer. Consider using an online payment system or mobile payment service like PayPal, Apple Pay, Samsung Pay or Android Pay to keep your credit card number out of the hands of merchants, so that if a merchant is hacked, it can't leak your account number. Watch out for public Wi-Fi. Don't shop or conduct financial transactions, including checking your accounts, using public Wi-Fi. Because it's a public network, your information can easily be viewed by anyone."
Marcos Oliveira

Security Expert Exploits Hotel Network Vulnerabilities | Top Stories | Hospitality Maga... - 0 views

  • IP Telephone
  • unplugged the IP Phone and plugged the phone's Ethernet cable into his laptop. It booked up to his Backtrack Live CD
  • Jason Ostrom, Vigilar senior security consultant, was given access to a hotel room and told to find out if he could break into their corporate network through the IP TelephoneÃÆ’Æ'Æ'ÃĥÂ.ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¡Ãĥ¬ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¾ÃĥÂ.s network connection
  • ...7 more annotations...
  • Jason was able to penetrate through to the data network by using a combination of techniques he calls VoIP Hopping. This type of VLAN hopping attack is just one of the attack vectors being used by attackers today
  • As traditional voice and data networks converge, more avenues of attack open up
  • A regular PC should never have access to the Voice VLAN
  • Defense methodologies are in their infancy and are sure to improve in the near future
  • protect against VoIP attacks Ostrom recommends putting a firewall between the Voice and Data VLANs. By putting the Voice VLAN on a separate DMZ of a firewall, many current attacks can be thwarted. It is important to lock down the firewall so that only protocols used by IP Telephony are allowed to flow
  • Intrusion Prevention System (IPS
  • VoIP Hopper is available at http://voiphopper.sourceforge.net.
  •  
    An unssuspecting person check into a hotel like any normal person would. The ever so common exchange, credit card for room key took place. The only difference was that the person that checked had done so with other intentions. The "guest" utilized an IP Telephone that was in this hotel room to hack into the hotel credit card database and steal credit cards, transmit them to a foreign country and then have money transferred to his offshore bank account. This happened but at the hands of Jason Ostrom, aa Vigilar senior security consultant. Ostrom was able to unplug teh telephone in his room, plug in the phone's ethernet canle into his laptop and hack away. Of course, he did this as part of his job in testing a company's security agaisnt viral hackers. His company offers free security testing using a downloadable software called VolP Hopper This article was extremely interesting because as a frequrnt traveler as well as a perosn in the hospitlaity industry I was very shocked at the ease that the credit card information could be stolen. When it comes to credit card security it is of the utmost importance for companies to be PCI compliant and spend whatever it is necessary to safeguard the information of their customers. The detrimental damage that a security breach can have on a person can be debilitating as leaders in the hospitality industry we must do everything possible to prevent attacks like this from happening. made me become extra cautious about using my credit cards.
Dian Peng

credit card safety - 0 views

  •  
    The article mainly talks about how to use your credit card safely when you do shopping or other consumption. At first, only tell it to those who really need to know and don't say it or lay it where others can find it out. Before entering your credit card number into any website or giving it to anyone over the phone, make sure you know exactly who you're dealing with and that their reasons for needing your credit card number are legitimate. Then, lock it up. Only carry the credit cards that you absolutely need and keep your other credit cards locked up in a personal safe. Three, each month when your credit card statement comes in, don't automatically assume everything on it is accurate. Read every line item on your credit card statement and make sure each and every charge is legitimate. Fourth, be careful with your email. It means that If you have a street-side mailbox, don't leave your credit card payments in there for the postal carrier to pick up and make sure you pick up your mail each and every day. At last, gets credit card monitoring service. If you can follow the tips above, you will use your card safely.
Yanique Coach

Westin Hotel's POS Hacked - eSecurity Planet - 0 views

  • Travelers who checked in to the Westin Bonaventure Hotel & Suites in Los Angeles between April and December last year are being advised to review their credit card statements and credit reports this week after hotel officials warned of yet another security breach.
  • So far, Westin Bonaventure officials have isolated the source of the security breach to four bars and eateries on the property, as well as the valet parking station. The venues in question include the Lake View Bistro, the Lobby Court Bar, the Bonavista Lounge, and LA Prime
  • Nonetheless, the company is providing free credit-monitoring services for anyone who used their credit or debit cards at those establishments during the nine-month period.
  •  
    Travelers who checked in to the Westin Bonaventure Hotel & Suites in Los Angeles between April and December last year are being advised to review their credit card statements and credit reports this week after hotel officials warned of yet another security breach.
  •  
    The Westin Bonaventure Hotel and Suites in Los Angeles had a security breach where their point of sale system for processing debit and  credit card transactions have been hacked. Data such as guests name, cedit and debit numbers and expiration date were jeopardized. Hackers had not been able to access information from the Hotel's computer system and neither did they affect guest room charges. The Director, Michael Czarcinski apologized and offered free credit monitoring services for those who used their cards during that nine month period.
lalle044

The smart card: Apple Pay competitor or simple stopgap? - CNET - 0 views

  • Paying with a Stratos may not be as seamless as holding your iPhone near the register and using Apple Pay. Apple's mobile payments service lets iPhone 6 and iPhone 6 Plus owners use their smartphones and their fingerprints to charge purchases to their credit cards just by holding their iPhone near a terminal. And while technologists rejoice at Apple Pay's security, only 6 percent of iPhone 6 and iPhone 6 Plus owners used Apple Pay as of March, according to market researcher InfoScout.
  • ow so-called smart cards like Stratos, Coin, Plastc and Swyp have come on the scene. When coupled with a smartphone app, these devices -- which cost around $100 -- let users store and toggle among different payment cards on the fly. Cards are scanned in using a small card reader and managed with a smartphone app.
  • It would be awesome if every single merchant took Apple Pay," he said. But that's not the reality. "It's kind of crazy that we're in 2015 and we're still paying with cash and plastic, and we have a computer in our pocket." Until the computers in our pocket become the main way to pay, he has a Coin card.
  • ...3 more annotations...
  • By October 2015, merchants that haven't upgraded their terminals to accept the new cards will be the ones liable for fraud, not the credit card companies. The result: we'll start to see many more EMV-ready point-of-sale (POS) systems.
  • If you have a chip in your card, the POS system is going to prompt you to put your card in the [chip] slot," Mulpuru said. That becomes a problem with products like Stratos, which do not contain chips. That means you'll still need to carry around a backup card.
  • What's more, Stratos, Coin and their rivals don't directly store credit or debit card information unencrypted -- and only transmit sensitive data from your smartphone. That makes devices inherently more secure than the standard magnetic stripe credit card. There are also options to deactivate the card if it loses communication with your phone
  •  
    I was listening to the news over the week end and was intrigued about a story on a new smart card that would one day take the place of all of our credit cards. My mind started reeling and could not grasp the concept especially with technology and hackers in the forefront of any credit card online usage. I read this article several times and it helped me understand the simplicity of this card and also the fact that your credit/debit account numbers are not stored on the card just a chip then the consumer either uses a PIN number or signature as authorization for payment. Fingerprint technology will be added in the future, which will bring about an evolution into the use of the Smart Card.
armanyleblanc767

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • challenge to maintain teams of well-trained staff.
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • Reliance on Paying By Card
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Insider Threats
  • Compliance
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
anonymous

Fast Food Chain Arby's Acknowledges Breach - Krebs on Security - 0 views

  • Sources at nearly a half-dozen banks and credit unions independently reached out over the past 48 hours to inquire if I’d heard anything about a data breach at Arby’s fast-food restaurants.
  •  
    In recent news, Arby's acknowledge a data breach within its restaurants. "Arby's said the breach involved malware placed on payment systems inside Arby's corporate stores, and that Arby's franchised restaurant locations were not impacted." Once figured out the company hired security experts to solve the problem. The initial sign of breach came from a service organization that serves more than 800 credit unions called PSCU. An alert was sent to all cardholders that a fast food chain had been compromised, but no specifics were mentioned. This article points out that, "point of sale malware has driven most of the major retail industry credit card breaches over the past two years." Monitoring your credit/debit card transactions is the best way to be safe in this situation- as long as you report the fraudulent charges you aren't liable. While IT has many positives for any organization, it's not risk adverse. Once a system is hacked all information of company and past users is up for grabs, and credit card companies are forced to take the blow.
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
Ganna Gorbachuk

Transforming Business with Mobile Payments - 12 views

  • Mobile systems are transforming the payment environment. According to investment bank Barclays Capital, U.S. mobile commerce sales--that is, purchases made on smartphones and tablets--hit $5.3 billion in 2011, up 83 percent from the year before. Generator Research, a consulting firm specializing in digital media, projects that by 2014, usage by consumers will grow 600 percent to 490 million worldwide.
    • Joe Cilli
       
      Interesting information. Keep in mind there is a high level of cannibalization in that mobile sales are increasing, but the bottom line is unchanged because in-store sales are decreasing. In short, the amount of transactions and dollar amount is roughly the same; it is, however, important to recognize the shift in consumer purchasing patterns.
  •  
    Great article on the rise of mobile payment systems and how businesses who in the past may have been cash only or otherwise are seeing increased sales as the ability to take credit card payments with little hardware and software infrastructure costs. Down the street from me is probably my favorite Rib joint in town, Uncle Rodney's House of Ribs is the name. I love that place, but rarely go because they are a cash only business due in large part to the fact that the owner does not wish to pay for wireless or otherwise internet related services to make his business able to accept credit cards. What are everyone's thought to the increased use of mobile payment systems for restaurants and other businesses?
  • ...6 more comments...
  •  
    I think mobile payment systems are great. I personally have not used them very much but I think they would be very handy at events. I am a Timberwolves season ticket holder and my seats are close to the court where a serving staff is able to get food and beverages for you. Fans are able to pay with credit cards but the server has to take your card to the back area to ring everything up. If the servers were able to carry mobile credit card readers they would be able to speed up transactions and take more orders. It would be a benefit to everyone - the team would be able to sell more items, the servers would make more tips, and the fans would be more satisfied. If someone wanted to keep an open tab until the end of the game I'm sure there could be an app for adding items to a specific seat location instead of doing multiple credit card transactions. I'm sure mobile payment devices are being used by staff at many events and I'm a little surprised it hasn't made it's way into the Target Center yet.
  •  
    That is an interesting artivle talking about the mobile payment that i have not seen in my life. If i was a owner of a store or a restaurant, i would like to try this technology that help to save my money and increase my businesses. On the other hand, as a customer who is asked to pay in this way, i would worry about the security problem because i dont know how it works.
  •  
    It sounds great. I think it is convenience, cause I can pay by my phone whenever I need. But maybe the biggest problem is the security. How to guarantee it, we always use mobile connect ing internet which increase the danger coefficient.
  •  
    I like this idea of mobile payments. It saves business people time and money which they were supposed to spend on the traditional way of credit card payment. It turns out more likely to be a self-monitored business transaction way. However, before signing the contract, the business owner should consider the security level of this payment method from the customers's standpoint. I'm pretty sure that some customers may feel weird and unsecured when they swipe their card on a mobile device.
  •  
    This is a fascinating article. On one hand I can absolutely see the benefits for a mobile business or a business that increases it's sales by accepting mobile payments. It also seems that security would be increased for the merchant as there is not much cash available on hand for petty thieves. The crooks of the future will need to be technologically sophisticated. The increased use of smart phones has greatly increased my small business as many of my customers make their purchases through their smart phones. My personal concern is that our country will see an increase in debt and over spending as purchasing with your credit card account becomes even easier. Will it even be possible to pay with cash in the future or will it all be electronic? Also, what happens if your cell phone is stolen and all of your financial world is on there. Do these scanning systems have much security if there is not a credit card to verify a signature against? Is everything stored in cyber space where the phone thief cannot reach it without expensive technical knowledge?
  •  
    While a few hundred years ago a life of an average person in a small town could consist of two or three events as a war in his country, governor's marriage and a crime in the neighborhood. In today's world the same as centuries ago every moment is full of things which happen somewhere but now we have a unique opportunity to know about them almost few seconds after they happen. Technology can make a huge difference in a small business when an employer finds a right time to use innovation, as Miki Nishihata and Joey Garza did. Their companies got an advantages of using card readers. Mobile systems are transforming the environment of sales and payment processing. A thing which simplifies the prosess of transaction is a benefit because a lot of consumers prefer FAST and EASY shopping when every minute may cost. Assuming all this information a Square company was created by Twitter co-founder Jack Dorsey and glass artisan Jim McKelvey. Nowadays almost everybody has a mobile phone and credit card and combining those two things with an innovative technologies of online sales is a fantastic invention!
  •  
    This is an interesting article, and it is quite amazing to see how the way of payment is drastically shifting with new technological devices such as smartphones, card readers. Just a couple of years ago, if I wanted to buy something online, I had to start my computer then go on whatever website I bought something from which took some time. Now, however, I don't even have to turn on my computer to purchase something on the web because I can buy many things through my smartphone whenever and wherever I want. It is a lot easier and faster than what it used to be.
  •  
    Spasibo bolshoe za interesting article! Ona mne ochen pomozhet v moem research!
natalieemmanuel

Point-of-sale malware has now infected over 1,000 companies in US | Ars Technica - 0 views

  • According to the US-CERT advisory, the group behind the Backoff malware operation scanned the Internet to find potential victims by detecting installations of the remote-desktop software frequently used by service providers to manage the point-of-sale systems of their retail clients. The attackers look for remote desktop solutions like Microsoft’s Remote Desktop, Apple's Remote Desktop, Chrome Remote Desktop, Splashtop 2, Pulseway, and LogMeIn, according to the advisory. Once a potential target is identified, the group uses the equivalent of a digital sledgehammer, attempting to break into the system using a list of common passwords.
  • Such techniques are a common threat to small retail businesses, according to Trustwave, who helped the government agencies in their analysis of and response to the 'Backoff' program. A third of cybercrime attacks on businesses focused on the point-of-sales systems in 2013, according to the company's 2013 Global Security Report. In 31 percent of incidents, attackers exploited weak passwords to gain access to targeted systems
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
apate114

Top 5 risks and security challenges for hotels in 2015 - eHotelier - 0 views

  • 1. Identity theft leading to credit card fraud
  • Identity theft and credit card fraud is the new form of pick pocketing, but on a much larger scale. The number of compromised credit cards is expected to increase this year.
  • 2. Silent invasions
  • ...11 more annotations...
  • 3. Longer or no security audit cycles
  • APTS are considered the most dangerous type of cyber-attack as they simply bypass the defenses that are in place.
  • Cyber-crime shows up on the security radar as the second highest risk the hotel industry is exposed to.
  • The gap between the low number of qualified security auditors worldwide and new hotels built is getting bigger and bigger.
  • Nearly 1.26 million hotels worldwide are dealing with all sorts of safety & security issues.
  • 4. Physical crime will remain an issue for hotels
  • Physical crime ranges from professional burglaries using nifty social engineering techniques to temporary drug laps in hotel rooms.
  • Holdups at night involving firearms have increased since hotels are easily accessible and less protected compared to other industries operating at night.
  • 5. Loss of competitive advantage after a major security incident
  • The recovery costs after a security incident, including the attention of the media, are often much higher than the investment in security and risk management.
  • Reputation is a vital yet fragile advantage that requires its very own security plan in a strong competitive market where guests nowadays love to make their booking decisions with the help of online travel review sites such as Tripadvisor & Co.
  •  
    The article highlights the top five risks and security challenges in the hospitality industry. The following are the top five security risks according to the article. 1. Identity theft leading to credit card fraud - compared to other industries, the hotel industry is at more risk for credit card fraud and identity theft. This is because hotels are highly targeted by hackers. Hotel properties for the most part have credit card information for each and every guest that has stayed at a specific property. Hotels must be ahead of the technology curve when it comes to security however this is not always the case. 2. Silent invasions - This consists of all the cyber attacks that can affect a business by infecting the network. As discussed during the first module, hotels run majority if not all of their business using technology. If a hotel were to have their networks hacked it would leave them in a very bad situation. Since hotels operate their entire business using technology and multiple different systems, they would not be able to operate if they experienced a network breach. 3. Longer or no security audit cycles - Most branded hotels are required by the franchise to have consistent security audits done for each property. Independent hotels are deemed greater at risk for a security attack because they are not mandated to have security audits. These hotels sometimes skip audit cycles to save money. 4. Physical crime - This ranges from professional robberies to drug laps in hotel rooms. Hotels are at risk for armed robbery due to to lower chance of security compared to other industries that operate overnight. 5. Reputation risk - Hotels that experience a security breach almost always will see some sort of loss in competitive advantage. Nowadays with social media and the news travelers are more aware with what is going on and they would be more inclined to book their reservation somewhere else if they heard of the property having a security breach.
lin liu

The latest from HTNG - Hotels unpack the future of credit card security | Hotel Management - 0 views

  • The Framework is aimed at reducing the cost and complexity of satisfying the Payment Card Industry Data Security Standards (PCI-DSS),
  • Travel Daily News reports that the new Framework calls for tokenization to encrypt the credit card information at the point-of-swipe.
  • Bloomberg BNA reports that on Feb. 14, the Council released new guidance for merchants who accept payments on mobile devices.
  • ...2 more annotations...
  • February also saw the release of the Council’s guidance on security and cloud computing.
  • The Council goes on to note that cloud computing remains an evolving technology, and merchants must be careful to evaluate competing cloud services and establish clear security policies and procedures.
  •  
    Hotels have to comply with Payment Card Industry Data Security Standards, which are constantly updated since technology is developing. Also, 'the hotel industry has unique vulnerabilities to credit card theft', since the cards should be available over the long period of time, and to different 3rd parties as well. The new technology will encrypt credit card information at the point-of-swipe, and the number never gets to any other place in the hotel or other business. The other issue is payments on mobile devices. Where it is advised to encrypt information prior to using the device, and avoid "bring you own device policy'.
  •  
    This article introduces the Secure Payments Framework in Hotel Technology Next Generation (HTNG) Conference. The Framework applies mobile payment and cloud computing technology to reduce the cost and complexity of satisfying the Payment Card Industry Data Security Standards. The credit card security is a big challenge for all hotels, especially for the small hotels, lacking expertise and budget to protect customers' card information. There are many advantages of the new card framework. Firstly, the new Framework can encrypt the credit card information at the point-of-swipe. In this way, the card number can't be stolen by other systems. Secondly, it is scalable for different sizes of hotel. Thirdly, new guidance is made for accepting payments on mobile devices. Before processing payment, the merchant need encrypt cardholder, to make sure more security. What is more, new policy on cloud computing. The cloud service provider and its clients are both responsible for the security of cloud data. The policy also need merchants to evaluate competing cloud services and carefully pay procedures.
anonymous

Credit Card Security Systems: 3-D Secure™ and SecureCode™ / GSPAY - 0 views

  • Many Ecommerce merchants and credit card holding online consumers are concerned with credit card fraud. CNP transactions and with them credit card fraud cases have become too popular lately.
  • Visa’s 3-D Secure™ and MasterCard’s SecureCode™
  • Visa’s 3-D Secure™, a key component of The Visa Authenticated Payment Program, adds extra security protection to SSL (secure socket layer) secure forms. The 3-D Secure™ system is supposed to decrease the number of chargeback disputes and fraud cases by 80%
  • ...5 more annotations...
  • The benefits or Visa’s 3-D Secure™ are clearly seen: high level of security for consumers, a significantly lower chance of chargeback and credit card fraud, and overall confidence in CNP transactions.
  • As for MasterCard’s SecureCode™ is resembles Visa’s 3-D Secure™. MasterCard credit card holders register at MasterCard’s SecureCode™ website and asked to provide a personal secure code, which will then be asked for when purchasing online.
  • he benefits for e-Commerce merchants using Visa’ 3-D Secure™ and MasterCard’ SecureCode™ technologies are:
  • The benefits for consumers who make purchases at e-Commerce online stores bearing the 3-D Secure™ or SecureCode™ logos, thus using 3-D Secure™ or SecureCode™ for safe processing are:
  • 3-D Secure™ and SecureCode™ will definitely improve the world of e-Commerce and CNP online shopping.
  •  
    This article is about the concern of customers paying their purchase online, and not through a machine as is the most typical way to do it. But for many this transaction is not safe at all, there could be hackers that can make fraud. This is why two of the most popular CC companies has developed the Visa's 3-D Secure™ and MasterCard's 28SecureCode™ to keep their customers safe, these cards requires a personal security code for every transactions and other personal information in order to keep the purchase safe and some others requires a monthly fee to obtain this service.
diana morales

A Mobile POS Solution Increases Poolside Food and Drink Sales at the Gaylord Hotels - Y... - 1 views

  • The hotels offered poolside service and with acres of pool area to cover, servers spent a lot of time walking between the pools, bar, and kitchen to enter and check on orders, and process payments.
  • This resulted in long wait times and had a negative impact on sales and customer satisfaction.
  • The servers use the iPod touch in combination with Daily Systems' iAPS sled, which is a unique all-in-one solution with a bar code scanner, credit card reader, smart card reader, and receipt printer.
  • ...1 more annotation...
  • "The cutting-edge mobile POS solution is also a factor in creating the impression that the Gaylord Hotels is a technologically savvy and modern company."
  •  
    Gaylords Hotels has added the POS system for their customers to experience. POS stands for Point Of Sale. Its a small devices that allows an employee to charge the customers credit card right then and there. No cashier, no register. The article elaborates on how the hotel has implemented this systemin their pool area. It discusses how pool attendants spend so much time walking back and forth which eventually makes the order longer. This system allows the employee to charge the credit card and print the receipt right then and there, saving a few trips. This should be implemented in most places saving time and preventing a slick employee to steal someones credit card information
Ted Rood

FTC Sues Wyndham Hotels Over Data Security Failures - Security - Privacy - Informationweek - 0 views

  • The Federal Trade Commission Tuesday announced that it had filed a suit against global hospitality company Wyndham Worldwide Corporation, as well as three of its subsidiaries
  • failing to institute a robust information security program, even in the wake of a major exploit.
  • exposure of over 600,000 credit card accounts and $10.6 million in fraudulent credit card charges, the FTC alleged.
  • ...5 more annotations...
  • More Security Insights Webcasts Malware from B to Z: Inside the threat from Blackhole to ZeroAccess Remove Administrator Rights Without Disrupting End User Productivity More >>White Papers
  • Valentino said the company overhauled its information security practices in the wake of the attacks, and also dismissed claims that anyone had been harmed by the breaches. "At the time of these incidents, we made prompt efforts to notify the hotel customers whose information may have been compromised, and offered them credit monitoring services," he said. "To date, we have not received any indication that any hotel customer experienced a financial loss as a result of these attacks."
  • "unfair and deceptive
  • The FTC accused Wyndham of failing to address the security vulnerabilities highlighted by the first breach, as well as failing to implement technology that could have detected unauthorized access to its networks. As a result, the agency said, in March 2009 attackers--"using similar techniques as in the first breach"--again
  • gained access to the Wyndham Hotels and Resorts network.
  •  
    This article describes one of the worst situations that could occur when operating a hotel. According to the text, Wyndham Hotel Group failed to implement a strong enough security system, resulting in hackers breaching the network and stealing over 600,000 credit card numbers and over 10 million dollars in fraudulent charges. The FTC is suing Wyndham Corporation for failing to take the proper security measures to guarantee the security of the most important customer information. The FTC also states that Wyndham used improper software configurations that presented credit card information in a manner that was clear and easy to read. Michael Valentino, spokesman for Wyndham Worldwide, the company made prompt efforts to notify those whose information had been compromised and according to Valentino, no hotel customer had experienced a financial loss as a result of the attacks.  Despite Valentino's claims, the FTC is suing Wyndham for unfair and deceptive practices in failing to protect the privacy and personally identifiable information about guests. The FTC claims that Wyndham failed to address the security failures that occurred after the first breach in 2008 and did not implement technology that could have detected unauthorized access to networks. In 2009, hackers used similar techniques to break into the network again as steal as much personal information as they could. 
Tamara Lang

Point of Sale Technology: New Developments - 0 views

  • Hotel
  • A hotels Point of Sale (POS) system is vital to the running of the business and crucial to how a hotelier monitors things like sales, bookings and staff performance. Recent advances in technology have helped to revolutionise the hospitality sector, decreasing service times and increasing the efficiency of sales when completing transactions.
  • The growing trend of a new technology called Near Field Communications (NFC) is hoped to eliminate the necessity for customers to carry money or credit/debit cards to pay their bills. This NFC technology allows consumers to use mobile devices to process all their transactions, for instance by swiping their smartphone across a special kiosk at the counter, with all the information sent to a central processing system for payment.
  •  
    This article was very enlightening on the recent advances of POS technology in the hospitality industry and the new developments that keep evolving. The article presents areas were recent advances have helped to improve the "effectiveness of a business and relationship with their customers". As stated in the article with the use of "cloud-based systems, the latest i-trends and the growth of Near Field Communications", the hospitality industry POS technology will move very far. Three key areas were discussed; "Point of Sale on the move" which referred to using a browser on any mobile device to obtain necessary information while you are on the move or away from the business. The second area was using a POS system on a tablet or smartphone that would be able to provide more useful information than tradition POS systems in a lightweight manner with more flexibility. I can attest to the real need for this advancement because working in an establishment that has the traditional POS systems has proven when there is a problem trouble shooting can be very difficult. A process as simple as getting your technical support team to make changes in your POS system can be a nightmare, when your system does not have updated software. We experienced that issue this week, when technical support attempted to access the system and could not locate the license agreement after hours of searching for a key we found a device that was attached to the printer cable in the back of the CPU. All of the unnecessary time spent on that one event could have been eliminated if some of this new technology was in place. The last area the article referred to is "Marrying POS and NFC". This new development is hoping to eliminate the need for carrying money or credit/debit cards and enable consumers to use mobile devices to process all transactions. I believe this would be very beneficial in the hospitality industry not only from the point credit card fraud but also it eliminate
1 - 20 of 418 Next › Last »
Showing 20 items per page