Skip to main content

Home/ Hospitality Technology/ Group items tagged bank

Rss Feed Group items tagged

15More

Could wristbands turn festivals into games? - BBC News - 0 views

  • Wristbands have long been synonymous with music festivals, but what was once a simple, colourful loop of material now increasingly contains contactless technology. This allows music fans to pay for food, drinks or merchandise but festival directors are now taking the technology further, into the realm of "gameification".
  • Festival director Ben Robinson says it will allow visitors to check-in at stages, talks and stalls, creating a "mission log" they will be sent after the event, listing what they saw and giving further information.
  • Ultimately, he hopes to turn festivals into immersive gaming sites - something akin to Pokemon Go - where, alongside enjoying the festival site, visitors can unlock exclusive rewards. This might include entry to a restricted area for visiting a number of check-in points or free dishes if enough food is purchased.
  • ...11 more annotations...
  • linking the wristbands to interactive apps and existing technologies, such as augmented reality, to give attendees something beyond the usual festival experience.
  • which is also used in contactless bank card payments,
  • The danger is that you get analysis that tells you 80% of your audience went to see Band X so you should book loads of bands that sound like Band X," he says
  • data can stop exposing you to that thrill of hearing something new and different."
  • "It's simply a device that will tell us how many people bought how many beers and at what time and such like [which is] data that a standard EPOS (electronic point of sale) system would track."
  • and experts also question the security of the system.
  • so somebody could duplicate it - and as it's contactless, you only need to be within a certain proximity.
  • "Also, the visitors are potentially being profiled and this is viewed by the security community as an invasion of privacy."
  • The system they are using provides only "blind data", he says, which means there is "no GPRS [and] no tracking"
  • "That is where people load money on that they never end up redeeming. Most retailers view this as an excellent stream of effectively free money... but it is scamming the punters who are already paying an on-site premium."
  • He says they use "a global encryption standard used by the military... that has only ever been hacked or cloned in a theoretical situation, never in real life" and only use any data collected for "assisting visitors with customer service enquiries".
  •  
    This article explains how music festivals are innovating their use of the RFID bracelets to create a more immersive guest experience. These bands, on top of being used as a cashless payment system, entry pass, and VIP entrance, festivals are now looking to use these bands to in creative ways including linking them to apps and augmented realty technologies to "gameify" the experience. Possibilities include having check- in sites to collect points for real- life prizes, allowing entrance to specialized areas, and creating mission logs so guests can remember their experience.
6More

The disruptive mobile wallet in the hospitality industry: An extended mobile technology... - 2 views

  • A self-administered questionnaire was utilised to collect data from mobile wallet users who have used a mobile wallet while dining out in restaurants and cafes. Other than technology self-efficacy and perceived critical mass, mobile usefulness, mobile ease of use, mobile self-efficacy, and perceived enjoyment were discovered to have a positive and significant association with the behavioural intention to adopt mobile wallet in the hospitality industry.
  • M-wallet is a service that enables users to store their debit or credit card information, pay for goods and services, and request/send money from/to their contacts [5]. Just like a physical wallet, a m-wallet can store credit card numbers, electronic cash, owner identity, information of contact, billing or shipping details and other information [6]. As the popularity of m-devices continues to increase, m-wallet is expected to be a prevalent payment method in the future for various financial transactions [4].
  • The Central Bank of Malaysia has been continuing its efforts to accelerate the promotion of m-wallet adoption and use [9]. M-wallet is expected to play a pivotal role in catalysing new consumer behaviours that move users away from cash and towards electronic transactions.
  • ...2 more annotations...
  • In particular, 93% of Malaysians still prefer to pay cash when dining out [10]. In other words, the utilisation of m-wallet is only at a maximum of 7% in this context.
  • Also, owing to the COVID-19 pandemic that demands everyone to practice a “new normal”, m-wallet is encouraged over cash in making payments to avoid infection [27,28].
  •  
    This article goes into depth directly within the Malaysian hospitality industry, of using mobile wallet specifically in restaurants. The Malaysian country wants to to only use mobile wallet however the citizens are mostly cash users. Mobile wallet or M-wallet is used on our telephones that hold our credit/debit card information and have the ability to pay services, people and more. It can be used in stores, restaurants, online and through applications. Malaysia would like to shed light on the m-wallet for their country to shift to a cashless society. As Covid-19 is a way for the m-wallet to be more seen and used to prevent cash exchanges therefore preventing spreading germs. It then goes into the theories and hypothesis of m-wallet as a whole; the technology used. There was a total of 450 questionnaires and 413 responses for the data in whether using mobile wallet was efficient and the level of difficulty it holds. While in this day and age we all have the ability to use mobile wallet. I believe this change in Malaysia will attract tourism from Americans being able to use m-wallet. This will then limit the currency change and we will be able to use our phones for payments without having to exchange money and being able to be as contact-less as possible. Now, while I do not know what the effects of Covid-19 have been in Malaysia, if the mobile wallet is now their everyday use. I hope that their shift has started to work and is making progress.
14More

7 Tech and Travel Trends That Will Shape the Hotel Industry in 2023 | By Nicole Dehler - 0 views

  • Rising energy costs and persistent inflation will continue to affect guests and hotels alike
  • Many hoteliers are turning to technology to ameliorate some of these pressures. Native-cloud-based PMS platforms, for example, can deliver more power and reliability than traditional on-site PMS platforms
  • 87% of hotels are experiencing a staffing shortage
  • ...10 more annotations...
  • Many hoteliers are turning to technology to add flexibility in hiring, make up for staffing shortages
  • Mobile and kiosk-based self-check-in can be deployed to deliver a convenient and personalized welcome experience with only a skeleton front desk staff
  • Similarly, mobile automation can complete a number of time-consuming administrative tasks, while mobile communication can streamline communication between the front and back-of-the-house, by instantly alerting employees when a room is ready or out of order
  • 2023 will continue to see the rise of blended travel models such as bleisure travel, remote working and digital nomads
  • Investing in a PMS that includes the options for hourly or day-use rates allows a hotel to cater to busy airport travelers, or remote workers
  • Leveraging mobile and kiosk-based check-in and mobile Point-of-Sale (PoS) systems allow hotels to deemphasize the front desk, and transform the lobby into a more communal space for dining, co-working, and socializing.
  • With almost two-thirds of internet traffic originating from mobile devices, hoteliers would be well advised to select a booking engine that is fully optimized for mobile
  • According to McKinsey, 82% of Americans are using some type of digital payments
  • Hotels have taken notice, and have deployed comprehensive payment facilitation platforms that can deliver a secure and seamless payment experience for guests while preserving the mobile-first nature of their stay
  • Savvy hoteliers will leverage an ecosystem model of technological investment, where foundational platforms like the PMS and CRS utilize flexible open-API systems to integrate as many potential third-party applications as possible, with no additional costs to the user
  •  
    This article describes 7 travel and tech trends that are shaping the hotel industry this year. With labor shortages and growing inflation, hoteliers are turning to technology to relieve some pressures like using a native-cloud-based PMS platform, using mobile and kiosk-based self check-in, and using a a more consolidated payment processer that can deliver a more secure and seamless experience for guests.
32More

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • challenge to maintain teams of well-trained staff.
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • Reliance on Paying By Card
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Insider Threats
  • Compliance
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
13More

The biggest cyber attacks of 2022 | BCS - 0 views

  • In a year of global inflation and massive rises in energy costs, it should come as no surprise that the cost of a data breach has also reached an all-time high.
  • average total cost of $4.5m
  • Amongst the 550 companies that IBM contacted that had experienced a data breach, a disappointing 83% had experienced more than one in the same period
  • ...9 more annotations...
  • common attack vector remains credential theft (19%) then phishing (16%), misconfigured cloud (15%) and vulnerabilities in third-party software (13%).
  • Russia has, for many years, attacked Ukrainian infrastructure such as power grids, internet infrastructure and banks. Since the outbreak of physical hostilities, this has extended to systems related to government administration and the military.
  • The Russia-linked cyber gang known as Conti managed to cause major disruption to financial operations throughout Costa Rica in April.
  • Ransomware, while not the overwhelming headline grabber it was a year ago, is still a major and terrifying threat to many companies
  • A group known as Lapsus$ began 2022 with a string of high profile targets including Nvidia, Ubisoft, Samsung and Microsoft. In each case, data was stolen and in many cases leaked online. Their operating model is extortion where access is most often gained through phishing and then they seek out the most sensitive data they can find and steal it. Often, they do not deploy encrypting software at all.
  • Hacking back is where offensive security experts will attempt to compromise attacker’s machines. This can be legally murky as often the attacking machines are compromised third parties.
  • June this year, a former Amazon employee, Paige Thompson, was convicted for her role in the 2019 Capital One breach. While working for Amazon Web Services (AWS), she exploited her knowledge of cloud server vulnerabilities and stole personal information of over 100 million people.
  • cripple Costa Rica’s import/export business.
  • The main attack vectors continue to be credential theft and phishing emails so it is vital to continue to raise awareness through corporate training and public ad campaigns. Finally, the conflict in Ukraine is showing how effective cyber weapons can be in disrupting command and control in a war.
  •  
    To summarize, this article states that, it should not come as a surprise that the cost of a data breach has also increased to an all-time high in a year marked by significant increases in energy prices and worldwide inflation. According to IBM's Cost of Data Breaches Report 2022, the average overall cost is $4.5 million. Additionally, even if ransomware isn't garnering as much attention as it did a year ago, it still poses a serious danger to many businesses. Credential theft and phishing emails are still the major threat vectors, therefore it's critical to keep spreading awareness through public awareness campaigns and business training. Finally, the situation in Ukraine is demonstrating the potency of cyber weapons in sabotaging command and control in a fight.
5More

All Bets Are Off on Casinos and Cybersecurity | UpGuard - 0 views

  • better malware tools and access to deep funding make today's cyber criminals more than a bad movie, especially when lucrative payloads are for the taking.
  • In May 2015, attackers were able to steal cardholder names, credit card numbers, and CVV codes belonging to hotel guests and customers. In 2016 they suffered similar incidents due to malware being installed on POS systems, allowing attackers to steal customers' credit card information.
  • It may come as no surprise that casinos and gaming firms are ideal cyber attack targets, but how competent are these enterprises when it comes to rudimentary security?
  • ...1 more annotation...
  • Online gambling upstart Ignition Casino offers Blackjack, Slots, Poker on its website; fortunately, the company has also taken the requisite security measures for bolstering its website security and email security.
  •  
    This article focused on cybersecurity in hotel casinos. They mention how casinos seem to be a target for a lot of cyber attackers because they tend to not invest as they should on protecting themselves. Casinos hold a TON of financial data; customer info., bank info., and credit card info. I enjoyed the article because they even went as far as giving a few casinos a "security score" in how well/bad they are in staying secure.
8More

Sacred Rose Festival Attendees Report Thousands in Overcharges - 1 views

  • Many music fans who attended the Chicagoland area's inaugural Sacred Rose Festival this past weekend and used their credit cards while there subsequently reported thousands in surprise overcharges.
  • The fest has responded saying it was a glitch with an onsite vendor.
  • the four-digit charges curiously appeared on the customers' cards after they visited a merchant on the festival grounds.
  • ...4 more annotations...
  • Various Redditors reported that they each received surprise charges amounting to $1,190, $1,300, $1,500, $1,700, $3,200 or more. One charge of nearly $5,000 was reportedly declined by a customer's bank.
  • the glitch in venue payment processing resulted in the charges, and that they were being reversed.
  • Here is their statement: 'You may have accidentally been charged a large amount from F&B at SeatGeek Stadium when using a credit card. Our payment processing is secure but had a configuration error. There was no exposure and/or fraud; we are PCI compliant. We are reversing all of these charges and you should see the amount credited to your card in 3-5 business days.'
  • There was a technical glitch with the point of sales system regarding the tips inaccurately processed.
  •  
    The overcharge nightmare of an establishment and their quick response to guests has led Sacred Rose Festival to scramble in response to outraged customers. The festival has shared the error came with the systems configuration and are PCI compliant with no exposure to breaches or fraud, but one would venture a guess there is more to this story.
« First ‹ Previous 121 - 128 of 128
Showing 20 items per page