Skip to main content

Home/ Hospitality Technology/ Group items tagged breach

Rss Feed Group items tagged

amdelgad

All Bets Are Off on Casinos and Cybersecurity | UpGuard - 0 views

  • better malware tools and access to deep funding make today's cyber criminals more than a bad movie, especially when lucrative payloads are for the taking.
  • In May 2015, attackers were able to steal cardholder names, credit card numbers, and CVV codes belonging to hotel guests and customers. In 2016 they suffered similar incidents due to malware being installed on POS systems, allowing attackers to steal customers' credit card information.
  • It may come as no surprise that casinos and gaming firms are ideal cyber attack targets, but how competent are these enterprises when it comes to rudimentary security?
  • ...1 more annotation...
  • Online gambling upstart Ignition Casino offers Blackjack, Slots, Poker on its website; fortunately, the company has also taken the requisite security measures for bolstering its website security and email security.
  •  
    This article focused on cybersecurity in hotel casinos. They mention how casinos seem to be a target for a lot of cyber attackers because they tend to not invest as they should on protecting themselves. Casinos hold a TON of financial data; customer info., bank info., and credit card info. I enjoyed the article because they even went as far as giving a few casinos a "security score" in how well/bad they are in staying secure.
amajo017

Hotel Technology Challenges for Every Hospitality Business - 2 views

  • Interoperability Data Management Security & Privacy Responsiveness
  • ue to the lack of standardization and specialized hospitality technology solutions, most hotels tend to develop their own proprietary solutions to manage assets.
  • Non-standardized technology can induce added learning times & on-boarding periods for guests.
  • ...17 more annotations...
  • This issue readily highlights the significance of applied technology management.    
  • Knowing and understanding customers is essential in predicting their behavior, future visits, and demands.
  • As the amount of data grows within hotel databases, the responsibility of back office management is quadrupled.
  • Authorization for data access, network & database security, and centralized database management are major concerns for hotels in the coming age. 
  • everal news outlets and hospitality professionals have already identified that hospitality companies are one of the most susceptible to data breaches. 
  • Hotel technology infrastructures must ensure that all digital interactions with guests are reinforced through robust security tech & privacy rules
  • Most hotels are handicapped by the knowledge and expertise they carry on the subject. A more reasonable idea is to consult with a technology management company that offers better insights, suggestions, and security framework designs for hotels. 
  • Advanced Hospitality has helped various hospitality ventures take root and develop their competency with technologies.
  • Hotels also need to enhance responsiveness for renovations and routine maintenance.
  • A responsive hotel tech infrastructure demands stronger resources, simpler network mapping, and seamless synchronization with hotel back office systems. 
  • Hospitality technology may be the most amazing transition to occur in the hospitality industry but remember it does come with a cost.
  • An efficient & effective hotel technology must be responsive and should acknowledge guest requests instantly.
  • thering gue
  • Gathering guest data is essential to the success of any modern business, hotels are no different.
  • Data management carries great emphasis in European countries, more so than their North American counterparts. While the current US government believes in a more lenient approach towards data retention and privacy,
    • amajo017
       
      Will be useful with regards to the lack of data privacy in US
  • With multiple point-of-sale (POS) touchpoints, an even larger number of smart devices, and that data from both demands a secure hotel network. Denying cybercriminals access to the network and preventing them from spying on guest devices is now essential for every business.
  • Highly optimized & synchronized systems leave almost no gaps when fulfilling guest requests. These technological marvels can even complete guest requests faster than hotel staff at times. This efficiency delivers a seamless guest experience while improving the responsiveness of technology. 
  •  
    This article discusses research that shows four hotel technology challenges in 2019. These challenged include Interoperability, Data Management, Security & Privacy, and Responsiveness. It argues that hotel management should be aware of these technologies because they can either help or hinder your business.
  •  
    This is an excellent article that explores that businesses in the hospitality face in their day to day running. The challenges that the article points out identifies include the interoperability of hotel technology systems, the management of data, the security and privacy of data, especially in the current era of cloud computing, and the responsiveness of hotel technologies. Although hotel technologies improve guest experience and foster efficiency in hospitality companies, such challenges may adversely their efficiency, and thus, adversely affect guest experience.
  •  
    This article discusses what we talked about this week in regards to the different types of technological disruptors in the hospitality industry. It discusses data management issues, privacy issues, and how responsiveness can be improved within hotels. This article will be useful for future research as I look more into artificial intelligence within the hotel industry.
mmdmd99999

JOSHUA BERGEN - ProQuest - 0 views

  • From PCI DSS compliance to privacy, the company's president stresses the importance of education in ensuring data security
  • "It's very ironic now being that what we do, data security and privacy and protection in the credit card environment because what led me to the accounting world was finding credit-card fraud in my reservation department and reporting it," Bergen said.
  • Bergen divided Venza's business into three areas: privacy regulation compliance, data protection and Payment Card Industry Data Security Standard compliance. Between the three groups, Venza's services include antivirus, backup recovery, data-breach notification, firewall management, information risk assessment, penetration and segmentation checks, privacy management and remote monitoring. Outside of these central services, the company also provides an educational human-resources suite consisting of modules in sexual-harassment prevention, diversity and guest relations, antibribery and acceptable use of a company's network, website and equipment.
  • ...2 more annotations...
  • Called Project Basecamp, the program will reach out to 500 students at 10 universities with hospitality programs and educate them about technological and financial security. "I've jokingly said if I do agood enoughjob, they should actually need less service from us," he said.
  • Companies may have incredibly advanced equipment, firewalls and encryption, he said, but all it takes is one accidental mistake from someone within the system and all of that technology becomes moot. "So that's why we focus on what we call the human firewall," he said. "They are the most valuable asset in all of this." Sidebar
  •  
    PCI DSS compliance to privacy to data security
mmdmd99999

PCI Compliance: What Every Hotelier Should Know and Do | hospitalityupgrade.com - 0 views

  • Payment Card Industry Data Security Standard (PCI DSS) compliance has become a very important consideration for hotels.  Some hotels are not in compliance and don’t even know it.  There are significant penalties associated with non compliance including lawsuits, audits, fines and even losing the ability to process credit card payments.
  • PCI compliance is about network and computer security
  • such as securing paper documents, proper shredding of documents and document retention
  • ...3 more annotations...
  • Network segmentation and the use of firewalls is very important.  No email or Web surfing should be done on the secure side of a network.
  • “How to be compliant,” that has additional links to each credit card brand.
  • There are levels of merchant compliance.  A level 1 merchant processes more than 6 million transactions annually.  This level requires an annual onsite security audit and quarterly network scans.Level 2 merchants process between 1 million and 6 million credit card transactions annually.  This level requires an annual self assessment and quarterly network scans.Level 3 merchants process between 20,000 and 1 million e-commerce transactions annually and have the same compliance requirements as level 2.Level 4 merchants process fewer than 20,000 e-commerce transactions a year and require annual self assessments and network scans.Data security breaches can cost a hotel an average of $182 per compromised record.  This does not include the cost of defending a lawsuit, if one is brought, or fines for non-compliance from individual credit card brands.
  •  
    PCI compliance, what is it, how to make sure you are compliant, why do we care?
jbrit055

Shopkick | The Mobile Proximity Marketing Advantages and Disadvantages Retailers Must Know - 0 views

  • The mobile market is maturing, with 82% penetration anticipated by 2020 in the US.
  • Beacon technology, which powers proximity marketing, results in an estimated 40 million messages a year, and that number is ever increasing. As a result, the retail industry must be sure it is primed to take full advantage of this technology now and in the coming years.
  • While proximity marketing is ideal for targeting the right audience at the right time, it’s also a complex and emerging marketing style that’s bound to have to work out a few kinks.
    • kmill139
       
      Once they fix the kinks they'd be able to make this a really great marketing tactic.
  • ...41 more annotations...
  • The Mobile Proximity Marketing Advantages for Retailers
  • The retailer added beacon technology to their stores in advance of Black Friday in 2015 through its Walk In and Win campaign. Macy employees and advertisements notified visitors of the upcoming event, encouraging them to download the store app in order to stay in the loop. Then, to incentivize consumers on Black Friday, users were given the opportunity to win prizes and play games via their mobile devices whenever they entered a Macy’s store.
  • Increased brand awareness:
  • Engaged users:
  • An automated edge:
  • Insights on purchase behaviors:
  • High-performing, innovative third-party retail apps provide proximity marketing that retailers can easily implement while avoiding many logistical concerns. Reputable partner apps have strong systems in place to prevent data breaches and have the experience to know how to interact with consumers without being intrusive.
  • However, there are some challenges to be aware of. As it’s an emerging marketing technique, there are still some challenges to be aware of before you implement the technology in your store.
    • kmill139
       
      The only downside I can see with this type of marketing is that it only works if the person has the app of the store downloaded. If not they will not see the ad whatsoever.
  • The Challenges of Proximity Marketing and its Disadvantages
  • Conversion issues:
  • Excessive opt-ins:
  • Management complexity:
  • Privacy concerns:
  • While proximity marketing is not without its disadvantages, many of these concerns can be resolved by choosing to partner with a trusted third-party mobile app. By capitalizing on the expertise of third-party companies, retailers of all sizes are able to achieve high conversion rates with beacon-based proximity marketing campaigns.
  • Higher conversion rates:
  • With the majority of adults now with a smartphone in hand, it stands to reason that retailers will want—and need—to leverage these devices to gain foot traffic, sales, and new customers.
  • employs geolocation to market to consumers within physical reach of a store
  • proximity marketing could be a valuable resource for increasing market share and brand awareness
  • minimizing expenses and easily gaining the attention of an existing consumer base
  • This is an emerging platform that companies are just beginning to utilize
  • retailers who choose to use it can garner a lot of attention.
  • doesn’t require much effort
  • unique
  • It is estimated that 57% of consumers are likely to engage with location-based advertising
  • If your target audience is asking for it, it can be assumed that it will be a sure-fire way to gain a bigger following.
  • you’re notifying an audience who is already motivated to buy.
  • drive their sales and increase brand awareness
  • It’s automatic; technology does the work for you.
  • the data it creates.
  • You can see what drives your consumers to buy, whether it’s discounts, informational videos, or interactive campaigns. This allows you to adjust future strategies accordingly.
  • improve customer conversion
  • drive brick and mortar sales
  • It can be difficult to predict which approach will be successful when you are implementing new marketing-based technology
  • they don’t use a majority of those apps regularly.
  • The more screens they must approve, the less likely they’ll be to finish the installation process and start to engage with your brand.
  • It requires the right hardware and programming as well as an expert to monitor it.
  • you’re responsible for its safekeeping
  • this data could be highly desirable for cyber criminals. Companies need to be prepared to not only store but also strongly protect this data.
  • Third-party apps strike the right balance between respecting a consumer’s privacy while providing timely marketing.
  • They also manage and consolidate the user agreements necessary to collect consumer data
  • you can gain access to a user base that is already active and engaged
  •  
    This article discussed the pros and cons of mobile proximity marketing and how to possibly overcome the downfalls of the type of marketing.
  •  
    privacy concerns, complex management, excessive opt-ins, conversion issues
  •  
    There can be many benefits and negatives to introducing new technology into your company. While it can be interesting to see new marketing methods for a company, these results can also be temporary. A company wanting to integrate these new marketing methods into their business will have to identify if their audience would react well with this new form of marketing and make their choices based on those results.
ariellesmall

Is robotics taking over hospitality? Yes and no | PhocusWire - 0 views

  • While the pandemic may have emphasized distancing and limited touch points, the art of hospitality would be completely lost without the human element performing tasks that go beyond the programmed capabilities of artificial intelligence and sentiment analysis.
    • jalilahst
       
      Hospitality needs human interactions
  • robotic tech can be a great option for limiting touch points between guests and staff and improving the overall health and safety throughout the hotel.
    • jalilahst
       
      The positive consequence to robotic technology during the global pandemic.
  • they can boost both efficiency and productivity when it comes to managing day-to-day tasks, like checking guests in or tracking guest requests.
  • ...7 more annotations...
  • Robots have an infinite capacity for storing and remembering data and can help staff to personalize the guest journey.
  • While robotic tech is becoming more readily available, implementing the latest technology can be expensive.
  • I believe that successful hotels will look to a hybrid approach now and in the future. Start in the area that will have the greatest impact:
    • jalilahst
       
      agreed
  • Robots could be susceptible to errors and security breaches, so ensuring that any data collected by robots is secure is key.
  • While the pandemic may have emphasized distancing and limited touch points, the art of hospitality would be completely lost without the human element performing tasks that go beyond the programmed capabilities of artificial intelligence and sentiment analysis.
  • robotic tech can be a great option for limiting touch points between guests and staff and improving the overall health and safety throughout the hotel.
  • Robots have an infinite capacity for storing and remembering data and can help staff to personalize the guest journey
  •  
    Hospitality has a need for human interactions. However 52% of travelers believe automated systems are safer. This article discusses the pros and cons of using robotic technology in hospitality. Then it goes further to show that the best options is to integrate some robotic technology in places where employees are overwhelmed in.
  •  
    Even though there was many innovations of technology that has occurred. There is nothing like a personal touch. Guest love to communicate with a human to be able to get a real and honest opinion.
mmdmd99999

Disadvantages of Cloud Computing - Cloud Academy Blog - 0 views

    • darielmolano
       
      Despite its benefits, cloud computing has its disadvantages. An outage could happen as well as downtime. Now, there are ways to minimize the effects of downtime and outage such as multi-region deployments
  • Cloud computing has benefited many enterprises by reducing costs and enabling a focus on one’s core business competence
  • here can be disadvantages to cloud computing, especially in smaller operations.
  • ...15 more annotations...
  • key disadvantages and share tips and best practices that your teams can employ to address them.
  • Since cloud computing systems are internet-based, service outages are always an unfortunate possibility and can occur for any reason.
  • Best practices for minimizing planned downtime in a cloud environment
  • storing data and important files on external service providers always opens up risks.
  • Their dependence on remote cloud-based infrastructure meant taking on the risks of outsourcing everything.
  • Best practices for minimizing security and privacy risks
  • Best practices to help you reduce cloud attacks
  • Even the best teams suffer severe attacks and security breaches from time to time.
  • Since the cloud infrastructure is entirely owned, managed, and monitored by the service provider, it transfers minimal control over to the customer.
  • Best practices for maintaining control and flexibility
  • asy switching between cloud services is a service that hasn’t yet completely evolved, and organizations may find it difficult to migrate their services from one vendor to another.
  • Best practices to decrease dependency
  • Pay-as-you-go cloud services can provide more flexibility and lower hardware costs, but the overall price tag could end up being higher than you expected.
  • Best practices to reduce costs
  • the suitability of cloud computing for your specific use case should be assessed in a risk-based evaluation.
  •  
    Cloud computing has its disadvantages like outage and downtime
  •  
    This article speaks on some disadvantages of Cloud computing all while providing ways to tackle these threats. For example, other than the main and common disadvantages it also touches on is the switching between cloud services. This can be seen due to the lack of growth within the cloud system. Eventually the gaps between servers can cause risk of security and loss of information.
  •  
    cloud computing disadvantages: downtime, security and privacy, vulnerability to attack, limited control and flexibility, vendor lock-in, cost concerns
dvieg001

Hotels in hackers' sights as technology replaces personal touch | Financial Times - 1 views

  • Hotels and hospitality businesses are now the third most targeted by cyber attackers of all industry sectors.
  • they have become a rich mine of data for hackers with nefarious intentions.
  • Hackers see international hotel chains, which process a huge volume of transactions, as easy pickings
  • ...6 more annotations...
  • he increased use of technology to replace face-to-face services such as check-in and on-site payments has only raised this risk.
  • One of the most high-profile cyber incidents in recent times was the breach of Starwood’s database in 2014, before the group was bought by Marriott, the world’s largest hotel chain. That hack, which was only discovered after the deal, exposed the data of about half a billion customers, Marriott said, when it revealed the impact in 2018.
  • The company sped up planned investment into data security and improved technology, such as software that detects suspicious cyber behaviour in real time, Van der Walt adds.
  • As cloud computing services have expanded, hotels have pushed more data storage towards external holders such as Amazon Web Services or Oracle
  • Many hoteliers additionally employ third-party agencies to manage credit card details and keep different forms of data separate:
  • And with guests demanding an increasingly personalised and individually-tailored service, particularly from the well-known hotel brands, data is likely to remain a precious commodity in need of protection.
  •  
    This article explains how and why hotels went from being in the bottom 13% to the top 3 most targeted industry for cyber attacks. It talks about how the implementation of technology to handle customer date has made the industry vulnerable and also how corporations are battling the issue by using separate third party companies to store data and handle credit card information.
kyleemcroberts

What is E-Marketing? Features, Types & Advantages | Marketing Tutor - 0 views

  • Web marketing, digital marketing, internet marketing or online marketing; all of these words are synonymously used for E-Marketing.
  • technologies and media to connect customers
  • e-marketing has become a very important part of the marketing strategy of different companies.
  • ...27 more annotations...
  • E-marketing is Cheaper than Traditional Marketing
  • Cost-Efficient.
  • how much sales the business has been made as a result of e-marketing.
  • Instant Response
  • Tangible ROI
  • Disadvantages of E-Marketing
  • ability to collect a wide range of data about your customers.
  • feedback from your target market.
  • Personalized Marketing.
  • exposure
  • e-marketing is that it’s accessible from everywhere across the globe.
  • increase the number of visits
  • No risk at all.
  • competition
  • Privacy & Security Issues.
  • Price competition also increases with higher transparency.
  • fast-changing technological environment,
  • cost is very high.
  • Types of E-Marketing
  • Email Marketing
  • efficient and effective
  • cheap but also very effective.
  • Social Media Marketing
  • Directly communicating with your customers can increase brand loyalty.
  • dependent on technology
  • Video Marketing
  • Video marketing is very effective if it conveys the right message to the right audience. 
deranique

Experts at Davos 2023 sound the alarm on cybersecurity | World Economic Forum - 0 views

  • 2023 will be a consequential year for cybersecurity.
  • "There's a gathering cyber storm,"
  • "This storm is brewing, and it's really hard to anticipate just how bad that will be."
  • ...17 more annotations...
  • cyberattacks such as phishing, ransomware and distributed denial-of-service (DDoS) attacks are on the rise.
  • Cloudflare
  • a major US cybersecurity firm that provides protection services for over 30% of Fortune 500 companies
  • "There's been an enormous amount of insecurity around the world,"
  • "I think 2023 is gonna be a busy year in terms of cyber attacks."
  • Experts warned that cyberattacks are increasing in sophistication and frequency.
  • “This is a global threat, and it calls for a global response,”
  • “This is a global threat, and it calls for a global response and enhanced and coordinated action,” Jürgen Stock, the Secretary-General of the International Criminal Police Organization (INTERPOL),
  • “The key to winning the battle against cybercrime is, of course, to work together to make it a priority across the geopolitical fault lines.”
  • This concern has been raised particularly around critical infrastructure sectors like energy, public transportation and manufacturing. SecurityScorecard, a US cybersecurity rating and analysis firm, reported recently that 48% of critical manufacturing companies surveyed were at significant risk of a cyber breach.
  • “Vulnerabilities within the critical manufacturing sector haven’t gone unnoticed by cybercriminals either,” said Aleksandr Yampolskiy, SecurityScorecard's CEO.
  • The Forum's report also notes that the potential targets for cyberattacks are increasing. Today, targets include not only government agencies or major corporations, but largely any organization that handles consumer data—no matter how small.
  • There is no such thing as a hundred percent security. It's about resilience in the face of insecurity.”
  • Consumers, too, need to increase their cybersecurity awareness in 2023, experts say.
  • As more things get connected to the internet there's just more risk. ”— Matthew Prince, Cloudflare CEO
  • Zero Trust approach to cybersecurity, which creates a framework that eliminates implicit trust and ensures that any user—even those who are supposed to be inside an organization's network—is authenticated and validated at every turn.
bbalthaser

Cybersecurity Budgets Increase for Retail & Hospitality Industry - 1 views

  • 70% of CISOs expect their budgets to increase again this year, while 60% also expect more FTEs, according to the CISO Benchmark Report released today from the Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC).
  • This year, business disruption emerged as a top 10 (No. 7) risk that organizations currently face, up seven spots from No. 14 in 2021. Similarly, 50% of CISOs now have business continuity/disaster recovery as part of their core responsibilities, an increase of 11 percentage points since last year.
  • very few CISOs have fraud as part of their core responsibilities, according to the report.  
  •  
    Chief of Information Security officers (CISO) report summarizes that hospitality and retail industries will be spending more accounting for 70% more providers. The report looks at a variety of benchmarks to assess like budgets and personnel. Fraud is not as prioritized as one might think and this time the focus is on business disruption. One core of responsibility seen by at least 70% of CISOs is of continuity and disaster recovery. They are also examining a new benchmark which is staff function priorities. The evolving of the industries is why cybersecurity threats are so complex. The report provides vital information to benefit CISOs on trends. The report in question is very interesting in how it examines what people are spending on their IT security budgets and breaks down where that money is being utilized and staffing. This would be a useful tool for hospitality providers looking to increase their budget because they can analyze other providers and what is currently trending in terms of threats and how to allocate assets whether money or personnel. If the biggest threat to providers is disruption then having an emergency action plan in place would highly benefit providers under underbudgeting. This would be a great tool for any organization to plan their IT strategy with security in mind.
kbroo026

What hotels need to know about biometric privacy laws - Document - Gale OneFile: Hospit... - 0 views

  • In order to avoid liability, employers should become familiar with biometric privacy acts, consumer privacy acts and data breach notification requirements.
  • Currently, three states have enacted biometric privacy laws: Illinois, Texas and Washington.
  • Illinois Biometric Information Privacy Act.
  • ...6 more annotations...
  • BIPA restricts the ability of a privacy entity to "collect, capture, purchase, receive through trade, or otherwise obtain a person's or a customer's biometric identifier or biometric information."
  • The Illinois legislature stated that heightened protection for biometric information is justified by the fact that once this type of information has been compromised, it obviously can't be changed (without some serious cosmetic surgery, anyway).
  • Employers also need to be aware of local laws and regulations.
  • Portland
  • bans the use of facial recognition technology by private entities in places of public accommodation, which include hotels and restaurants.
  • With the patchwork of laws and enforcement procedures, the enactment of a uniform federal law would be beneficial.
  •  
    Several states have implemented some form of biometric privacy laws, with the gold standard coming from Illinois. Illinois' BIPA allows for private enforcement, stiff fines, and paying of attorney fees. BIPA prohibits collection, capture, purchasing or receiving a customer's biometric identifier/information. Safeguarding this data is perhaps more important than any other because it cannot be easily changed, if at all. Current lack of federal law and a patchwork of local regulations means that businesses and employees must be knowledgeable of rules and rights that affect them.
chadidscha

Cyberattacks are surging. CT's workforce isn't keeping up - 0 views

  • A growing wave of cyberattacks is threatening governments, businesses and everyday residents. Across the globe, there is a critical shortage of skilled professionals to guard against these criminals.
  • The state’s cybersecurity workforce increased by only 1 percent between 2015 and 2020, which was the seventh slowest rate in the nation, according to data from the Bureau of Labor Statistics. By comparison, the ranks of these key professionals more than doubled in a dozen states over that timeframe.
  • Globally, cybersecurity experts are in extraordinarily high demand. An analysis from Cyberseek, a public-private partnership that measures cybersecurity workforce shortages in the United States, notes the talent gap is severe in every state besides Maine.
  • ...1 more annotation...
  • Nationally, the number of unfilled cybersecurity jobs is estimated to be 464,000, including 3,800 in Connecticut, according to Cyberseek, which is backed by a subdivision of the U.S. Department of Commerce.
  •  
    Cyber-attacks has become an increasing problem within the US and the lack of unfulfilled jobs regarding cyber security poses just as big, if not bigger, of a problem. All states, besides Maine, are in dire need to fulfill jobs across the private business sector and government related positions. At this point, many companies, including the government, offer free training (acquiring proper certifications) in hopes of gaining more employees to help with the fight against cyber war.
« First ‹ Previous 241 - 253 of 253
Showing 20 items per page