Skip to main content

Home/ Hospitality Technology/ Group items tagged breach

Rss Feed Group items tagged

22More

12 Ways To Increase Hotel Security - LODGING Magazine - 0 views

  • Even when hotels have strong security policies and procedures in place, they are still vulnerable to cyber attacks, break-ins, theft, fraud, and other crimes
  • American Hotel & Lodging
  • Association (AHLA) security consultant
  • ...17 more annotations...
  • Hotels can be held liable for the criminal acts of third parties
  • Guest Safety: Ensuring Return Stays and a Good Reputation
  • Update locks.
  • Provide a sense of ownership.
  • Monitor activity with software.
  • Evaluate and improve—quickly.
  • Meet and greet.
  • Make time for safety meetings.
  • Theft and Fraud: Monitoring Employee Activities It’s a disappointing reality that hoteliers have to contend with employee theft and fraud. B
  • Boost employee empowerment.
  • Staff smart.
  • Add active monitoring to video surveillance.
  • Cybersecurity: Protecting Electronic Borders
  • As technology has advanced, so has criminals’ ability to exploit those new technologies. The hotel industry has seen several such examples lately
  • Connect IT and security departments.
  • Upgrade to VLAN.
  • Beware of social engineering.
  •  
    This article highlights all the necessities to make sure your hotel is safe and secure for all your guests. It specified for cyber security, however, that switching to a VLAN server would be massively beneficial for the hotel as it becomes a private server that has multiple stages of security to bypass. In addition, it advises the modification of passwords every few months because apart from cyber breaches, people also try to con others out of their passwords by word of mouth and manipulation.
  •  
    In this article it talks about the 12 different ways to increase security in our hotels and how to make thing more safe for our guest.
8More

When It Comes to a Cyberattack, We Are All Vulnerable - By David Trumble - 0 views

  • When It Comes to a Cyberattack, We Are All Vulnerable
  • Cyberattacks have nearly paralyzed mega enterprises including Facebook, Target, Wells Fargo and even the venerable credit reporting agency, Equifax. 
  • Here are some compelling, if not terrifying, statistics on the growing threat of data breaches:
  • ...4 more annotations...
  • organizations must take preemptive measures not only to mitigate the financial and reputational impact of these events but ultimately to protect their customers.
  • Deploying the latest software protection is only the beginning. Transparency to customers and actionable steps to correct such a catastrophic event are critical to an orderly recovery.
  • An effective plan includes a risk assessment to identify vulnerabilities across a wide spectrum of threats including, but not limited to, cyberattacks.
  • Here are six important questions to ask your crisis management team:
  •  
    Talks about the effects and the importance of being prepared for a cyber attack.
79More

Must-Know Event Technology Trends for 2020 | Social Tables - 3 views

  • In addition to speeding up registration time, incorporating RFID technology into events will help with both qualitative and quantitative data analysis, thereby making it easier for planners to target what worked during their event and what didn’t.
  • Though event apps are admittedly helpful, they now have a new hurdle to face. Producing an application to be used for one event is costly, time consuming, and inefficient, as users must learn how to interact with the app for each new event attended. Phone storage space is very important to consumers. Many are hesitant to download an application that they will only use once. Thus, event apps that can continue to deliver value to customers beyond the date of the event itself, are going to become a huge trend.
  • RFID also has the potential to allow attendees to become more engaged with the event across various social platforms.
  • ...71 more annotations...
  • Menu options, travel directions, appointment updates, facial recognition software and contact information are just the beginning of the very real ways that event planners will soon be able to use wearable tech.
  • Event technology trends aside, the number one thing for any event professional to remember, is to let your tools work for you, rather than the other way around. The purpose of implementing advanced technology is to make your life, and the life of those whom you plan events for, as easy as possible.
  • 5G will also make it more feasible to incorporate the cutting-edge into event experiences.
  • Projection mapping is the act of creating an augmented reality experience with the help of projectors.
  • this visual technology proves to be an efficient and cost effective way to create optical illusions in nearly every location.
  • event technology adoption can increase attendance by 20%, increase productivity by 27%, and decrease costs by as much as 30%.
  • branded apps provide limitless opportunities to interact with consumers right on their own phones
  • Apps can be customized to appear as if they were created specifically for events or stays, while offering functionality that serves to enhance and personalize the attendee experience.
  • Planners can utilize branded multi-use apps to connect with attendees and engage them on a variety of levels before, during, and after the occasion.
  • Event spaces can create customized apps to enhance experiences and share things like helpful facts, historical tidbits, and even the personalities of their unique employees,
  • Because they’re often cloud-based, these programs also provide accurate, customizable, and collaborative project planning that’s accessible by all managing parties
  • With event diagramming software, both event planners and venues are able to map everything out visually
  • provides helpful tools like drag-and-drop diagramming, 3D walkthroughs, and seating software on a single platform.
  • Hotels especially can use apps in this way, allowing guests to control their rooms from their phones and even communicate with chatbots to find nearby attractions.
  • Projection mapping5GBranded multi-use appsEvent diagramming
  • It also opens up new possibilities for app developers to push the boundaries of current event tech trends
    • abroo041
       
      The world of technology is advancing every day. As technology grows and advances, so does its use in the events industry. This blog post discusses some of the technological advances that have made their debut in the events industry and how they can improve an event, how they help the event planner and venue, and even shows us examples of how they are used in real life. It gives statistics on how these technologies have benefit events. For example, when the blog post speaks about gamification, it mentions that "gamified events see a 44 percent increase in engagement". The post is not only suggesting to us that adding gamification is a good idea for future events, but it shows us how well gamification works.
  • Knowing event technology trends—and adopting the most valuable ones—gives planners and venues the competitive advantage
  • Studies show that using event technology can increase attendance by 20 percent and increase productivity by 27 percent. 
  • Each match automates personalized actions, such as printing a badge with the attendees name, sending an email with a scannable lunch voucher, and finalizing a swag bag for their ticket-tier (no sense creating swag bags for no-shows).
  • The technology speeds event check-ins, improves security, and helps businesses at tradeshows collect more valuable leads by tracking attendee visits to booths.
  • can also use facial recognition to watch for crowd flow bottlenecks and collect session attendance data so you know what worked—and what didn’t.
  • The ability to support advanced tech like facial recognition makes venues more attractive to corporate planners. The technology also allows automation at certain access points, which means lower manpower requirements and lower costs. 
  • Properly integrated apps add value to events, providing attendees with more opportunities for networking, interaction, and engagement with peers, speakers, and exhibitors.
  • Offering tech to support projection mapping provides bang for the buck. There’s no need to physically construct or deconstruct any part of your exhibit hall to add this fun, popular technology to your toolbox and draw more events. 
  • This visual technology is an efficient, cost-effective way to create optical illusions on anything—from cars to landmarks to stages.
  • With tradeshow or conference maps, speaker bios, and schedules in the event app, there’s no need for bulky information packets. Push notifications in the apps help keep attendees informed and on schedule. Planners can also use apps to personalize the event agenda through live polling and attract event sponsors with the option of targeted attendee surveys.  
  • Event spaces can create customized apps to share helpful info like maps, historical tidbits, and even the personalities of their unique employees
  • Easy-to-use 3D event diagramming software provides accurate, customizable, collaborative project planning regardless of venue design or size.
  • Give clients peace of mind and leave nothing to chance on the big dayUpload a floor plan to work with, so you know the diagram is to scaleTake clients and stakeholders on 3D ‘fly throughs’ to clarify your visionPlan seating charts and manage attendees’ meal choices or other preferencesHelp staff easily identify and accommodate VIPs and guests with special requests
  • Sales reps can collaborate with planners in real time, share variations on the event proposal, and visually portray upsells.
  • Attendees can use this tech to follow slide presentations, participate with quizzes and polls, take notes, and engage in text-based Q&A. They can also view graphs, tables, videos, and other content; and follow website and social media links. 
  • Any speaker can keep an audience attentive and engaged with this technology, leading to good reviews and a successful event.
  • Supporting second screen tech for presentations is much less expensive than making physical upgrades that aren’t in the budget. 
  • This data underscores the importance of social media sentiment analysis in monitoring your brand and messaging, keeping an eye on competitors, and making improvements to services during and after events.
  • Tracking attendee activity on social media during an event provides actionable data to help you make adjustments in real-time
  • Replenishing food and beveragesEasing show floor bottlenecksDriving session attendanceAddressing technology issues (mobile apps, Wi-Fi, or audio/visual)
  • Venues can social media sentiment to promote popular services and learn where there’s room for improvement:
  • Wristbands and smart badges using near-field communication (NFC) chips keep disruptions and lines to a minimum, thereby increasing attendee productivity and engagement.
  • Access different event areasExchange information with peersReceive exhibitor marketing materialMake cashless purchases
  • Wearable tech helps you speed-up check-in, control access, and monitor attendee behavior with less staffing. It also improves ROI for exhibitors, who can drive attendees wearing the tech to visit a booth of interest based on an individual’s profile.
  • On-site staff can use real-time data to learn when they need to offer overflow rooms or investigate security breaches, such as non-VIP guests in restricted areas. 
  • Indoor wayfinding helps attendees navigate exhibit halls with ease,
  • gather useful attendee behavioral data, send leads to sales team members in real-time, and build attendee profiles to send targeted messaging
  • You can also incorporate proximity advertising options as a value-add for exhibitors and sponsor
  • Post-event, you can utilize IPS data to see where attendees spent their time visiting booths and attending presentations.
  • Adding hotel bars, restaurants, spas, gift shops, and other amenities to the location map can help drive additional revenue during events while improving the attendee experience
  • store attendee admission information on their person, helping to detect fraud and streamline access
  • Attendees can review their travels throughout a tradeshow and see who they interacted with, while exhibitors are notified in real-time when sought-after prospects come into their booth.
  • Planners can generate pop-up directions for attendees based on their location at an event instead of investing in producing/shipping/replacing physical signage
  • validates your event and highlights improvement opportunities by tracking session popularity, length of attendee visits to exhibitor booths, and strong tradeshow traffic.  
  • RFID and beacon technology helps security and general event staff do their job better in real-time, which is essential for building trust and streamlining crowded events
  • event planners are turning to venue sourcing platforms to connect with the perfect site for their particular event.
  • discover detailed venue layouts, capacity ranges, and on-site services
  • Venue platforms offer exceptional ROI and generate more leads through improved discoverability.
  • Convey elements that make your venue uniqueShowcase your event spaces visually with accurate floor plans, 3D diagrams, quality photos, and videosLeverage the success of past events with testimonials and social media accolades
  • artificial intelligence (AI) tech is using badge scans, social media info, and other behavioral data to match attendees with people they should meet or seminars they may want to attend. 
  • Instead of taking-up significant time pre-event and on-site manually recommending seminars, exhibitors, and sponsors to attendees, AI can do it for you—even in real-time—based on their profiles and preferences captured during registration. 
  • it requires transparency and advance notice about how you may use data submitted by attendees. 
  • Attendees entering the geofenced area triggers predetermined actions, such as event check-in, push notifications, or advertising related to the event. 
  • Planners can sell geofencing to exhibitors and sponsors to reach attendees at events, or even promote their event on attendee devices at a competing event under a separate geofence. You can also provide attendees with a better experience via seamless registration and check-in, along with automatic app downloads as soon as they walk on-site.
  • provides analytics, both post-event and in real-time to help you better understand things like the duration of an attendee’s time at an event and overall peak attendance. 
  • Hotels can serve ads promoting their brand, facility, and services to attendees at events
  • once a prospect visits an event website, ads for that event will appear on any subsequent websites the prospect visits, in the form of website banner ads, search engine results, and pop-up or push ads on mobile apps. 
  • Event marketing teams should develop relevant and creative ads with clearly visible event dates to convince prospects who have visited an event website, but haven’t yet registered
  • venues can use it to generate return visits from event planners
  • retarget attendees during events with offers for in-house services like food and beverage, spa, and discounts on extending their stay.
  • Gameplay creates an immersive attendee experience, while generating leads and booth visits for exhibitors via quizzes, scavenger hunts, and trivia on mobile apps.
  • Gameplay fosters a sense of common purpose; creates an environment of collaboration and trust; facilitates easier communication; and boosts attendee confidence. You can also gather information about attendee engagement and interests via game choices.
  • Promoting the use of gameplay on-site showcases a venue to organizations looking for facilities supporting team building exercises as well as immersive attendee experiences.
  • Event technology is a term used to describe all of the digital tools and software used in the events industry. Everything from check in & registration, to diagramming, to social media tools, and more can be considered event technology.
  •  
    RFID, event applications, wearable technology, virtual reality, and social media are upcoming popular uses for event planners. With RFID event planners are able to keep better track of the guests attending the event as well as keeping them more involved. I first heard of this a few months ago when attending an event and it described that a chip with RFID was placed inside the wristband-type ticket. For me, the most interesting thing is the wearable technology! Imagine an event where you can have directions given to you or a layout of the event right on your wrist! Also, the watch can notify you of events happening within an event or you can see order your food or see the menu. To know that soon enough it will be a norm for everyone to have some type of wearable technology and that event planners can truly get the guests involved through this use is exciting.
  • ...2 more comments...
  •  
    This article discusses five major event technology trends. The first is RFID, which can assist in registration time but even more important is being used to gather both qualitative and quantitative data analysis. This kind of data acquisition is great because it allows for planners to analysis, study and understand what worked and didn't work for their events. The second is multi-use apps. These apps allow the event to incorporate important aspects like activities, scheduled break down, and speaker info all at once. Additionally these apps allow attendees to socialize with other participants, and expand their network. The other technologies are some that can definitely change the industry once they are fully integrated. These include: wearable technology, virtual reality, and social media.
  •  
    Nowadays the event planning becomes more and more popular. With the development of event planning, we have 5 event technology trends shaping the future of event planning. The first on is RFID-radio frequency identification. In addition to speeding up registration time, incorporating RFID technology into events will help with both qualitative and quantitative data analysis, thereby making it easier for planners to target what worked during their event and what didn't. In this way, it will be easier to foster repeat attendees. The second one is multi-use apps. It's easy to use apps to solve problems. event apps that can continue to deliver value to customers beyond the date of the event itself are going to become a huge trend. The third one is wearable technology. Like google glasses should be a trend in the future. Facial recognition and contact information make the event planning more easier. The fourth one is VR. VR is a great way to up attendee engagement during events. The last one is social media. Social media will be a really important trend. Social media is more than likely the way that investors and sponsors will advertise your event.
  •  
    This article introduces four new advances to technology that help ease the process of event planning. Projection mapping, 5G, Branded multi-use apps, and event diagramming.
  •  
    This article shares the technology innovation with meeting/convention operations and how these technology help offer better guest satisfaction.
6More

Event App Security: Access & Data Privacy Best Practices - EventMobi - 1 views

  • Due to heightened sensitivity around data breaches and privacy, event planners are having to pay special attention to how their technology vendors—like event app providers such as EventMobi—are using and storing their event data.
  • Provide passcodes for private events. Requiring participants have a passcode to log into an event app allows planners to limit access to only those people they share the passcode with, such as a list of registrants.
  • Restricting app access to registered participants only (based on their email address) ensures the greatest control over event details and participant listings by locking out anyone not registered to attend.
  • ...1 more annotation...
  • Aside from ensuring your event app provider is security-conscious, it’s important to consider implementing processes that mitigate risk around how other vendors and/or your employees access or use event participant data.
  •  
    This article tells about how important the security features are for the event registration software and apps. The authors tells what security ensuring procedures have to be implemented in the apps, what kinds of information should the attendees agree to before signing up and the regulations that have to followed by the event planners using the event apps.
  •  
    This article is a piece of nice introduction on how to protect event information security with apps. It gives us an insight of how event planners can set the registration system and limit access of the participants to protect privacy. Besides the settings and consideration of the system (app) itself (like the provider of the app and their policies) and the privacy policies, this article also mentions other considerations like Wi-Fi security, employee training and limited information access.
19More

Data Security in the Hospitality Industry | CSU-Global Blog - 0 views

  • Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there’s a franchisor, an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. In fact, it was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • Well-trained staff also know how to recognize social engineering attempts, and they understand an organization’s compliance requirements. The risk is that the hospitality industry involves a great deal of of seasonal work in which people might move on after only a few months, or they might be transferred.
  • ...14 more annotations...
  • This type of data risk is more subtle, and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests’ data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data.
  • the job turnover rate in hospitality is as high as 90 percent
  • High Staff Turnover
  • From the perspective of cyber criminals, hospitality appears to offer an ideal target for conducting crimes, such as identity theft and credit card fraud, due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • Information security is a pivotal aspect of many industries
  • Complex Ownership Structures
  • Reliance on Paying By Card
  • Here are five of the biggest data security concerns in the hospitality industry:
  • Compliance
  • Insider Threats
  • Best data-protection practices for companies in the hospitality sector include… Always encrypting payment card information.Operating a continuous training program in cybersecurity to maintain a well-trained workforce.Always adhering to relevant regulations, such as PCI DSS.Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats.Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker.Know where your data is and enforce the principle of least privileges to limit acce
  • ss to sensitive information.
  • organizations in the hospitality sector are better placed to implement a comprehensive information security strategy that entails the necessary procedures, processes, and people to improve cybersecurity within the hospitality industry.
  •  
    The article talks about cyber security threats in the hospitality industry. Threats range from high staff turn over so staff isn't trained thoroughly, to insider threats where employees can sell information to third parties, to Cyber-criminals who infect POS systems with credit cards.
  •  
    Data information security is very important to a business development.In my opinion, I think the relationship is inversely proportional. In other words, the more effective cyber security budget is invested, the less potential impact there is of customer information being stolen (being hacked). Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
18More

ROLE IMPACT AND IMPORTANCE OF MIS - 4 views

  • The role of the MIS in an organization can be compared to the role of heart in the body. The information is the blood and MIS is the heart.
  • The system ensures that an appropriate data is collected from the various sources, processed and send further to all the needy destinations. The system is expected to fulfill the information needs of an individual, a group of individuals, the management functionaries: the managers and top management.
  • The MIS helps in strategic planning, management control, operational control and transaction processing.
  • ...11 more annotations...
  • providing the operational data for planning, scheduling and control , and helps them further in decision-making at the operation level to correct an out of control situation.
  • Disciplined information reporting system creates structure database and a knowledge base for all the people in the organization. The information is available in such a form that it can be used straight away by blending and analysis, saving the manager’s valuable time.
  • plays a vital role in the management, administration and operation of an organization.
  • marketing, finance, production and personnel becomes more efficient.
  • helps the middle management in short term planning, target setting and controlling the business functions.
  • It helps indirectly to pull the entire organization in one direction towards the corporate goals and objectives by providing the relevant information to the organization.
  • It will be observed that lot of manpower is engaged in this activity in the organization. Seventy (70) percent of the time is spent in recording, searching, processing and communicating.
  • information is doubling up every two or three years
  • a manager has to process a large voluminous data; failing which he may end up taking a strong decision that may prove to be very costly to the company.
  • today MIS is considered to be of permanent importance, sometimes regarded as the name centre of an organization
  • It has been well understood that MIS enables even small organizations to more than offset the economies of scale enjoyed by their bigger competitors and thus helps in providing a competitive edge over other organizations.
  •  
    This is a great article which breaks down the MIS and their role. The MIS is an important factor to help build a productive business. Companies should take into consideration the hiring of a MIS personnel.
  • ...1 more comment...
  •  
    What a perfect analogy - the MIS can be compared to the role of the heart in the body. While large corporations are able to afford this, what I would consider a luxury in my world, I think most Executives or Directors find themselves playing this role without the desire to, or the recognition - and of course not to the level a MIS can produce/process I am sure. The MIS holds so much weight, it really could make or break your fiscal year should the wrong decision be made. This article is great at summing up such an important and not really spoken about position.
  •  
    Thank you for the great read. I enjoy how the article compares the MIS function to the heart in the body. With this direct comparison, we see how important MIS is to an organization. These systems ensure that data is properly collected and stored to be made available to any manager or executive level employee.
  •  
    Agreeably, MIS is the heart to any successful business in today's era. MIS impact productivity and performance. Processing/filtering information which is transmitted into and out of one's business is key for reducing security breach.
8More

The Corona virus may not be the biggest threat to the hospitality industry | By Jaison ... - 0 views

  • There are several long-term key threats to both travelers and travel providers related to technology. The technology story of the last decade in travel is one of fragmentation and consolidation.
  • Hotels therefore need a mix of channels and partners to maintain high levels of occupancy and average daily rates (ADR)
  • Hotels therefore need technology providers that can provide a large enough ecosystem of channels to choose from, in order to tap into emerging source markets frequented by guests, while also exploring source markets from new channels.
  • ...5 more annotations...
  • keeping up with a growing number of channels to integrate with can be a real challenge.
  • Switching technology providers can be painful. Integrations and mapping take considerable work and switching a provider means redoing that work all over again; while there might be numerous benefits, these may not make up for the cost of switching.
  • The most significant risk lies in the exposure of guest data.
  • If a hotels distribution technology is spread over numerous vendors, managing those vendors and their security involves significant time, organization and cost.
    • anonymous
       
      This article discusses the invisible threat against the hospitality industry, especially the hotel sector. It covers the pros and cons on the utilization of technology providers, especially when using more than one. Data breaches are expected due to the inability to oversee each provider's security. This then puts the guests' information at risk. It then discusses how the tense relationship between the US and China a governments impacts technological advancements and progression.
9More

IBM Security BrandVoice: Why Managing Windows PCs Like Mobile Devices Is A Smart Long-T... - 1 views

  • videoconferencing tool Zoom has seen its daily usage rise by more than 300% from before the pandemic. And on March 18, Microsoft announced that its collaboration tool Teams added 12 million daily users just that week, bringing the total to 44 million.
  • This transition to remote work on such a massive scale would not have been possible in the server-led infrastructure of 15 to 20 years ago.
  • Cloud computing, which has been touted for its flexibility, reliability and security, has emerged as one of the few saving graces for businesses during this pandemic.
  • ...5 more annotations...
  • they're referring to a hybrid public-private model they've adopted to balance their concerns about security breaches with their desire to reap the benefits of running some enterprises through a public cloud vendor.
  • Within a full cloud, operations are streamlined among all teams — support, professional services and security — leading to less redundancy of tasks and greater overall efficiency
  • Multiple providers can deliver different levels of services, leading to differing outcomes within cloud and on-premises operations.
  • Gartner Inc. predicted that through 2020, 95% of cloud security failures will be the customer's fault
  • According to the U.S. Bureau of Labor Statistics, from 2017 to 2018, only 29% of American workers could work from home.
  •  
    Since the start of the COVID-19 pandemic, there has been a massive surge to online conferencing. This conferencing would not be possible without the cloud. Moving forward this could be the way most work is done as some employers would prefer to have their employees work from home.
11More

What is cloud computing? Everything you need to know about the cloud explained | ZDNet - 0 views

  • , companies can rent access to anything from applications to storage from a cloud service provider.
  • t firms can avoid the upfront cost and complexity of owning and maintaining their own IT infrastructure, and instead simply pay for what they use, when they use it
  • loud computing services cover a vast range of options now, from the basics of storage, networking, and processing power through to natural language processing and artificial intelligence as well as standard office applications.
  • ...7 more annotations...
  • computing is becoming the default option for many apps: software vendors are increasingly offering their applications as services over the internet rather than standalone products as they try to switch to a subscription model
  • for many customers location of their services and data remains a key issue
  • he infrastructure to support cloud computing now accounts for more than a third of all IT spending worldwide,
  • global spending on cloud services will reach $260bn this year up from $219.6bn
  • Research by Oracle found that two thirds of IaaS users said using online infrastructure makes it easier to innovate, had cut their time to deploy new applications and services and had significantly cut on-going maintenance costs.
  • This may allow companies to avoid large increases in IT spending which would traditionally be seen with new projects
  • ertainly many companies remain concerned about the security of cloud services, although breaches of security are rare. Ho
  •  
    Cloud computing has a lot of growth predicted. However, security remains a concern for many. On a positive note, it will help companies with budgeting by not needing an IT team.
1More

Hospitality industry more prone to cyber attacks | TravelDailyNews International - 1 views

  •  
    The article by, a financial policy author, explains in detail the extent of cyber-attacks in the hospitality industry. The article explains that the hospitality industry is more prone to cyber-attacks, given the nature of information most of the organizations generate daily in their operations. The article explains that most organizations in the hospitality industry may not be aware that they have already been hacked. The article emphasizes the importance of internal audits and the critical evaluation of cyber footprints in hospitality organizations to minimize cyber-attacks. The author of the article delves into the cybersecurity risk factors in the hospitality industry and reports about the UAE IAA members' seminar which was aimed at sharing information and networking with a focus on building cyber-resilience against cyber-attacks. The article shows the prevalence of cyber-attacks in the hospitality industry noting that each stolen data record costs an average of $148 with the average cost of a cyber-attack being valued at over 3 million dollars (Karantzavelou, 2020). The article quotes a statement by the Jumeirah group chief internal audit officer who asserts that protection against cyber threats should be the DNA of every organization, and they should be continuously on the lookout for potential threats and ensure adequate protection. Members in the seminar advised on the importance of having internal auditors to provide assurance, suitable frameworks, and to set up controls to mitigate key cybersecurity risks. The article explains that hotels are prone to Cyber-attacks since they collect varied, valuable and sensitive customer information. The article also cites a cyber-breach in 2018 where up to 500 million customer details and passport information was compromised in an international hotel chain for up to four years continuously without detection (Karantzavelou, 2020). At the bottom line, contributors in the seminar explain the importance of cybe
18More

Understanding the Security Risks of Your Hotel's PMS Data Hosting Environment | By Warr... - 0 views

  • Data security has come under greater scrutiny for all businesses in recent years, with larger fines and penalties being awarded for contemporary data breaches.
  • Choosing the right partner and hosting environment for your property can be complicated, but the property-management system (PMS) selected will play a critical role in securing your confidential data
  • Protecting your guests’ data is equally important as preserving their physical safet
  • ...14 more annotations...
  • There are two components of the puzzle: the booking engine used by hotels, and the actual PMS
  • Understanding how your hotel accesses and stores guest data is key to understanding their liability in relation to that data
  • Hosting your hotel's online booking engine comes with an extensive investment into web server technology
  • work with third parties to host their booking engine off site. However, even if your hotel's data is out of sight, it is a hotel's responsibility to keep their data partners accountable
  • Request information on the hosting facility’s certifications for GDPR, PCA, SOC 2, and others.
  • Forming relationships with your network administrator is key because every partnership in this arena is unique
  • data storage and security for hotels could be mostly automated, or hotels could be expected to manage several processes on their own
  • No matter how a hotel stores its data, operators will always be liable for securing it on some level.
  • Partnerships of any kind also do not absolve hotel operators from managing their local network
  • data services have tenants, like the housing market, and it pays to know if you have neighbors or not. Businesses have the option to invest in either a dedicated or open hosting environment,
  • Dedicated hosts allow for updates to roll out in coordination with operators’ decisions, keeping it autonomous and allowing for proper scheduling and preparatio
  • The other option, where multiple businesses share a single server host and single application instance, is a more hands-off proposition
  • but when an update is rolled out by the host it is done to every company on the shared server environment, whether your property is prepared for it or not. Surprise updates such as these can potentially impact operations, or other aspects of your business.
  • The hosting environment for your PMS and guests’ data should provide you with confidence through open and clear communication, vendor commitment and choice of options that best suit your specific independent needs
  •  
    This article discusses the important issue of data security especially when it comes to a hotel's PMS. It goes into two areas of particular vulnerability: the booking engine used by hotels and the actual PMS. By hosting a 3rd party booking engine off site, it is still the responsibility of the hotel to secure and keep guests' date secure. They need to ensure that their partners are adhering to proper compliance and rolling updates for security. The second area of focus is the PMS itself and how it is hosted: whether locally or through a cloud based system. Regardless of the location of the host, data security is the responsibility of the hotel.
10More

Cloud vs On-premise PMS for hotels: which one is better? - CiHMS - 0 views

  • On-premise Property Management System requires a significant number of “on property” hardware compared to the Cloud-based one. It gives the hoteliers total control: data and the system, system configurations, networks, updates, and changes are all yours to decide
  • Running the On-premises PMS means hoteliers must maintain a dedicated server room, which also needs an effective cooling system and an around-the-clock support team to keep everything up and running smoothly
  • With the cloud computing vendors, the PMS providers would be responsible for most of the IT operations expense. The hoteliers can also get the advantages from the cloud computing vendors’ highly available servers, at their optimal performance.
  • ...6 more annotations...
  • The hidden cost includes hardware server costs, additional IT staff expenses to manage the system infrastructure, maintenance fees (yes, more maintenance fees), and the expenses of other 3rd party software integrations
  • A cloud-based PMS has a much lower entry cost. They charge a fixed monthly subscription model, with a small initial setup fee. No server cost, maintenance fee, extra human resources cost, lower energy bills and is an extremely affordable budget for small and medium scaled hotel businesses
  • Although you can set up your On-premises PMS to be accessed from an off-site workstation or device, remote access can be affected by various factors. Getting real-time data can certainly be challenging, especially not at the speed that cloud-based PMS delivers
  • Undoubtedly, On-premises PMS is still ahead of the Cloud-based system when it comes to the number of integration capabilities, the flexibility of built-in reports that got customized, added over the years. 
  • a security breach can happen, losing your internal data, your brand reputation, revenue loss is unavoidable. 
  • It explains the widespread adoption of cloud-based systems. The only thing you have to hold responsible for is your Internet connectivity which is basic infrastructure any hotel should already have in place. In fact, the switch to cloud-based PMS is not impossible for the existing On-premises system.
  •  
    When it comes to deciding whether you should switch to cloud computing or remain with on-premises PMS, it all depends on your company. Many people fail to see the hidden costs associated with on-premise PMS such as hardware costs, IT staff to manage the infrastructure and expenses coming from 3rd party software integrations. Although on-premises PMS can be more customizable for companies, cloud-based systems are dominating. They reduce costs, are highly accessible in real time, fees are consistent, and are highly secured.
13More

What is Network Redundancy and Why Does It Matter? - 0 views

  • The underlying concept of redundant networks is simple. Without any backup systems in place, all it takes is one point of failure in a network to disrupt or bring down an entire system. Network redundancy is the process of adding additional instances of network devices and lines of communication to help ensure network availability and decrease the risk of failure along the critical data path.
  • All valuable data should be backed up regularly, preferably in another location. A good data center location strategy maps out the best places to replicate and store data so it can be easily accessed in the event that other redundant systems fail and the main network goes down. By using more than one data center, companies can ensure that even if some disaster occurs, they will be able to carry on with minimal disruption.
  • Colocation data centers regularly conduct tests to assess the integrity of their backup systems and redundant networks. They can test different connections by physically disconnecting hardware to make sure failover occurs as anticipated. If things do not go as planned during testing, data center managers then create an after-action report that lists the items they need to fix as a result of the testing. They also create a procedure to follow for both automatic and manual flip over. 
  • ...8 more annotations...
  • For many companies, their networks are the primary point of contact for delivering products and services to their customers.
  • A network outage, then, whether it's caused by equipment failure, an unexpected cyberattack, or some form of human error, can be devastating for a business. Every moment of system downtime translates into very real financial losses in the form of lost revenue, diminished brand reputation, and missed opportunities.
  • Network redundancy is the process of adding additional instances of network devices and lines of communication to help ensure network availability and decrease the risk of failure along the critical data path.
  • Without any backup systems in place, all it takes is one point of failure in a network to disrupt or bring down an entire system. Redundancy in networks helps to eliminate single points of failure to ensure better network stability and uptime in the face of events that would otherwise take the network offline.
  • fault-tolerant redundant system provides full hardware redundancy, mirroring applications across two or more identical systems that run in tandem.
  • Ideal for any operations in which any amount of downtime is unacceptable
  • A software-based redundant system, high availability uses clusters of servers that monitor one another and have failover protocols in place.
  • there is a brief loss of service while the backup servers boot up applications.
  •  
    Network redundancy is the process of adding network devices and other instances of communication lines to help ensure network availability and reduce the risk of failures on critical data paths. One of the first steps in the network redundancy plan is to create a network strategy that reviews the existing infrastructure. A high-quality hosted data center should have an extensive backup system to ensure that it is always available. All valuable data should be backed up regularly, preferably in another location. By using multiple data centers, companies can ensure that even if certain disasters occur, they will be able to proceed with minimal losses. In addition, a well-maintained UPS system ensures that the server can be switched from power to backup generator power without losing any data or applications.
  •  
    A network outage whether it is due to a cyber attack or simple human error can be devastating to a company. It makes them look very bad, damaging their reputation, and can cost the business millions of dollars. Network Redundancy can help ensure network availability and decrease the risk of failure. There are 2 forms of redundancy. Fault Tolerance where there is a mirrored backup system that takes over with no loss of service, and High Availability where the backup servers take over and restart applications that were running on the failed server.

CARNIVAL IS LATEST TRAVEL BRAND HIT WITH RANSOMWARE ATTACK - 0 views

started by mrodr1442 on 31 Aug 21 no follow-up yet
7More

What Will Smart Homes Look Like in 10 Years? | Time - 0 views

  • manufacturers are putting their R&D and marketing budgets behind home-monitoring and security gadgets–they will have 22.6% of the smart-home market share by 2023, estimates research firm IDC, with smart speakers and lighting equipment not far behind, at 15.4% and 11.8% respectively
  • cybersecurity will become all the more vital. Any kind of massive breach that turns off consumers, says Daniel Cooley, chief strategy officer at electronics-component manufacturer Silicon Labs, could be catastrophic for the industry. “I call it a mass-extinction event for the Internet of Things,” he says.
    • jblan183
       
      This can hint towards a huge improvement with a huge risk; a house with everything you could ask for being automated for your convenience could be easily hacked and just like that, your personal information is taken and shown to the entire world, or used to the hacker's advantage. My tip: tread carefully if you wish to buy a smart home or invest in a smart home company.
  • Smart vacuum cleaners like iRobot’s Roomba are already picking up after us, while products like the Aibo, a robotic dog for children, show how they might help keep us company like a pet. As for the future? Robotic-furniture company Ori Living is working with Ikea on pieces that change based on your needs, getting the bed out of the way when you need a desk, or hiding your closet when it’s dinnertime.
  • ...2 more annotations...
  • A bill put forth by Virginia Senator Mark Warner in March would push the government to set up minimum security requirements for smart devices used by federal agencies; such requirements could eventually become standard for the industry at large.
    • jblan183
       
      Hacking could become rare with this bill, with any smart device requiring minimum security requirements that would force all smart device businesses to comply to the eventual standard of the industry.
  • All the automated attentiveness will come with a high price tag: consumers will spend $123 billion on IoT gear by 2021, according to advisory firm ABI Research, a number that’s likely to rise thereafter.
13More

Three ways technology is improving hotel security | TOPHOTELNEWS - 3 views

  • Mobile keys are making an entrance, and this means added security for guests. In some instances, the technology can alert guests and hotel management when someone has entered the room or tried to get in.
  • Many properties are expanding the number and locations of cameras, upgrading hardware, and using better software to run and monitor the cameras. Some of the more advanced systems offer low-light vision, facial recognition, and movement and color recognition analysis software.
  • To combat cybercrime, hotels are taking steps to incorporate more advanced firewalls, limiting who has access to data, and securing mobile devices of employees.
  • ...6 more annotations...
  • Mobile keys are making an entrance, and this means added security for guests. In some instances, the technology can alert guests and hotel management when someone has entered the room or tried to get in.
  • Mobile keys are making an entrance, and this means added security for guests. In some instances, the technology can alert guests and hotel management when someone has entered the room or tried to get in.
  • 2. Hotel security monitoring systems get an upgrade
  • ware to run and monitor the cameras. Some of the more advanced systems offer low-light vision, facial recognition, and movement and color recognition analysis software.
  • 3. Hotel security and cybercrime
  • New technology, such as mobile key cards, advanced monitoring systems, and cybercrime initiatives are working to protect property and personal information, so travelers can always feel more secure.
  •  
    In this article, TOPHOTELNEWS highlights three ways technology is reducing incidences of theft, assault, and data breaches in the hotel industry. Mobile keys allow guests and hotel staff to monitor who enters a room and when, limiting the chances of theft. Security cameras now offer low-light vision and facial recognition, and their decrease in size allows for discrete placement. Cybercrime initiatives are also working harder than ever to secure delicate information by developing advanced firewalls. Each of these advancements allows travelers to feel more secure in their "home away from home."
  • ...1 more comment...
  •  
    This is a great article as the hotel that i work for as many of these same features including the mobile keys, and high definition security cameras and a great team at the back of it. Although it is all good to have those features having the right team makes a huge difference. I have many examples with while being at the hotel probably having a difficult interaction with a guess the security team call me to make sure that i am ok. This made me feel safe to the highest extent that they are watching and alert.
  •  
    This article discusses three ways that hotel security is being enhanced by technology. One way is by mobile keys. Customers no longer have to use physical keys. They can simply use their mobile phone to open room doors. They don't have to worry about their keys going into the wrong hands. The second way is cameras. Modern cameras are smaller and are more easily hidden and can more accurately take pictures of the faces of persons who enter and exit hotels. The third way is to enhance the cybersecurity of the hotels' computer systems.
  •  
    This article discusses the ways a hotel can implement security measures to keep guest information and company's data safe.
10More

Innovation in event management - a vision of the future - 0 views

  • With video conferencing tools like Zoom and Google Meet quickly becoming part of our daily working lives, speakers have still been able to reach an audience, and conferences have still been able to take place.  
  • One thing is clear for the events industry: it will not entail jumping right back into pre-Covid norms.
  • “Hybrid events are expected to be the norm in the new Covid-19 environment, with a blend of virtual and physical elements, while retaining the ‘live’ aspect that fulfils the need to connect and network,” says Carrie Kwik, Singapore Tourism Board’s (STB) executive director, Europe.”
  • ...6 more annotations...
  • Therefore, it is critical for our industry to pivot and adapt to new event formats and business models.” 
  • Singapore is well positioned to pioneer these new models.
  • According to Singapore’s Economic Development Board, the city state plays host to 59% of the Asian regional headquarters of multinational tech companies.
  • ttendees could be given an RFID token that blinks red when a person breaches safe social distancing guidelines, while movement tracking could take place via beacon or Bluetooth technology. 
  • For this reason, STB is developing a suite of initiatives to help tourism businesses in Singapore build the capabilities they need to succeed in the digital age.  
  • As digital/virtual becomes a key feature of many events in future, a successful venue may be one that can adapt its physical spaces and technological bandwidth to embrace this feature.” 
  •  
    This article covers how Singapore is one of the leading countries in innovation when it comes to event management. It goes into discussing the new normal and how the Singapore Tourism Board's reacted to it. In addition, there is statement explaining how Singapore's largest venue is now being used as a hybrid broadcast studio. They have taken this time during the pandemic to pilot innovative schemes and use it to not only adapt to the current crisis but also think ahead to the future of events. With that said, COVID-19 has pushed for for a flow of disruptive innovators in the event management industry. This is shown in the hybrid version of events.
1More

The Importance Of Keeping In-House Computer Systems Up-to-Date - 0 views

  •  
    Security is one of the biggest reasons to keep everything updated. Some software developers release the issues when they find a new version. This lists the problems with security in the old version that have been fixed. If the systems are not updated, hackers use the old now-known flaws in the systems to breach it. It is also important to update to maintain compliance with all regulations and the current laws.
16More

How COVID-19 has accelerated tech adoption in the hotel industry | Hotel Management - 0 views

  • exponential technology.
  • refers to both the rapid improvements in cost and performance
  • Smart capacities and services that were previously considered add-ons to the guest experience will quickly become requirements in the post-pandemic hospitality space.
  • ...12 more annotations...
  • Investing in integrated online booking platforms that help to supplement staff efforts and create a seamless, personalized experience is the best way to ensure the guest has a positive brand experience
  • Hoteliers are using app platforms to track spaces used by guests and ensure a thorough sanitation before their next use
  • Integrated app platforms can help guests order room service or a morning coffee, reserve a spot out on the pool deck or communicate virtually with a staff member for instant assistance
  • Reward programs are meant to incentivize returning business without alienating first-time customers, or overemphasizing the different levels of guest perks.
  • A personalized guest app can offer different levels of accommodation.
  • Their choices and preferences could be logged as data and shared with the staff to help personalize their next stay.
  • Wearable technology has gained in popularity as a way to monitor guest activity, manage contact tracing, and help control the spread of the virus
  • also offers valuable feedback for consumer analysis
  • The more that guests are able to be tracked and recognized, the more they deserve to know their data is safe.
  • App platforms should have a section detailing which guest operations remain completely private, the rules and regulations regarding the use or sale of customer data, and the consequences that apply if any rules are breached.
  • Accelerated adoption of technology will transform the hotel sector at a rate even more extreme than once predicted
  • Smart tech will offer benefits to customers and staff alike, elevating the guest experience and making new levels of personalized hospitality possible.
  •  
    *The hotel industry has incorporated exponential technology for its improvements in cost and performance -an implementation that evolved rapidly during the pandemic that hasn't been seen before. *Smart technology has offered benefits to customers and staff while elevating the guest experience on a personalized hospitality way.
1More

The new ways cybercriminals are attacking travel companies | PhocusWire - 0 views

    • apere870
       
      This article discusses the new way cybercriminals are attacking travel companies. It seems that cyber breaches are more common now with businesses in the hospitality sector. The main target for hackers is small hotel chains that don't have adequate infrastructure.
« First ‹ Previous 221 - 240 of 253 Next ›
Showing 20 items per page