Skip to main content

Home/ Hospitality Technology/ Group items tagged Theft

Rss Feed Group items tagged

rhoff019

Digitizing The Menu: 8 North Broadway Takes The First Step | Rockland County Business J... - 0 views

  • “We see more people ordering a second, and a third glass of wine,”
  • “We’re also seeing a 10% uptick in dessert orders.” Which makes sense – it’s hard to resist a dessert that’s staring back at you from a digital tablet.
  • eMenu International, which manages menus and wine lists in restaurants in 15 countries worldwide, says customers have seen increase in their average check from approximately 3% to 9% since implementing the digital menu to their operations.
  • ...8 more annotations...
  • And a patron is more likely to be drawn into a fuller description of a wine or spirit rather than by a line or two on a menu.
  • Restaurants using the full capacity of e-menus, particularly fast-casual establishments that connect to the POS (point of service) system, enable customers to choose their food and drink, place an order and pay.
  • Restaurants can customize e-menus and updates with a click of a button. Another feature of e-menus are multiple language options. Restaurants with tourists are able to view the menu in their native language.
  • it’s time-effective to put wines and desserts on an e-menu because the selection is changed up less frequently than the food, for example, which can change daily.
  • A restaurant can use e-menus to feature and promote private rooms, catering packages, special events such as sports games, bands and more.
  • Or, the e-menu can be used to promote a sister, or a chain of restaurants.
  • we’ve reconsidered that because the human touch is so important in the dining experience
  • Issues of concern include credit card security. Until and unless the transactions (bill payments) are PCI-DSS complaint, a customer’s credit / debit card data is at stake. A customer drops the tablet on the floor by mistake and the screen breaks. Who fixes it? Or replaces it?  The 8 North Broadway chef says his tablets are guaranteed for wear and tear. And there’s theft.
  •  
    eMenu systems can cause customers to order more when they see images and descriptions on a tablet. There has been an average of a 6% increase in checks in restaurants that utilize digital menus. It can also save the restaurant money to use this system instead of printing new menus. eMenu systems can be customized to promote whatever the restaurant wants to promote. These menus can also be translated so guests can read the menu in their native language, a feature which would be useful in a city such as Miami.
khadija2050

What is an Human Resources Information System (HRIS)? A Full Guide - 1 views

  • used to collect and store data on an organization’s employees.
  • be cloud-based
  • . This means that the software is running outside of the company’s premises, making it much easier to update.
  • ...35 more annotations...
  • these systems are also called Human Capital Management systems, or HCM. In this article, we will use the terms HRIS and HRIS systems interchangeably.
  • keeps track of changes to anything related to employees
  • ability to offer self-service HR to employees and managers.
  • This includes material for the identification for employees in case of theft, fraud, or other misbehaviors, first contact information in case of accidents, citizens identification information for the tax
  • one plac
  • the tracking of data required to advance the HR and business strategy. Depending on the priorities of the organization, different data will be essential to track. This is where the HRIS comes in.
  • Record-keeping
  • time and attendance data from employees
  • Payroll automates the pay process of employee
  • is benefits management
  • This software handles all the company’s recruiting needs. It tracks candidate information and resumes,
  • allows HR to track qualification, certification, and skills of the employees, as well as an outline of available courses for company employees. This module is often referred to as an LMS, or Learning Management System, when it’s a stand-alone
  • talent pipeline and having replacements available
  • having employees and their direct supervisors manage their own data
  • involves the analysis of this data for better-informed decision making. We’ll explain more about this in the section below.
  • databases that record a company’s transactions. An example of a transaction is when an employee joins the company.
  • It includes modules on talent management, workforce rewards, workforce management, and work-life solutions.
  • They simply haven’t been designed for this. In addition, not all HRIS systems have all the above functionalities build-in.
  • as it means that data is dispersed into multiple systems. In order to report data, a new layer needs to be added on top of all HR systems to report and analyze the HR data.
  • These include Workday, Oracle, SAP, ADP, Ceridian, Kronos, and more. Listing all the HRIS suppliers would be impossible, so we decided to explicitly mention the four HCMs that are considered to be leaders.
  • they offer different suites including recruiting, learning, performance management, and an e-learning LMS.
  • Workday is arguably one of the best-known HRIS out there
  • These are systems that keep track of a company’s resources, which include among other things financial assets, orders, and people. In 2011, SAP acquired SuccessFactors,
  • . They are
  • HR, payroll, and talent management. Systems include time and attendance, onboarding, performance management, compensation, succession
  • on-the-job training to HR professionals in the use of the system. This function is usually in the IT arm of the HR department.
  • provides support for the HRIS. This includes researching and resolving HRIS problems and being a liaison with other parts of the business, like finance/payroll.
  • This means improving the employee experience in using the systems, coming up with user-friendly innovations, and implementing new policies to be reflected in the system.
  • IT is useful to understand the intricacies of the system while HRM helps to understand the processes that the HRIS is supporting.
  • the specific demands of the different stakeholders inside the company are inquired about.
  • you choose an implementation partner,
  • Here the functional and technical requirements for infrastructure,
  • a core test team is created.
  • communication plans need to be created, and Frequently Asked Question and other support documents created to benefit the software implementation and uptake.
  • the system can Go-Live. Feedback needs to be constantly collected and training material updated with the evolving systems. Cons
  •  
    the articles gives a detailed definition of the HRIS and the benefits it presents to companies . it also touches on different platforms that companies decide to choose to work on the HRIS.
mattiebell

Hilton Hotels Hit By Payment Malware - 0 views

  • Hilton has revealed that some of its payment systems have been infected with malware that organised the theft of targeted customer informat
  • ion.
  • nfected POS (Point of Sale) systems in hotels.
  • ...6 more annotations...
  • i
  • we identified and eradicated unauthorised malware that targeted payment card information in some point-of-sale systems at our hotels
  • 54 North American locations were compromised by point-of-sale malware
  • hospitality service providers face extraordinary challenges with customer data security at point of sale (POS)
  • often the weak link in the chain and the choice of malware,
  • Encrypting the data in the card reading terminal ahead of the POS eliminates the exposure of live information in vulnerable POS systems
  •  
    This article is about the POS system at Hilton hotels and how it was breached by malware that put consumer data at risk. I found this article interesting because Hilton does not use unattended POS systems, which are what are most commonly targeted in information phishing attacks. This is definitely something that affects all aspects of the hospitality industry, and we know that consumer data is very sensitive. Hotels and other hospitality agencies are trusted to maintain high levels of confidentiality. It would be interesting to see how such a malware would have affected a smaller company with less counterattack resources.
tashaemunnings

Why the Adoption of Biometrics Will Rise - TheStreet - 0 views

  • Biometrics allows for automated check-in and re-check-in at any venue
  • The adoption of using consumer fingerprints or their faces instead of tickets comes with its risks.
  • "Biometrics is a double-edged sword when it comes to security," he said. "On the one hand, it’s a better and more reliable way to secure your identity or account, rather than having to remember a password and passwords get hacked all the time. Even two-factor authentication is proving to be much more vulnerable than many people thought."
  • ...7 more annotations...
  • Another concern is that biometrics could also contain information about your health and genetics.
  • "The good news is that biometric data theft still has only a limited real-world potential, since it’s not easy to spoof somebody’s biometrics, although it is possible
  • comes
  • Several hospitality venues have already started using facial recognition, including cruise ships
  • Some cruise ships take a photo of passengers at embarkation and that data is used from contact tracing to selling consumers photos they appear in and ensuring everyone disembarks at the end of the journey.
  • "Hotels likewise have experimented, with Marriott planning to eventually use facial recognition across all their properties."
  • "This is easier and more cost effective than other forms of authentication, it allows for greater efficiencies and it’s better at preventing fraud,
  •  
    Using biometrics to allow people access to events and keep track of their whereabouts is becoming more and more common across several industries including hospitality. Although seemingly helpful and more efficient that regular tickets or keys, there also seem to be concerns about the security. However, many believe that although these concerns exist, the use of biometrics is one of the safest verification routes currently.
ryanbonifas

Video surveillance helps secure World Poker Tour tournament | Security Magazine - 0 views

  • Video surveillance helps secure World Poker Tour tournament
  • The casino needed to have comprehensive coverage to enhance both event security and the safety of VIP guests; secure premises and protect against fraud and theft; and fulfill legal requirements set by local regulators.
  • To improve video coverage of gaming tables and the casino floor, security engineers from Volga Elektronik installed IDIS 5MP dome cameras and the IDIS Solution Suite (ISS) video management system (VMS). The expanded surveillance system helps operators detect, verify, analyze and rapidly respond to security and safety events and meet the requirements of regulatory gaming integrity.
  • ...1 more annotation...
  • "Our security team can quickly and efficiently respond to incidents and resolve disputes to reduce table stoppages. The result is an enhanced patron experience that builds on our reputation as one of Europe's top gaming destinations."
  •  
    Poker and casino type events are a great target for crime. As the need to secure not only the safety of guests grow, but the protection of a venue and its assets, venues like the Merit Royal Hotel and Casino are constantly upping their game to ensure venue and life safety.
carine_elie

How Much Should You Spend on Cybersecurity in 2022? by Lynn Goodendorf Spring 2022 - 0 views

  • Many hospitality companies are struggling with the question of how much to spend on cybersecurity especially in the context of revenue losses related to the pandemic.  The challenge is that the risk of cyberattacks is rapidly escalating.  There are several drivers of this alarming trend.  First, ransomware is growing in severity both in the scope and the scale of attacks as well as the amount of the ransom demand. Next is the increase in remote work during the global pandemic and the rush to facilitate at home working. And finally, small companies are increasingly targeted because they are “easy” victims and typically more vulnerable. As you might expect, the cost of cybercrime increased more than 50% from 2019 through 2020. According to a report by McAfee¹, the global cost is estimated to be more than $1 trillion and monetary losses are estimated at $945 billion.  Examples of hidden or intangible costs that are difficult to measure include system downtime, reduced efficiency, brand damage and loss of trust.  Expenses that are direct and easier to measure are consultant services, legal fees and cyber risk insurance premiums. Below is a chart published in the McAfee report that illustrates this trend.
  • Ransomware - a Denial of Service/Operations and often includes a data breach Business Email Compromise (BEC) - often involves Funds Transfer Fraud Computer Data Breach - theft of personal data such as cardholder data, social security numbers, driver’s license numbers, passport numbers and details, etc.   What is the best way to go about budgeting for cyber security risk?  As a starting point, be sure that you have a qualified information security professional managing your program of work. Regardless of the amount you spend, a knowledgeable and experienced cybersecurity professional can make well informed judgments about priorities in expenditures.   There are three well established strategies that can work together in combination.   Each strategy has advantages and drawbacks and it is not recommended to rely on a single approach. Below is a description of each way to go forward.
  • STRATEGY A:  Key Ratios of Spend
  • ...2 more annotations...
  • STRATEGY B:  Gap assessment
  • STRATEGY C:  Focus on Compliance
  •  
    The writer of this article is Hospitality Upgrade. It includes the expanding worries of the hotel sector.  The key ratio of spend, gap analysis, and a focus on compliance are the top three main strategies being used by the hotel sector. In addition, the other measures are made by businesses to aid in preventing such breaches and the financial repercussions that result from them.
llibe010

The Top Five Cyberthreats Hotel Brands and Franchisees Need to Know About | Netsurion - 0 views

  • ay for guests, it also opens hotels to digital threats perpetrated by malicious actors. Consequently, hotel operators should be aware of the types of cyber attacks, which can significantly hurt their brand reputation and bottom line, not to mention the safety and welfare of employees and guests.
  • In January, for example, cyber criminals took over a luxurious Austrian hotel’s computer-controlled key-card system, locking 180 guests out of their rooms until hotel managers paid a nominal ransom
  • A ransomware attack may disable or alter performance of hotels’ computer-driven systems such as air conditioning and lighting, putting guests’ comfort and, worse yet, safety at risk. In addition, booking systems are extremely vulnerable to ransomware attacks because they process information belonging to the hotels, third-party applications and their customers.
  • ...18 more annotations...
  • 1. Ransomware:
  • hey present further ransomware opportunities to hackers by using computers to automate functions.
  • distributed denial of service, or DDoS
  • One of the largest data breaches in history was conducted through a third-party vendor when hackers stole data from 70 million credit cards by gaining access to a mega-retailer’s network through credentials belonging to an HVAC contractor.
  • 3. Phishing scam targeting customers and hotels:
  • 4. DDoS attacks on the hotel network:
  • 2. Remote hacking through third-party vendors:
  • 5. Theft of personal information over public Wi-Fi.
  • Statistics indicate that such incidents will become more frequent, so it is not a matter of if but when the next cyber attack will occur.
  • Integrate a managed SIEM. Hotels should bring on a managed security information and event management (SIEM) platform for their remote locations to be warned right away of cyber attacks. They may also want it for inside the perimeter if they lack the expertise and resources to properly use SIEM internally.
  • Maintain PCI compliance. The Payment Card Industry Security Standards Council (PCI SSC) has put forth a set of stipulations, the Payment Card Industry Data Security Standard (PCI DSS), in response to rapid PCI expansion. Hotels should make sure they are compliant with these regulations, which require businesses to send credit-card information in a secure environment, to prevent paying heavy fines and losing data, revenue, and customer trust.
  • Install antivirus on all devices. Hotels should ensure they have reliable anti-virus and anti-malware software installe
  • Train employees. Hotels should train employees to not open suspicious emails or links inside them as they may contain malware.
  • According to the FBI, the number of cyber threat occurrences quadrupled to 4,000 per day last year from 1,000 per day in 2015
  • In addition, there are large volumes of payment card transactions between restaurants, on-site shops, spas, parking, and the front-desk, ensuring there is plenty of customer data for a hacker to compromise.
  • The number of cybersecurity incidents worldwide increased 38 percent in 2015 from 2014, according to the Global State of Information Security Survey 2016 by PwC, CIO, and CSO.
  • Hotels are especially vulnerable to this type of attack where a type of malware disrupts access to a system until a ransom is paid. This is because they often use integrated POS systems
  • Hackers can break into hotels’ payment systems through a remote access point belonging to one of its vendors, so they should closely monitor third-party access to their networks
  •  
    This article outlines some of the main cyber attacks on the Hospitality industry. It exposes the threats due to the wealth of data stored in PMS, POS and CRM and suggests steps to take to protect against malware and randsomeware. The article further highlights the necessity for antivirus software on all devices.
  •  
    The article describes the five most common cybersecurity risks for hotel brands such as ransomware, remote hacking and DDoS attacks. The operational elements of each risk have also been discussed. It also covers best practices that hotels and other hospitality organizations can adopt to curb breaches.
cborregomarsh

Cloud Computing Continues to Transform Hospitality - RTInsights - 1 views

  • Just like databases in the early 90s allowed hotels to manage large numbers of reservations and requests efficiently, cloud solutions offer the chance to remove common frustrations and frictions across the entire ecosystem.
  • Reduce cost: Cloud services allow hospitality industries to pay only for the services they need. Cloud computing also puts smart building management into reality, as well as facilitating projects and maintenance.
  • Improve experiences: Cloud services also provide flexibility in services by allowing staff to operate from anywhere, as an example. Guests also receive the same flexibility to manage their needs from anywhere.
  • ...46 more annotations...
  • Build responsive infrastructure:
  • Cloud Security
  • Cloud reliability The hospitality industry wants to know that they aren’t adopting another solution that will prove obsolete in just a few years.
  • Even if it’s no fault of the establishment, customers will remember frustration reconciling a bill or having to wait a long time for check-in. The cloud adds a layer of protection against minor hiccups in their experience.
  • Personalize guest offers: Captured data offers a wealth of information. Cloud computing helps hoteliers and other hospitality organizations provide customized experiences and responsive, convenient services.
  • Cloud computing can offer a seamless experience to customers while reducing obstacles to service from the staff side.
  • The Airline was able to improve customer service by providing an instant response to various customer requests and reducing wait times.
  • Pre-arrival: Cloud services capture data from the moment guests first interact with the company or service. The hotel, for example, can make a note of what services or rooms the customer looked at and offer suggestions for upgrades.
  • Arrival: When guests arrive, their information is saved and ready for each member of staff. This offers personalization right from the beginning.
  • The stay: Knowledge of previous stays provides insight into customer preferences. A hotel may address mistakes right from the beginning or identify missed opportunities. Personalization continues with upsell offers that happen as the customer continues to interact with the business.
  • Departure: Not only does the cloud enable a frictionless checkout experience with no surprises, but it can also follow up afterward to continue to nurture relationships and reward loyalty.
  • Preparation: Following guest stays, businesses can enable targeted follow-up. Cloud computing can also handle things like predictive maintenance to reduce downtime, especially during peak seasons.
  • The Hilton made use of cloud computing to monitor all locks within its properties.
  • It’s only one instance of the Hilton’s shift to cloud computing. It has digitized rooms and created a type of mission control for everything from entertainment to ordering room service.
  • Cloud services can offer the full security expertise with automatic updates that the hospitality industry needs to keep information secure.
  • The cloud provides a real end-to-end solution for hospitality that brings back the excitement of travel. In an industry facing stiff competition, this type of solution could be a differentiator for success.
  • Companies can choose a provider familiar with the nuances required for hospitality excellence and reap the benefits of an end-to-end experience.
  • Cloud services allow hospitality industries to pay only for the services they need.
  • Cloud services also provide flexibility in services by allowing staff to operate from anywhere
  • Moving to cloud operations also allows the hospitality industry to scale.
  • In that case, cloud services allow a smooth transition with a central line of communication.
  • Cloud computing helps hoteliers and other hospitality organizations provide customized experiences and responsive, convenient services.
  • cloud solutions offer the chance to remove common frustrations and frictions across the entire ecosystem.
  • rigidity causes issues in connectivity and service. When the internet goes out, or a system goes down, operations cease.
  • Staff can work from anywhere, change devices if necessary, and mitigate the risk of lost or unsecured information.
  • The Hilton’s Room Lock Problem
  • The American Airlines Integration Challenge
  • The space continues to evolve, offering new ways to ingest, process, and protect customer data. And it’s this free flow of data that will allow the hospitality industry to move into the new era of the industry.
  • Use of cloud computing in hospitality continues to evolve, offering ne
  • w ways to ingest, process, and protect customer data.
  • cloud solutions offer the chance to remove common frustrations and frictions across the entire ecosystem.
  • Cloud services also provide flexibility
  • Cloud services allow hospitality industries to pay only for the services they need.
  • operate from anywhere,
  • cloud services allow a smooth transition with a central line of communication.
  • provide customized experiences
  • Staff can work from anywhere
  • he cloud adds a layer of protection against minor hiccups in their experience.
  • security is built-in.
  • Cloud computing can offer a seamless experience to customers while reducing obstacles to service from the staff side.
  • personalization right from the beginning.
  • address mistakes right from the beginning or identify missed opportunities. Personalization continues with upsell
  • handle things like predictive maintenance to reduce downtime
  • this type of solution could be a differentiator for success.
  • It has digitized rooms and created a type of mission control for everything from entertainment to ordering room service.
  • reducing wait times.
  •  
    Cloud computing has come a long way. The hospitality industry is quickly incorporating cloud computing services for guest satisfaction and productivity of employees. The article shares several real life examples where cloud computing were beneficial.
  • ...2 more comments...
  •  
    As we know, cloud computing is becoming the new norm and is the future for technology but is also transforming the hospitality and tourism industry. Cloud computing allows the hospitality industry to improve travel experiences, provide personalized offers, and also helps the industry reduce cost. With so many advantages, there are some cons of cloud computing that may pose as an issue such as the security and reliability that comes with using cloud computing. However, the pros outweigh the cons and if cloud services can overcome those barriers, the hospitality industry will reach new heights not seen in previous years. With the implementation of cloud computing in the hospitality industry, it will provide a travel experience like no other from start to finish, literally.
  •  
    This article discusses the impact that the integration of cloud computing has had on the operations and growth of the hospitality industry as a whole. Companies are optimizing their usage to help them carry out daily tasks while using data and sharing to provide the best guest experience possible. The article also goes into detail regarding the steps being taken by companies to prevent data theft and downtimes. One aspect of the post that I found to be extremely interesting was how it walked me through the integration of cloud computing in every step of guests' stay from pre-arrival to departure.
  •  
    Cloud computing is the future whether businesses want it to be or not. With the growth of technology, we need to embrace one tool that is become very developed, cloud computing. It gives more efficiency to businesses who need to know more about their clientele and also can provide information and data that humans could never do. It gives a more personalized experience to each guest while organizing data much faster than on a excel sheet that stuff have to manually update. It improves experience and reduced cost for business as well. It allows information to be reached anywhere and business can be taken home or traveled with. It brings a new level of security to businesses and customers and allows more flexibility in service in the hospitality industry.
  •  
    Cloud computing transforms hospitality by a offering seamless experience to customers while reducing obstacles to service from the staff side. It also offers individualized, quick solutions in an industry that is highly competitive.
mmdmd99999

Credit Card Fraud 2021 Annual Report: Prevalence, Awareness, and Prevention - Security.org - 0 views

  • Nearly half of all American adults have had a fraudulent charge on their credit or debit cards, amounting to around 127 million people. More than one in three credit or debit card holders has experienced card fraud more than once. The median charge was $62, equating to approximately $8 billion in attempted fraudulent charges on Americans’ credit and debit cards. Almost 40 percent of card holders do not have email or text alerts from their credit card company or bank enabled. Around 81 percent of victims without these notifications had to take additional action to reverse fraudulent charges, compared to just 19 percent of those with alerts enabled.
  • Unfortunately, credit card fraud has also become even more common since the start of the pandemic. Reports of credit card fraud increased by 44 percent between 2019 and 2020 according to the Federal Trade Commission (FTC).3 The FTC also estimated that there has been $38 million dollars in reported credit card fraud tied directly to COVID-19.4
  • Nearly 60 percent of credit card holders reported they’d had an unauthorized transaction appear on a credit or debit account at some point in their lives.
  • ...1 more annotation...
  • According to our research, almost 70 percent of fraud victims noted their most recent fraudulent charge within hours of its occurrence. Today, most banks and credit card companies have systems that can detect suspicious charges and alert account holders of potential fraud before transactions are processed. Around 61 percent of credit and debit card holders in our study had enabled email or text alerts from their card servicers that would help them act quickly on fraud attempts. These individuals were more likely to block transactions before money was taken from their accounts.
  •  
    Statistics on credit card fraud to support why PCI compliance is important to protect consumers
melnetra112

Why Hoteliers May Want to Step Up Their Game on Security Technology | - 0 views

  • Why Hoteliers May Want to Step Up Their Game on Security Technology
  • Within the hospitality industry, we are all quite aware that Covid continues to spook people all over the world, which will lead to depressed overall travel numbers for quite some time to come. Add to that the various automated systems that together mean hotels may never need to hire back a large portion of their former employees
  • Problems may come about in the form of snatched purses from restaurant tables, missing bags left at the bell desk or minor vandalism of cars left by the front entrance.
  • ...7 more annotations...
  • As we’ve all now promised heightened guest safety in the wake of this rampant virus, so too must we protect our visitors and their belongings during any subsequent increases in criminality. Anything stolen will not only leave guests heartbroken, but this will also reflect quite poorly on the property
  • Beyond retaining a strong security department, much of the contactless technology that hotels have set up in the past months can luckily pull double duty to help prevent theft or other transgressions.
  • Nevertheless, an absence of human eyeballs should be another reason to emphasize touchless technologies including mobile keycards, online payment platforms and elevator floor access systems.
  • Elevator floor access restrictions are often only deployed at night, but these should now be set up for all times of day while also considering elevator cameras
  • The technology underpinning self check-in and mobile key cards can also be used to grant or deny access to other areas on property
  • Even niche operations like poolside or oceanside lounge chairs can be put through an online booking portal to better inhibit unauthorized visitors
  • While cyber threats may still have a much bigger financial impact on hotel companies than any misconduct on a more personal level, it still doesn’t hurt to look at how all the new hardware and software your property has set up to combat Covid might also be redeployed for other safety purposes.
  •  
    To Sum the article, Hoteliers consider high-tech security technology since the outbreak of the coronavirus and the safety of residents in hotel. In order for hotel to prevent the virus from spreading they'll consider limiting who has access to the facility. Another, to prevent criminal activity to take place within hotels by granting access to person who notify resident who stays and to be buzz in, contactless on key card and more.
pjohn091

The Property Management System (PMS) of the future is already here | By Max Starkov - 0 views

  • The traditional, legacy PMS is an on-premises software platform with features and functionality ranging from barebones to rich and very complex. These legacy platforms have a number of serious disadvantages: a) too expensive to install, train staff and maintain, b) their "all-in-one solution approach" stifles innovation and prevent quick adoption of new functionality needed to meet new guest requirements or sudden changes in the market conditions, like the contactless experience from last year, and c) as closed systems they are reluctant to open up to third-party integrations, applications and solutions, depriving the property and its guests from some very innovative and much-needed applications and services.
  • Some of the benefits of the cloud PMS are significant and timely: No upfront costs - its pay-per-use model makes it an operating expense (OpEx), which helps the constricted cash flow Easy to install, train staff and use which increases staff productivity Automation of many administrative tasks, saving the property team time and effort AI driven workflows and database management and intelligence Automatic software upgrades with minimum downtime and no extra cost No need for on-property IT support, which is getting quite unattainable in the post-crisis era Complete automation of redundant processes and tasks, allowing the property to operate with leaner staff The ever-changing data security requirements are handled by professional data security engineers at the cloud PMS vendor Provides guests with contactless guest experience and mobility. Upgrade and up-sell capabilities or easy integration with an upsells vendor, important in this depressed revenue environment Easy access to reporting and performance analytics from any device anywhere. Most importantly, an Open API for seamless, fast and free or low-cost connectivity with the myriad innovative third-party vendors out there. Ex. Oracle's legacy OPERA PMS has 400 API capabilities vs the OPERA Cloud PMS with 3,000 API capabilities.
  • he three main advantages of the OPERTA Cloud PMS over the legacy PMS:
  • ...14 more annotations...
  • Ability to achieve more with fewer resources,
  • Security of data
  • Ability to be agile, adapt and evolve
  • the three key advantages of the cloud PMS over the legacy PMS:
  • Flexibility:
  • According to Laura Calin from Oracle Hospitality, switching from a legacy to a cloud PMS has occurred traditionally when a) on-premises hardware reaches end-of-life and warranties are expiring, or b) when a brand affiliation comes to an end and a replacement system is required.
  • Connectivity:
  • I believe over the next 5 years the adoption of cloud PMS solutions will explode and this will be the highest growth component of the hotel tech stack
  • Why? Low costs, efficiencies, higher productivity and data security aside, in the near and mid-term a full-service 3-4-5-star hotel will need over 100 plus APIs with third-party tech applications and solutions to be able to function and meet the basic needs and wants of today's digitally-savvy travelers.
  • Ease and efficiency:
  • (PMS) is the hotel 's command center for rooms and F&B management, sales and catering, distribution, availability, pricing, reservations, guest interactions, issue resolution, housekeeping, reporting, billing, guest communications, etc. and is often described as "the central nervous system of the hotel operations."
  • Luckily for our industry, the future is already here in the form of a cloud PMS with Open API (application programming interface) integration platform, just on time in this most challenging era in our industry.
  • the three key advantages of the cloud PMS over the legacy PMS:
  • Ever since the emergence of the cloud-first PMS platforms like Cloudbeds and Mews, there has been a monumental shift in the PMS vendor community's mindset: from closed system mentality to cloud PMS with Open API mentality. At Oracle Hospitality, with the adoption of the Oracle's self-service cloud technology tools, the OPERA Cloud PMS with Open API has become the most important innovation strategy
  •  
    This article deals with cloud PMS and its advantages. Some of the advantages stated by the article are efficiency, low cost, and provides guest with more contactless experience. This is a new trend we are starting to see emerge into the industry especially now more than ever after the events that have occurred due to the pandemic.
  •  
    Seems to me this took a lot longer for companies to start getting onboard then I would have anticipated. The cost perspective and ease of use should have attracted people right away. Not having to house or protect on site servers from damage and theft is also a critical point. Not to mention the ability to grow the system when necessary.
  •  
    The article discusses traditional PMS, an on-premises software platform that can range from very basic to extremely powerful and complex. Installation, training and maintenance are expensive for such platforms, and they stifle innovation by not allowing third-party integrations, applications, and solutions. Cloud-based hotel management systems with Open API integration platforms are the future of hotel management software. They are cost-effective and offer many operational benefits. Operating expenses such as the OPERA Cloud PMS improve cash flow, are easy to install, train personnel, and automate many administrative processes. Also, it provides easy access to reporting and performance analytics, as well as contactless guest experiences and mobility.
cdamo003

Biometric Technologies as the Future of Hospitality - Intellectsoft Blog - 0 views

  • With the adoption of biometrics like fingerprints, face or iris scanning, or even voice recognition, biometrics have the potential to revolutionize the hospitality industry
  • Biometric technologies are solutions that are commonly used to identify a person based on some aspect, namely, a person’s unique physical or behavioral characteristics.
  • There are two types of biometrics used to recognize a person. The first type is biometrics based on physiological characteristics. The second is behavioral biometrics. Physiological identifiers include the following:
  • ...7 more annotations...
  • If your hotel has a lot of security measures, guests may not like it and they may never come back. If, on the contrary, security measures are weak, this can lead to theft or something else.
  • One of the ways to use biometrics in hotels and other establishments in this domain is to implement registration using fingerprint or face recognition
  • The first is that locals can register by scanning their faces through a mobile app. Another option is for foreigners who can check in by scanning their faces through vending machines located throughout the hotel lobby
  • In the same way, hotel staff control guest access to different parts of the hotel, for example by requiring a finger scan to access the pool.Another way to use biometrics in hotels is to avoid key cards that allow guests to enter their rooms. Instead, a person just needs to scan their fingerprint, which greatly simplifies the system.
  • as the fingerprint will become the only key to all areas of the hotel, which greatly facilitates the work of technical staff and saves the hotel from unnecessary problems with visitors.You can also monitor in real-time the access of staff to restricted areas of the hotel, such as guest rooms, washing rooms, etc. You can track which room a particular hotel employee has entered, thereby roughly understand their location.
  • According to one study, 41% of hotel visitors visited the hotel more often and stayed in only one hotel if an employee could recognize them without giving their name. In another survey, 62% of hotel guests believe that such actions by staff will greatly improve their experience of the hotel.
  • For example, a guest arriving at a hotel scans a fingerprint at the front desk, after which the concierge will immediately receive all of his personal information, room, and service preferences, to make his stay at the hotel as pleasant as possible.
  •  
    The use of biometrics in the hospitality industry is becoming more common. Through physiological characteristics such as fingerprints, face scanning or voice recognition, guests can access hotel rooms without the need of room keys. Employees would have control over guest access and be able to easily recognize guests after scanning in.
  •  
    This article discusses how biometrics is reshaping the hotel experience. From check in from the way we make purchases and enter different areas of the hotel. This feature is also able to enhance security and take away the old issue of lost keys. Many hotels are already implementing this feature and this is a great way to increase security measures.
rosedelice

Why Is Hotel Security Important? - American Protection Group - 0 views

  • Hotels are part of the hospitality industry, where providing good customer service is essential. A hotel’s reputation is staked largely on the guest experience, and investing in proper security services plays a central role in ensuring guests feel safe and protected. It also protects owners from the damages and costs that may arise from criminal activity such as theft.
  • Security officers patrolling the hotel’s grounds can look out for suspicious activity. Hotels should have security officers regularly patrol the hallways, stairwells, lobbies, parking lots, restaurants and bars.
  • Security officers can handle unruly guests or visitors and prevent negative situations from spiraling out of control. Officers can also provide additional protection to VIP or controversial guests of the hotel that might attract public attention or protests.
  • ...4 more annotations...
  • Security officers can prevent hotels from incurring property damage, particularly if officers are patrolling the hotel’s grounds. They can also assist in incidents involving guests damaging their rooms.
  • In addition, the presence of security officers at a hotel can make guests and employees feel safer and more at ease. Many hotel guests are in an unfamiliar location, and this sense of security can increase their satisfaction with the hotel.
  • Security officers on the premises of a hotel can react appropriately and rapidly when emergencies occur. In the case of a fire, they can help evacuate guests and maintain order. In a shooting or other act of violence, they can stop the perpetrator and protect guests and staff from danger. They can also provide valuable assistance and information to law enforcement when they arrive on the scene.
  • Hotel guests may occasionally become unruly or intoxicated, particularly in hotels with bars. Security officers follow hotel policy for dealing with these guests by escorting them either off of the premises or to a taxi, or detaining them for the police as appropriate. They can also escort trespassers and loiterers off the premises. In addition, security officers can safely help staff and guests to their vehicles upon request if they feel unsafe.
  •  
    It is very important for hotels to provide excellent security. It makes the customers feel safe and enhance their confidence and safety.Security officers patrolling the hotel's grounds can look out for suspicious activity.Security officers can prevent hotels from incurring property damage, particularly if officers are patrolling the hotel's grounds. They can also assist in incidents involving guests damaging their rooms.
avanzado

Hotel Safety: Security for Hospitality and Hotel Management Companies | By Kacey Bradley - 1 views

  • improved software allows hotel owners to match up specific transactions with the surveillance footage,
  • IT and security departments should work in conjunction
  • Offering employees profit-sharing, a stake in the hotel's future is an effective way to improve security.
  • ...8 more annotations...
  • Mobile keys, on the other hand, strengthen security and allow guests to bypass the front desk altogether.
  • Most commercial properties have some type of video surveillance system.
  • Profit-sharing gives employees room to grow in a chaotic industry. Most profits come in the form of an end-of-year bonus people can use to their hearts' desire. Beyond increased loyalty, employees with profit-sharing options are more likely to take ownership of their role in the business and improve productivity.
  • Your Wi-Fi should be a secure network users must log in to before using. Make the username and password easy to find. Also, alert guests about possible security risks, such as connecting to public Wi-Fi networks nearby that don't require a password.
  • A straightforward update is an in-room safe. It's easy to come up with relevant items to stash inside, especially when traveling. Guests can stow essential documents, passports, collectible coins, souvenir gifts and more.
  • A safe and secure environment all starts with knowledgeable staff. Set up regular meetings with all employees to talk about guest safety. Go over OSHA requirements and how the team can stay safe in the event of fire and evacuation. You should also provide training on compliance regulations and bloodborne pathogens.
  • In today's technologically advanced world, guest and staff security are more critical than ever. Luckily, you can take plenty of steps to make improvements. From smart surveillance technology to secure Wi-Fi networks, read the advice below to improve your hotel's setup.
  • In today's technologically advanced world, guest and staff security are more critical than ever. Luckily, you can take plenty of steps to make improvements. From smart surveillance technology to secure Wi-Fi networks, read the advice below to improve your hotel's setup.
  •  
    This article basically gives tips about how to create a safe hotel. There are many ways you can ensure that your staff and hotel guests are protected.
  • ...2 more comments...
  •  
    Among other ways that hotels in the modern are using to ensure safety and security, the article looks at cybersecurity. The author proposes that hotels' security and IT departments should work together to create a safe online environment that "prevents unwanted third parties, like hackers, from intercepting private guest data." This reiterates the significance of updating computer equipment to mitigate potential threats.
  •  
    This is a great article that explains the different ways hotels are trying to make staying at a hotel safer. They start by explaining how they have surveillance cameras placed around the hotel to help them see everything that is happening all at once. Cybersecurity protects the hotels computer systems from being hacked and having people steal all the hotels and customers information. Mobile room keys helps guests find their keys faster because they will now have it on their mobile devices. For hotels the guests safety are their top priority and they train their staff to believe in the same thing.
  •  
    This article is about steps a property can take in order to ensure the safety of their employees and guests. This includes: surveillance cameras, cybersecurity, mobile room keys, safes in rooms, among other things. - Be sure to invest in high-quality cameras that can pick up the little details, such as facial features and bill amounts. - Your Wi-Fi should be a secure network users must log in to before using. Make the username and password easy to find. - Mobile keys strengthen security and allow guests to bypass the front desk altogether. -Set up regular meetings with all employees to talk about guest safety. -In terms of profit-sharing, workers feel a sense of pride or ownership, they will keep their eyes and ears open for signs of waste, fraud or theft.
  •  
    This article talks about hotel's safety and the usage of surveillance cameras, cybersecruity, mobile room keys, guest safety, staff training, and profit sharing. Each section talks about the procedures that should be taken to keep guest and staff safe.
jsanc478

Why hotels need strong security for contactless check-in | Hotel Management - 2 views

  • Contactless check-ins have become an important option, allowing guests to bypass the usual check-in at the front desk and access their reserved room using their mobile device.
    • jsanc478
       
      This article talk about how the pandemic change the way hotels will operated now on for a better customer service with their guest as check ins and other updates. One ofd the principle changes will be, mobilize check in. Having the guest check in with the phone and how safe that can be for the guest. There is always fraud around that hack information on business likes this, but how hotels can protect this type of fraud, by linking digital room keys to theirs guest's mobile devices.
  • Some hotels are also allowing their guests to use their mobile devices as digital keys
  • Concerns about this type of fraud are legitimate. Yet, if hotel operators adopt a multilayered approach, it will be more difficult for fraudsters to ply their trade.
  • ...7 more annotations...
  • However, it is also an appealing avenue of potential fraud for hackers because mobile devices are one of the most common targets for identity theft
  • Limiting contactless check-in options only to certain guests,
  • Linking digital room keys to their guests’ mobile devices themselves, rather than to their guests’ phone numbers, ensures the hotel operators are communicating directly
  • Having a multifactor authentication process established for new guests or those guests who are showing a different behavior pattern than in the past
  • Implementing a notification system i
  • Developing rules around certain reservation dollar amounts
  • Every hotel operator will have to design these options based upon the needs of their hotels.
  •  
    More hotels are now using contactless check-ins by allowing the guest to be able to use their mobile devices as their digital room key. This is great for the pandemic to social distance but potentially risky due to hackers. As long as hotel operators adopt multilayer security strategies then they can provide a safe and secure environment for everyone.
« First ‹ Previous 141 - 155 of 155
Showing 20 items per page