Skip to main content

Home/ Hospitality Technology/ Group items tagged SECURITY

Rss Feed Group items tagged

marble_bird

Hotel_ITSec.pdf - 0 views

shared by marble_bird on 15 Jul 20 - No Cached
  • During the past decade, information technology (IT) has significantly changed the way the hotel industry controls and manages operations. While many technologies have been utilized, some newer technologies have emerged in the literature and in practice, and many of them impact the hotel’s security.
  • Among the results, this study identified a gap between hoteliers’ understanding of IT budget adequacy and the adequacy of installed IT security systems.
  • Advancements in technology are increasing at a remarkable rate. As technology becomes more important, organizations that do not keep up with these advancements could lose business opportunities to other competitors that do
  • ...53 more annotations...
  • The four leading technologies which have showed a high adoption rate from the industry and have received attention from academia are: self-service, wireless, green, and security technologies. The advantages of these technologies for hoteliers include enhanced customer services and operational efficiency (Doyle, 2007), decreased guest wait times, more efficient methods to settle bills (Singh & Kasavana, 2005), reduction of energy costs (Meeroff & Scarlatos, 2007), and protection of sensitive customer data and credit card numbers
  • In addition, exploring the influential factors of security system usage will provide greater depth of knowledge with respect to why some hotels have adopted more security systems than others.
  • there is still a lack of understanding of the nature of risk associated with inadequate IT security, especially among operators of hotels that do not have their own IT departments.
  • Self-service technologies are commonly defined as devices or applications which permit users to produce a service independent from the direct involvement of the service provider (Meuter, Ostrom, Roundtree, & Bitner, 2000). The use of self-service technologies in the hotel industry has grown considerably, especially in the areas of self check-in, in-room check-out, and foodservice kiosks
  • IT systems refer to general support systems such as mainframe computer, mid-range computer, and local area network.
  • Some of the most significant wireless technology applications involve the use of mobile handheld devices, such as personal digital assistants (PDA), tablet PCs, and cellular phones, or RFID (radio frequency identification). RFID utilizes computer chips and antennas, allowing the chips to wirelessly communicate with a receiver.
  • While the major usage of RFID in the hotel industry was for inventory control purposes, it also has the potential to be utilized in ways that can provide more conveniences for the guests.
  • Other possible uses include placing RFID tags on items of high value as a means of theft prevention or integrating tags into guest loyalty cards for easy identification
  • IT investment that lowers environmental impact and IT that manages the environmental impact of other systems are commonly referred to as “green technology”
  • Many hoteliers might think becoming more environmentally friendly will cost more for their hotels. However, it has been demonstrated that “going green” is not only the right thing to do for the environment but also provides tangible bottom-line benefits for hotels by reducing consumption of energy and water, as well as other related costs.
  • Some of the risk factors involved include reliability, security, and privacy issues
  • A hotel with more technologies being utilized will install more security systems than those with fewer technologies.
  • Many of these attacks involve attempts by thieves to gain access to customer credit card data, and these attempts constitute a major portion of the risk inherent in IT security
  • if a system is breached and the merchant is not PCI compliant, the merchant then is responsible for all costs associated with improperly used credit card information taken from that system (Kress, 2008). These losses could bankrupt a business if the security breach goes undetected for even a short time.
  • IT security systems are those measures taken to protect the confidentiality and integrity of proprietary data.
  • two main paradigms of adoption are believed to occur: bottom-up adoption and top-down adoption.
  • Thus, it is reasonable to assume that organizational factors (e.g., financial factor, human resource) will influence the implementation stage of security systems at a hotel.
  • A hotel with sufficient IT budget will install more security systems than those with insufficient IT budget.
  • That is, if a hotel does not have its own IT department, it will have a negative influence on successfully installing or maintaining necessary security systems.
  • A hotel with its own IT department will install more security systems than those without.
  • Overall, the state of IT spending on security continues undiminished because managed security services are required for almost every application (Communications News, 2007).
  • risk associated with a breach of IT systems security (e.g., network break-ins) is very high. Consequently, no sector of the business community is exempt from attacks on their IT systems, with an attack being defined as a technique used to exploit a system’s vulnerabilities.
  • Given the importance of security and privacy at a luxury hotel, this study expects luxury properties to have installed more security systems than other segments
  • Most hotel employees use their property management systems for hotel operations and should be able to check their e-mails.
  • To justify the low response rate, previous studies which have compared response rates of mail and e-mail for surveys were reviewed.
  • the large majority of respondent properties do not have their own IT departments. Second, the people making IT decisions generally do not have IT backgrounds or training. Third, the large majority of respondent properties have little more than firewalls or antivirus software to protect their proprietary data, and these systems alone are not adequate to meet PCI standards, as they do not take steps to encrypt and protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test their networks, and maintain an information security policy as required by the Security Standards Council.
  • The respondents were asked to select from a total of fourteen securities related systems
  • The profile of the respondents revealed that they were experienced hoteliers with more than ten years experience in the industry
  • Fifty-three percent of the respondents reported that they were with chain hotels that would be considered mid-range properties with an average of 175 rooms (median of 107). Over 80% of the respondents reported working in operations, while fewer than 4% reported working in either IT or engineering (Table 1).
  • Nearly 70% of the respondents’ properties did not have their own IT department (69.2% did not have, and 30.8% had their own IT departments, n = 234, missing data = 10).
  • Fifty-three percent of them (n = 244) thought the most important goal for hotel technology would be enhancing the customer’s experience.
  • second identified goal was utilizing technology to help generate revenue (41%)
  • differentiate properties from their competition (20%), to lower expenses (16%), and to increase security (6%).
  • Internet kiosks in the lobby represented the most frequently used self-service technology (36.5%, n = 244), followed by kiosks for airline check-in/board pass
  • With respect to security systems currently in use, antivirus security systems represented the most frequently used security system (92.2%), followed by hardware firewalls, software firewalls, physical security, and encrypted login security systems.
  • intrusion detection was the most frequently identified system (15.6%), followed by vulnerability assessment scanning (13.5%), Internet scanning (13.1%), antivirus (11.5%), digital ID server (11.5%), and nonreusable passwords (9.8%; Table 2).
  • Thus, the hypothesis was supported that there was a linear relationship between the three factors and the adequacy of security systems.
  • The positive standardized coefficient (β) of .389 indicates that there was a statistically significant (p < .001) linear relationship between IT usage (the number of wireless, self-service, and green technologies a hotel was using) and the adequacy of security systems
  • The study revealed certain things of interest, the most significant of which is the need for greater emphasis on IT security among hoteliers.
  • only about 30% of all respondents reported having their own IT departments. Since budget hotel properties are extremely unlikely to have an IT department, it is highly likely that the very large majority of IT decisions throughout the industry are being made by hotel operators for whom IT is not their primary area of concern.
  • Furthermore, the focus of hoteliers for future IT implementations is enhancing the guest experience (53%) and generating revenue (41%). Very few respondents (6%) identified increasing security as a 5-year IT goal.
  • While almost all respondents use information systems as part of their jobs, very few are trained in the development, maintenance, and secure use of these systems.
  • no correlation was found between the respondents’ perceived adequacy of their IT budgets and the adequacy of installed security systems, as adequacy of IT budget did not appear as a significant term in the regression analysis.
  • Nearly 10% of respondents do not have so much as anti-virus protection for their systems, and nearly half do not even take simple physical precautions to protect their IT systems.
  • we note that no correlation exists between the respondents’ perceived adequacy of their IT budgets and the number of installed IT security systems, as the number of installed systems was not a significant factor in the regression analysis.
  • The sample obtained in this study represented the targeted sample: over 80% of the respondents were working in hotel operations. Furthermore, the purpose of this study was to explore hotel operators’ insight of technology usage, IT budget, and security measures rather than to confirm existing theories or to generalize the results.
  • it is reasonable to conclude that the respondents did not have an adequate understanding of the nature of the IT security hazards facing them for the average property does not have installed systems adequate to meet PCI standards, yet they reported having adequate budgets.
  • In order to adequately protect proprietary data, one must have an understanding of network security, which is an understanding apart from software functionality.
  • Properties with their own IT departments, however, reported that they had a higher number of installed IS security systems than did those properties without their own IT departments.
  • roperties without their own IT departments, in particular, have a less adequate understanding of their IT security needs than may be necessary.
  • This study found hoteliers’ lack of attention to security provision, training in IT, and PCI compliance can place hoteliers at great risk. For example, the cost of a single incident at a noncompliant property could result in the loss of the entire business.
  • It will be useful to examine the reasons why luxury properties are more likely to employ adequate security measures to determine whether this greater use is attributable to better understanding of security issues or some other factor.
  • The study was limited by the nature of online surveys; the response rate was quite low. Future studies could test the proposed research model via paper-based mail surveys to increase a response rate.
  •  
    This article covers a study performed on various hotels to determine management's level of IT knowledge and security implementations in relation to the hotel's IT security budget. The article discusses four types of technology impacting the hotel industry and how management responses to trending technology can affect a business, particularly in terms of a data breach and overall security. The study finds that an alarming percentage of hotel managers are not adequately informed on the risks and procedures of IT management and security, and many do not have proper IT security measures in place despite having an appropriate budget.
anonymous

What Is IT Security? - Information Technology Security - Cisco - 0 views

  • Although IT security and information security sound similar, they do refer to different types of security. Information security refers to the processes and tools designed to protect sensitive business information from invasion, whereas IT security refers to securing digital data, through computer network security.
  • Network security is used to prevent unauthorized or malicious users from getting inside your network. This ensures that usability, reliability, and integrity are uncompromised. This type of security is necessary to prevent a hacker from accessing data inside the network. It also prevents them from negatively affecting your users’ ability to access or use the network.
  • Internet security involves the protection of information that is sent and received in browsers, as well as network security involving web-based applications. These protections are designed to monitor incoming internet traffic for malware as well as unwanted traffic. This protection may come in the form of firewalls, antimalware, and antispyware
  • ...3 more annotations...
  • Endpoint security provides protection at the device level. Devices that may be secured by endpoint security include cell phones, tablets, laptops, and desktop computers. Endpoint security will prevent your devices from accessing malicious networks that may be a threat to your organization. Advance malware protection and device management software are examples of endpoint security.
  • Applications, data, and identities are moving to the cloud, meaning users are connecting directly to the Internet and are not protected by the traditional security stack. Cloud security can help secure the usage of software-as-a-service (SaaS) applications and the public cloud.  A cloud-access security broker (CASB), secure Internet gateway (SIG), and cloud-based unified threat management (UTM) can be used for cloud security.
  • With application security, applications are specifically coded at the time of their creation to be as secure as possible, to help ensure they are not vulnerable to attacks. This added layer of security involves evaluating the code of an app and identifying the vulnerabilities that may exist within the software.
  •  
    IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers. IT security includes Network security, Internet security, Endpoint security, Cloud security, and Application security.
xsun015

The Future of Hotel Security - AOL Travel Ideas - 0 views

  • With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the next level. #plain_module { width: 590px; height:170px; border: none; float:left; margin:0px; font-size:12px;} #plain_module img {border:none; width: 13px; height:14; border: 0px; margin:0px; } #plain_module .mini_main { margin: 0px; padding:0px; width:585px; height:220px; repeat scroll 0 0} #plain_module .mini_item_header {padding:10px 0px; margin: 0px 0px; font-size:16px; color: #555555; border-bottom:1px dotted #CCCCCC;} #plain_module .mini_item {padding:5px 0px; margin: 0px 0px;} #plain_module a { color: #49A3CA; text-decoration:none; } #plain_module a:hover { color: #F98419; text-decoration:underline;} span.gray {color:#949494;} .mini_main li{list-style-type: none;background-image: url(http://www.aolcdn.com/travel/bullet);background-repeat: no-repeat;background-position: 0 1px;padding-left: 10px;}
  • The new thing is contact-less Smartcards and RFID (Radio Frequency Identification) cards that need just be waved to allow room access.
  • But travelers worried they will constantly have to traipse back to reception every time they lose their card need not despair. Security systems in some hotels do away with cards altogether.
  • ...8 more annotations...
  • "I think that you will begin to see more hotels going to RFID and smartphone entry before using biosystem recognition," says Wolfe. "These systems are expensive, and there are many consumers who just don't want this information stored somewhere -- for a variety of reasons."
  • Systems that track the other qualities that make each human unique are in development as well.
  • Yet more card-free security systems are on the way.
  • Many industry watchers are keeping an eye on Houston's largest hotel, the vast 1,200-room Hilton Americas–Houston. The hotel has a facial recognition system that can identify and track guests, employees, and even suitcases. With 700 employees and an annual $16 million payroll, the system offers benefits such as employee time-theft monitoring and prevention for the hotel. But travelers aren't that concerned about employees taking an extra cigarette break. What it means for you is that the system includes alerts if unwanted people are on the property and a response time of mere seconds if there's an incident. Customer service is heightened as well: Returning guests will be recognized and greeted by name. And with 1,200 rooms worth of luggage in transit, the system makes it a lot easier to find lost or misdirected bags.
  • not everyone wants to be on-camera, all the time. With concerns about "snooping" and a Truman Show-like lack of privacy, might guests feel that systems such as this are too intrusive in our hotels? "
  • Technology is opening new doors to hotel safety, and the way we navigate hotels is set to change in the blink of an eye. Or the swipe of a cellphone. Or the print of a finger. With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the next level. #plain_module { width: 590px; height:170px; border: none; float:left; margin:0px; font-size:12px;} #plain_module img {border:none; width: 13px; height:14; border: 0px; margin:0px; } #plain_module .mini_main { margin: 0px; padding:0px; width:585px; height:220px; repeat scroll 0 0} #plain_module .mini_item_header {padding:10px 0px; margin: 0px 0px; font-size:16px; color: #555555; border-bottom:1px dotted #CCCCCC;} #plain_module .mini_item {padding:5px 0px; margin: 0px 0px;} #plain_module a { color: #49A3CA; text-decoration:none; } #plain_module a:hover { color: #F98419; text-decoration:underline;} span.gray {color:#949494;} .mini_main li{list-style-type: none;background-image: url(http://www.aolcdn.com/travel/bullet);background-repeat: no-repeat;background-position: 0 1px;padding-left: 10px;} Those plastic key cards that once seemed so innovative will soon go the way of the actual key. The new thing is contact-less Smartcards and RFID (Radio Frequency Identification) cards that need just be waved to allow room access. Much like the cruise world's one card system, these cards may soon make hotel stays easier by allowing guests to pay for services, as well as to check-in and check-out, through a single device. Travelers may even be able to save preferences on the cards, from pillow type to floor choice. RFID cards are already in use at New York's Plaza Hotel, and Starwood Hotels are considering introducing them into their hip Aloft and Element properties. But travelers worried they will constantly have to traipse back to reception every time they lose their card need not despair. Security systems in some hotels do away with cards altogether. "In addition to Radio Frequency Identification, there are also systems that use a smartphone, such as an iPhone," says Frank Wolfe, CEO of Hospitality Financial and Technology Professionals. "When a guest checks into a hotel and provides their phone number, they get an encrypted sound code via text message." You can then play back the code to unlock your room door.
  • Systems that track the other qualities that make each human unique are in development as well. Movement-activated video-capture systems were showcased in New Zealand in September 2010. Researchers are at work on devices capable of recognizing an individual's gait or walk and even their DNA. Frank Wolfe says, "If you want to go 'way out there', there are some systems being explored that can allegedly sniff someone, and also systems that can recognize the pattern of blood veins on a human being which are apparently unique to the individual," says Wolfe. Quite common in Japan, vascular-recognition systems such as this are still "several years off," according to Wolfe. "I think that you will begin to see more hotels going to RFID and smartphone entry before using biosystem recognition," says Wolfe. "These systems are expensive, and there are many consumers who just don't want this information stored somewhere -- for a variety of reasons."
    • xsun015
       
      Nowadays, more and more hotels pay attention to IT security. They use high technology security equipment to protect the security of hotel and customers. These equipments will record every details about the hotel and customers. One one hand, this is a way to protect the security of the hotel. But they forget to care about the customers' feeling. Not all customers like it. Some customers want to protect their privacy. So I think that hotel needs to  consider the boundary about the hotel security. Keep the benefit and privacy for the customer. Then compare all the security devices, which is the best.
  •  
    This article is about the advanced hotel security achieved through improved technology. Today's hotels tend to integrate the existing technology with high-tech methods, such as iris scanners and digital facial-recognition, to increase security. There are newly introduced contact-less Smartcards and RFID cards. These cards enable people not only to pay for service but also check-in and check-out on a cruise ship. Thus, there is double security system that uses their Smartphone to unlock the door in addition to RFID cards. Even, card-free security systems like finger print entry system and an iris scanner are in progress. These systems are developed for providing guests as well as increasing their property security by identifying employees. Moreover, a camera system that verifies individual's identity through tracking the human unique characteristics like a gait, walk, and DNA is being developed. However, any novelty and valuable technology is useless, if the consumers do not accept. Therefore, considering guest's unwillingness, hotels are going to employ RFID or Smartphone entry system first, not biometric systems. Lastly, the low tech, such as hotel staffs who get in-depth training and awareness of guests and staff and your fellow travelers who are interdependent on one another, is one of the greatest security measures in addition to biometric and high-tech method ironically.
  • ...3 more comments...
  •  
    The hotel security will be raised to a new and next level with s lot of new technology. The plastic key will be innovated to smartcard with RFID. By usting the smartcard, the customer can stay easier by using it to check in or check out, also to choose the type of the pillow. Also, without the smartcard, the smartphone also can be that role and will become more popular and more easier. The card free security systems are on the way. The fingerprint may be used to enter the room. The Houston's largest hotel has a facial recognition that can identify and track guests and employees. This system will improve the security and the business. However, not everyone wants to be on camera, it sometimes depends on the background of the customers. New security measures will become such a part of our daily life that they will become the norm. One of the greatest security measures of late is actually low tech.
  •  
    The article highlighted reports the advancements in technology in the hospitality industry. These technologies are presented as security features as well. The highlights are about RFID cards, biometrics, hand scanners, iris scanners, facial recognition and even veins scanners. RFID cards is presented also as a security feature, however, it may give margin to a lot of fraud. Facial recognition systems are presented with a lot of emphasis and could be a great security feature if monitored for unwanted people. Some hotels have introduced iris scanners for special rooms such as presidential suites. Biometrics are being installed in hotels where your key card or credit card is replaced by your fingerprint. In order to add security, these hotels have added a password after fingerprints are placed on the reader. This extra security step will change consumer's perspective and maybe increase acceptance. The author also mentions that customers may not accept intrusive methods. The facial recognition seems to be a great advancement in hotel security; however, customer may feel uncomfortable to know that they are being recorded on cameras at all times. It is also mentioned that this may be a cultural issue. London was mentioned because it is very common to find security cameras in public areas and street in London . The main message transmitted is that no matter which one but technology and security will be taken to next level in the next few years. Security will have to move along with technology to avoid the downfalls of technology. It shouldn't hindrance the guests' security.
  •  
    It's amazing how technology can aid in hotel security and this article describes just that. The future will be bright with all the new and innovative security opportunities for the hospitality industry. The main points of security mentioned in this article include the finger print entry system where they would have a touch screen where a guest would put their finger and that's how they would get in their room, saying goodbye to key cards. There is also a system that can track a person such as a movement activated video capture, where it can actually recognize an individual. Another security system that is coming into development can identify guests, employees, and suitcases. For instance, if a suitcase was lost or misplaced the system makes it easier to find the lost bags.
  •  
    The uniqueness of human has been used for security tech in many ways, such as finger print, movement pattern, blood veins etc. And facial recoginition system is used by Hilton Americas-Houston now. It can be used to track guests, employees and even suitcases. However some customer feel unconfortable for the survillance everywhere and don't want to be on-camera all the time.
  •  
    The article described the future of hotel security systems. The security level is more and more important in hotel, for customer when they travel to a unacquainted place they need a safe hotel to guarantee them safety. Not only the security systems but also the details in everywhere the hotel management team must be pay more attention.
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
rebecca Bonet

Keeping hotel locks safe | Hotel Management - 1 views

  • Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • ...18 more annotations...
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate
    • TIANJIAN ZHANG
       
      Nowadays, locks security is an essential issue in hospitality industry. Actually, most hotels upgrate their locks systems with advanced technology. The role of technology in the security sector is fundamental, but despite the rapid technological progress, one thing has remained constant: the importance of trust. Whether hoteliers wising up to the fact that they've bought what could be called a flawed security system will be willing to trust the supplier of said equipment for a fix.
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues. 
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • , preventing
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security
  • “  Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software ,” Shea said. “  When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • For instance, a ‘wandering intruder alert’ warns hotel security personnel when a card is presented to a number of different doors.  Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues.  
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate ,”
  • As with any hotel upgrade, hoteliers understand that renovation and upgrades are a regular part of running their business
  • Looking past RFID solutions for instance, VingCard Elsafe has made our RFID locks compatible with next generation technologies, like Near Field Communications (NFC), providing our customers with an easy upgrade path at reasonable cost.”  
  •  
    This article discusses the security issues with room keys. These hotel locks will not open with cards that are read as duplicates or duplicatable. The locking mechanism has been specifically designed to alert the front desk and secuirty departments in the event these locks are tampered with. I'm sure at one point or another we have all experimented with our room key and tried to open other doors. A system like this will prevent activity like that.
  • ...2 more comments...
  •  
    VingCard Elsafe, the global leader in hospitality security and part of the ASSA ABLOY Group, announces that it has phased out the use of brass metal plating and painting in the manufacture of its locking systems, opting instead to use a more eco-friendly process to color stainless steel. VingCard Elsafe has adopted a new method of metal coloration called physical vapor deposition, or PVD, an environmentally friendly process that involves vaporizing an alloy onto stainless steel within a heated vacuum. PVD requires no chemicals and produces no waste or hazardous materials of any kind, resulting in no environmental impact whatsoever. The PVD process has other added benefits, as well. PVD-treated surfaces have high wear resistance for discoloration, and the stainless steel adds enhanced anti-corrosion properties. Besides eliminating the negative environmental effects of the brass plating process, the move by VingCard Elsafe to simplify its lock manufacturing process has had other related green benefits. By doing away with the need for secondary surface treatments of the locks, new product components are now supplied directly from metal stamping to the point of use in the assembly line. This means less shipping and transportation is required for product manufacture, resulting in a diminished carbon footprint.
  •  
    VingCard Elsafe is a new kind of lock system, which contains RFID technology and is compatible with the Near Field Communications. It has several advantages compared to traditional magstripe locks. First of all, it can add security to the RFID card and prevent cloning, which is much safer than the traditional key card. Another is that it can detect tampering and know when and where staffs use the lock. It can send alert to the front desk. Moreover, the front desk can know when the door is forced open. However, before using the lock system, training program should be provided. So this new kind of lock system brings safety to the guests and to the hotels.
  •  
    This article talk about the issue that hotel are having with their security system lock for guest room. These cards are easy to duplicate. The new system will alert front desk or security if the lock has been tampered with. Other alarms include detecting that a door is forced open 'mule tool' instruction when a door is open from the inside handle without an occupant in the room.
  •  
    This article discusses the current state of hotel lock safety. Monitoring safety has changed as these locks become more automated. The article states that, "Hotel Management corresponded with Tim Shea, president of ASSA ABLOY Hospitality, for ways in which vendors are keeping hotel locks secure." Through VingCard Elsafe's locks, hotel security and safety has increased. VingCard says, "Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software." This is just one of the ways the locks increase security. The article also states that the system is cost-effective for hoteliers.
Hanqing Yang

Taking Network Security to the Cloud - 1 views

  • The biggest threat to network security at the hotel property level isn’t a lack of technology – it is the lack of resources to manage it.  A strong network security solution should combine cloud-based security configuration with plug and play installation of a firewall and IPS appliances.
  • The impact of a mass security approach is significant to hotel network operations. It could eliminate the need for on-site IT resources to configure and deploy security appliances. It could also provide much-needed network visibility across an entire portfolio of properties. Lastly, it would be instrumental in expediting large-scale security deployments and updates.
  • The challenge is that many hotels lack the IT resources to adequately stay on top of security.
  • ...3 more annotations...
  • They expect ironclad security that protects their entire “online” experience in the hotel, from online booking and iPad-enabled check-in to the wireless connectivity in their rooms.
  • The biggest threat to network security at the hotel property level isn’t a lack of technology – it is the lack of resources to manage it.
  • Ideally the firewall or IPS device should be shipped directly to the property where anyone (e.g. GM) can simply plug the device into the network
  •  
    Today's travelers expect a strong network security. The challenge is that many hotels lack the IT resources because of budget. As a result, IT functions are limited to making sure security patches are up to date and services are running rather than proactively identifying security threats and preventing. This article introduces cloud-based security system as a solution. With the network security system, IT headquarters can monitor and manage the entire network. Also, hotels can save the cost for on-site IT resources and security appliances. It was interesting that cloud-based security is a solution for network security when there are many opinions that cloud computing is not safe. 
  •  
    This article talks about the limitation of hotel network security issue, then introduce one solution to it. First of all, it mentions since the usage of Internet is growing big more than ever, customers has more attention and requirement on Network Security. Actually, staff of IT department spend most of their time on updating system and other mid-level support, while they should spend more time on proactively identifying security threats and preventing attacks. This happens due to finance and human source constraints. Lucky for us, there is already one effective solution, keyword, cloud computing. Buy applying cloud computing, IT staff only need set up firewall, configure security system on headquarter. After then configuration is done, they send out these IPS device to branch companies. The security system will automatically update through these devices, no more traveling between properties.
  •  
    While many hotels right now are keeping and tracking down their valued customers' information, lots of those hotels are facing security problems also. Customers expect ironclad security that protects their entire "online" experience in the hotel, from online booking and iPad-enabled check-in to the wireless connectivity in their rooms. In today's cyber threat environment, that makes the hospitality industry a desirable and lucrative target for attacks. This article mainly talked about how to strength hotel network security.It suggested that a strong network security solution should combine cloud-based security configuration with plug and play installation of a firewall and IPS appliances. Which can be described as Taking Network Security to the Cloud.The IPS device will automatically contact and authenticate to the installation cloud, retrieve its configuration, and then reboot into the hotel's network ready to protect.
apate114

Top 5 risks and security challenges for hotels in 2015 - eHotelier - 0 views

  • 1. Identity theft leading to credit card fraud
  • Identity theft and credit card fraud is the new form of pick pocketing, but on a much larger scale. The number of compromised credit cards is expected to increase this year.
  • 2. Silent invasions
  • ...11 more annotations...
  • 3. Longer or no security audit cycles
  • APTS are considered the most dangerous type of cyber-attack as they simply bypass the defenses that are in place.
  • Cyber-crime shows up on the security radar as the second highest risk the hotel industry is exposed to.
  • The gap between the low number of qualified security auditors worldwide and new hotels built is getting bigger and bigger.
  • Nearly 1.26 million hotels worldwide are dealing with all sorts of safety & security issues.
  • 4. Physical crime will remain an issue for hotels
  • Physical crime ranges from professional burglaries using nifty social engineering techniques to temporary drug laps in hotel rooms.
  • Holdups at night involving firearms have increased since hotels are easily accessible and less protected compared to other industries operating at night.
  • 5. Loss of competitive advantage after a major security incident
  • The recovery costs after a security incident, including the attention of the media, are often much higher than the investment in security and risk management.
  • Reputation is a vital yet fragile advantage that requires its very own security plan in a strong competitive market where guests nowadays love to make their booking decisions with the help of online travel review sites such as Tripadvisor & Co.
  •  
    The article highlights the top five risks and security challenges in the hospitality industry. The following are the top five security risks according to the article. 1. Identity theft leading to credit card fraud - compared to other industries, the hotel industry is at more risk for credit card fraud and identity theft. This is because hotels are highly targeted by hackers. Hotel properties for the most part have credit card information for each and every guest that has stayed at a specific property. Hotels must be ahead of the technology curve when it comes to security however this is not always the case. 2. Silent invasions - This consists of all the cyber attacks that can affect a business by infecting the network. As discussed during the first module, hotels run majority if not all of their business using technology. If a hotel were to have their networks hacked it would leave them in a very bad situation. Since hotels operate their entire business using technology and multiple different systems, they would not be able to operate if they experienced a network breach. 3. Longer or no security audit cycles - Most branded hotels are required by the franchise to have consistent security audits done for each property. Independent hotels are deemed greater at risk for a security attack because they are not mandated to have security audits. These hotels sometimes skip audit cycles to save money. 4. Physical crime - This ranges from professional robberies to drug laps in hotel rooms. Hotels are at risk for armed robbery due to to lower chance of security compared to other industries that operate overnight. 5. Reputation risk - Hotels that experience a security breach almost always will see some sort of loss in competitive advantage. Nowadays with social media and the news travelers are more aware with what is going on and they would be more inclined to book their reservation somewhere else if they heard of the property having a security breach.
mtedd003

Cyber Security Marketing Tactics That Actually Work - 0 views

  • Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping.
  • This should come as no surprise given that the average annual cost of cyberattacks worldwide is about $9.5 million, according to Ponemon Institute.
  • clearly a need for effective cyber security products and services, there are also many solutions on the market, making it more difficult to capture the attention of your target audience.
  • ...22 more annotations...
  • New cyber security companies are popping up all the time in response to the heightened demand. This can make it hard to stand out in the crowd, and it makes it essential for you to communicate what makes your brand different.
  • you also want to be credible.
  • your potential customers need a significant amount of education to understand what threats they face and what solutions they may need.
  • This is especially true given that CEOs and other C-level executives are not as well versed in information security, which can impact a company’s decision to include cyber security as part of their overall preparedness plan.
  • Though there is plenty of evidence pointing to the necessity of cyber security in protecting valuable data, the truth is that many businesses just don’t prioritize cyber security until it is too late.
  • only one in five, or 22% of those surveyed said that they fully incorporate information security into their strategy and planning.
  • data suggests that cyber security marketers must find ways to create a sense of urgency for potential customers
  • Content marketing can help you build credibility while addressing the major challenge of educating your prospects. In order for your content to be effective,
  • ensure that it is unique.
  • Blogs are great for attracting prospects in every stage of the buyer’s journey. Try to create some evergreen blog content that will be universally relevant
  • Offering downloadable content like e-books and whitepapers is also an excellent way to convert your site traffic into leads that you can later nurture.
  • Another aspect of downloadable content that you’ll need to consider is the landing page.
  • case studies are one of the most important tactics for B2B companies.
  • Email Marketing
  • Downloadable content like e-books, case studies, and reports that provide readers with a more in-depth understanding of important cyber security topics. Links to your most recent blog posts talking about recent attacks or security concerns and those that break down complex cyber security topics for a wider reading audience. Video content that emphasizes the importance of cyber security and communicates the value of your company’s offering. A digest of relevant articles from reputable industry publications that helps readers better understand hot topics in cyber security. Monthly offers and sales promotions like a free trail, which can encourage prospects to sign up.
  • Webinars are a great way for cyber security marketers to connect with bottom-of-the-funnel leads.
  • interactive element.
  • Webinars can sometimes be costly to produce. However, as with other parts of your marketing campaign, there is also an opportunity to repurpose your webinar to get more out of this content.
  • Paid campaigns are great at accomplishing two goals – amplifying your content marketing efforts and getting prospects to arrive at your demo request landing page.
  • Don’t exaggerate your solution’s results.
  • Use data in your messaging. 
  • Create an easy-to-navigate library of premium content. 
  •  
    The Cyber-security Market report has predicted worldwide spending on cyber-security will surpass $1 trillion by 2021. This is a result of annual cyber-attacks costing $9.5 million in global damages. The many solutions on the market require cyber-security services to be innovative on how they market. Cyber security companies want to stand out to customers while still remaining credible. Many businesses are also uneducated and/or don't prioritize cyber-security. The use of blogs and downloadable e-books allow marketers to educate while promoting their product. Cyber security marketers have to make sure they have an easy user-interface, use data in messaging, and don't over exaggerate the capabilities of their products.
Diana Sardina

Hotel security demands more investment in latest integrated systems | Security News - S... - 0 views

  • The contribution to profit, or the perceived lack of it, is one of the major reasons why security is often seen almost as an afterthought by hoteliers
  • Because security is not profitable, investors and hotel operators are reluctant to invest in safety and security
    • Diana Sardina
       
      The security department is a non revenue department and therefore hoteliers prioriotize technology investment into departments that bring money to the company.
  • active security components", include video surveillance (CCTV), access control, intrusion detection systems and X-ray machines at the hotel's main entrances
  • ...11 more annotations...
  • , evacuation, fire extinguishing and danger management processes
  • Security cameras in the hotel lobby, coded access cards - that's it
    • Diana Sardina
       
      Hoteliers are aware of the continuous threat we live in, but they prefer to ignore it since the cost of installing advanced technologies to prevent it is too high.
  • hard" security systems, which can help avert or manage serious threats such as terrorist attacks.
  • investors or owners of a hotel property often ignore these chain-specific security standards for cost reasons and provide budgets that cover only the minimum required by law.
  • between different types of "passive" security
  • hotels is very simplistic: security cameras in the lobby or other public areas and coded access control cards for elevators and rooms
  • We have highly sophisticated danger management systems today, particularly at airports, elements of which could be implemented in large hotels or connected to professional expert systems via remote security service centres
  • Outside of "classic trouble spots" such as the Middle East, people have a false sense of security.
    • Diana Sardina
       
      In the United States we have forgotten about 911 and we think that as long as we are here and not in the middle east we are "safe".
  • However, the vast majority of hotel operators are reluctant to make additional voluntary investments. Even insurance companies have not really taken up the opportunities presented
    • Diana Sardina
       
      I would have thought that insurance companies will force hotels to be more proactive in security measures. But reading this article makes me realize that we are very vulnerable.
  • The effective interlink between security equipment and security processes to protect persons and assets in real time is the main issue.
  • Hotels may be concerned about the costs of higher-level security systems but criminal activity could cost a hotel its reputation and not to mention, a person his or her life
  •  
    This articles is an eye opener on how lightly we take hotel security. There are several new technologies designed to prevent security issues and we do not consider them, simply because they are too expensive and we feel a false sense of security since our country is not located in the middle east. The reality is that deep inside we all remember 911 and we see news every day of how much hate some people have againts us. Security should be taken much more seriously.
marylauren1717

PCI Security Standards Council Releases Guidance for Mobile Payment Security | News | H... - 0 views

  • The PCI Security Standards Council (PCI SSC), an open, global forum for the development of payment card security standards has published the PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users.
  • Even with rapid adoption of mobile technology in payments, security still tops concerns for merchants. It comes down to the basic element of trust.
  • Currently, it is challenging to demonstrate a high level of confidence in the security of sensitive financial data in devices that were designed for other consumer purposes.
  • ...1 more annotation...
  • The PCI Mobile Payment Acceptance Security Guidelines recognize payment security as a shared responsibility. By providing a high level introduction and overview of the mobile payments space and the security risks of mobile devices, the document outlines the unique, complex and evolving mobile environment that underscores the need for all parties in the payment chain to work together to ensure mobile acceptance solutions are deployed securely.
  •  
    The PCI Security Standards Council published the PCI Mobile Payment Acceptance Security Guidelines for Merchants and End-Users on February 19, 2013. "The PCI Security Standards Council's mission is to enhance payment account data security by driving education and awareness of the PCI Security Standards. The organization was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa Inc." The guidelines educates merchants on risks that they must be aware of in order to protect their customers' data when they are using mobile devices for payments, such as smart phones and tablets. As more merchants turn to handheld devices for payment options, they must consider new security risks. With these new guidelines and procedures, merchants will learn what is needed to isolate and prevent card data from exposure to the public. 
paige rosenberg

The Future of Hotel Security - AOL Travel News - 1 views

  • Technology is opening new doors to hotel safety
  • Yet more card-free security systems are on the way
  • eventually new security measures will become such a part of our everyday lives that they will become the norm.
  • ...12 more annotations...
  • Systems that track the other qualities that make each human unique are in development as well.
  • here are some systems being explored that can allegedly sniff someone, and also systems that can recognize the pattern of blood veins on a human being which are apparently unique to the individual,
  • new thing is contact-less Smartcards and RFID (Radio Frequency Identification) cards that need just be waved to allow room access.
  • Kimpton's 190-room Nine Zero Hotel in Boston was the first hotel to install a biometric iris scanner back in 2004
  • we navigate hotels is set to change in the blink of an eye. Or the swipe of a cellphone. Or the print of a finger. With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the next level. #plain_module { width: 590px; height:170px; border: none; float:left; margin:0px; font-size:12px;} #plain_module img {border:none; width: 13px; height:14; border: 0px; margin:0px; } #plain_module .mini_main { margin: 0px; padding:0px; width:585px; height:220px; repeat scroll 0 0} #plain_module .mini_item_header {padding:10px 0px; margin: 0px 0px; font-size:16px; color: #555555; border-bottom:1px dotted #CCCCCC;} #plain_module .mini_item {padding:5px 0px; margin: 0px 0px;} #plain_module a { color: #49A3CA; text-decoration:none; } #plain_module a:hover { color: #F98419; text-decoration:underline;} span.gray {color:#949494;} .mini_main li{list-style-type: none;background-image: url(http://www.aolcdn.com/travel/bullet);background-repeat: no-repeat;background-position: 0 1px;padding-left: 10px;}
  • Those plastic key cards that once seemed so innovative will soon go the way of the actual key
  • "In addition to Radio Frequency Identification, there are also systems that use a smartphone, such as an iPhone,"
  • When a guest checks into a hotel and provides their phone number, they get an encrypted sound code via text message
  • Many industry watchers are keeping an eye on Houston's largest hotel, the vast 1,200-room Hilton Americas–Houston. The hotel has a facial recognition system that can identify and track guests, employees, and even suitcases
  • 1,200 rooms worth of luggage in transit, the system makes it a lot easier to find lost or misdirected bags.
  • Returning guests will be recognized and greeted by nam
  • "Hospitality all over the world has become more aware of past vulnerabilities that they might have had and have closed these holes by more in-depth training and awareness of guests and staff," he says. "In today's society, all travelers are becoming interdependent on each other for safety and security."
  •  
    This article talks about the future trend of the hospitality security, which is technology is opening new doors to hotel safety.  The author introduces some different technologies such as Contact-less Smartcards and RFID that hotels like New York's Plaza Hotel are currently using. Finger print or cellphone wipe technology is also used instead of card, which should be more safe. Some hotels even use video-capture systems to make sure the security is perfect. After introducing these technologies, the author also talks about the privacy issues. Because some customers are not willing to be on cameras. However, though some of them are concerning about this issue, an expert predicts that new security measures will eventually become such a part of everyone's everyday lives that he or she will become the norm. All in all, this article gives us the trend that more and more technologies will be used for hotel security in the future.
  • ...7 more comments...
  •  
    I think PR representatives should address the privacy controversy surrounding radio frequency identification technology with a safety campaign. This may help consumers realize that they are not in the privacy of their own home when they are in the hallways of hotels and cruise ships and the cameras/tracking could help protect them. As long as the data collected is not misused these technologies will continue to be present in these locations.
  •  
    It's pretty important for the hospitality industry to present these new technologies as wonderful security measures. People could be put off by knowing they have to swipe their finger to get into a bathroom. The success of these technologies depends on effective marketing and proven security measures that ensure collected information about a traveller will not be used in unethical ways.
  •  
    Interesting article it is. Security is always the big issue for hospitality. I would like to stay in a hotel that is using finger print as the key card of the hotel because i believe that is much safer than cards that anybody can access my room by using the card.
  •  
    In this article all of the new trends for hotel security are described and examples of where they are being implemented are given. Thanks to technological innovations hotel safety is heading into a whole different level. Now key cards are being change to more sophisticated ones that need just to be waved to open a room door. In the near future it is expected for these cards to be used as a payment method and to check-in and check-out. In the U.S biometrics technology is starting to be used by a small number of properties not only for guests to access their rooms but for employees. Facial recognition systems with the ability of tracking guests and employees are also being implemented. This system helps to improves customer service as it helps to really understand guest's preferences, as enormous amount of information can be extracted as they are constantly being monitored. Other technologies are also being developed. The most amazing ones are the systems that track other unique human characteristics as the way a person walks or it's DNA.
  •  
    The technology of hotel changes very fast, such as swipe of a cellphone or print of a finger, or the contact cards that need just be waved to allow room access. It is like the cruise world's one card system, these cards may soon make hotel stays easier by allowing guests to pay for services, as well as to check- in and check-out, through a single device. If customers lost their cards on cruise, the radio frequency identification and smartphone will provide customers their code via text message, so they can play back the code to unlock your room door. But more card free security systems are on the way. If you want to get into your room at New York's SoHo Loft , you are going to have to lift a finger. The Nine Zero Hotel in Boston us the technology to make the property safer all round ,that means non-staff members and intruders can not access the property. Systems that track the other qualities that make each human unique in development as well. The Houston's largest hotel has a facial recognition system that can identify and track guests and an annual $16 million payroll ,the system offers benefits such as employee time theft monitoring and prevention for the hotel. But with 1200 rooms worth of luggage in transit the system makes it a lot easier to find lost or misdirected bags The Wolfe feels that in addition to the biometrics and high-tech methods currently being deployed ,one of the greatest security measures of late is actually low tech.
  •  
    The full name of RFID is radio-frequency identification. RFID is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered by the electromagnetic fields used to read them. Others use a local power source and emit radio waves (electromagnetic radiation at radio frequencies). The tag contains electronically stored information which can be read from up to several metres (yards) away. Now RFID in hospitality industry as a tool is used for improving service quality, customer satisfaction, market share, and profitability. As the new technology apply into hotel security, the hotels change their ways in the blink of an eye, or the swipe of a cell phone, or the print of a finger. With futuristic systems like scent and iris scanners and digital facial-recognition, hotel security is being taken to the high level and some of the luxury hotels begin to use RFID system. Usually customers will worry about lose the card of hotel. Then they can not open the door and even need to pay extra money to buy a new card. But now security systems in some hotels do away with cards altogether. Because of RFID system, customers can use the iPhone connect with the system. When a guest checks into a hotel and provides their phone number, they get an encrypted sound code via text message. Guests can play back the code to unlock your room door.
  •  
    i think there are some factors to consider. Customer Service - Many opportunities for "great" customer service are lost if guest and employee interaction is diminished. In many cases, the front desk staff give the first impression that a guest experiences. This first "experience" can be crucial for referring the guest to other property amenities, i.e. spa, restaurants, lounge, pool, attractions, etc. Often, the front desk staff are acting as the concierge and resolvers of guest issues.
  •  
    this article talks about new technology that is being implemented throughout out US and the world. Old key cards are now going to be replaced with even older standard keys or the radio frequency identification card that can be waived in front of the door to gain access. Also, there is a technology that will sent an encrypted sound text to guest;s cell phone, which when played back will open the door.  It talks about technology that tracks all employees, guests and their luggage.  There are several concerned that travelers have about their privacy, but article stated that it all depends on the type of the traveler.  Also, the face recognition technology used in Houston's largest hotel remembers guests names and when they return, guests are greeted by name.  Article concludes that even with all this technology, the best security is provided through interdependence of travelers and employees.  
  •  
    Technology in the hotel travel and tourism industry will be changing drastically in the near future, from the swipe of a cell phone, print of a finger, facial recognition, iris scanners, security is going to be taken to the next level. the plastic key cards will soon no longer exist. Radio frequency I'd cards are the new thing, where guest will use this for preferences for everything, from charging things to your room, preference of floor type to pillow choice, chick in and out etc. systems that track the other qualities of a person instead of using a key or card are in development as well. There are research going on how to open the door and. Lose wi just the persons walk and movements. Some people think these new security technologies are awesome, while some think they are not, people dont want to be watched 24/7while on vacation they just want to enjoy there stay. But in today's society all travelers are becoming interdependent on each other for safety and security.
berkley7

Security: Something No Hotel Can Ignore - 0 views

  • Security has always been a key issue for hoteliers.
  • Technology plays a major part in meeting today’s security requirements, but there are other important factors in implementing effective security measures.
  • McShane emphasizes that the people link to technology is critical in the successful use of any security system. The attitude of the hotel staff must be oriented toward security and the proper use of the equipment that is installed.
  • ...1 more annotation...
  • Security Innovations, Incorporated (SII) specializes in online and real-time access control systems for the lodging industry. SII provides security products that integrate standard electrical and building specifications.
  •  
    The following article does a great job outlining different aspects of cyber security within the hospitality industry. Security is one of the main departments that need attention and an additional budget in order meet todays security requirements. After doing some research, it is clear to see that all employees must have the same focus in order to provide the best security for their guest. Hotel security can provide things like: facility protection and control, guest and visitor monitoring and assistance, security command center monitoring (cameras, alarms systems and surveillances), maintain emergency response plan, etc. "Security has a difficult job of enforcing the rules and regulations of the establishment while making the guest feel welcome." The article goes over different security systems and what differentiates them, I thought that it gave a lot of insightful information into various cyber security systems.
agrie013

Cloud Storage Security: How Secure is Your Data in The Cloud? - 0 views

  • Hybrid Cloud: Many companies choose to keep high-volume files on the public cloud and sensitive data on a private cloud. This hybrid approach strikes a balance between affordability and customization.
  • Intrusion Detection: Online secure storage can serve many users at the same time. Successful cloud security systems rely on identifying when someone tries to break into the system. Multiple levels of detection ensure cloud vendors can even stop intruders who break past the network’s initial defenses.
  • Internal Firewalls: Not all accounts should have complete access to data stored in the cloud. Limiting secure cloud access through internal firewalls boosts security. This ensures that even a compromised account cannot gain full access.
  • ...5 more annotations...
  • Encryption: Encryption keeps data safe from unauthorized users. If an attacker steals an encrypted file, access is denied without finding a secret key. The data is worthless to anyone who does not have the key.
  • Authentication: Weak passwords are the most common enterprise security vulnerability. Many employees write their passwords down on paper. This defeats the purpose. Multi-factor authentication can solve this problem.
  • Breach Drills: Simulating data breaches can help employees identify and prevent phishing attacks. Users can also improve response times when real breaches occur. This establishes protocols for handling suspicious activity and gives feedback to users.Measurement: The results of data breach drills must inform future performance. Practice only makes perfect if analysts measure the results and find ways to improve upon them. Quantify the results of simulation drills and employee training to maximize the security of cloud storage.
  • Is the Cloud Secure and Private?Professional cloud storage comes with state-of-the-art security. Users must follow the vendor’s security guidelines. Negligent use can compromise even the best protection.
  • Redundancy makes cloud storage security platforms failure-proof. On-site data storage is far riskier. Large cloud vendors use economies of scale to guarantee user data is intact. These vendors measure hard drive failure and compensate for them through redundancy.Even without redundant files, only a small percentage of cloud vendor hard drives fail. These companies rely on storage for their entire income. These vendors take every precaution to ensure users’ data remains safe.
  •  
    This article goes into how secure is data that is stored in the cloud. There are three different types of cloud storage. one is public, two is private and three is hybrid. The article states that most companies go with hybrid because of its versatility. cloud storage does have built in security that includes intrusion detection, internal firewalls and file encryption. the article does list that there is security risk that come with cloud storage. week passwords are one of the main concerns when it comes to cloud security. Cloud companies do what's called breach drills to see if there are any weakness in the security and if there are how do they handle the situation if the system is compromised. this article does list the pros and cons of cloud services but in the end, it shows that the writer for this article is biased towards the use of cloud services.
  •  
    Breach drills sound like a great idea! It would be helpful in continually maximizing security efforts and determining weak points in the system, especially with technology advances and computer viruses becoming stronger.
pjohn091

Hospitality security adjusts to COVID-19 constraints | 2021-02-08 | Security Magazine - 0 views

  • While COVID-19 has slowed the hospitality industry, security plays a more pivotal role than ever and the ongoing pandemic is challenging security professionals to adjust and adapt to new rules and procedures.
  • “The things people do in hotel rooms are things they would never do at home: prostitution, drug abuse. Suicide is huge, people kill themselves in hotel rooms because they don’t want to do it at home,”
  • The hotel industry came to a halt in the early months of the COVID-19 pandemic and things are only slowly starting to pick back up. Yet the burden on security is no less than it was before, and in many ways, the job has gotten harder.
  • ...12 more annotations...
  • Occupancy levels dropped 90% for several months and have only recently returned to a consistent 40%, with many hotels still closed,
  • “Despite the low occupancy levels, we continue to have a significant number of incidents resulting in a much higher incident-to-occupied-room ratio than we have historically seen. We have seen a dramatic increase in heart attacks and suicides over the past few months, and continue to have increased numbers of fraud and guest-on-guest type incidents.”
  • Even as the need for security persists, many hospitality chains have pared back their security budgets.
  • Eventually COVID-19 will recede, but new risk categories will likely continue to unfold in hospitality. Security professionals can help to steer a course by reminding upper management that risk is more than just a monetary calculation.
  • Under these emerging policies, security is striving to put more active eyes on guest rooms — right at a time when COVID-related staff reductions are making it harder for security even to sustain normal operations.
  • Even if there’s only one person working the front desk, “they still need to be making the rounds,” Perman says. “They need to be knocking on doors and making contact, making conversation. You need them to keep up that level of human intervention.”
  • “A passive infrared detector can also be used to detect temperature in human beings, so a video camera that is infrared capable can detect fever in a human, and that is being done in a lot of places,”
  • Through COVID-19, though, technology can be a double-edged sword. For example, some hotels have turned to mobile-phone-based check-in to provide a touchless experience. “From a security perspective there are unintended consequences there,” Danson says. “Now you never have to go to the front desk, you never have to encounter a person.”
  • In some cases, entire corporate departments are being eliminated, so there is no centralized security department. There is no one providing corporate guidance, no one providing policies and procedures.”
  • With the onset of COVID-19, things have gotten even more challenging, as hotel security is increasingly tasked to do more with less. 
  • Even in this strained environment, other common risks persist in the hospitality world. Prostitution is a perennially complex issue for hotel security, for example, while human trafficking is an increasing area of concern.
  • When allocating resources in support of operational safety and security, “the chief of security needs to be informing corporate leadership of the potential risks, so that it becomes a risk-based decision and not just a budget decision,” Slotnick says. “Security has to make the case for risk, whether it’s a risk to brand reputation or other forms of risk.”
  •  
    This article goes into great detail about how Covid-19 is affecting hotel security. With budget cuts, security personnel are being limited, but the need for security is more important than ever. The article talks about how suicides in hotels are higher than ever as well, making it all the more important to have a solid security presence.
  •  
    In this article, it discusses the decline of the hotel industry following the COVID-19 pandemic, and how things have only slowly begun picking up again. However, the security burden is as great as it has ever been, and in many ways, it is even harder. Despite hotels closing their doors amid the pandemic, occupancy levels have only recently recovered to a consistently high 40%, with many still closed for months.
hui wang

Ensuring best practice in hotel security management - End User | IFSEC Global - 0 views

  • Hotel Security Management
  • ‘Hotel Watch’ scheme
  • “Provincial hotels generally have poor or average security precautions in place,” suggests Fairweather. “Usually, I’d only rate them at around four or five out of ten unless they employ a security professional.”
  • ...1 more annotation...
  • Basic security requirements
  •  
    This article is about the Hotel Security Management which including membership comprises of large, five-star hotels across the UK. This club is for the information exchanges for the hotel security establish. Hotel security managers in Glasgow, for example, have operated a 'Hotel Watch' scheme since 1992. Here, managers and security staff use e-mails and faxes to alert fellow scheme members about specific incidents that have happened or been prevented on their premises. And the hotel security grated level is different depends on the how develop and promotion for the country or area. Especially, "Provincial hotels generally have poor or average security precautions in place," according to Fairweather. "Usually, I'd only rate them at around four or five out of ten unless they employ a security professional." What is more, recommendations for basic hotel security would include the installation of bespoke CCTV systems, access control and perimeter security, electronic keys for bedrooms and storage areas designed to protect cash and valuables belonging to members of staff and residents.
rderonville

Cybersecurity Tactics for a Hotel Industry that's Under Siege | News | Hospitality Maga... - 1 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar.
  • n addition to airlines and banks, hotels maintain a rich database of personally identifiable and financial data on file.
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required. As a result, they can be exploited for the credit card data held on the POS terminals.
  • ...4 more annotations...
  • Reputational damage and revenue loss from a breach headline not only impact individual edge locations, but the corporate brand as well.
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • If used correctly, hotels could see anomalies that could lead to breaches prior to any damage being done — allowing them to halt hackers in their tracks.
  •  
    Hotels POS systems are at risk for customers. Hackers are using tactics like Phishing and ransomware. Hotels must take action and arm themselves with a "toolbelt" of security options to combat the hackers.
  •  
    This article explores the issues with cyber security in the hotel industry. it is to be taken seriously because customer information is on the line and so is the company's reputation and revenue. Hotels must look into their POS systems because, according to the article, is a weak security point. However, it holds much of the consumer's information like credit card numbers, expiration dates, and etc. The POS system is vulnerable so the secuiry put in place to protect it must be updated. Personal details for hotel guests are stored in many different places in a hotel's many systems. This includes the restaurant, gift shops, billing, facilities, and etc. According to the article, hotels needs a "toolbelt" of various security technologies to prevent malicious attacks. The three mentioned in the article are File Integrity Monitoring, Unified Threat Management, and Security Information and Event Management. Please look into the article to read what each of these systems can do in regards to cyber secuity for the hospitality industry. A good way to implement these tools is to look into outsourcing a managing security firm that specializes in cyber security. This can help minimize and even diminish things that can cause breaches in systems. In my opinion, this article gives solutions to hotels in regards to cyber security. Sometimes installing a firewall or antivirus is simply not enough. A security firm that specializes in this area can be considered. It may be expensive depending on the business to do that, however, it will be even more expensive to have a tarnished reputation for not securing customer information and to deal with lawusuits.
anonymous

Credit Card Security Systems: 3-D Secure™ and SecureCode™ / GSPAY - 0 views

  • Many Ecommerce merchants and credit card holding online consumers are concerned with credit card fraud. CNP transactions and with them credit card fraud cases have become too popular lately.
  • Visa’s 3-D Secure™ and MasterCard’s SecureCode™
  • Visa’s 3-D Secure™, a key component of The Visa Authenticated Payment Program, adds extra security protection to SSL (secure socket layer) secure forms. The 3-D Secure™ system is supposed to decrease the number of chargeback disputes and fraud cases by 80%
  • ...5 more annotations...
  • The benefits or Visa’s 3-D Secure™ are clearly seen: high level of security for consumers, a significantly lower chance of chargeback and credit card fraud, and overall confidence in CNP transactions.
  • As for MasterCard’s SecureCode™ is resembles Visa’s 3-D Secure™. MasterCard credit card holders register at MasterCard’s SecureCode™ website and asked to provide a personal secure code, which will then be asked for when purchasing online.
  • he benefits for e-Commerce merchants using Visa’ 3-D Secure™ and MasterCard’ SecureCode™ technologies are:
  • The benefits for consumers who make purchases at e-Commerce online stores bearing the 3-D Secure™ or SecureCode™ logos, thus using 3-D Secure™ or SecureCode™ for safe processing are:
  • 3-D Secure™ and SecureCode™ will definitely improve the world of e-Commerce and CNP online shopping.
  •  
    This article is about the concern of customers paying their purchase online, and not through a machine as is the most typical way to do it. But for many this transaction is not safe at all, there could be hackers that can make fraud. This is why two of the most popular CC companies has developed the Visa's 3-D Secure™ and MasterCard's 28SecureCode™ to keep their customers safe, these cards requires a personal security code for every transactions and other personal information in order to keep the purchase safe and some others requires a monthly fee to obtain this service.
Jessica Schwec

Consultant Calls For Local Security In Tourism, Hospitality Business | :::…Th... - 0 views

  • around
  • indigenous
  • He recommended the recruitment of indigenous youths to keep  surveillance, provide  protection and  report suspicious movements in and around tourist sites.
  • ...2 more annotations...
  • “The success or failure of a tourism destination or hospitality industry depends on how safe and secure  the environment is for the guests and tourists.
  • “There must be locals involved in the policing of our parks, hotels  and tourist centres. These locals  know the  terrain very well, they know the criminals amongst them and they are in position to fish them out,” he said.
  •  
    Security has different meanings in different countries and is extremely important in creating and maintaining international leisure travel. In the United States this means technology: security cameras and monitoring, rapid communication and response technology. In developing countries such as Nigeria, the security conversation centers around much more primitive ideas. "A hospitality and tourism consultant, Emeka Attamah, has made a case for the establishment of 'Local Tourist Security'…in Nigeria." This idea centers on the belief that locals should be involved in the policing of public places because they are well versed in the terrain and the criminals that operate in these areas and are therefore in the best position to fish them out. After all, the success or failure of a tourism destination depends largely in part on how safe tourists perceive the destination to be. The idea of a Local Tourist Security in countries such as Nigeria means recruiting indigenous youth to provide surveillance and security near tourist sites. There are benefits and disadvantages to this proposal. These individuals will be well versed in the region and the people who live there. Many of them will have lived in the area for generations and have insider knowledge on who's who and where's where of the town in which they are operating. However, these youth would be more malleable and perceptive to outside influence. More than likely they would be easier to pressure into certain ways of thinking or actions than their adult counterparts. In addition, initiatives such as Local Tourist Security seem to potentially promote child labor (although potentially milder than the stigma would have us believe), which is looked down upon internationally. In conclusion, Local Tourist Security groups may be the best answer for areas such as Nigeria at the current time, but security in these countries is still miles behind the developed world. As a result these measure may attra
lvela051

Safety Security and Loss Prevention During Hospitality Emergencies - Disaster Recovery ... - 0 views

  • Emergency preparedness should be a major part of the hospitality managers’ duties; they must work side by side with other tourism organizations to be prepared well to assist and save the lives of the tourist before, during and after the catastrophic events, and should adopt an updated effective emergency plan.
  • Safety and security are classified as the most important factors in the hospitality industry. Pizam et al., (1997) argued that safety and security are the most important factors to the tourist, and the first in mind when planning to travel.
  • The effective usage of safety surveillance such as closed circuit television (CCTV), electric emergency generators, body guards, fire extinguishers, fire sprinklers, emergency lights will maintain the security procedures adopted by the hotels to ensure their guests' safety, and updated emergency plans to confirm the emergency preparedness and effective planning to overcome the potential risks.
  • ...18 more annotations...
  • Furthermore, it is important to consider the proper dress for the security staff to be in line with the hospitality management philosophy.
  • Safety is a term which relates to protecting guests and staff within the hotel from the potential hazards, injury, and death by dealing with dangerous materials and different kinds of accidents. In contrast, security regards the protection of property from criminal accidents and terrorist activities.
    • lvela051
       
      Main goal with safety.
  • Providing the highest levels of safety standards and security ensures good marketing for the hotels by preventing an accident before it becomes a major issue causing loss of life and property.
  • effective information system and being well prepared for emergencies could prevent or minimize loss for the hotels.
    • lvela051
       
      Preparedness helps to know the situation better.
  • four-phase model to plan for the crisis and to deal with the emergencies; this model proposed reduction, readiness, response, and recovery phases to deal with the crisis.
  • Many practitioners imply that regarding the technology evolution in the last decade, Information Technology has become a fundamental part of the hospitality industry,
    • lvela051
       
      The use of technology is becoming a part of how to prevent the problem.
  • the importance of an updated emergency plan
    • lvela051
       
      things change over time, its important to continuously update the plan.
  • The hospitality industry is one of the most vulnerable industries to crises.
  • is vulnerable to both internal and external emergencies.
    • lvela051
       
      Need plan for both to be prepared.
  • updated regularly, and a direct communication system should be employed to respond to and overcome the crisis.
  • The importance of continuous emergency training for the employees is also emphasized.
  • ole of the media, information, and the social media should be reviewed and evaluated continuously
    • lvela051
       
      With the use of technology becoming a bigger factor, its important to have someone assigned to handle the media.
  • causing negative impacts not only for the hospitality players, but also for the tourists and the local community.
    • lvela051
       
      It affects more than just the establishment.
  • biometric technologies could ensure the hotel security and increase the effectiveness of hotel information systems. This will reduce the costs, improve management of the employee and guest activities, and improve the ability to recognize the criminal activities.
  • Preparedness and an updated emergency plan with managers' awareness will help the hospitality industry to provide the necessary resources, as well as effective training to avoid or minimize risks. Safety surveillance and security systems are very important to save guests' lives and hospitality properties. These factors can also be used as a marketing tool for guests and meeting planners. Finally, it's very important to understand the crisis emergency frameworks to mitigate effects and be well prepared before the crisis strike, and furthermore, to minimize losses during evacuation when the disaster happens.
    • lvela051
       
      What can be done.
  • susceptible to epidemics movements,
    • lvela051
       
      Word of mouth is a big marketing tool that can either hurt of help an industry.
  • Hotels should issue a check-list concerning a hotel’s vulnerability to emergencies caused by natural disasters (hurricanes, earthquakes, tsunamis) or man-made crises (terrorist attacks, explosions, fires, spill, food poisoning).
  • This will transmit a positive image: hospitality may gain a lot by using its safety and security as a marketing tool to attract more tourists to the destination.
  •  
    This article was very interesting and it was about how safety security is very important to the hospitality industry. This article also explained how a study shows the safety and security systems work in the hospitality industry. They also said that it is very important to update the emergency plan because you never know when something going to happen in the hotel and you always have to be ready for anything. This study just showed how an effective information system could prevent and being well prepared can definitely help prevent any emergency.
  •  
    The article is a study that was conducted in regards to the security management within a hotel and how an effective security system can help in preventing accidents or emergencies from occuring. The main priority of a hotel or any establishment, besides the service provided, is having an effective emergency plan set in place to be able to respond and overcome a crisis. International hospitality being a focus over the recent years, has suffered crises, risks, and disasters causing negative impacts on tourism and the community. Hotels should "issue a check-list concerning a hotel's vulnerability to emergencies caused by natural disasters (hurricanes, earthquakes, tsunamis) or man-made crises (terrorist attacks, explosions, fires, spill, food poisoning)." Another part of the plan is to focus on the loss prevention aspect of a hotel by implementing information technology to secure or improve security. On technology mentioned was biometric to increase the hotel information system and also to help reduce cost and improve the way we recognize criminal activities. With the hospitality industry being one of the most vulnerable industries to crimes and disasters, it is important to recognize, improve and update the plans set into place to ensure accurate information. While it's impossible to say that these preventions are going to stop these problems from happening, it can help other learn about the proper steps to handling these situations. I personally think that as much as employers suggest different way, it's the job of the loss prevention team in every industry to construct a plan that address as many issues and conduct trainings that would help to prepare us for these occasions. Trainings are going to be the best way to properly analyze a problem and improve on the emergency plan set.
galca008

Improving data security in the hotel industry lets guests sleep peacefully | Hotel Mana... - 1 views

  • The hospitality industry is quickly growing as a favored target of hackers and cybercriminals. In fact, according to the 2016 Trustwave Global Security Report, hospitality is the vertical industry with the second-highest number of data breaches, behind only the retail industry.
  • Hotels are high-value targets for cybercriminals because they not only hold payment card information on guests, but also a wealth of other sensitive personal data that can be used to steal their identity.
  • The fallout from a widespread data breach that compromises guests’ payment card data or personally identifiable information can be disastrous for a hotel chain. The average cost of a data breach in 2016 was $4 million. This figure encompasses everything from breach mitigation to crisis team management costs, business losses and even the more intangible consequences: damages to brand reputation.
  • ...6 more annotations...
  • However, with more countries migrating to chip cards and EMV-compliant POS systems, attackers have shifted their focus to card-not-present fraud and are targeting industries where consumers are making their payments and reservations over the phone—such as hotel contact centers.
  • If guests aren’t convinced that the hotel is keeping their personal and financial data secure, they will take their business elsewhere. In order to protect their brand reputation and their business, hotels need to create a culture of security throughout their entire organization that focuses on protecting guests’ digital property in addition to their physical property. One of the best places to start is their contact center.
  • In an era of increasing cyberattacks, hotels can make themselves less of a target by adopting technology to ensure that payment card data and other personally identifiable information is kept secure and segregated from the contact center.
  • With such an approach, customers calling to make a reservation or order additional services discreetly type their card numbers into the telephone keypad, rather than reading them out loud to the agent on the phone line. The data is securely routed to the payment gateway or a more secure server so it is never shared with the agent and is not held in the contact center infrastructure. This ensures that there is no possible spillover of the data to the unsecured or unmonitored areas of the business. It also reduces the number of individuals with access to the sensitive data, and makes the hotel contact center a less attractive target for cybercriminals. As an added benefit, this approach makes it easier for the hotel to comply with Payment Card Industry Data Security Standards by reducing the scope of compliance. By keeping payment card data out of the contact center, hotels can significantly reduce the high costs and extensive time associated with maintaining PCI DSS compliance.  
  • With stronger security practices for handling guests’ sensitive data, the hotel industry as a whole can transform itself from being one of the most likely targets for data breaches to becoming a model for data security, thereby ensuring that fewer customers ever have to go through the experience
  • Guests can sleep peacefully knowing that their data is secure, and the hotel can rest assured that its name won’t be making headlines as victim of a costly data breach.
  •  
    The hospitality industry is a major target for cyberattacks, resulting in sensitive guest information being compromised. When these attacks happen it leaves guests restless, because they know or believe their information is not safe. This article discusses this issue and how security can be improved to avoid these attacks.
  •  
    The article titled, "Improving data security in the hotel industry lets guests sleep peacefully" shows how the breach of data security can be anywhere. As technologies improve, so do ways in which cyber security can become at stake. According to this article, "Hotels are obligated to maintain the physical security of guests and their belongings during their stay-if guests don't feel safe staying in their room or leaving their belongings there, they won't continue to patronize that hotel brand. The same thinking applies to data security: If guests aren't convinced that the hotel is keeping their personal and financial data secure, they will take their business elsewhere". Thus, hotels need to make sure they are safeguarding information such as their payment information as well as other confidential information. Hackers are becoming even more sophisticated, where they can target specific industries, such as hotel industries since guests speak with hotel representatives over the phone to provide payment information. In the even that a hotel's data has been compromised, what is its responsibility? First, they should send the client a letter of apology, and then handle the complete process efficiently, so the client can at least feel they re supported. The avoidance and handling of data breach is becoming even more common nowadays with the rise of technology.
1 - 20 of 1197 Next › Last »
Showing 20 items per page