Skip to main content

Home/ Hospitality Technology/ Group items tagged breach

Rss Feed Group items tagged

lderi004

The Top 5 Largest IT Investments in 2017 - SIM - Medium - 0 views

  • Business analytics not only tops the list of IT investments, but it also ranks first on the list of departments that executives think deserve even more investment.
  • As companies transition to cloud-based technologies, they spend heavily on custom configurations and ensuring applications work in conjunction with each other.
  • High profile data breaches at companies like Target and Yahoo have forced executives to recognize the potential consequences.
  • ...2 more annotations...
  • “There’s huge competition out there in the cloud market, and so that competition is very likely to drive down the cost of those cloud-based services,”
  • Though CRM has been widely-used by Fortune 500 companies for decades, the CRM market is expanding rapidly as CRM software companies seek to penetrate the market for small-to-medium-sized businesses.
  •  
    This article is based on SIM's top 5 largest IT investments of 2017, which I found interesting to share, as we learn about I.T. investments. They ranked business analytics as the number one of IT investments, as companies are always looking to hire the best talent. Next on the list is custom software development, as new technologies now allow access to different applications to work together. Furthermore on the list, are cybersecurity, cloud computing, and CRM, which is no surprise as they are growing tools in today's technology driven industry. Overall, I agree with SIM's list, as these top 5 investments are clearly necessities to success in today's tech-driven industries. 
msoma003

HNN - 4 cyber security threats looming over hotels - 0 views

  • The world of cyber security is seemingly in a state of constant flux, making the sources of possible threats hard to nail down for hoteliers.
  • The world of cyber security is seemingly in a state of constant flux, making the sources of possible threats hard to nail down for hoteliers.
    • msoma003
       
      Always changing
  • The velocity of change of threat landscape is very challenging for organizations.
  • ...11 more annotations...
  • But the practice is growing more and more sophisticated, panelists said, and phishing attacks are increasingly targeting high-ranking executives, including those in the hotel industry.
  • without checking with multiple sources and having face-to-face conversations.
  • In such phishing emails, the scammers will order subordinates to authorize large wire transactions under the guise of the transfer being for some sort of acquisition or other major transaction.
    • msoma003
       
      An employee will follow the orders from their boss
  • projects (they’ll do), along with the methods and styles of communication
    • msoma003
       
      They study the target, this takes time and sophistication
  • take over the email accounts
  • Ransomware is the practice of finding some vulnerability in a company’s systems to abduct their information or the functions of those systems and then keep it hostage until someone gets a payoff.
    • msoma003
       
      This is new but it can cost the firm a lot of money
  • breach of your point-of-sale systems and loss of customer payment card information.
    • msoma003
       
      Most common and what most consumers are scared of
  • extent of your insurance coverage in the case of such an attack
    • msoma003
       
      Many managers do not look at this
  • Braun called point-of-sale attacks the single biggest cyber security threat to the hotel industry.
  • denial of service, or DDoS attacks
  • hijacked and then used to send little pulses to bring down systems.”
    • msoma003
       
      A firm can be attacked by all sources
  •  
    This article discussed some of the biggest cyber security threats to the hotel industry. One of the biggest threats is that of the POS system, this is not new but we should still watch over it. Another threat that is old is a phishing scam the scams are getting more sophisticated now, hackers get into the email accounts of executives and order large transactions to be made. Internal protocols cannot wipe of the hack but can minimize the risk of employees falling for the fake emails. Ransomware and DDos are also hacks though not as common they still carry big risks.
msbode

Ensuring Software Integrity in IoT Devices - 3 views

  • oT is defined as the Internet of Things. The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems
  • Gartner predicts that there will be 20.4 billion connected Internet of Things (IoT) devices by 2020, with 5.5 million new things getting connected every day
  • more than half of major new business processes and systems will include an IoT component by 2020
  • ...9 more annotations...
  • Manufacturers are rushing products to market with little or no thought to security, often including hardcoded passwords or known vulnerable software libraries. While this problem is most obvious in the consumer space (which gets the most news coverage), vulnerable IoT devices are present in every business sector as well
  • The TPM stores secret keys, passwords, and digital certificates in its secure internal storage protecting them from software and physical attacks. The TPM acts as a root of trust for checking platform integrity at boot time (i.e., check against any malicious change). A cryptographic hash value of the platform configuration is calculated and compared against the precomputed hash value of the platform. Access to the platform is denied if the integrity check fails [4]. This is the beginning of the “chain-of-trust” for software modules that are subsequently initiated. This transitive trust mechanism is one of the important security features in trust computing. It uses the trust root as a starting point to establish a chain of trust model, in the order of trust root, boot loader, OS, and Application.
  • Secure boot provides the foundation for Trusted Boot, which extends the trust boundary to the boot process and eventually the operating system.
  • software attestation attempts to achieve a dynamic root of trust without specific hardware support. This method has the advantage of not requiring any stored secrets (cryptographic keys or passwords) and allows applications or modules to be updated, which may not be possible if hash values are stored in immutable formats, such as a TPM chip
  • While Secure Boot validates the platform and firmware, Trusted Boot is generally defined as verifying each software module before execution and extending the chain-of-trust to the entire operating system. During the boot sequence, the digest of each executing program is recorded before it executes. A TPM (Trusted Platform Module) is used to store all these records and then report on them securely.
  • It is important to note that Trusted Boot requires a TPM chip so the operating system can see the chain of execution, thus it may not be an option for some IoT devices. Lack of trusted boot support would allow an attacker with physical access, or using a software vulnerability during run time, to potentially modify the stored code and compromise the device.
  • There are many other attack possibilities to consider with IoT devices. For example, existing TPM architectures do not support runtime integrity checking and this allows attackers to exploit vulnerabilities to modify the program after it has been verified (at time of check or TOC) but before the time of its use (at time of use or TOU) to trigger unintended program behavior, such as the execution of malicious code or the leaking of sensitive data
  • Physical attack is a viable method of compromising the integrity of a device. Modifying and replacing firmware by an attacker may be worth the effort, depending on the perceived value of the device or the data it may access (such as a video camera or ATM). Attackers can go as far as removing memory and reading its contents.
  • a device built today can become a major problem tomorrow
  •  
    The purpose of this article was to review the available literature on the subject of ensuring software integrity for IoT (Internet of Things) devices, focusing on detecting and preventing modification of the original software, so that the device cannot be used for unintended purposes. The literature reviewed; secure boot, trusted boot and runtime security. Concluding that no one single control is going to adequately protect a device the solution based upon 25 years of experience is to create a multi-layered approach to security that starts at the beginning when power is applied, establishes a trusted computing baseline, and anchors that trust in something immutable that cannot be tampered with. Additionally, because a device built today can become a major problem tomorrow, due to them having hardcore keys "set and forget", the internet will then have literally billions of obsolete hosts in the coming years. Therefore it is important for MIS Managers/ Consultants investigate how to change the game in order to mitigate the damage or economic value of new systems being breached and by asking questions such as 'Can we even in the presence of a malicious attacker offer some limited form of security for the most valuable transactions (such as e-banking) or assets?' and 'Can we make the 'business' of the attackers less attractive by applying security technologies that are particularly tailored towards destroying the business model of the attackers?'
lderi004

The Disadvantages of Computerized Accounting Systems | Bizfluent - 0 views

  • But it’s easy to become excessively reliant on computerized accounting and to overlook the potential pitfalls of allowing a machine and a software program to store all your data and calculate essential numerical relationships.
  • Although computerized accounting systems use technology to calculate sums and store information, this data must be entered by humans, and these humans must be trained
  • Training staff on software programs can be expensive, and knowledge needs to be updated regularly because computerized accounting systems change, sometimes every year.
  • ...3 more annotations...
  • Virtually every aspect of a computerized accounting system is costly.
  • You may also have to shell out funds for repairs, or hire professionals for training, custom software or to untangle especially complex mishaps.
  • Computerized accounting systems are vulnerable to cyber security issues.
  •  
    As this week we are talking about electronic accounting systems, I found this article on the disadvantages of computerized accounting systems to be rather interesting. As mentioned in the article, many companies tend to become too reliant on computerized systems, which leads to them forgetting about the negative outcomes that may arise from using such systems. These disadvantages include high cost, from training staff to repairing/replacing the electronic systems. In addition, like any cloud-based system, a computerized accounting system can also make a company vulnerable to cyber security issues, such as hacking. Overall, while very advantageous, computerized accounting systems still have certain risks companies must address before deciding whether, or not to use them. 
  •  
    I believe you found a very interesting article on electronic accounting systems. Even though the tendency is all about the positive aspects on electronic accounting systems, I enjoyed reading the perspective on this article which focuses on its drawbacks. Companies need to evaluate whether this investment is functional for them and weight the pros versus the cons. Additionally, the information on an electronic accounting system is sensitive, and it can make the company vulnerable to hacking and data breaches. These are very important points for managers to take into consideration while finding the right accounting system for them.
cpaez007

Airline ticket distribution: How airlines might reduce Global Distribution System (GDS)... - 0 views

  • After a quick search I found and booked the same ticket through an online travel agency for a bit more than the price on the airline website, but less when you included the €8 fee. Unfortunately this small change in booking method would have cost the airline a substantial amount of money. Here’s why…
  • Selling costs generally represent around 4% to 8% of overall airline expenses
  • Many airlines sell a large proportion or the majority of their tickets through indirect channels.
  • ...10 more annotations...
  • A key driver for the high cost of selling tickets through indirect channels is the fees charged by Global Distribution System (GDS) companies for each ticket sold. With airline profit margins under constant pressure airlines need to find ways of reducing distribution costs by selling tickets to customers directly instead of through 3rd parties.
  • The fees to distribute tickets through the GDS are relatively high averages around US$12 per return ticket [2]. In 2012, it was estimated that approximately US$7 billion in GDS fees was paid by airlines which was over twice the industry’s expected net profit for that year [3].
  • Quite simply, the GDS is something that airlines cannot live without. Why? If your competitors are using the GDS and you are not then your tickets will not appear in any searches by 3rd party distributors meaning it is unlikely your tickets will be sold by the 3rd party.
  • Even low-cost carriers such as Air Asia and Ryanair that have avoided the GDS for years have recently started selling tickets through the GDS as they have realised that they are missing out on revenue from not selling tickets through the GDS.  
  • The ‘New Distribution Capability’ (NDC) is a XML-based data transmission standard set by the International Air Transport Association (IATA) and provides a set of guidelines for communications between airlines and 3rd party distributors. The NDC will allow for the sale of ancillary products (for example, baggage, meals, special seating etc.), something which the GDS currently cannot handle. However, while the NDC has the potential to help airlines boost revenue, there are still questions as to whether there will be any benefits stemming from reduced distribution costs.
  • How can we make our direct channels so attractive that customers will want to use them over indirect channels?”
  • The simplest solution is to ensure that the user experience on the airlines website is seamless and easy. Users are highly likely to abandon online bookings and use another booking website if they encounter difficulties. Simple actions such as ensuring customers are not diverted to an error page can translate into a significant increase in direct bookings
  • Airlines might also want to re-think the way it provides incentives and commissions for ticket sales.
  • With the trend moving towards airline consolidation (for example, partnerships, equity interests and mergers) airlines might also consider how they can work together to sell each other’s tickets on their websites. This strategy goes well beyond the sale of interline or codeshare tickets and will give customers benefits including the ability to book multi-airline itineraries directly from an airline website. Of course airlines must be wary of how they do this to ensure they are not in breach of any anti-trust regulations.
  • There is no ‘one size fits all’ approach and for an airline to decide on the best distribution strategy it will need to conduct a solid analysis into their customer behaviours, channel usage and also the commercials of their different distribution systems.
  •  
    In this article we discuss the issues that airlines are having with the GDS system. They give an example of someone attempting to purchase a ticket through an airline website, and then through a travel agency. The direct airline method was only cheaper, if the guest provided information to a direct bank account. The cost for airlines to sell is a bit less than 10%, and they are sold mostly through indirect channels, like travel agencies. The main reason this can happen, is the integrated GDS system. A GDS system is a data facility that shares inventory information for various airlines to different 3rd party channels. The issue with this, is that the total in fees for the use of the GDS system was around $7billion, which is twice the amount of net profit they are receiving. People state that the airline system cannot survive without the GDS, but is that statement really true? Airlines like Air Asia or Ryanair have really attempted to focus on selling tickets directly, and really expand on their profit. How can this be achieved? Well, airlines are making the booking process easier for guests to manage, which gives them more of a reason to book through there. Also, they are offering greater loyalty rewards for directly booking through the site. Different incentives need to be created to attract guests to book directly. Lastly, they would like to create another distribution system, to put GDS out of business. This new system will work to allow guests to handle meal and baggage fees. Concepts that the GDS cannot handle. With that said, will this new system reduce costs for airlines? I guess they will have to wait and see.
Jennifer Dantzler

Point-of-sale Malware Infections on the Rise, Researchers Warn | CIO - 1 views

  •  
    Researchers from Arbor Networks and IntelCrawler identify new attacks using malware designed for point-of-sale systems. " https://diigo.com/0bdlpi
smgarcia

How technology can help hotels avoid food waste, safety risks | Hotel Management - 1 views

  • Hotels that invest in digital temperature sensors with good software can prevent spoilage, reduce food waste, decrease food safety breaches and ultimately save hotels significant money.
  • 1. Elevated safety checks.
  • 2. A more holistic view.
  • ...5 more annotations...
  • 3. Consistency, scalability, and flexibility.
  • 4. More accurate temps.
  • 5. Streamlining processes.
  • 6. Reducing food waste.
  • Deploying mobile workflow apps and sensor technologies can dramatically improve hotel kitchens’ efficiency, safety, and profitability, while reducing food safety risks and preventing expensive food waste.
  •  
    This article discusses the benefits to using new technologies to manage kitchens in hotels and/or restaurants. By using digital softwares, processes can be streamlined as information is shared more quickly across different departments and staff versus paper reports being misfiled or lost. This also ties into food sensors to better determine and manage food output and ensure not only a better quality being served to the public but less waste overall. Especially in the current climate, less food waste would not only help the bottom line but would be an added marketing tool to more eco-conscious patrons.
  •  
    There are so many systems for revenue management and labor control for the F&B industry, but certainly based on my personal experience, the use technology for food temperature and cost control is an area that is still lagging behind. In most the hotels I have worked at, we still rely on monitoring the temperature of the fridges from the sensors and alarms installed in the fridges and although we use the Birchstreet system to order food and cost the recipes, the inventory and quality assurance of food once received is still done visually and with the "clipboard and paper" method which takes a lot of labor and inaccuracies. Very interesting article and reminder of where technology can come in handy. Thanks for sharing!
dominiquewalker

The Importance Of Offsite Backup | Monster Technology - 1 views

  • Offsite backup is the use of cloud-based storage systems for data recovery in case of a power failure, fire, tornado, earthquake, flood, or other disaster.
  • Data stored offsite usually involves accessing information using an Internet connection.
  • Physical disasters and human error remain the primary reasons for having offsite backups. For instance, you need an extra copy of your data in case your office floods and external drives become soaked with water.
  • ...6 more annotations...
  • backups for these reasons:
  • To retrieve lost data after a security breach
  • An extra copy for extra peace of mind
  • To use up less onsite space
  • To take advantage of unlimited storage room
  • To prevent from neglecting to back up your data
  •  
    This article is short and very much to the point. Plainly explaining what is an "offsite backup". Its purpose, and reasons one would utilize the cloud-based application.
yuqiongliang

11 ways to help protect yourself against cybercrime - 0 views

  • 1. Use a full-service internet security suite
  • 2. Use strong passwords
  • 3. Keep your software updated
  • ...10 more annotations...
  • 4. Manage your social media settings
  • 8. Take measures to help protect yourself against identity theft
  • 6. Talk to your children about the internet
  • 7. Keep up to date on major security breaches
  • 5. Strengthen your home network
  • guard your personal data. A VPN — short for virtual private network — can also help to protect the data you send and receive online, especially when accessing the internet on public Wi-Fi.
  • 9. Know that identity theft can happen anywhere
  • 10. Keep an eye on the kids
  • 11. Know what to do if you become a victim
  • Contact the companies and banks where you know fraud occurred. Place fraud alerts and get your credit reports. Report identity theft to the FTC.
  •  
    In a way, fighting cybercrime is everybody's business. Think of it as an obligation to do your part in the fight against cybercrime. For most people, that means following a few simple, common-sense steps to keep yourself and your family safe. It also means reporting cybercrimes to relevant officials at the appropriate time.
marvahb

Technology and Electronics Reviews - USATODAY.com - 0 views

  • Unfortunately, only 44% of retail storefronts have chip card readers enabled on their POS systems,
  • While no system is 100% secure, most can be made much safer than they are. But not all retailers take the necessary steps
  • Consumers can try to protect themselves by looking for retailers that have enabled chip-based credit and debit card use on their POS terminals
  • ...1 more annotation...
  • Even so, there are still lots of these thefts, in which criminals insert malicious software into a company's point-of-sale (POS) system. The malware surreptitiously records credit and debit card information when customers swipe them through payment terminals. It later sends the card information to the thieves, who sell it on the Internet underground, known as the dark web
  •  
    This article is well worth the read. It informs us as to why our credit cards keep getting hacked although our favorite retail stores seems to have secure POS systems. There is actually lots of time and money that needs to be invested in order to have a secure POS. Many of these hacks keep happening because companies wait until it's too late to upgrade to chip reader POS or a higher performance security
teresaricks

Cyber Security In The Hotel Industry | protel - 4 views

  • And phishing isn’t the only strategy these computer thugs use, either. Just about every hotel in the world could be vulnerable to malware, ransomware, spam, hacking and social engineering. 
  • The argument for educating staff on cybersecurity is a simple one: if staff don’t know how to recognize a security threat, how can they be expected to avoid it, report it, or remove it?
  • the 2019 State of IT Security Survey found that email security and staff training were listed as the top problems faced by IT security professionals.
  • ...16 more annotations...
  • Yet, more than 30% of staff surveyed by Wombat Security Technologies didn’t even know what phishing or malware was. This is probably why scams like the Business Email Compromise (BEC) result in whopping losses of over $3 billion (according to the FBI).
  • But as humans, hoteliers make mistakes, they’re trusting of fake identities, tempted by clickbait, and vulnerable to other sneaky tactics used by criminals to gain access to company information.
  • Staff need cybersecurity training to protect themselves and the hotel against cyberattacks.
  • By making employees aware of security threats, the impact they might have on your business, and what procedures to follow when a threat has been identified, you’re strengthening the most vulnerable links in the chain.
  • So how do we counter these threats? Education, education, education. 
  • To achieve these record levels of data breaches and cyber-threats, cybercriminals are focusing their attention on the manipulation of human behavior.
  • The World Economic Forum in their latest report, The Global Risks 2019, puts cyber-attacks and data theft into the higher-than-average likelihood bracket during 2019.
  • Security awareness training is not a point event or solution, it is a process. Security awareness comes out of a series of ideas, thoughts, and preparations that are used to develop a holistic security awareness training program.
  • Identify the Specific Cybersecurity Needs of the Hotel/Property   
  • Include Cybersecurity Awareness Training During Onboarding
  • Cover Relevant Topics
  • Make Staff Cybersecurity Training An Ongoing Process
  • We all make mistakes and occasionally slip up. It is really important that staff know that they can come to you and that they are free to report problems without there being a risk of them losing their jobs. This will come from your personal management style. 
  • Cybersecurity is everyone’s responsibility, whether you are C-level, management, accounting, housekeeping, maintenance, or reception, it does not matter. Everyone needs to be made aware of the hotel’s individual cybersecurity policies, attitude, and culture. 
  • Continuously send reminders via email, Slack, or any other messenger your hotel may be using with reminders to change passwords, to update anti-virus programs, and with information about the latest phishing techniques.
  • If you create a culture of cybersecurity awareness within your organization, then the chances of your organization becoming a victim are greatly reduced.
  •  
    This article stresses the importance of providing cybersecurity training to staff in the hospitality industry.
yoevelyn

The Future of IoT Is at the Edge | By Ian Millar - Hospitality Net - 0 views

  • This will significantly increase the quantity of data available to us as well as levels of automation.
    • yoevelyn
       
      Cloud computing facilitates the implementation and application of IoT technologies. Businesses in the hospitality industry can now offer a more streamlined, personalized experience to guests by way of "smart environments." Devices that before weren't considered part of the information revolution are now becoming data gathering points thanks to the advancement in computing capabilities, accessibility and wide adoption of the internet.
  • By connecting everyday devices to a centralised database, hotel staff will receive real-time data on whether any device is posing any trouble, all before the client realises and before it brings dissatisfaction, shifting from preventative to predictive maintenance.
    • yoevelyn
       
      Along generating highly personalized experiences to guests, the internet of things can help management predict maintenance issues with amenities and tools like air conditioning units, refrigerators and the like. This ability to predict if and when an appliance breaks down can help curve dissatisfaction by allowing maintenance to be performed before guests even have a chance to realize there is any issue.
  • According to PwC's Customer Experience Survey, customers do not want to choose between human interactions and machine: they want automation to be embedded in their experiences but to still maintain a human element
    • yoevelyn
       
      Even though guests love the experience of smart environments enhancing their hotel stays, it is clear they don't see it as a substitute to human interaction. Instead, they see the implementation of these technologies as an enhancement, or a tool that complements the hospitality service while still maintaining the human element.
  • ...1 more annotation...
  • A proposed solution is to introduce fog and edge computing versus the already wide-spread cloud computing.
    • yoevelyn
       
      With all this "smartification" of appliances, there is also the risk of security and privacy being breached. Experts in the field are proposing the use of "fog and edge" computing, which is a decentralized way of storing and processing the data, as opposed to the centralized cloud computing alternative. This means that the computers storing and analyzing the data would function as a "could" of sorts that's managed at a local level because these computers would exist in the hotel property itself rather than in a central data warehouse. This mean, more hospitality businesses would need to invest on their own computing and storage infrastructures.
nunes305

PCI Compliance for HOTELS: What you need to know (PCI-DSS) - 2 views

  • In Spain, one of the world’s leading travel destinations, hotels accounted for a $2,995 million revenue in 2017, showing an annual growth rate of 6.0% In France, it reached $4,946 million, and UK recorded a $5,746 million revenue the same year.
  • The growing contribution of the hotel segment to the GDP of many countries worldwide, among with the increase in revenue and data theft, made credit card security a top concern. As a result, the PCI-DSS security standard became an essential consideration for hotels, becoming absolutely obligatory fromf 2018.
  • t defines the best practices for card security that every company should implement, affecting all hotels independently from their size or location. The purpose is to reduce as much as possible the risk for fraud, data theft, identity theft, and other threats.
  • ...2 more annotations...
  • As a global industry that generates an overwhelming revenue of 550 billion dollars annually, the hospitality industry seems to be one of the most attractive segments for credit card breaches and data theft.
  • Credit card storage – many hotel managers are under the wrong impression that only digitally stored credit card information must be protected, but this is not true. In fact, under PCI Compliance and privacy laws, all paper documents containing personal data must be physically secured and adequately restricted at all times.
  •  
    PCI Compliance for HOTELS: What you need to know (PCI-DSS)
  •  
    Thanks for the summary. It's comforting to know that countries in Europe are getting on board with being PCI compliant, one less thing to worry about when using credit cards internationally for booking, shopping or entertainment.
andreae22

5 Cloud Computing Disadvantages - 0 views

  • “The Cloud,” refers to data that you can send and access from a remote server
  • must always have an internet connection.
  • f you lose your network connection because of a storm or an outage, you may experience some downtime.
  • ...8 more annotations...
  • Not all cloud providers are created equally
  • value of unlimited bandwidth
  • ideally be working with
  • You are, essentially, trusting another party to take care of your data
  • Cloud hacking cases as recent as the past few months have shown that not all cloud providers are as secure as they claim to be
  • One of cloud computing’s greatest disadvantages is that you don’t always know which providers you can trust.
  • You cannot fix your cloud computing problems in-house
  • Cloud computing is a powerful tool, but you may still find yourself trapped with certain limitations like speed, space, and availability. In the end, the benefits of cloud computing technology come down to who you chose to provide it.
  •  
    Cloud Systems have many disadvantages, the big three include downtime, connectivity and security.
lianettfernandez

Mickey Mouse Club had Mickey Mouse security: Disney's Playdom forum pours out passwords... - 0 views

  •  
    The article deals with the 2016 cyber attach on disney
afost026

Top Cybersecurity Challenges for the Hospitality Industry | KirkpatrickPrice - 0 views

  • Organizations within the hospitality must consider why they’re a target for cybersecurity attacks, which data privacy and security frameworks and regulations apply to them, and what challenges they will face.
  • Data Collection
  • When Marriott’s guest reservation database was breached, the names, mailing addresses, phone numbers, email addresses, passport numbers, rewards account information, dates of birth, gender, arrival and departure information, reservation dates, communication preferences, and encrypted payment card numbers of up to 383 million guests were compromised –
  • ...2 more annotations...
  • Data collection inherently makes the hospitality industry a target for hackers and cyber attacks
  • If a hacker can get into just one location’s gift shop or front-desk system, they can access a whole lot more
  •  
    This article talks about the many challenges for the hospitality industry due to hacking. One example is interconnected technology. If a hacker can hack into one location, they can hack into multiple connected locations.
npate083

5 Ways POS Is Changing (And Why It Matters) - 0 views

  • Businesses have moved from traditional cash registers and stationary credit card readers to iPads and even mobile- or cloud-based POS systems.
  • Breadcrumb, a restaurant cloud-based POS system
  • Square allows businesses to transform iPads and smartphones into a POS system
  • ...22 more annotations...
  • One e-commerce solution is Shopify's POS system
  • the Shopify POS synchronizes and streamlines your financial and product information in a centralized dashboard.
    • npate083
       
      Shared commerce streamlines financial and product information in a centralized dashboard. It provides the user with real-time data and customer insight without having to run reports on multiple systems.
  • real-time data and customer insights
  • without the hassle of running reports on multiple systems.
  • Businesses should consider allowing mobile payments, as customers are shifting away from cash. 
  • businesses don't need any heavy equipment overhauls
  • Mobile credit card processing services (Square, PayPal Here, Flagship ROAMpay) simply require a credit card reader attached to a smartphone or tablet with the necessary mobile app, while mobile wallet providers (Google Wallet, Visa Checkout, Apple Pay) and loyalty mobile apps (Starbucks, Daily Deals) allow customers to pay directly from their smartphones or by using a POS scanner to read barcodes or QR codes on their screens.
    • npate083
       
      Mostly everyone is switching to mobile payment. It is much easier and convenient. As a business, it is vital to have mobile POS system so customers can pay directly from their phone.
  • New POS systems integrate real-time transactions with CRM solutions to help businesses increase sales and boost revenue
  • POS integration lets businesses create client records, CRM tasks and email marketing lists
  • enable businesses to collect all types of customer data from POS transactions,
  • to improve customer experience and acquisition
  • ability to extract valuable information from POS transactions to help business owners make smarter business decisions.
  • POS software tool
  • data-gathering and reporting features
  • Detailed reports include inventory and volume analysis, top-selling items, revenue and profit margin optimization, and staffing needs
  • Toast is a POS system
  • "restaurant operations by combining POS, front of house, back of house, and guest-facing technology on a single platform"
  • "monitor restaurant sales, labor costs, food costs, and more in real time, at home, and on the go with powerful reporting capabilities."
  • , POS systems need more security as the technology advances.
  • (IoT) – the interconnectivity and communication of devices, networks and physical objects over the internet
  • POS systems are more vulnerable than ever to hacks and data breaches
  • US-CERT recommends protecting POS systems by using strong passwords, ensuring you have the latest POS software updates, installing a firewall, using antivirus programs, restricting unauthorized internet access (such as for purposes other than POS transactions) and disabling remote access to POS systems.
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
anonymous

Three Basic Steps to Security | Hospitality Technology - 0 views

  • mind the three Ps: patches, people and passwords
  • A lot of breaches occur because software is not up to date
    • anonymous
       
      Patches It is always important to keep systems up to date that way you can keep tabs on everything and know exactly what is going accurately. It also makes it more efficient.
  • It is good policy to change a passcode every 30 days, but it gets confusing. People revert to things easily hacked and guessable
    • anonymous
       
      Pass-codes Although people want to keep their passwords easy and simple sometimes this isn't the best strategy. It works best if you think of something that most people wouldn't be able to guess so easily. Pass codes should definitely contain numbers and words, but most importantly they should be something that YOU will always remember that way you won't forget it.
  • ...4 more annotations...
  • using a pass phrase that is from something easy to remember, such as a line from a favorite song or nursery rhyme plus some numbers
  • More than half of users reuse the same password on different systems
  • How do you off board someone properly? You go through and change all things to make sure they’re locked out and to make sure they can’t do anything tricky” such as copy files or create a backdoor
    • anonymous
       
      People Making sure those who leave leave properly is equally as important as making sure those who enter enter the business the right way. You have to make sure that the people who leave are not gonna be planning anything against your business. Take the proper precautions and be aware of anything and everything.
  • These basics are a good starting point and can help deter hackers
  •  
    The article discusses three key points to keep in mind for a better security within a hotel according to Russ Schrader from NCSA.
aguar024

Hotels, Technology, & the Cybersecurity that Protects Them - Armor - 0 views

  • Hotels, Technology, & the Cybersecurity that Protects Them
  • introduction of virtual assistants like Alexa in hotel rooms
  • biometrics for guest access into their rooms instead of the standard room keys
  • ...9 more annotations...
  • The 2018 Trustwave Global Security Report listed the hospitality industry as one of the top five industries subjected to network breaches each year. The more technology added to help guests also means the industry needs to think harder about how they store and protect their guests’ data. If a hacker compromises the technology or infrastructure environment where guest data resides, guests could have their personal data compromised.
  • mobile keys
  • hat’s most worrisome is the amount of information collected and stored by Internet of Things (IoT) devices, like these virtual assistants and the mobile keys solution. After all, personal data has always been a prized target of cybercriminals.
  • register your fingerprint at the front desk
  • the balance between usability and security for their apps and software is critical.
  • Consumers, who are most likely to be victims, have their share of responsibilities.
  • osting on social media about how fun a vacation is could notify attackers that your valuables are sitting at home unprotected
  • it’s the hotel’s IT infrastructure that’s usually the targe
  • Unfortunately, most hotels do not have a dedicated on-site cybersecurity staff (or even IT staff for that matter).
lclar060

Responsibilities of an Information System Security Officer - 0 views

https://work.chron.com/responsibilities-information-system-security-officer-15533.html This articles highlighted the top reasons as to why employers ought to invest in MIS officers. Undoubtedly, b...

technology software tech solution

started by lclar060 on 13 Jan 20 no follow-up yet
« First ‹ Previous 201 - 220 of 253 Next › Last »
Showing 20 items per page