Skip to main content

Home/ Hospitality Technology/ Group items tagged Theft

Rss Feed Group items tagged

Maria Zuniga

Event Planning In The Hotel Of The Future - 1 views

  • Combining today’s recognizable technology, such as touchscreen and virtual reality, with concepts that are beyond our time, these are some of the notable features hotels in the future will have.
  • he idea of using robots could help break down the language barrier that is sometimes the case when planning in other countries as these robots are naturally multi-lingual and can adapt to the language you are using.
  • This includes robot butlers, entertainment, greeters and business services which for planning events can be more cost effective and reduce human error, streamlining the process of communicating with the systems to get exactly what you want.
  • ...12 more annotations...
  • As one of the strongest drivers for change in the event industry, technology plays a prominent role in the planning and management of events
  • It could also be the case that it loses that human touch for the guests and when quick problem-solving is needed, robots won’t be able to deal with this as intuitively as they follow set protocols.
  • With 3D bio-printing currently being researched, it is not a huge leap to consider 3D printers in hotel rooms that can accommodate products such as headphones or clothing and accessories
  • Based on votes and crowdsourcing, venues can be made-to-order and self-assemble the environment around them to suit.
  • Larger venues and associated grounds could create an event in themselves by recreating famous landmarks or even movie settings that could be explored.
  • Based on your DNA, own health and genetics you would be able to visit health centers and spas that could promote longevity. It could become the latest trend in bachelorette parties or healthy event experiences that cater to the health conscious.
  • A hotel that is short-term and could pop-up in limited spaces would work hand in hand with pop-up events and mean they could be reproduced on a larger scale.
  • It is suggested that fast and effective hovering, autonomous airport transfers would be able to go supersonic in order to beat the traffic and reduce the journey. If this is the case it could free up plenty of time on the itinerary for corporate or destination events and this means providing a better experience.
  • As sustainability and environmental issues are becoming an increasing concern and given prominence, it makes sense that future hotels and venues would plan sustainable events and accommodation
  • Sustainable hotels that produce and operate on clean, self-sustaining energy will become a viable option for the environmentally conscious guest and the suggestion is that all hotels would have the option to become sustainable.
  • These would work in a similar way to how a concierge app works now and would streamline the travel bookings and searches. In the same way that Siri can help you access items from the internet or your phone, these avatars would be a more complex and capable version that cuts out the need for travel agents
  • rom biometric payment systems which can greatly reduce the risk of identity theft to eye scanner room entry, DNA authorizations will be more popular. As technology develops, so does the need for security
  •  
    This article talks about the future of event planning. The efforts hotels will have to make to be competitive in the industry. It also talks about the technology that will have to be offered such as VR (virtual reality).
  •  
    This article is very interesting because it lists all the ways that event planning will be in the future because of technological advances. It talks about autonomous staff, 3D shopping, made-to-order venues, personalized longevity health spas, pop-up hotels, supersonic air travel, sustainable hotels, personal travel avatars, and DNA authorization. The article describes the benefits and downfalls to each one and puts emphasis on the fact that these advances are closer than we can imagine.
natashacastro

What Are the Disadvantages of a Human Resource Management System? | Chron.com - 0 views

  • Human resources management systems offer efficient digital management of your employee data. You can monitor everything from benefits to payroll and paid time off with a few clicks on your computer. This makes your HR functions quick, but it doesn't always make them better.
  • Your employees entrust you with personal information. Everything from Social Security numbers to private health information and marital status gets stored in your HR management system. Several layers of management may have access to that information. In addition, a non-management employee may engage in identity theft and access a fellow employee's sensitive data. Such a breach of security with your management system can embroil you in legal problems and create poor employee relatio
  • ecause HR management systems do such a good job of listing employee accomplishments, certifications and degrees, managers may be tempted to promote based on the objective data your system provides. This may discourage supervisors from taking the time to get to know employees on a personal basis as part of their evaluation of what staff members can contribute to your company. The U.S. Office of Personnel Management points out that computerized employee evaluations can result in an impersonal narrative from the supervisor. Such evaluations may not be the most reliable guides for making decisions about promotions.
  • ...1 more annotation...
  • our system can contain so much data that you may find it difficult to analyze. You may need a separate analysis system just to sort the data into meaningful chunks
  •  
    This article examines the disadvantages of a human resource management system. Employees give all of their personal information from their social security to martial status. One obvious disadvantage to having all of this information is a security breach which could create legal problems if employees choose to take on legal action. Another negative to HRIS that is discussed in the article is the finances involved with using this system. Another cost would be training the staff to learn how to use the HRIS system. Throughout the entire article I thought this negative stood out the most. With so much information in the system, it could be difficult for any owner/manager/ or employee to analyze. It could be hard to generate reports and/or identify patterns, according to the article.
kdibe001

Budgeting for Cybersecurity: Risk vs Reward - NuData Blog - 0 views

  • Companies are facing an onslaught of cybercrime – everything from DDoS attacks to breaches to insider theft – and the numbers are staggering. Cyberattacks typically cost large businesses $861,000 and small business on average about $86,500, according to Kaspersky Labs. Jupiter Research is estimating that the cost of data breaches will reach $2.1 trillion globally by 2019. It is the frequency of attacks and the cascade of numbers which now makes this a CEO and Boardroom issue as cyberattacks could cause some major damage or even take whole businesses down.
  • IT Security budgets are set to grow 14% on average over the next three years with small business spending as little as a $1,000 all the way to a million dollars for large companies. While some analysts like Cybersecurity Ventures predict that there will be a burst of spending – 12-15% year over year growth through 2021, Gartner Research reports that IT security spending will account for less than 5% of worldwide IT spending.
  • You can also get more budgeting dollars by leveraging bottom line increases such as incentives for VIP customers, revenue increases, and spend increases throughout the customer lifecycle.
  • ...1 more annotation...
  • Security spending does not equal security effectiveness
  •  
    I found with this article that cyber attacks are becoming alarmingly more common than we have prepared ourselves for. Businesses now need to invest in their own cyber security department or, as the article suggests, apply a cyber security budget to each department. With security budgets predicted to increase 14%, money should be collected through the customers over a lifetime of the customer so that the budget is continually there. I found this article to stand out to me because I never thought of cyber security being so crucial, but it easily makes sense. I think a lot of business lack in providing the proper amount of security to prevent cyber attacks. Personally, I never heard of a cyber security department so this was new for me to read about.
teresaricks

Cyber Security In The Hotel Industry | protel - 4 views

  • And phishing isn’t the only strategy these computer thugs use, either. Just about every hotel in the world could be vulnerable to malware, ransomware, spam, hacking and social engineering. 
  • The argument for educating staff on cybersecurity is a simple one: if staff don’t know how to recognize a security threat, how can they be expected to avoid it, report it, or remove it?
  • the 2019 State of IT Security Survey found that email security and staff training were listed as the top problems faced by IT security professionals.
  • ...16 more annotations...
  • Yet, more than 30% of staff surveyed by Wombat Security Technologies didn’t even know what phishing or malware was. This is probably why scams like the Business Email Compromise (BEC) result in whopping losses of over $3 billion (according to the FBI).
  • But as humans, hoteliers make mistakes, they’re trusting of fake identities, tempted by clickbait, and vulnerable to other sneaky tactics used by criminals to gain access to company information.
  • Staff need cybersecurity training to protect themselves and the hotel against cyberattacks.
  • By making employees aware of security threats, the impact they might have on your business, and what procedures to follow when a threat has been identified, you’re strengthening the most vulnerable links in the chain.
  • The World Economic Forum in their latest report, The Global Risks 2019, puts cyber-attacks and data theft into the higher-than-average likelihood bracket during 2019.
  • To achieve these record levels of data breaches and cyber-threats, cybercriminals are focusing their attention on the manipulation of human behavior.
  • So how do we counter these threats? Education, education, education. 
  • Security awareness training is not a point event or solution, it is a process. Security awareness comes out of a series of ideas, thoughts, and preparations that are used to develop a holistic security awareness training program.
  • Identify the Specific Cybersecurity Needs of the Hotel/Property   
  • Include Cybersecurity Awareness Training During Onboarding
  • Cover Relevant Topics
  • Make Staff Cybersecurity Training An Ongoing Process
  • We all make mistakes and occasionally slip up. It is really important that staff know that they can come to you and that they are free to report problems without there being a risk of them losing their jobs. This will come from your personal management style. 
  • Cybersecurity is everyone’s responsibility, whether you are C-level, management, accounting, housekeeping, maintenance, or reception, it does not matter. Everyone needs to be made aware of the hotel’s individual cybersecurity policies, attitude, and culture. 
  • Continuously send reminders via email, Slack, or any other messenger your hotel may be using with reminders to change passwords, to update anti-virus programs, and with information about the latest phishing techniques.
  • If you create a culture of cybersecurity awareness within your organization, then the chances of your organization becoming a victim are greatly reduced.
  •  
    This article stresses the importance of providing cybersecurity training to staff in the hospitality industry.
nunes305

4 Cyber Security Insider Threat Indicators to Pay Attention To | Ekran System - 0 views

  • Insiders can target a variety of assets depending on their motivation.
  • they focus on data that can be either easily sold on the black market (like personal information of clients or employees) or that can be crucial to company operations (such as marketing data, financial information, or intellectual property)
  • Usually,
  • ...8 more annotations...
  • he most frequent goals of insider attacks include data theft, fraud, sabotage, and espionage.
  • Detecting a malicious insider attack can be extremely difficult, particularly when you’re dealing with a calculated attacker or a disgruntled former employee that knows all the ins and outs of your company.
  • Of course, behavioral tells that indicate a potential insider threat can vary depending on the personality and motivation of a malicious insider.
  • 1. Disgruntlement
  • 2. Unusual enthusiasm
  • 3. Unusually frequent trips and vacations  
  • 4. Unexplained changes in financial circumstances  
  • Insider threat detection is tough. There are no ifs, ands, or buts about it. However, every company is vulnerable, and when an insider attack eventually happens, effective detection, a quick response, and thorough investigation can save the company a ton of money in remediation costs and reputational damage.
  •  
    "Insiders can target a variety of assets depending on their motivation. Usually, they focus on data that can be either easily sold on the black market (like personal information of clients or employees) or that can be crucial to company operations (such as marketing data, financial information, or intellectual property). Frequent targets of insider attacks include:  Databases"
azephyr

Cybersecurity in Hospitality Industry - Types of Threats - Logsign - 0 views

  • implementation of electronic devices and similar conveniences also pose serious threats regarding the security of our sensitive information. That is why cyber security practices gain much more importance in the hospitality industry. I
  • The term cyber security is used to refer to the methods and practices that aim to defend devices, networks, servers, electronic systems and all kinds of data from ill intended attacks.
  • Cyber security professionals aim to keep such malicious intended individuals away from your systems.
  • ...7 more annotations...
  • Cyber security practices often involve the use of a tool or software such as antivirus programs, firewalls, anti malware software and such. In accordance with the needs and vulnerabilities of your organization, various cyber security solutions can be employed and configured. You can opt for getting professional help and/or hiring a team of cyber security professionals for this task.
  • In the past years, we have witnessed many hotels being victims of cyber criminals. Such incidents lead serious data leakages and hurt the reputation of the organization.
  • Customer Data/Identity Theft: When booking a hotel room, we share some of the most sensitive pieces information regarding us: Our name, address, payment information. That is why most hackers try to steal customer information from the hotels using malware, computer viruses and social engineering methods.
  • he term phishing refers to the techniques used to deceive and convince professionals to leak information. The most popular phishing techniques include fake web pages, phone calls, text messages and e-mails.
  • Darkhotel hacking: This technique involves hacking the hotel WiFi and steal information from the visitors.
  • If you want to protect your organization from cyber threats, first you need to inform your employees.
  • Secondly, you must invest in some bullet-proof cyber security software including but not limited to antivirus, antimalware and firewalls. You must also hire a team of IT specialists to ensure that your organization is protected 24/7.
  •  
    This article talks about the type of threats the hospitality industry can face, an explanation of cybersecurity, and how to protect your organization from cyber threats, especially phishing.
guanhuahao

What is a POS system? - Hospitality Net Explainer - 3 views

  • The point of sale (POS), historically known as the cash register, was invented by an Ohio saloon owner in 1879 in order to stop theft from employees and guests.
  • POS, used in retail and F&B, is the sister of the Property Management System (PMS) used in hotels.
  • Going into more detail, the F&B POS systems' market is divided in two facets: Legacy POS and Cloud POS.
  • ...5 more annotations...
  • the Legacy POS still owns the majority of the market, (70% of it in fact).
  • The main criteria to inform your decision should be:
  • Accessibility
  • Analytics
  • Integration
  •  
    This article shows the origination and basic functionalities of POS and the two types of categories now of this system in the F&B industry: Legacy POS and Cloud POS. Compared both from the perspectives of data stored, data access, type of payment, personalization level, and limitations. In the end, give the suggestion on how to choose the right one for business.
leahesper

10 Ways to Prevent Fraud By Restaurant Employees - 0 views

  • Employee fraud should be a major concern to restaurant operators because it can significantly cut into revenue.
  • Quite simply, this is an issue that you can’t afford to ignore.There are two main areas where employees can inflict financial harm on a restaurant: they can steal product or they can steal money.
  • First, consider all of the areas that are at risk for fraudulent behavior.
  • ...9 more annotations...
  • Restaurant managers should have a good understanding of what is happening with transactions.
  • As you review transactions, look for unusual activity.
  • The next step is to investigate any patterns or irregularities you find.
  • At smaller chains, spot-check from each register to look for anomalies.
  • When employees know a fraud detection system is in place, the number of cases decreases.
  • Review your authorization process and revise as needed
  • Rolling out cashless payments can help reduce this problem.
  • Preventing and identifying fraud should be an everyday part of your financial management.
  • Lastly, keep in mind that restaurants with lower menu prices may be at risk for more theft.
  •  
    This article gives examples of cases in which fraud took place in the establishment and then gives ways you can identify employee fraud and take steps to prevent it!
kaseyfl9568

Importance of Computer Networking & Security | Your Business - 1 views

  • networking brings with it security threats which, if mitigated, allow the benefits of communication to outweigh the risks. Risks of poor security to your business network include theft, intrusion and even destruction of digital property.
  • Programs can actually be written which will divide a task evenly between computers connected to a network, decreasing the time needed for that task
  • Companies, organizations and even homes use an intranetwork -- or intranet -- to communicate between devices
  • ...2 more annotations...
  • the point where “intra” meets “inter” is where security comes in to play.
  • Encryption scrambles the bulk of a data transmission, and can only be unscrambled by the parties involved.
  •  
    Advantages and Risks of Networking Operating Systems NOS help connect people at a much faster and more organized rate than pen and paper- even email. But with this, there are threats that can come with this convenience. It is important to know the precautionary measures to take and when done properly, how with risk, can come reward. But if measures are not taken properly, the reward can be greatly sacrificed by data being stolen, information being taken and destruction of digital property. We learned that the server can communicate a lot of data to individuals at different locations at once and how this becomes a very big advantage and allows for an increase of productivity. There are also more ways to communicate data with technology as the intrAnet. This allows for a company to use their network to communicate messages between their devices. But when the inter-network is mixed with the internet, the security can become compromised.
cmarq019

Robots Are Ready to Shake (and Stir) Up Bars - WSJ - 1 views

  • training for employees
    • cmarq019
       
      it is quite interesting to see that there is training for the employees to use the machine.
  • “We could have designed a very simple machine, but we wanted to design a pretty cool one, so that’s why [we added] the movement element,”
  • We could have designed a very simple machine, but we wanted to design a pretty cool one, so that’s why [we added] the movement element,”
  • ...6 more annotations...
  • “In most of the bars, the bartender is the biggest crowd puller,
  • “In most of the bars, the bartender is the biggest crowd puller,
  • Still, Tewari doesn’t see his machine putting bartenders out of work
    • cmarq019
       
      It wouldn't be anytime soon that these technologies will put the bartenders out of work, however in about 10 years or so that is a possibility.
  • “Robots might take that away from my experience.”
    • cmarq019
       
      I wouldn't believe that these devices like these will be for the customer service industries, if so, it would be more suitable for fast food restaurants like Wendys or McDonalds
  • Its bar counters now sit in the Hard Rock Hotel & Casino in Biloxi, Miss., and on five Royal Caribbean cruise ships.
  • The Smartender, another automated cocktail dispensing system, aims to replace the back-of-house bartender who pours drinks for servers at chain restaurants, casinos and sports stadiums.
marble_bird

Hotel_ITSec.pdf - 0 views

shared by marble_bird on 15 Jul 20 - No Cached
  • During the past decade, information technology (IT) has significantly changed the way the hotel industry controls and manages operations. While many technologies have been utilized, some newer technologies have emerged in the literature and in practice, and many of them impact the hotel’s security.
  • Among the results, this study identified a gap between hoteliers’ understanding of IT budget adequacy and the adequacy of installed IT security systems.
  • Advancements in technology are increasing at a remarkable rate. As technology becomes more important, organizations that do not keep up with these advancements could lose business opportunities to other competitors that do
  • ...53 more annotations...
  • The four leading technologies which have showed a high adoption rate from the industry and have received attention from academia are: self-service, wireless, green, and security technologies. The advantages of these technologies for hoteliers include enhanced customer services and operational efficiency (Doyle, 2007), decreased guest wait times, more efficient methods to settle bills (Singh & Kasavana, 2005), reduction of energy costs (Meeroff & Scarlatos, 2007), and protection of sensitive customer data and credit card numbers
  • In addition, exploring the influential factors of security system usage will provide greater depth of knowledge with respect to why some hotels have adopted more security systems than others.
  • there is still a lack of understanding of the nature of risk associated with inadequate IT security, especially among operators of hotels that do not have their own IT departments.
  • Self-service technologies are commonly defined as devices or applications which permit users to produce a service independent from the direct involvement of the service provider (Meuter, Ostrom, Roundtree, & Bitner, 2000). The use of self-service technologies in the hotel industry has grown considerably, especially in the areas of self check-in, in-room check-out, and foodservice kiosks
  • IT systems refer to general support systems such as mainframe computer, mid-range computer, and local area network.
  • Some of the most significant wireless technology applications involve the use of mobile handheld devices, such as personal digital assistants (PDA), tablet PCs, and cellular phones, or RFID (radio frequency identification). RFID utilizes computer chips and antennas, allowing the chips to wirelessly communicate with a receiver.
  • While the major usage of RFID in the hotel industry was for inventory control purposes, it also has the potential to be utilized in ways that can provide more conveniences for the guests.
  • Other possible uses include placing RFID tags on items of high value as a means of theft prevention or integrating tags into guest loyalty cards for easy identification
  • IT investment that lowers environmental impact and IT that manages the environmental impact of other systems are commonly referred to as “green technology”
  • Many hoteliers might think becoming more environmentally friendly will cost more for their hotels. However, it has been demonstrated that “going green” is not only the right thing to do for the environment but also provides tangible bottom-line benefits for hotels by reducing consumption of energy and water, as well as other related costs.
  • Some of the risk factors involved include reliability, security, and privacy issues
  • A hotel with more technologies being utilized will install more security systems than those with fewer technologies.
  • Many of these attacks involve attempts by thieves to gain access to customer credit card data, and these attempts constitute a major portion of the risk inherent in IT security
  • if a system is breached and the merchant is not PCI compliant, the merchant then is responsible for all costs associated with improperly used credit card information taken from that system (Kress, 2008). These losses could bankrupt a business if the security breach goes undetected for even a short time.
  • IT security systems are those measures taken to protect the confidentiality and integrity of proprietary data.
  • two main paradigms of adoption are believed to occur: bottom-up adoption and top-down adoption.
  • Thus, it is reasonable to assume that organizational factors (e.g., financial factor, human resource) will influence the implementation stage of security systems at a hotel.
  • A hotel with sufficient IT budget will install more security systems than those with insufficient IT budget.
  • That is, if a hotel does not have its own IT department, it will have a negative influence on successfully installing or maintaining necessary security systems.
  • A hotel with its own IT department will install more security systems than those without.
  • Overall, the state of IT spending on security continues undiminished because managed security services are required for almost every application (Communications News, 2007).
  • risk associated with a breach of IT systems security (e.g., network break-ins) is very high. Consequently, no sector of the business community is exempt from attacks on their IT systems, with an attack being defined as a technique used to exploit a system’s vulnerabilities.
  • Given the importance of security and privacy at a luxury hotel, this study expects luxury properties to have installed more security systems than other segments
  • Most hotel employees use their property management systems for hotel operations and should be able to check their e-mails.
  • To justify the low response rate, previous studies which have compared response rates of mail and e-mail for surveys were reviewed.
  • the large majority of respondent properties do not have their own IT departments. Second, the people making IT decisions generally do not have IT backgrounds or training. Third, the large majority of respondent properties have little more than firewalls or antivirus software to protect their proprietary data, and these systems alone are not adequate to meet PCI standards, as they do not take steps to encrypt and protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test their networks, and maintain an information security policy as required by the Security Standards Council.
  • The respondents were asked to select from a total of fourteen securities related systems
  • The profile of the respondents revealed that they were experienced hoteliers with more than ten years experience in the industry
  • Fifty-three percent of the respondents reported that they were with chain hotels that would be considered mid-range properties with an average of 175 rooms (median of 107). Over 80% of the respondents reported working in operations, while fewer than 4% reported working in either IT or engineering (Table 1).
  • Nearly 70% of the respondents’ properties did not have their own IT department (69.2% did not have, and 30.8% had their own IT departments, n = 234, missing data = 10).
  • Fifty-three percent of them (n = 244) thought the most important goal for hotel technology would be enhancing the customer’s experience.
  • second identified goal was utilizing technology to help generate revenue (41%)
  • differentiate properties from their competition (20%), to lower expenses (16%), and to increase security (6%).
  • Internet kiosks in the lobby represented the most frequently used self-service technology (36.5%, n = 244), followed by kiosks for airline check-in/board pass
  • With respect to security systems currently in use, antivirus security systems represented the most frequently used security system (92.2%), followed by hardware firewalls, software firewalls, physical security, and encrypted login security systems.
  • intrusion detection was the most frequently identified system (15.6%), followed by vulnerability assessment scanning (13.5%), Internet scanning (13.1%), antivirus (11.5%), digital ID server (11.5%), and nonreusable passwords (9.8%; Table 2).
  • Thus, the hypothesis was supported that there was a linear relationship between the three factors and the adequacy of security systems.
  • The positive standardized coefficient (β) of .389 indicates that there was a statistically significant (p < .001) linear relationship between IT usage (the number of wireless, self-service, and green technologies a hotel was using) and the adequacy of security systems
  • The study revealed certain things of interest, the most significant of which is the need for greater emphasis on IT security among hoteliers.
  • only about 30% of all respondents reported having their own IT departments. Since budget hotel properties are extremely unlikely to have an IT department, it is highly likely that the very large majority of IT decisions throughout the industry are being made by hotel operators for whom IT is not their primary area of concern.
  • Furthermore, the focus of hoteliers for future IT implementations is enhancing the guest experience (53%) and generating revenue (41%). Very few respondents (6%) identified increasing security as a 5-year IT goal.
  • While almost all respondents use information systems as part of their jobs, very few are trained in the development, maintenance, and secure use of these systems.
  • no correlation was found between the respondents’ perceived adequacy of their IT budgets and the adequacy of installed security systems, as adequacy of IT budget did not appear as a significant term in the regression analysis.
  • Nearly 10% of respondents do not have so much as anti-virus protection for their systems, and nearly half do not even take simple physical precautions to protect their IT systems.
  • we note that no correlation exists between the respondents’ perceived adequacy of their IT budgets and the number of installed IT security systems, as the number of installed systems was not a significant factor in the regression analysis.
  • The sample obtained in this study represented the targeted sample: over 80% of the respondents were working in hotel operations. Furthermore, the purpose of this study was to explore hotel operators’ insight of technology usage, IT budget, and security measures rather than to confirm existing theories or to generalize the results.
  • it is reasonable to conclude that the respondents did not have an adequate understanding of the nature of the IT security hazards facing them for the average property does not have installed systems adequate to meet PCI standards, yet they reported having adequate budgets.
  • In order to adequately protect proprietary data, one must have an understanding of network security, which is an understanding apart from software functionality.
  • Properties with their own IT departments, however, reported that they had a higher number of installed IS security systems than did those properties without their own IT departments.
  • roperties without their own IT departments, in particular, have a less adequate understanding of their IT security needs than may be necessary.
  • This study found hoteliers’ lack of attention to security provision, training in IT, and PCI compliance can place hoteliers at great risk. For example, the cost of a single incident at a noncompliant property could result in the loss of the entire business.
  • It will be useful to examine the reasons why luxury properties are more likely to employ adequate security measures to determine whether this greater use is attributable to better understanding of security issues or some other factor.
  • The study was limited by the nature of online surveys; the response rate was quite low. Future studies could test the proposed research model via paper-based mail surveys to increase a response rate.
  •  
    This article covers a study performed on various hotels to determine management's level of IT knowledge and security implementations in relation to the hotel's IT security budget. The article discusses four types of technology impacting the hotel industry and how management responses to trending technology can affect a business, particularly in terms of a data breach and overall security. The study finds that an alarming percentage of hotel managers are not adequately informed on the risks and procedures of IT management and security, and many do not have proper IT security measures in place despite having an appropriate budget.
jamigovaerts

POS Systems: The Backbone of Restaurant Tech | Modern Restaurant Management | The Busin... - 0 views

  • “one-stop-shop”
  • All restaurant technology starts and ends at one central point: it’s POS system.
  • a good point of sale system can be the biggest asset a restaurant has
  • ...5 more annotations...
  • Technology upgrades, such as those that protect against data theft or provide guest relationship management capabilities, can make a big difference in improving operational efficiency and guest satisfaction.
  • Modern-day point-of-sale software functions on its ability to integrate.
  • It may be impossible to predict the future of POS technology with certainty, but it’s quite transparent that the technology will continue to evolve to meet the changing demands of the market.
  • Improving the quality of food, service, and guest experience has always been and will always be the primary driver of restaurant success. To do that, every restaurant needs a POS system that won’t fail them and will provide assistance in all aspects of operations from now into the future.
  • POS Systems: The Backbone of Restaurant Tech
qyang010

10 Ways to Prevent Fraud By Restaurant Employees - 0 views

  • 1. First, consider all of the areas that are at risk for fraudulent behavior.
  • 2. Restaurant managers should have a good understanding of what is happening with transactions.
  • . As you review transactions, look for unusual activity.
  • ...7 more annotations...
  • 4. The next step is to investigate any patterns or irregularities you find.
  • 5. At smaller chains, spot-check from each register to look for anomalies.
  • 6. When employees know a fraud detection system is in place, the number of cases decreases.
  • 7. Review your authorization process and revise as needed.
  • 8. Rolling out cashless payments can help reduce this problem.
  • 9. Preventing and identifying fraud should be an everyday part of your financial management.
  • 10. Lastly, keep in mind that restaurants with lower menu prices may be at risk for more theft.
lwu014

8 Types of Restaurant Fraud and How to Prevent Them - 0 views

  • 8 Types of Restaurant Fraud and How to Prevent Them
  • Types of External Fraud in Restaurants
  • What are chargebacks?
  • ...6 more annotations...
  • How to stop chargeback fraud
  • How to stop break-ins and robberies
  • How to stop vendor fraud
  • Break-ins and Robberies
  • What is vendor fraud?
  • Types of Internal Fraud in Restaurants
  •  
    This article gives us 8 ways in which we can prevent fraud. It includes charges backs,vendor fraud, time theft (for employees) etc..
  •  
    This article was talking about 8 types of Restaurant Fraud and How to Prevent Them
anaslip

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Hospitality Tech... - 0 views

  • Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector
  • Marriott International revealed that a massive cyberattack compromised personal information for up to half a billion individual guests of its properties.[1] The data breach ranks as the second largest known theft of sensitive personal records to date.
  • This marks the second major cybersecurity failure for Starwood, the Marriott division affected. Before being acquired by Marriott in 2016, the company’s cash register system was penetrated by malware looking to steal credit card information. [3] Other major organizations in the hospitality industry, including Hilton and Hyatt, have reported similar attacks. In 2017, for example, Holiday Inn parent company InterContinental Hotels discovered a breach lasting three months and affecting 1,200 properties. With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • ...5 more annotations...
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • However, industry specific challenges like high employee turnover continue to expose the sector.[6] Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.” What this means is that an adversary—commonly referred to as a “hacker”—finds some way to gain access to a target and compromises it. The target can be accessed through vulnerabilities in web frameworks, internet browsers, or internet infrastructure such as routers and modems. Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks.
  • Rather than rely solely on the incident response and recovery methods that have been used for many years, a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale. This kind of approach, when paired with incident response tactics, could provide true security to vulnerable, critical networks.
  • A TTP-based cybersecurity tool would work in concert with existing incident response, internally-focused cybersecurity efforts, adding a layer of prevention over the top of this vital but flawed process.
  •  
    In today's world no business entity is impervious to cyber-attacks. Marriot, Hilton and InterContential Hotel Groups were all recently affected by such acts. The traditional cyber-attack method which the hospitality industry employs is oftentimes simply a reaction to the attack- "incident responses". Instead, the industry needs to shift its focus and allocate resources to aid prevention of future of attacks. This new focus was be surrounding tactics, techniques and procedures (TTP) - the ability to identify adversary and implement the necessary processes to hinder attacks.
  •  
    This article tells us about the importance of having a good cybersecurity. There are some big hospitality companies like Marriott and Hilton which have revealed that many cyberattackes compromised personal information for many guests and that cybersecurity has to be improved.
cleon087

Cybersecurity at Hotels: 6 Threats For Hotels to Manage - 0 views

  • hishing att
  • Ransomware
  • Point of sale/ payment card attacks
  • ...21 more annotations...
  • DarkHotel hacking
  • Customer data/ identity theft 
  • Over that past few years, the industry’s most well-known brands have all been victims of cybercrime.
    • kaylaabad
       
      The hospitality industry is a huge target for cybersecurity breaches
  • Phishing refers to the sending/receiving of emails that appear to be from a genuine source.
    • kaylaabad
       
      Phishing: Phishing refers to the sending/receiving of emails that appear to be from a genuine source.
    • cleon087
       
      It is important to know about what this means
  • intends to convince the recipient that he/she should share information
    • kaylaabad
       
      Goal of phishing: to be information from recipients
  • In recent years, this threat has become increasingly sophisticated, with attacks targeting those in authority. The aim is to take over a user’s email account to send bogus emails to colleagues. These emails often attempt to persuade recipients to authorize transactions, which are ordered from above.
    • kaylaabad
       
      Phishing example in the industry: In recent years, this threat has become increasingly sophisticated, with attacks targeting those in authority. The aim is to take over a user's email account to send bogus emails to colleagues. These emails often attempt to persuade recipients to authorize transactions, which are ordered from above.
  • Hotels that have fallen foul to this crime have in the past paid more than $17,000 to be able to let guests into their rooms and create electronic keys.
    • kaylaabad
       
      Ransomware - Hotels that have fallen foul to this crime have in the past paid more than $17,000 to be able to let guests into their rooms and create electronic keys.
  • Cybersecurity for hotels should always include a process to mitigate any compromised systems should they go down in a DDoS attack.
    • kaylaabad
       
      distributed denial of service attack
  • Cybersecurity issues of this nature, often result in customers being out of pocket, and the media getting involved. Which, of course, means bad press for a hotel. Furthermore, there could be financial implications for the business.
    • kaylaabad
       
      POS attacks: Cybersecurity issues of this nature, often result in customers being out of pocket, and the media getting involved. Which, of course, means bad press for a hotel. Furthermore, there could be financial implications for the business.
  • The attacks use forged digital certificates to convince victims that a software download is safe.
    • kaylaabad
       
      DarkHotel hacking: The attacks use forged digital certificates to convince victims that a software download is safe.
  • Protecting the identity and information of a customer is paramount to the success of any business and hotels ar eno exception.
    • kaylaabad
       
      Protecting the identity and information of a customer is paramount to the success of any business and hotels ar eno exception.
  • That is often passwords and financial information; this scam is one of the oldest on the internet.
    • cleon087
       
      It is important to be informed of this type of attack as a hotel owner because your holding sensitive information.
  • taking information and certain systems hostage. The purpose of this attack was to gain financially from those who paid the demanded figure to free their data/systems.
    • cleon087
       
      A lot of times that ask for a ransom and you pay and still you don't get access back to your computer. Also they can take credit card information and use guest credit cards.
  • Every day regular items such as sprinkler systems to security cameras are vulnerable to hijack. After which, entire computer systems can be made to come crashing down.
    • cleon087
       
      Having access to cameras is concerning because this is sensitive information. They can get access to private areas of the hotel and use it to their advantage.
  • And that means somewhere there is a weakness in the system which has been revealed by human error.
    • cleon087
       
      This is why it is important to invest in the security because you don't want your guest to experience this.
  • criminals use a hotels Wi-Fi to target business guests.
    • cleon087
       
      This is scary because people go to hotels to get a vacation and they trust the hotel.
  • ncourage guests to use virtual private networks (VPN) if they plan on conducting business with sensitive data.
  • Especially when there are criminals from all over the world trying to steal identities, and credit card data.
  • his crime is forever changing.
  • for hotels, an almost perpetual arms-race to secure both data and networks.
    • cleon087
       
      This is why it is important to be up to date.
  • Phishing refers to the sending/receiving of emails that appear to be from a genuine source
  •  
    This article lists of some common security breaches that hoteliers need to be aware of and prepare the hotel system for.
  •  
    This article talks about how cybersecurity can critically affect hospitality businesses if they are not careful about what ways could attack their business.
  •  
    As the article states, "Protecting the identity and information of a customer is paramount to the success of any business and hotels are no exceptions." Quite unfortunately, cybersecurity issues are some of the biggest obstacles that hotels are experiencing nowadays. With hacking attacks such as phishing and ransomware, hotels need to invest in increasing their cybersecurity as any breach can lead to a downfall in business loyalty and brand.
jackyreis

The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was ... - 0 views

  • The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was short on details.
  • It took just three days for Facebook to notify authorities and the public that  hackers had compromised as many as 50 million user accounts on the social media platform.
  • Facebook leaders did not have enough information to paint a clear picture of the hack and the risk to its users during the announcement.
  • ...12 more annotations...
  • Europe’s new privacy law, the General Data Protection Regulation, imposes massive fines on companies if they don’t notify privacy regulators about a data breach within 72 hours. The rule took effect in May and applies to any company with E.U. customers. U.S. lawmakers have proposed similar a 72-hour rule to replace the patchwork of state data breach laws that exist here
  • The company said Friday it had notified European data privacy regulators of the breach, in accordance with GDPR. Shortly after doing so, Ireland’s Data Protection Commission, the watchdog that monitors Facebook’s GDPR compliance, said Facebook’s disclosure “lacks detail” and criticized the company for being “unable to clarify the nature of the breach and the risk for users at this point.”
  •  Equifax waited six weeks to reveal that the Social Security numbers and other sensitive information on 143 million Americans had been exposed in a data breach. Uber waited a year to reveal a hack affecting tens of millions of drivers — and just last week paid a $148 million settlement in connection with the incident. Yahoo also paid a fine earlier this year for waiting two years to tell investors that Russian hackers stole information on 500 million users. 
  • Wray stressed that cyberattacks and theft of intellectual property can inflict long-term damage on American companies,
  • No country poses a broader, more severe intelligence collection threat than China.
  • The Energy Department on Monday announced awards of up to $28 million to help fund 11 cybersecurity research projects to strengthen the defenses of America's critical energy infrastructure,
  • Karen Evans, the assistant secretary for the department's Office of Cybersecurity, Energy Security, and Emergency Response, said “energy cybersecurity and resilience” is one of the “most important security challenges” that the United States faces.
  • “The frequency, scale, and sophistication of cyber threats have increased and attacks can be much easier to launch,”
  • “Cyber incidents have the potential to interrupt energy services, damage highly specialized equipment and threaten human health and safety.”
  • The Senate Commerce Committee should hear from consumer privacy experts as lawmakers consider whether to develop data privacy legislation, a coalition of consumer and privacy groups said Monday
  • And while civilian agencies generally face the most lopsided age disparities, the importance departments place on building a long-term talent pipeline varies greatly
  • That means federal technologists at or approaching retirement age outnumbered their 20-something counterparts roughly 4.6 to 1.”
  •  
    This article highlights the importance of announcing a security breach quickly, and explains the argument on whether it needs to be carefully analyzed before releasing the breach. It explains the importance of releasing the understanding of a hack as quickly as possible to maintain people's information (i.e. bank information) safe.
shannaton

Ecommerce Data Breaches: Real Costs of Security Mismanagement - 1 views

  • In 2013, retail giant Target had more than 110 million of its customers’ credit card and con
  • act information compromised. This breach led to the resignation of its chief executive officer (CEO) and chief information officer the following year.
  • Hackers steal personally identifiable information, like names, addresses, phone numbers, and Social Security numbers to commit identity theft.Attack groups also steal less common information, such as customers’ favorite sports teams, pet names, dream vacation spots, and places of birth to gain access to financial accounts.
  •  
    There has and continues to be constant breaches where hackers tend to use sophisticated techniques to to exploit personal data. With so much at stake ecommerce businesses must heed the warning and take proactive action to secure their data.
leonfai

Why cybersecurity matters | Hotel Management - 0 views

  • Cybersecurity is not just a buzzword. In today’s technology-abundant world, it has become a critical undertaking for companies across all industries—including hospitality.
  • Trustwave’s "2018 Global Security Report" lists hospitality as one of the top three industries most vulnerable to payment card breaches. Other estimates project that hotels are the unwelcome recipients of around 20 percent of all cyberattacks.
  • Additional anecdotal evidence supports these numbers. One need not look further than Marriott International’s Starwood Hotels & Resorts Worldwide group, which recently disclosed the theft of more than 25 million passport numbers and 380 million unique guests’ personal information.
  • ...9 more annotations...
  • After all, the industry has been and continues to be focused on cultivating a user-friendly atmosphere. Unfortunately, for hackers this combination is nothing short of a gold mine.
  • Since a businesses' hard-earned reputation relies heavily on instilling confidence in its customer base, a breach of trust is sure to compromise that relationship. If an attack affects millions and is publicized to millions more, the impact on brand equity can be difficult to recover. 
  • Marriott, for instance, was criticized not only for the breach, but also for responding inadequately and unprofessionally.
  • In short, as more and more consumers become aware of the importance of reliable cybersecurity, a hotel that neglects this pain point is compromising the strength of its product among its competitive set. 
  • Considering that the annual frequency and severity of cyberattacks are only rising, the time is now to establish organizationwide security operations, recovery plans and budget allocations.
  • a cohesive top-to-bottom strategy is required and often is best delegated to a trusted strategic advisor with depth of experience in cybersecurity breach prevention and resolution.
  • Next, the goal becomes full-scale protection. From the technical side, this includes setting up firewalls and securing weak points (such as point-of-sale terminals).
  • There needs to be an efficient method for detecting the attack and mitigating any damages. Lastly, to avoid the pitfalls noted above, a predetermined plan to address this worst-case scenario is vital. From reviewing insurance policies to preparing for impending litigation, recovery is a process best started with a go-to advisor before it is needed. 
  • The only way to avoid being another statistic in future Internet crime reports is by staying as ahead of the looming threats as possible.
  •  
    This article talks about how cyber security is very important to the safety of the personal information.
  •  
    Author, Lena Combs, discusses why hospitality has become vulnerable to cyber attack. Ranging from the failure to secure POS systems and credit card data. To hotels' inability to detect and effectively respond to potential cyber threats. Combs outlines the steps involved in implementing a cohesive top- to bottom strategy that will effectively address these dilemmas. More importantly, why doing so protects a hotel's bottom line and brand positioning.
  •  
    The following article highlights the importance of cybersecurity in general and why it is especially important in the hotel industry. This highlights many facets, one being the fact that the hotel industry is one of the most vulnerable to cyber-attacks, therefore, needing to have top-notch cybersecurity.
zihanwang

Data Security in the Hospitality Industry | CSU-Global Blog - 0 views

  • Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there’s a franchisor, an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. In fact, it was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • Well-trained staff also know how to recognize social engineering attempts, and they understand an organization’s compliance requirements. The risk is that the hospitality industry involves a great deal of of seasonal work in which people might move on after only a few months, or they might be transferred.
  • ...14 more annotations...
  • This type of data risk is more subtle, and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests’ data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data.
  • the job turnover rate in hospitality is as high as 90 percent
  • High Staff Turnover
  • From the perspective of cyber criminals, hospitality appears to offer an ideal target for conducting crimes, such as identity theft and credit card fraud, due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • Information security is a pivotal aspect of many industries
  • Complex Ownership Structures
  • Reliance on Paying By Card
  • Here are five of the biggest data security concerns in the hospitality industry:
  • Compliance
  • Insider Threats
  • Best data-protection practices for companies in the hospitality sector include… Always encrypting payment card information.Operating a continuous training program in cybersecurity to maintain a well-trained workforce.Always adhering to relevant regulations, such as PCI DSS.Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats.Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker.Know where your data is and enforce the principle of least privileges to limit acce
  • ss to sensitive information.
  • organizations in the hospitality sector are better placed to implement a comprehensive information security strategy that entails the necessary procedures, processes, and people to improve cybersecurity within the hospitality industry.
  •  
    The article talks about cyber security threats in the hospitality industry. Threats range from high staff turn over so staff isn't trained thoroughly, to insider threats where employees can sell information to third parties, to Cyber-criminals who infect POS systems with credit cards.
  •  
    Data information security is very important to a business development.In my opinion, I think the relationship is inversely proportional. In other words, the more effective cyber security budget is invested, the less potential impact there is of customer information being stolen (being hacked). Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
« First ‹ Previous 121 - 140 of 155 Next ›
Showing 20 items per page