Skip to main content

Home/ Hospitality Technology/ Group items tagged Theft

Rss Feed Group items tagged

katya zelinskaya

Will Self-Checkout Obliterate Traditional POS Systems? | Point of Sale News - 1 views

  • Even though the general trend towards self-checkout is positive, many customers are still wary.
  • The temptation to steal from self-checkout terminals is practically absent with the new buzz about the instillation of cameras, laser scanning, and weighted sensors.
  • hese people have an understanding of how they work and know how to check themselves out in the most efficient way possible (many times they check themselves out faster than a cashier).  
  •  
    It is knowledgeable why retailers would be skeptical over self-services in grocery stores, which include lack of floor space, the ability to lower labor cost, and the concerns of consumer acceptance and usage, but this has changed with the future of technology. The permutation of self-checkout technology now gives the retailer opportunities to reduce labor intendment, and it also orchestrates the front-end operations to offer state of the art customer service to the consumer Self- checkout allows retailers to save space and it easily fits into the store's existing layout. Five self-serve lanes can accommodate the floor space of only two conventional lanes. Cash balancing and reporting for each station remains the same as it was before the device was installed.
  •  
    I cannot imagine the human factor completely disappearing in stores. I have three young children and I cannot go through teh self check-out if I have more than a couple of items. There will always be those people who need the extra help. I do enjoy self check-out lines, so hopefully there will be a balance of machine and man in the stores.
  •  
    after the invention of the first POS system of 1974 and the self- check out counters of 1992 researchers projecting 430,000 of self check out counters to be opened by 2014.  The benefit of the Self Check out counters is very tempting for the owners.  Article mentions that some customers are still not too happy with the self check out counters, because of possible bad experience in the past.  Managers are delaying the installation of the automated check outs, because of the scare of the theft, but it's proven that theft is not as issue because usually losses occur from the cashier's negligence.  Article provides some of the proves that self check out counter , can help customers to lose weight, and check out faster, and provides extra privacy. 
cwilliamsiona

Data Security in Hospitality - Why Is It So Important? - 0 views

  • The hospitality industry has one of the highest numbers of security breaches.
  • As a result, the hospitality sector seems to be an ideal target for cybercriminals looking to carry out credit card fraud and identity theft crimes.
  • Such complex ownership structures could result in breaches as in the case of the Wyndham Worldwide breaches which occurred back in 2008 and 2010
  • ...8 more annotations...
  • These criminals infect point-of-sale systems with malware that scrapes card information. 20 out of the top 21 high-profile breaches that have occurred since 2010 have been a result of this strategy.
  • One of the more recent data breaches in 2019 - the Earl Enterprises data breach involved the theft of over 2 million credit card numbers. It is believed that the breach was the result of malware installed on POS systems at the popular restaurants run by the company.
  • Having well-trained staff is invaluable for ensuring the secure collection and storage of sensitive data. However, the hospitality industry has a very high turnover rate due to the fact that it largely involves seasonal work.
  • Just one untrained individual can give cybercriminals easy loopholes to gain access to sensitive customer data.
  • It involves employees selling customer data to third parties unknown to the management of their organization
  • High profile breaches such as the recent Marriott International data breach which resulted in the leakage of the personal data of over 500 million guests continue to drive up awareness levels.
  • Failure to provide adequate data protection can have catastrophic consequences for hospitality companies
  • Organizations in the hospitality sector can protect the data of their customers by implementing a number of best practices for mitigating the risks associated with data collection.
  •  
    According to this article, the hospitality industry has one of the highest numbers of security breaches. Due to the nature of the business, credit card fraud and identity theft crimes seem to be an ideal target for cybercriminals. Humor error, high turnover rate, and insider threats are just a few primary factors for security breaches within the hospitality sector. The consequences of data breaches can have a long lasting impact on the company, including, customer trust, tarnished brand reputation and legal and financial problems. As we all know, hotel owners and operators do not want anything to impact their revenue. Encryption of credit card information, operating a continuous training program in cybersecurity, adhering to relevant regulations, using firewalls, and a detailed response plan in the event that a data breach should occur are a few practices the hotel sector can implement to mitigate a cyber attacks.
areut002

How to Prevent Employee Theft at Your Business - 2 views

  • iggest area of store loss remains employee theft with 38%
  • heft remains in second place
  • reduce employee theft risk by making it easy to identify and investigate suspicious activity.
  • ...6 more annotations...
  • security cameras
  • the hours required to review video footage has impacted the effectiveness of this technology.
  • POS data to monitor high risk transactions including age-restricted sales, refunds, voids and no sales.
  • new insights into when and how high risk transactions are completed and, most importantly, by who.
  • flag transactions individually or by category
  • business owners can can address operational issues before they can irreversibly impact their business.
  •  
    Essentially, this article shuts down old time cameras, saying that they will not be able to capture everything and how they take entirely too long to review. With POS systems, the owner can customize it to allow it to fit their needs. This means they can be alerted when too many refunds are happening or a transaction is made over a specific amount. It will keep a log on everybody to ensure review and audits happen.
taurus1313

4 Must-Have Unattended Payments Features for New and Existing POS Installations - DevPr... - 0 views

  • Security and loss prevention are important to any business, but they are particular concerns with unattended payments. With no sales associate to monitor behavior, self-service terminals may be a target for theft or tampering.
  • Today’s consumers demand that any customer-facing solution is convenient and easy to use,
  • and business owners won’t gamble on a solution that could diminish customer loyalty.
  • ...13 more annotations...
  • Many types of businesses and organizations that are implementing self-service are doing so to help improve average sales and customer throughput.
  • It’s vital that unattended payment solutions integrate with the business’ systems, such as point of sale (POS), retail inventory management, restaurant kitchen display system, or accounting systems. Your solution will have far less value if it stands alone and requires your clients to manually transfer data to other systems.
  • Lower labor costs
  • Fewer order or cashier errors
  • Better space utilization with fewer checkout counters
  • Reduced risk of employee theft due to less cash handling
  • The number of consumers who prefer self-service is growing
  • 66 percent of shoppers favor self-service technology over interacting with sales associates
  • 77 percent of consumers say they’d be comfortable in a retail setting where there is only self-checkout — no sales associates at all
  • Quick service restaurants are launching self-service ordering and payment, keeping lines shorter and serving customers faster
  • These solutions should meet all Payment Card Industry (PCI) standards, including best practices for skimming prevention.
  • Unattended payment solutions represent the chance for you to enter the market as the opportunity grows
  • Not only does this give you a broader market in which to sell your solutions, it can also differentiate your business from direct-selling POS providers, positioning you more strongly to compete
  •  
    Unattended POS systems are being utilized in spaces beyond vending and self service. Many industries are leaning towards changing to self serve kiosks and this article explains why and shows for benefits to this system. I have seen this system move from grocery store checkouts to the McDonald's located in a busy beach side town.
  •  
    the article highlights the benefits of using unattended pos systems and how there is a growing tendency for self service and less face to face interaction in retail and hospitlaity business
  •  
    "Lower labor costs Fewer order or cashier errors Better space utilization with fewer checkout counters Reduced risk of employee theft due to less cash handling"
nunes305

PCI Compliance for HOTELS: What you need to know (PCI-DSS) - 2 views

  • In Spain, one of the world’s leading travel destinations, hotels accounted for a $2,995 million revenue in 2017, showing an annual growth rate of 6.0% In France, it reached $4,946 million, and UK recorded a $5,746 million revenue the same year.
  • The growing contribution of the hotel segment to the GDP of many countries worldwide, among with the increase in revenue and data theft, made credit card security a top concern. As a result, the PCI-DSS security standard became an essential consideration for hotels, becoming absolutely obligatory fromf 2018.
  • t defines the best practices for card security that every company should implement, affecting all hotels independently from their size or location. The purpose is to reduce as much as possible the risk for fraud, data theft, identity theft, and other threats.
  • ...2 more annotations...
  • As a global industry that generates an overwhelming revenue of 550 billion dollars annually, the hospitality industry seems to be one of the most attractive segments for credit card breaches and data theft.
  • Credit card storage – many hotel managers are under the wrong impression that only digitally stored credit card information must be protected, but this is not true. In fact, under PCI Compliance and privacy laws, all paper documents containing personal data must be physically secured and adequately restricted at all times.
  •  
    PCI Compliance for HOTELS: What you need to know (PCI-DSS)
  •  
    Thanks for the summary. It's comforting to know that countries in Europe are getting on board with being PCI compliant, one less thing to worry about when using credit cards internationally for booking, shopping or entertainment.
anaferia

The biggest cyber attacks of 2022 | BCS - 0 views

  • In a year of global inflation and massive rises in energy costs, it should come as no surprise that the cost of a data breach has also reached an all-time high.
  • average total cost of $4.5m
  • Amongst the 550 companies that IBM contacted that had experienced a data breach, a disappointing 83% had experienced more than one in the same period
  • ...9 more annotations...
  • common attack vector remains credential theft (19%) then phishing (16%), misconfigured cloud (15%) and vulnerabilities in third-party software (13%).
  • Russia has, for many years, attacked Ukrainian infrastructure such as power grids, internet infrastructure and banks. Since the outbreak of physical hostilities, this has extended to systems related to government administration and the military.
  • The Russia-linked cyber gang known as Conti managed to cause major disruption to financial operations throughout Costa Rica in April.
  • cripple Costa Rica’s import/export business.
  • A group known as Lapsus$ began 2022 with a string of high profile targets including Nvidia, Ubisoft, Samsung and Microsoft. In each case, data was stolen and in many cases leaked online. Their operating model is extortion where access is most often gained through phishing and then they seek out the most sensitive data they can find and steal it. Often, they do not deploy encrypting software at all.
  • Hacking back is where offensive security experts will attempt to compromise attacker’s machines. This can be legally murky as often the attacking machines are compromised third parties.
  • June this year, a former Amazon employee, Paige Thompson, was convicted for her role in the 2019 Capital One breach. While working for Amazon Web Services (AWS), she exploited her knowledge of cloud server vulnerabilities and stole personal information of over 100 million people.
  • Ransomware, while not the overwhelming headline grabber it was a year ago, is still a major and terrifying threat to many companies
  • The main attack vectors continue to be credential theft and phishing emails so it is vital to continue to raise awareness through corporate training and public ad campaigns. Finally, the conflict in Ukraine is showing how effective cyber weapons can be in disrupting command and control in a war.
  •  
    To summarize, this article states that, it should not come as a surprise that the cost of a data breach has also increased to an all-time high in a year marked by significant increases in energy prices and worldwide inflation. According to IBM's Cost of Data Breaches Report 2022, the average overall cost is $4.5 million. Additionally, even if ransomware isn't garnering as much attention as it did a year ago, it still poses a serious danger to many businesses. Credential theft and phishing emails are still the major threat vectors, therefore it's critical to keep spreading awareness through public awareness campaigns and business training. Finally, the situation in Ukraine is demonstrating the potency of cyber weapons in sabotaging command and control in a fight.
yuzhu li

New Point of Sales Technology for Your Business | Family Money Values - 0 views

  • Chip based credit cards.
  • is closely intertwined with NFC and smartphones.
  • New payment services players.
  • ...4 more annotations...
  • field offering lower entry costs to small merchants
  • With the ability to pair small mobile card readers with smartphones, businesses can ensure that their employees can take payment anywhere, anytime, which has tremendous potential for never missing a sale.
  • Enhanced security.
  • the natural evolution of a technology key to day-to-day business transactions, they are also a response to fraud and identity theft
  •  
    For family run business, according to Ms. Bekiroglu, to know its business' better way is to keep up all like payment kiosks, self-check out stations, touchscreen interfaces, etc. and the most important 3 parts are the "chip based credit cards", "new payment services players" and the "enhanced security". Chip based cards is more secure and the data is single used in the transaction, and it can crack down on fraud and identity theft. New payment services players mostly means the apps. From my opinion, the important thing for the whole business world is the security part. One of my friend used the credit card for gas, however, in days, the card had been used over 4 thousands. Finding out the reason is because the leaking information at the gas station. Only the security part has been enhanced, POS systems would be more effective.
elena_martynova

Hotel Cybersecurity: What Can Happen When Hackers Strike? | By Robert E. Braun - 0 views

  • Hoteliers remain vulnerable to hackers seeking confidential information such as guests' credit card data and employees' personal information.
  • In a recent hotel breach, the hackers did not go after confidential data, but rather sought a ransom payment after taking control of the hotel's technology.
  • hotels, more than most private industries, have to take into account the kind of physical harm that might be done by a hacker.
  • ...9 more annotations...
  • not only are guest information systems targets, but also the life and safety systems – HVAC, elevators, electricity and so on.
  • while financial theft could impact a hotel and its reputation, a hack of the physical structure of a business could put the hotel out of business.
  • Moreover, hotels are complex businesses with overlapping and interconnected systems. Thus, finding a way into one system can allow a bad actor to access other parts of the hotel, giving them the opportunity to demand payment for protection.
  • Hotel owners and operators should be aware that ransomware is increasingly popular because it provides for almost immediate return on a hacker's "investment."
  • Rather than selling personal information, which rapidly loses value, the use of ransomware gains the hacker an immediate return
  • Hotels need to take the same steps that other business take to achieve data security:
  • Analyze risk.
  • Train Personnel.
  • Plan for the breach.
  •  
    Theft of data by hackers remains the major threat to Hospitality Industry. Usually, hackers attack hotel point of sale for obtaining personal information. But now days hotel owners should be aware of ransomware which is becoming more popular among hackers as it provides the hacker an immediate return.
Kai Zhang

Hotel Network Security: A Study of Computer Networks in U.S. Hotels - Cornell School of... - 3 views

  • Since many business travelers connect remotely to continue working while on the road, the potential for theft of corporate information exists.
  • not prevent malicious users from intercepting guests’ transmission
  • virtual local area networks (VLANs)
  • ...3 more annotations...
  • The VLAN inhibits attackers from using their computer to imitate the hotel’s main server, which is the mechanism most would use to intercept other people’s data
  • hotel could potentially be considered at fault for not taking the necessary precautions to protect their guests from hackers.
  • Given that the technology exists to increase a hotel network’s security, a hotel could potentially be considered at fault for not taking the necessary precautions to protect their guests from hackers.
    • TIANJIAN ZHANG
       
      The security of guests' connections to the hotels' network seems to be an essential issue in hospitality industry, especially in those commercial hotels. Based on the leaks of the network technology in the hotels, some companies may hire hackers to steal or snoop the secret data of other companies for achieving some business goals during the business people from the victimized companies staying in the hotels. Therefore, if hotels can not make sure their network system can prevent malicious users from intercepting guests' transmissions, they must admit their weaknesses of network technology and warm guests to be cautious when they access the network system of the hotels if they need to view some secret data. Anyway, hotels should keep taking the necessary precautions to protect their guests from malicious users.
  •  
    From what I research from the article, VLAN as a local area network itself actually is quite secure cause the fake IP address means a private one.  And it is already encrypted. But the hackers had imitate the hotel's main server. As for the technology developing, it seems like the more secure the system make, the smarter the hacker would be. 
  •  
    This article introduced how hotels improve their network to enhance security. To reduce the potential for stealing by theft and hacker, the W Dallas Hotel set up virtual local area networks. Compared with relatively rundimentary hub technology and encryption for Wi-Fi, the biggest advantage of this VLANs is to inhibit attackers from using computer to imitate the hotel'smain server. I think increaing a hotel network's security is very necessary, still, people should pay more attention to this and improve the techonology to make sure the security of all aspects.
linanzhang

Why You Need a POS System in a Restaurant - 0 views

  • If you are planning a very small operation, such as bagel or sandwich shop, you may not need a POS system at the opening time, especially if you aren’t going to take credit cards
  • ou will need to replace parts, update software and eventually need to replace it entirely with a new model. New POS systems come with limited warranties and tech support, but just like every other piece of equipment, the problems always seem to start after the warranty has run out.
  • If it happens to crash and you don’t have a backup, then you risk losing all your data, not just sales, but profit and loss statements and payroll statements.
  • ...5 more annotations...
  • POS system acts as a time clock, it can also help prepare payroll. This can save you a lot of money in your bookkeeping department. Along with the daily operations of running a restaurant, a POS system can organize profit and loss statement and sales tax.
  • Another benefit of a restaurant POS program is that it can track everything from food usage to the most popular menu items.
  • One benefit of a POS system is that it simplifies communications between the kitchen and the wait staff.
  • This makes swiping credit cards more secure for both the customer and the business. Servers are accountable for all their sales, and it is impossible to alter checks in the computer unless you have the password. This helps cut down on employee theft.
  • This computerized system allows business owners to track sales, cash flow, food inventory and can help simplify your bookkeeping enormously.
  •  
    This article discusses the importance of having a Point of Sale, or POS, system in your restaurant and its many roles in the operations of the business. POS systems track all sales transaction up to the minute. It also accounts for all employees' operations. Of course, there are pros and cons to every system. One pro of a POS is the direct connection to the kitchen staff. Once the server places the order, a ticket is printed in the kitchen thus helping to eliminate miscommunication and create efficiencies between servers and kitchen staff. Another positive stated was a POS system helps cut back on employee theft since the system logs employee actions and makes it difficult to alter items in the system. Additionally, POS systems can help substantially with the bookkeeping operations. POSs can track and collect data regarding popular and unpopular food and menu items. The system also can help with accounting and show payroll as well as profit and loss statements. One of the drawbacks of a POS is the susceptibility to electronic issues, such as hardware failure or system crashes. If there is a catastrophic crash to the system, the restaurant could lose all of its sales data as well as payroll statements and other important documents. Therefore, having a backup is important, but expensive. Additionally, while the POS system typically comes with a warranty, it would be smart to have an IT person employed who can set up the POSs and update the device or software and address any problems the POS network may encounter. Again, this adds cost. In the end, Point of Sale systems are an overwhelmingly positive tool for the restaurant industry. However, restauranteurs need to be aware of the issues and plan accordingly to run a smooth operation.
  •  
    This article talks about POS. POS-point of sales is a hardware that used in the hospitality industry, mostly used in the restaurant. It's a tool you can accept the payment of customers and count the transaction. Modern POS system provides a platform to help customers to enhance the experience. It's also an easy communication with kitchen and wait staff. It can maximize the revenue. But some issues are POS systems come with limited warranties and tech support. I think companies need to ask for help with the IT advisor In the hospitality industry, tough competition and thin margins, we need to get more value from POS.
kayshap96

How Employee Time Tracking Software Transforms Hotel Management - 0 views

  • The quality of staff management affects every aspect of the guest experience.
  • Since the cost of labor is a significant expense, optimizing human capital is paramount. Time tracking software is the answer for streamlining employee hospitality timekeeping and scheduling.
  • Employee scheduling requires: Forecasting occupancy Matching staffing demands to expected occupancy Creating shift schedules Adapting schedules to changes Accommodating employee availability and preferences
  • ...8 more annotations...
  • The solution for efficient and cost-effective employee management is advanced time and attendance software. Let’s discuss some of the benefits.
  • Cloud-based time and attendance eliminates hardware compatibility issues. This was a shortcoming of older enterprise systems. With cloud computing, all players can access work information from any internet-enabled device.
  • With an online shift trade board, the manager posts open shifts when an employee calls in sick before the shift begins. If the employee fails to call and just doesn’t show up, the system signals that a worker neglected to clock in. The system sends alerts to all available workers. The current schedule feeds information to the trade board. The system knows which workers are already working and, therefore, unavailable.
  • he manager approves the trade which triggers a confirmation alert to the applicable employee.
  • Time and attendance software remembers everyone’s availability and schedule requests.
  • Any business is susceptible to time theft. Since many hotel employees are unsupervised, the hospitality industry is especially vulnerable.
  • US employers pay millions a year in unnecessary wages due to time theft. A biometric time clock paired with a time tracking system allows managers to apply schedule lockouts and break rules.
  • Time tracking software handles the complex logistics of multiple employee types and pay rates. These include overtime calculations, accruals tracking, break tracking, and absence management.
  •  
    With technology constantly updating and hotels getting larger and obtaining more employees, it is important to have a system that is keeping up with the times, and makes bosses work a little easier and more efficient. With the time tracking software it does all of that. The software allows managers to have available employees cover shifts, it ensures there will be no time theft, it keeps track of overtime, pay rates, absences and more. The system is cost effective because it does not hold up the employer in the office all day, and with the watches out for the time thieves. This system does everything a manual tracker can do and more. It is extremely efficient.
anonymous

Cybersecurity Tactics for a Hotel Industry that's Under Siege - 0 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar. Just ask Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel Collection, all of which were victims of highly publicized, major breaches in the hospitality industry last year. 
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • In the breaches mentioned above, point-of-sale (POS) systems were attacked and malware launched to acquire cardholder names, credit card numbers and expiration dates.
  • ...7 more annotations...
  • It can be difficult and expensive to hire and retain an IT security team
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required.
  • personal details for hotel guests are frequently stored in a variety of locations, including billing, facilities, restaurants, etc.
  • otels are made even more vulnerable thanks to POS system provider breaches
  •   Phishing remains a particularly popular tactic used by hackers everywhere, including those that are targeting the hotel industry to trick both prospective guests, who give up credit card and personal details, and insiders, who then give up valuable login credentials.
  • File Integrity Monitoring (FIM), Unified Threat Management (UTM), and Security Information and Event Management (SIEM) should also be considered
  •  
    This article talks about how there is a serious concern in the hotel industry when it comes to credit card and identity theft. They talk about how all the major brands in the hotel industry were all victims of highly publicized, major breaches in the last year alone. Also, including airline and banks, hotels maintain a wealthy amount of database of personal and financial data. For example, with new technology systems being created, POS systems are a weak security point for many networks because they are constantly in use and are not always updated or even protected from vulnerabilities. The article talks about personal details for hotel guests are frequently stored in a variety of locations including restaurants, facilities, and government buildings, so hackers have a greater possibility to access your personal information. The bigger hotels are in more danger because of the volume of guests that come in and out of the location. Smaller hotels should be concerned not just about their security but also by ransomware, an increasingly favorable tactic to extort hoteliers by hackers who encrypt the hotels data making it inaccessible until ransom is paid for. I believe hotels need a toolbelt of various securtiy technologies that can be used to prevent future malicious attacks. I think by managing and implementing a firewall is essential which helps get rid of dangerous traffic from coming onto the network and preventing sensitive data from being hacked.
  • ...1 more comment...
  •  
    This article talks about the weakness and vulnerability of POS systems involving safety. It mentions the security breach that few companies, such as Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel, faced last year (2016) involving credit card fraud and identity theft through their POS systems. It mentions how point-of-sale (POS) systems are not complete safe and how vulnerable they are because they are constantly in use and aren't always patched, updated, or protected from vulnerabilities as frequently as required. It suggests that enterprises should outsource their cyber security management to minimize costs, considering that is extremely expensive to hire and retain IT security team.
  •  
    MOD 10: This article discusses the main tactics of cyber hackers that target hotels. Point of sale (POS) systems are easy targets for hackers due to their constant use during operation hours and because of that their security measures aren't always up to date. Hotels have large data banks since they're storing consumer profile information such as home addresses, phone numbers and credit card numbers. There's a large risk when it comes to security breaches within franchises because they have access to their parent company's regional, national and global systems. If their systems are hacked and breached, then that puts the whole system of the brand at risk. Security breaches within a system can also damage a brands reputation with the public. According to the article, "Recent major breaches at Fortune 500 companies and household names across the retail, restaurant and hotel sectors demonstrate that anti-virus, anti-malware and firewalls alone are not enough to secure businesses from the ever-evolving threat landscape." Smaller properties are even at a greater risk because not only do they have to monitor their compliance with PCI but also monitoring their security systems for their database and PMS system. Some of the recommended software's that should be used by hotels looking to be proactive with their company's cyber security is File Integrity Monitoring(FIM), Unified Threat Management(UTM), and Security Information and Event Management(SIEM).
  •  
    This article explores the different tactics hotels should use after a cyber attack. The article mentions several different type of attacks such as Phishing when hackers trick customers into giving up their login credentials. Ransomware, when hackers encrypt data making it unusable and inaccessible for the hotel. Not one solution but rather companies should be equipped with a series of technologies from firewalls to file monitoring programs. Some of these technologies, like SIEM requires an intelligent IT team to have the capabilities of analyzing and monitoring the reports produced. This may be more difficult for smaller businesses to implement and maintain.
swhit133

he Most Common Types of Restaurant Theft - 0 views

Stealing food, beverages and supplies from restaurants can be coordinated by employees or in combination with vendors. There is outright stealing of food from the inventory, but there are also inst...

http:__www.cornwelljackson.com_common-types-of-restaurant-theft_

started by swhit133 on 10 Oct 18 no follow-up yet
yuqiongliang

11 ways to help protect yourself against cybercrime - 0 views

  • 1. Use a full-service internet security suite
  • 2. Use strong passwords
  • 3. Keep your software updated
  • ...10 more annotations...
  • 4. Manage your social media settings
  • 8. Take measures to help protect yourself against identity theft
  • 6. Talk to your children about the internet
  • 7. Keep up to date on major security breaches
  • 5. Strengthen your home network
  • guard your personal data. A VPN — short for virtual private network — can also help to protect the data you send and receive online, especially when accessing the internet on public Wi-Fi.
  • 9. Know that identity theft can happen anywhere
  • 10. Keep an eye on the kids
  • 11. Know what to do if you become a victim
  • Contact the companies and banks where you know fraud occurred. Place fraud alerts and get your credit reports. Report identity theft to the FTC.
  •  
    In a way, fighting cybercrime is everybody's business. Think of it as an obligation to do your part in the fight against cybercrime. For most people, that means following a few simple, common-sense steps to keep yourself and your family safe. It also means reporting cybercrimes to relevant officials at the appropriate time.
allisonweets

Tablets replacing paper menus in restaurants - a long-term trend or too problematic? | ... - 0 views

  • This trend is in market from mid-2011 onwards (use-case discussions started as soon as the first iPad was released in 2010) and its gaining momentum now.
  • Customers will be able to browse the food menu and place their order which eventually gets posted in the kitchen display console. That’s the core functionality.
  • Customize:
  • ...13 more annotations...
  • Visualize:
  • Engage (and Earn):
  • Ability for restaurants to do focused campaigns and cross-selling to customer by knowing the customer buying pattern, interests, wishlist.
  • Ability for restaurant owners to do predictive analysis on the number of guests to expect and what food items (also quantity) they are likely to order.
  • Credit card security.
  • High capex.
  • Breakage.
  • Extensive use of technology everywhere.
  • Risk of replacing human with techno-machine.
  • Theft of the tablet.
  • The transactions and customer data (from tablet) should be integrated to the existing restaurant systems like POS, CRM, Analytics software etc which attracts additional cost and time.
  • tablet-based menus are a good change in the restaurant industry. But, replacing the entire waiter crew with only tablets is going to haunt the restaurant. We predict that a mix of both is going to work in the restaurant industry.
  • Restaurants need to take a calculated (risky) call to adopt this trend by considering the ROI and all merits and demerits the technology attracts.
  •  
    For several years, tablets/eMenus have been rising in popularity within dining establishments as a way to increase efficiency and revenue for the establishment. Customers are able to view the menu in it's entirety along with pictures of each item, allowing the customer to view exactly what they are ordering. This could potentially decrease the amount of orders sent back to the kitchen and decrease food waste, thus minimizing loss of revenue. Although this developing technology has many advantages, there are a few disadvantages that management must consider before implementing these systems. Credit card security, risk of replacing wait staff/jobs, and potential theft of the system being a few.
mserr078

12 Ways To Increase Hotel Security - LODGING Magazine - 0 views

  • Even when hotels have strong security policies and procedures in place, they are still vulnerable to cyber attacks, break-ins, theft, fraud, and other crimes
  • American Hotel & Lodging
  • Association (AHLA) security consultant
  • ...17 more annotations...
  • Hotels can be held liable for the criminal acts of third parties
  • Guest Safety: Ensuring Return Stays and a Good Reputation
  • Update locks.
  • Provide a sense of ownership.
  • Monitor activity with software.
  • Evaluate and improve—quickly.
  • Meet and greet.
  • Make time for safety meetings.
  • Theft and Fraud: Monitoring Employee Activities It’s a disappointing reality that hoteliers have to contend with employee theft and fraud. B
  • Boost employee empowerment.
  • Staff smart.
  • Add active monitoring to video surveillance.
  • Cybersecurity: Protecting Electronic Borders
  • As technology has advanced, so has criminals’ ability to exploit those new technologies. The hotel industry has seen several such examples lately
  • Connect IT and security departments.
  • Upgrade to VLAN.
  • Beware of social engineering.
  •  
    This article highlights all the necessities to make sure your hotel is safe and secure for all your guests. It specified for cyber security, however, that switching to a VLAN server would be massively beneficial for the hotel as it becomes a private server that has multiple stages of security to bypass. In addition, it advises the modification of passwords every few months because apart from cyber breaches, people also try to con others out of their passwords by word of mouth and manipulation.
  •  
    In this article it talks about the 12 different ways to increase security in our hotels and how to make thing more safe for our guest.
tcale003

This $20 USB Cable Is A Dead Man's Switch For Your Laptop - 0 views

    • tcale003
       
      This article is about a new inexpensive technology called a Buzz Kill Cord. It has been recently created by Michael Altfield, a Software Engineer to prevent hacking across the globe for anti-theft protection if someone steals one of your computer or phone devices. This USB cable will destroy any and all information on your device.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • ...10 more annotations...
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated. There are many different technologies across multiple machines from the trains mentioned above right through to chainsaws. Unsurprisingly, laptop computers haven't been on the list until now. Software engineer and sysadmin, Michael Altfield, has created a cheap "kill cord" that can trigger a laptop to self-destruct if stolen by a snatch and grab thief. What's more, you can make your own for just $20 (£15) but there's an important caveat: this is for Linux laptops, not those running macOS or Windows.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • le, ac
  • There are many different technologies across multiple machines from the trains mentioned above right through to chainsaws. Unsurprisingly, laptop computers haven't been on the list until now. Software engineer and sysadmin, Michael Altfield, has created a cheap "kill cord" that can trigger a laptop to self-destruct if stolen by a snatch and grab thief. What's more, you can make your own for just $20 (£15) but there's an important caveat: this is for Linux laptops, not those running macOS or Windows.
  • Although laptops can crash, the consequences will likely not be as devastating as a runaway train incident. So why would anyone want a "kill cord" for their laptop? Good question, and one answered by software engineer Michael Altfield in his blog posting that describes how he made one.
  • if you were doing some online banking or accessing your work network via a VPN, the opportunity to monetize the theft becomes apparent. That scenario isn't far-fetched either.
  • Stand up if you use your laptop in a coffee shop or some other public place like an airport.
  • I'm guessing nobody is sitting down at this point. Yet by using either distraction tactics or a more straightforward and violent strategy, a thief could steal your fired up and authenticated laptop in seconds. Encryption won't help much if you have authenticated and are accessing that data, or service, at the time of the snatch and grab.
  • Altfield wanted an anti-theft solution that could trigger the laptop to shut down, lock, or even wipe all data in such a physical separation scenario. "I couldn’t find a low-tech solution that implements a laptop kill cord," he said, "so I decided to build one myself." The result is what Altfield calls a "BusKill" cable.
armanyleblanc767

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Reliance on Paying By Card
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • challenge to maintain teams of well-trained staff.
  • Compliance
  • Insider Threats
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
earagon22

What is RFID Technology? (+Use Cases in the Hotel Industry) - 2 views

  • It’s no surprise that hospitality businesses want to take advantage of RFID technology too, especially when it offers speed, security, and a high-tech touch.
  • Seeing an opportunity to meet all of these objectives, Coachella Valley Music & Arts Festival rolled out an RFID wristband solution that allows faster entry into the festival and eliminates the risk of counterfeiting.
    • jblan183
       
      Coachella took the RFID wristband one step further than smart cards by placing the chips on wristbands, issuing RFID chips with unique identifiers to festival-goers. Instead of security scrutinizing every paper ticket upon entry, attendees simply scan their wristbands at RFID readers at the festival entrances to gain access, allowing them to get to their favorite stages faster.
  • One of the most popular use cases for RFID technology is guestroom entry. Compared to a traditional keycard, RFID-equipped cards offer hoteliers more control over security. Front desk staff can activate and deactivate cards remotely and review logs to see where and when a card was used.
    • jblan183
       
      Con: Keeping them near phones, wallets, or purses will demagnetize the cards, especially inconvenient should a hotel not have a complimentary card holder.
  • ...23 more annotations...
  • If guests have RFID-enabled keycard that contain payment information or room-charge information, guests can simply pay with their keycard
  • Besides granting entry to guestrooms, hoteliers can also use RFID technology to control access to amenities, parking, event spaces, and more
  • RFID tags on minibar items can alert hotel staff to low stock rather than tasking housekeeping staff with monitoring stock levels.
  • Most hoteliers have a line item in their budget to account for replacement of stolen items like pillows, hair dryers, and dishes. RFID chips on these frequent “souvenirs” can tell hotel staff when an item has left the building and give them the opportunity to recover the stolen item.
  • An RFID system is simply a cost- effective technology that uses radio waves to send a signal from a chip to a receiver.  RFID stands for radio-frequency identification, and this type of wireless technology involves two parts: a tag and a receiver.
  • Tags can be either passive (no battery, activated by the receiver) or active RFID tags (battery-power source, emits a signal that the receiver picks up).
  • RFID is a key component for IOT (internet of things) connectivity.
  • The tag contains a microchip with a unique code, and the receiver contains components to process the signal transmitted by the tag.
  • There are different types of RFID tags writes the RFID journal, "In general, low-frequency and high-frequency range tags are read from within three feet (1 meter) and UHF RFID tags (ultra-high frequency) are read from 10 to 20 feet. Readers with phased array antennas can increase the read range of semi-passive RFID tags to 60 feet or more."  Read range can also vary depending on environmental factors that effect the strength of radio signals.
  • its popularity has skyrocketed in recent years as the technology became cheaper and more applications were developed.
  • RFID wristbands at Coachella
  • Paper tickets for Disneyland are a thing of the past thanks to the RFID-powered “MagicBand” system that Disney rolled out in 2013.
  • Besides pure functionality, Disney also turned the MagicBand into a marketing vehicle; Disney fans can purchase MagicBands in their favorite color or emblazoned with their favorite animated character.
  •  Hotel and travel businesses usually begin by leveraging technologies like RFID for access control systems and asset tracking.  Due to the pandemic, contactless guest journeys have increased uptake of RFID, Bluetooth and NFC (nearfield communication) technology.
  • Festival-goers are issued wristbands embedded with RFID chips that each have a unique identifier, meaning that it’s essentially impossible to copy them. Instead of security staff scrutinizing every paper ticket upon entry, attendees simply scan their wristbands at RFID readers at the festival entrances to gain nearly instantaneous access.
  • Due to its relatively low cost, ease of use, and potential for operational efficiency, RFID technology can be an attractive solution for hoteliers looking to elevate their guest experience.
  • Door locks
  • RFID cards can also be more cost-effective in the long term as they don't get demagnetized.
    • earagon22
       
      My property uses RFID tech for room keys and it is so convenient as the wristbands don't get demagnetized when placed by phones or credit cards.
  • Controlled amenity access:
  • On-site payments
  • Outlets like restaurants, bars, and spas can use RFID technology to streamline the payment process.
  • Inventory management
  • Theft prevention
  •  
    Radio Frequency Identification or RFID continues to appeal to leaders in the hospitality industry as it allows for so many opportunities. RFID is a cost-effective technology. It utilizes radio waves to send signals from a chip to a receiver somewhere. Due to the COVID-19 pandemic, RFID technology usage has increased because of the consumers' desire to have contactless options. This article provides quite a few great examples of RFID technology in the industry. It mentions Disney and Coachella as they have switched to using RFID wristbands. Hotels, as mentioned in this article, can use RFID technology for a multitude of things. Some examples include: for door locks, on-site payments, controlled amenity access, inventory management, and theft prevention.
  •  
    The RFID is a very interesting and powerful system. Many industries have been using such system for a long period of time. In the aviation industry, the RFID helps to track and sort checked baggage at the airport by reading several inlays at one. Airlines that use such system has a higher customer satisfaction rate.
vriverol

Hoteliers: Prioritize Digital Identity Verification in 2023 | Hospitality Technology - 0 views

  • In a digital age where travelers crave instant, one-tap experiences, no hotel can afford to isolate itself - and digital identity verification is a crucial cog in the mobile check-in experience.
  • Digital ID technology validates that an ID is authentic, further mitigating fraudulent activity and deterring bad actors. In addition to scanning their ID and providing biometric data, guests must take a photo of themselves which must fit specific criteria - including visible facial features and clarity of the image - which is then cross-verified for authenticity.
  • Digital identity verification eliminates the friction of another touchpoint in the guest journey, allowing travelers to bypass the front desk, check-in, and access their room key with a few taps on their device.
  • ...3 more annotations...
  • With the added encryption and authentication of digital ID verification, hotels can protect guests from malicious attempts at identity theft and ensure their own defense is in place to shield them from fraud.
  • Hotels have a legal obligation to keep paperwork of their guests on file. However, gathering details and scanning the ID of each guest is not only time-intensive, but also creates room for error. By integrating digital identity verification into the mobile check-in process, hoteliers can ease multiple pain points across their operations: first, by removing the need for front desk staff to check each guests’ ID against their profile; second, by automating what is a legal requirement.  
  • Mobile check-in and digital identity verification should perform the heavy lifting on mundane operational tasks - such as scanning IDs and handing out key cards - freeing up staff time to focus on other elements of the guest experience.  
  •  
    This article touches on the advantages of using biometric digital identity verification in hotels. Guests that have traveled a long way are going to be exhausted and irritated if they need to stand in a long check in line. Using digital identification can not only help speed up the check in process, but also make it more secure. Front desk workers will not have to worry about mixing up documents or mishandling the guest's sensitive information, and will also be freed up to focus on other tasks. This can also help the hotels avoid chargebacks or fraud, as they can prove the guest was there and the added encryption will help stop identity theft.
‹ Previous 21 - 40 of 155 Next › Last »
Showing 20 items per page