Skip to main content

Home/ Hospitality Technology/ Group items tagged breach

Rss Feed Group items tagged

tgore002

Apple Was Slow to Act on FaceTime Bug That Allows Spying on iPhones - The New York Times - 0 views

  • The FaceTime problem has already been branded “FacePalm” by security researchers, who say Apple’s security team should have known better. Rarely is there a software flaw that grants such high-level remote access and is so easy to manipulate: By adding a second person to a group FaceTime call, you can capture the audio and video of the first person called before that person answers the phone, or even if the person never answers.“If these kinds of bugs are slipping through,” said Patrick Wardle, the co-founder of Digita Security, which focuses on Apple-related security, “you have to wonder if there are other problematic bugs that other hackers are exploiting that should have been caught.”
dbonn009

http://www.hotelnewsnow.com/Articles/291683/Marriott-hit-by-hotel-industrys-largest-dat... - 1 views

This article illustrates the severity and impacts of a data breach of Marriott's guests over a four year span.

started by dbonn009 on 18 Mar 19 no follow-up yet
tricc003

Hyatt launches bug bounty program | Hotel Management - 0 views

  • The new initiative is designed to allow Hyatt to “tap into the vast expertise of the security research community to accelerate identifying and fixing potential vulnerabilities.”
  • Hyatt Hotels has launched a bug bounty program via HackerOne, seeking to reward researchers who find vulnerabilities in its sites and apps.
  • The ethical hackers can use the platform, as well as rival services such as Bugcrowd, to report vulnerabilities, security flaws, leaky servers and more before less well-intentioned individuals stumble across them, potentially leading to cyberattacks or data theft,
  • ...3 more annotations...
  • Back in 2015, 250 properties managed by Hyatt across a number of countries, including the U.S., UK, China, Germany, Japan, Italy, France, Russia and Canada, were subject to a cyberattack.
  • Researchers who report valid, high-severity flaws can expect rewards of up to $4,000; important bugs will earn them $1,200 and less severe vulnerabilities are worth between $300 and $600.
  • A second data breach, in which 41 locations were affected and unauthorized access to payment card information was detected, occurred in 2017.
  •  
    Several different hotel chains have fallen victim to hackers who have stolen the personal information of their guests therefore Hyatt is taking matters into their own hands. The hotel chain is offering a bug bounty program via HackerOne which will reward ethical hackers with monetary compensation for reporting flaws in their network and programs. They will then take the information that these hackers provide them with & work to strengthen the weaknesses in their cyber security.
kpony001

Cloud security: The reason hackers have it so easy will infuriate you - 0 views

  • hackers time and again have outwitted the cyberguardians.
  • HashiCorp offers an open-source tool called Vault that stores sensitive credentials, encrypted themselves, and strictly limits what people, servers and programs can access them
  • The mass movement of company and personal data to the cloud has only complicated things.
  • ...15 more annotations...
  • Companies have uploaded VPN and cloud access credentials to cloud storage systems that are easily accessible.
  • security breaches are routinely made worse when hackers who enter one system are then finding the keys to another lying around unencrypted.
  • developers are still regularly storing the digital keys to company assets and even user data in source code, configuration files, and other miscellaneous, unencrypted locations.
  • Unlike typical users who can memorize their passwords or store them with a secure password manager, developers and IT workers often need to keep security credentials in places where automated software can find them.
  • Cloud managers are playing catchup to close the door on the critical data left out in the open.
  • Sophisticated new cybersecurity tools designed to securely store these kinds of credentials in a way that legitimate, automated processes can access, and intruders can’t
  • hackers time and again have outwitted the cyberguardians.
  • cloud industry leader Amazon launched AWS Secrets Manager, its own credential management tool. And Microsoft offers what it calls Azure Key Vault to securely store and monitor and control access to this kind of data.
  • The main problem is that companies really don’t have policies for it or they don’t follow up and make sure those policies are followed
  • Until recent hacks made it clear that few organizations can hope to keep their networks entirely free from intrusion, many companies paid less attention to the security of data within their firewalls
  • UpGuard, known for its frequent role in detecting leaks tied to data stored on insecure cloud machines, has released BreachSight, which scours the internet for its clients’ exposed code, credentials, personally identifiable information, and other sensitive data.
  • Since last year, Amazon has also offered a service called Amazon Macie, which uses machine learning to detect unusual access patterns to cloud storage and uploads of potentially sensitive data like access keys.
  • Amazon also released open source software to help prevent accidentally storing passwords and keys to source code repositories
  • other developers have offered similar tools to scrub credentials from existing code.
  • it’s possible that those types of tools will automatically be provided as part of cloud computing contracts, as standard as seatbelts in new cars.
  •  
    Cloud computing has created a very hacking prone storage system because companies have not been paying as much attention to security as they should. Thus, by not taking the logical measures such as not uploading credentials to cloud storage systems, they are becoming prone to hacker raids. However, with the turning of the tide, new methods of security have presented themselves in the form of online tools such as HashiCorp's Vault Microsoft's Azure Key Vault, and Amazon's AWS Secrets Manager, which stores sensitive credentials in very limited access windows, as well as UpGaurd's BreachSight which detects online data leaks containing exposed and volatile client data, and Amazon's Amazon Macie, which learns the access patterns of your cloud storage,
vincentsalazar

Hotel technology investments to increase in 2015 to match guest expectations - 0 views

  •  
    "Indeed, consumer-facing technologies were the highest priority for the surveyed cohort of IT professionals. The other important areas of tech upgrades are adding bandwidth to on-property systems (especially as the industry trends towards personal content consumption), and preparing for the upcoming shift in North America to the chip-and-pin technology. Screen Shot 2015-01-26 at 12.12.53 PM The rise of mobile payments also poses a technology quandary to hotels, as there are currently competing standards without a clear winner. The reality of multi-brand mobile payments is also that there will likely be several winners, and guests might wish to pay via a variety of mobile-first payment systems in the near future. Migrating to the cloud continues to be a priority for many respondents. Services across the boar are being transitioned from on-property to the cloud, including PMS (15% moving to cloud), sales and catering (14%), POS(14%) and CRM (12%). The security of this data is obviously also a concern, with many hotel technologists seeing securing data as a clear priority. As the shift to cloud-based services continues, hotels must spend more money on security to prevent breaches or other embarrassing lapses. Mid-tier brands are the most likely this year to see an increased focus on security, investing 10.39% of budgets in security and PCI compliance. That's compared with only 6.87% last year." Hotels are investing in technology to better serve a more tech savvy consumer. By adding systems who cater to mobile devices and mobile computing, hotels are expanding their customer base. A transition has even begun to cloud based services.
ashleyb102

Investing in Technology for Competitive Advantage / Arthur Andersen / Fall 1996 - 0 views

  • Technology Investment - The Future
  • Some organizations are early-adopters, while others embrace advancements after they have been already tested by others and the investment risk is reduced
  • otel organizations vary widely in their ability and willingness to track the cycles of technology advances.
  • ...8 more annotations...
  • It is essential that technology investment be sold as part of an integrated business plan where the technology is supporting the plan
  • As to the investments required for technology, we can safely predict that there will be significant demands for capital to cover technology investments
  • Further complicating the long-range planning for technology investment in an era of network-centric computing is the question of whether to invest in company-based systems or to wait for the availability of network subscription services provided by outside technology utilities
    • ashleyb102
       
      Cloud based systems
  • technology investments must support a company's vision and long range strategy
  • Hotel organizations for years have recognized the importance of reserving capital to replace furniture, fixtures and equipment. A similar approach may prove beneficial in the technology arena. FF&E reserves will begin to share prominence in the financial planning of hotel investments with l.T. (or Information Technology) reserves.
  • Smaller, more frequently planned technology investments should generally pay higher dividends in the long run, as compared to the one-time, major investment followed by years of neglect
  • The quandary for investors in the hospitality industry, as indeed in many other industries, is how to balance the need to keep up with rapidly evolving technologies with the need for satisfactory returns on capital over the short term.
  • management will need to understand that technology and information alone confer no competitive advantage. leadership and sound planning will be required to ensure that these investments and the highway of information they generate ultimately produce the shareholder returns required.
  •  
    Investing in information technology can be beneficial for businesses in hospitality industry because it pays higher dividends over a long period of time. If businesses continue to invest in information technology systems regularly they can prevent problems caused by having older information systems. A security breach is a major problem that can be prevented by investing in information technology systems regularly. Another reason to invest in IT systems in the hospitality industry is to have a competitive advantage.
lderi004

Cyberattacks on Hotels -- What Should Hotel Owners and Operators Do? - Cybersecurity La... - 0 views

  • Almost as soon as there were data breaches, hotels became a prime target of hackers, and the hospitality industry has consistently been one of the most commonly targeted businesses
  • Most commonly, hackers compromise systems so that they can obtain credit card numbers and sell them on the dark web.
  • More sophisticated hackers collect information on individuals as a means of compromising other computer systems and to impersonate individuals
  • ...3 more annotations...
  • As further described below, the hospitality industry possesses a number of factors that make them attractive to hackers: large volumes of valuable information, multiple vectors for accessing information, large workforces and dependence on vendors, to name a few.
  • First, the increasing incorporation of technology into hotel operations can lead to more breaches.
  • Predicting the future is a difficult and fraught task, but in this case, it is straightforward – there is no reason to expect that the number of cyberattacks will drop
  •  
    I was very intrigued with this article, as Braun mentions cyberattacks on hotels in a very straightforward manner. Hotels are in a competition of enhancing their technology everyday, however, with this enhancement comes more of a liability of getting cyber hacked. In addition, our industry deals with a lot of third party companies, making it easier to hack information as well. As Braun mentions, attacks nowadays, are not only for credit card information, but also simple data on guests, such as passwords to loyalty programs, and other credentials. Therefore, as technology grows, the only thing predictable is that hacks will get more dangerous. So, the one true thing our industry must do is prepare ourselves as best as we can. 
itzdchang

Businesses See GDPR as an Opportunity to Improve Data Privacy and Security - 0 views

  •  
    A new study done by IBM has discovered that nearly sixty percent of organizations are embracing the General Data Protection Regulation (GDPR), having their sights set on improving privacy, security, and data management. This is a relief to see as this particular subject in the hospitality industry has frequently come up as a major talking point with the developing technologies in the industry; the fact that industry leaders are viewing the GDPR in this manner rather than a compliance issue/restriction is refreshing. Seventy percent of survey responders are disposing data ahead of the deadline for compliance in an attempt to reduce their exposure. IBM did a separate poll that found only twenty percent of US consumers completely trusted organizations to maintain the privacy of their data. Due to this, businesses are using the recent GDPR compliance as a statement to consumers that they're looking to build trust and reliability with customers and drive innovation. However, even with the opportunities at hand, only thirty six percent of responders believed they will be fully compliant by the deadline. To minimize the amount of data an organization is managing, companies are taking measures such as reducing the number of people who have access to personal data or simply cutting down on the amount of data stored. Additionally, studies have found that the primary challenges organizations are facing with the GDPR include finding all the of the personal data stored in their business, ensuring the accuracy of said data, and making sure this data is in compliance in how it is shared or used. Another challenge to the new compliance is that companies are to report data breaches to regulators within 72 hours of the breach, yet IBM has found that only thirty one percent of companies have taken a look at the measures they have in place for incident response to account for this new rule in compliance.
afost026

5 Lessons to Learn from a Restaurant POS Security Breach - : - 0 views

  • Endpoint Security Matters.
  • POS terminal with an IP address and a connection to a business’s network is as vulnerable to compromise
  • must take POS security into account and include provisions for guarding access to data maintained in the POS system.
  • ...4 more annotations...
  • You Can’t Neglect POS System Security
  • Testing is a Big Deal.
  • An Incident-Response Plan is Crucial.
  • In POS Security, There’s No Rest for the Weary.
  •  
    This article gives you another aspect of POS. It talks about the POS security and how to be properly prepared. many POS systems are vulnerable if they just link it to the internet.
anonymous

Cybersecurity in Hospitality: An Unsolvable Problem? | Paladion - 0 views

  • n addition, hotels often share partnerships with other local companies that their guests may frequent (from restaurants to local entertainment options), giving hotels even more expansive profiles on each guest in their database.
  • This rich personal data is invaluable to cybercriminals
  • Nearly every hotel now offers their guests dedicated mobile apps, and new digital partnerships with sponsors, travel companies, and other related hospitality and entertainment companies.
  • ...5 more annotations...
  • Only one employee at one hotel needs to make one mistake to create a global crisis.
  • nd here’s the really bad news: even if a hotel runs their own networks perfectly, they cannot control one of their many external vendors.
  • large-scale hotel breaches were not caused by any specific mistake made by the hotel—they were caused by cybercriminals breaching the hotel’s Point of Sale (POS) system
  • Hospitality companies still need to modernise their infrastructure, train their staff, and hold their partners accountable.
  • While hospitality companies have fewer transactions than retail organisations — and thus have data on fewer customers to steal — they collect substantially more valuable and varied personal data for each of their guests
  •  
    Cybersecurity is hospitality is a very big issue. Hotels collect very personal data from guests, like names, addresses, credit card information and more. Large hotels have been attacked in recent years and peoples personal information has been stolen. Hotels like everyone else need to update their systems regularly and train staff to know what they should and shouldn't do while in the system.,
  •  
    This uncovers the dilemma hitting many hospitality businesses, cyber security. It explains why the hospitality industry is at risk and how to prevent against these attacks. It always goes over the simple challenges hospitality faces with this topic.
rderonville

The Point-Of-Sale Problem - 0 views

  • To properly manage risk, start by applying the same security practices to the POS system that you use with other sensitive IT systems.
  • look for POS systems that have clear security design improvements over legacy ones.
  • Any system that's part of a payment process is a target of data thieves. Wise companies will assume that the devices, applications, and networks that house sensitive cardholder data are under siege and act accordingly.
  •  
    The POS is a great system that is used by many industries. It helps businesses run efficiently and transactions be done effectively. However, it comes with its problems. This article is in two parts so I will post the both on Diigo. This article states that POS systems are the most frequently used computing system and it is targeted by criminals. According to the article, "Today, attackers have only become more sophisticated, using advanced software techniques to avoid detection by antivirus. The attackers are attaching devices that are to collect information from the patrons who use the POS system. The solution to this issue from the article, is that managers apply the same security practices to the POS systems that are used for other sensitive IT systems. These systems should not be the same system used for internet browsing or email. Using a third party security is system is fine however, they should ensure that security controls are part of regular maintenance. The article states that businesses should look for POS systems that have design improvements rather than those who have been in the industry for a long time. There needs to be upgraded design, security, and software to minimize the threats that are posed on the POS system. This article highlights the issues that POS systems attract and also gives solutions. It is up to the businesses to give as much attention as possible to this system the same way they do for systems with sensitive information. Ultimately credit card transactions do hold sensitive information so the upgraded POS systems should be the number one choice for a business. Along with what is stated in the articles, this minimizes the risk of customer loss and a damaged reputation. This also helps minimize the possibility of revenue loss due to lawsuits because of breaches.
natashacastro

The Top 7 Hotel Tech Trends for 2016 - Capterra Blog - 0 views

  • the top hotel tech trends for 2016
  • 1. New Security Measures
  • It’s past time for a change, and 2016 will (hopefully) mark a new initiative in the industry: innovative tech security.
  • ...18 more annotations...
  • Hotels will also begin installing new check-in systems that accept chip-based credit cards and debit cards as a way to guarantee secure payment.
  • 2. Wearable Tech
  • MagicBands, which operate off their MyMagic+ system,  allow guests to “[book] transportation to a hotel from the airport and choos[e] where to eat. The MagicBand also serves as a room key and ticket for attractions, replacing the need to carry around bulky key cards and folded papers, both of which are lost frequently.”
  • It’s more effective for learning customer preferences than just relying on online guest reviews.
  • 3. Self-Service Check-in
  • And in a technological world where you can get just about anything at the touch of a button, your guests are going to start expecting the same immediate gratification from your hotel.
  • However, this technology can do more than just ease your guest experience. Using kiosks for self check-in can “sav[e] money on staffing, increas[e] its revenue[,] and increas[e] customer satisfaction,” says author Julie Weed.
  • 4. Cloud Computing (Total or Hybrid)
  • You need to keep all your software tools in one, centralized location that everyone can access.
  • as hotels are expected to invest in newer technologies to stay ahead of the curve, they also need to find ways to cut costs, and cloud computing has the potential to cut 50% of operational costs.
  • many companies employ a hybrid cloud, which can quell fears of sensitive data breaches by only storing some (not all) information on the cloud.
  • 5. Increased Presence on Social Media
  • it’s clear you need to be on social media to ensure users stay at your hotel rather than your competitors.
  • 6. Native Mobile Apps
  • While social media can get your name out there, making a native mobile app is another emerging trend that taps into your guests’ affinity for technology and ease.
  • Not to mention, these mobile apps are a good replacement for key cards, and enable smartphones or smartwatches to act as more secure room keys.
  • 7. Continued Industry Aversion to Tech
  • Technology has changed many industries, and in one that serves its guests face-to-face, it’s important to keep up with what those guests value. And a growing number of them value technology. It’s a part of their everyday lives.
  •  
    Tech innovations are the essential part of the Hospitality Industry. In the article the author tells us about the top hotel tech trends for 2016 which impact the industry: -new security measures, which is very important due to possible breaches -wearable tech, with just a wave of your wrist you can check in or enter your room -self service check-in, which ease the process -cloud computing, which cuts costs and flexible -presence on social-media, engaging with customers is very important -native mobile apps -continued technology development All these trends play a very important role in improving relationships between hotel and guest.
  •  
    This article is explaining some of the new trends that hotels are finally catching up on. For example, self service check in took a while to catch on but with hotels using it now, it reduces wait times for customers and increases satisfaction.
Maria Zuniga

Hyatt Hotels discovers card data breach at 41 properties - 0 views

  • it had discovered unauthorized access to payment card information at certain Hyatt-managed locations worldwide
  • Hyatt said the incident affected payment card information, such as, cardholder name, card number, expiration date and internal verification code, from cards manually entered or swiped at the front desk of certain Hyatt-managed locations
  • cyber security team discovered signs of the unauthorized access in July and launched an internal investigation, completed on Thursday, that resolved the issue and took steps to prevent this from happening in the future.
  •  
    This article is very interesting because it shows that the accounting in hospitality industry is never safe. It is crucial to have POS system that are secure as well as having managers that are on top of their duties. The article stated that a total of 41 properties were affected by this and that it hasn't been the first time. This is a call to action for Hyatt as well as other hotels to be more aware of their money.
vickychapas2021

Cloud vs On-Premise PMS for hotels: Which is Preferable? - 0 views

  • Reason being, the desktop-based system contains data in i
  • Installing it in the new terminal or PC will cost you extra.
  • All it requires is a browser and a favorable internet connection
  • ...21 more annotations...
  • not dependent on an internet connection.
  • You need to buy a license for the individual machine
  • All the updates happen without hampering your ongoing operations.
  • 0 downtime.
  • Certainly, updating all the systems takes up a lot of your time and effort.
  • You have to install firewalls and anti-virus program
  • All these security measures make cloud systems a safer option than on-premise systems.
  • Not everyone can access the desktop hotel system
  • Similarly, cloud-based software has fail-safes. 
  • 92% of hoteliers have already shifted to cloud infrastructure
  • cost a mid-sized hotel $10,000 to $20,000 or more for the software license. 
  • one-time setup and training fee as well (Approximately $500). 
  • . It can be easily integrated with OTAs
  • It involves a lot of manual technical work and extra hardware.
  • cloud software your data is safer than the old desktop system.
  • Reason being, the desktop-based system contains data in i
  • ktop-b
  • This saves a lot of your money.
  • (costing around $5 to $10 per room).
  • you lose connection, then the file allows you to keep writing. 
  • cloud systems create more revenue opportunities
  •  
    This article talks about the pros and cons of cloud PMS systems. It also goes over some myths that we think about such as it is easy to breach. There are more pros than cons for Cloud PMS systems than one would think. Cloud PMS systems are overall a better option for any property.
angelopecorelli

Hilton Was Fined $700K for a Data Breach. Under GDPR It Would Be $420M | Digital Guardian - 0 views

  •  
    This article goes over the multiple lawsuits that Marriot had to face due to a massive cyberattack in 2015 where multiple credit card numbers were leaked. I think this is a perfect example of how cloud computing is not a bulletproof system at the moment and how it still has much room to grow. Similar cyberattacks happen all over the world some on a smaller scale and some on a larger one. I believe this is an article that everyone should read to truly understand the reproductions that a company can face if they don't have a strong cyber defense.
sigomezsh

Data ownership: The next big issue enterprise IT will have to tackle - 0 views

  • The reason why the issue of data ownership has become somewhat unclear is because oftentimes organizations are not in direct possession of their data.
  • Consider how many business applications are currently available as software-as-a-service (SaaS) applications. In most cases, a SaaS provider hosts their SaaS application and also stores the data that the application generates.
  • Whenever possible, organizations should back up their SaaS data. This not only protects the data against accidental loss, but it also provides the organization with a tangible copy of its SaaS data.
  • ...3 more annotations...
  • While it is true that SaaS providers likely store your data on encrypted storage, it is also likely that the SaaS provider maintains control over the encryption keys that are used when accessing the data.
  • A SaaS provider might sell data (or insights into the data) to advertisers, government agencies, research analysts, or even your competitors.
  • After all, data leakage and breaches can have devastating financial consequences, and companies simply cannot afford to take a chance on a cloud provider that plays games with subscriber data.
andreae22

My Head in the Clouds (computing): A Case Study of a Restaurant Group Embracing Off-Sit... - 0 views

  • These applications simplify daily tasks for management teams and staff, which will ultimately leverage senior management down to focus on the bigger picture
  • he year was 2010 and the impending doom of PCI Compliance was upon us.  At best, our network infrastructure was dated and we needed to act quickly to get it into compliance.
  • CI Compliance is an almost unachievable set of network security standards designed to protect the credit card giants, who already charge them way too much for credit card processing and continually squeeze them with a plethora of monthly fees. 
  • ...21 more annotations...
  • The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment
  • he restaurant industry is also plagued with security breaches, including large chains such as Darden (Cheddar’s), Panera Bread, Sonic and Arby’s.
  • Operators must identify network vulnerabilities, physical vulnerabilities, and operational vulnerabilities that could result in a credit card breach and fix them.  In summary, it is a painfully tedious, extremely time consuming, and potentially expensive process
  • It is extremely important for the security of our guest’s payment information, both for ensuring trust with our customers and limiting legal liabilities
  • PCI DSS is mandatory for any and all businesses that accept credit cards.  It involves a process of assessment, remediation and reporting.
  • egacy systems such as Positouch, Micros, and Aloha are bulkier, more expensive, and much harder to program and implement.
  • In a nutshell, PCI DSS forced us to upgrade our network, which ultimately allowed us to operate in the cloud.  This unintended outcome to a painful requirement was truly a blessing in disguise and it pushed us into new territory – the cloud!
  • IBM defines cloud computing as “the delivery of on-demand computing resources — everything from applications to data centers — over the internet on a pay-for-use basis.”[iii]
  • ud computing can streamline our operation.
  • The first order of business was to get our network infrastructure in order.
  • Toast
  • It is extremely intuitive, like using a smartphone, thus needing very little training. As wireless POS solutions evolve, legacy systems will eventually be phased out.  It is only a matter of time.
  • EMV (Europay, MasterCard and Visa) is another set of regulations that are coming to the restaurant industry. “EMV is a global standard for cards equipped with computer chips and the technology used to authenticate chip-card transactions.”
  • Pay My Tab will fully integrate with our POS system and eliminates many bulky PCI DSS requirements.
  • llows for remote access, allowing management to check flow of service, identify unique reservations, and make sure that waitlists are being managed appropriately. 
  • good communication is key for making sure work-life balance is maintained.
  • An area which the cloud has really saved our restaurants time is with food & beverage inventories. 
  • This has greatly improved productivity and allowed our management teams to communicate in real time.
  • Our office hardware now consists of much less expensive “Network Computers”, which do not require expanded memory for giant program
  • Although the solutions highlighted above create efficiency and save time, they do not serve guests and they don’t understand the art of hospitality
  • It is imperative that as restaurateurs we continue to create a positive environment, embrace innovation, and engage and train our employees in the art and skill of hospitality.
  •  
    This article is an case study on how one restaurant group could use cloud computing to improve their business. By not only securing the companies information by the customers as well. Reviewing the key points of sales interactions between customers and the restaurant, like the POS, Tableside payments, reservations and management assistants.
ayenkiah

Marriott Breach Exposes Weakness in Cyber Defenses for Hotels - Bloomberg - 0 views

  •  
    After 500 million guests had their information opened to hackers, hotels security have been in question. Many brands like Marriott prioritize security. However, the cost to keep up with the advance in technology provide a challenge at times.
kuhang

Cybersecurity in Tourism & Hospitality: the urge of protecting customer data - NTG - 0 views

  • Organizations in tourism and hospitality have massive databases of personal data nowadays as they ask their consumers to leave their data for better and optimized services.
  • Cybersecurity is defined as the area related to computing and telematics that focuses on protecting the computer infrastructure and avoiding all types of threats, which put at risk the information that is processed, transported and stored in any device.
  • The accommodation industry is beginning to be aware of the relevance of this topic: if hotels do not manage this issue properly, they lose the opportunity to give the clients the reliability and security they need.
  • ...3 more annotations...
  • n many cases, it is the employees themselves who fall into errors that expose the security of the hotel and the privacy of their clients through a lack of cyber security. Incorrectly shared passwords, professional accounts that link to personal devices or the dissemination of internal company information are some of the mistakes employees make. In order to correct these errors and ensure that they do not happen again, training and awareness-raising are the keys.
  • Employees must be informed at all times about the correct practices to be followed, thus avoiding making mistakes that in most cases have terrible consequences, both for the hotel and for the customers themselves.
  • For the peace of mind of the guests, the hotels should complete constant intrusion tests to evaluate the state of the systems, auditing their security from the point of view of possible external attacks. In order to make an optimal security assessment, it is best to carry out controlled attacks on the systems.
  •  
    This paper mainly discusses the importance of network security in tourism and hotel industry. Due to the characteristics of the industry, it is inevitable for hotels to manage and protect their customers' personal data. Therefore, network security is very important for hotels. Then the author analyzes the reasons of the hotel data breach and puts forward solutions. The main approach is conduct network security training for employees and regularly evaluates the system status.
rhoff019

Council Post: Cybersecurity As We Know It Is About To Change - 0 views

  • the global cybersecurity market is set to increase to $270 billion by 2026. This signals the priority boardrooms have placed on cyber risk management even as digital transformation takes place en masse.
  • COVID-19 has become the catalyst to trigger change in the ways we manage and operate technology.
  • Virtual desktops emulate a computer system so that IT can control access as such adding input/output devices as well as software and applications. This could become an important control point when remote workers are operating outside the safety of a corporate network.
  • ...15 more annotations...
  • Telecommuting Is The Only Way Of Working For Many
  • With the remote working concept taking center stage, re-evaluation of these policies is needed to address the new cyberthreats.
  • With millions of employees working from home, hackers’ focus has shifted from enterprise to remote working individuals. To handle the menace that exists in cyberspace, decentralized cybersecurity will rise where greater emphasis will be placed on data sources such as actual remote employees themselves.
  • User access controls have largely revolved around single or two-factor authentication. These methods rely on “something you know (username)” and “something you have (password).”
  • This means identity protection will be a top priority, and the best defense should involve building authentication systems that focus on “who you are.” This would require advanced biometric solutions such as fingerprint/thumbprint/handprint, retina, iris, voice and other facial recognition technologies.
  • The current state of privacy regulations is designed around the enterprise network and building the proverbial wall to keep sensitive data out of prying eyes.
  • With swift digitalization, security controls will shift to data sources, similar to the trend witnessed in IoT.
  • From a risk management perspective, global privacy policies will need to encapsulate standard operating procedures regarding BYOD, GDPR compliance and state privacy laws.
  • The shift to cloud services offers employees, customers, suppliers and everyone else across the ecosystem a seamless and frictionless way to access data and applications. Remote access by various users would compound security challenges and present many new potential attack vectors. In the post-pandemic world, IT resources could shift toward data, particularly keeping data secure across cloud platforms.
  • This will facilitate cybersecurity teams to apply varied access controls and demarcate data storage to minimize the risk of cyber intrusion and data breach.
  • Innovative technologies such as ML/AI and AR/VR will see greater adoption. As we have already witnessed, video conferencing applications will continue to rise as non-contact interactions surge.
  • Sectors such as retail, hospitality and manufacturing will layer their adoption of robotics with added AR/VR capabilities.
  • Cybersecurity teams that are saddled with an events-based approach will be overly burdened with triages when a cyber breach occurs. By embracing an intelligence-driven approach, businesses can digitalize confidently with external threat intelligence as the guiding beacon.
  • Social engineering techniques to trick untrained and unsuspecting employees, third parties and contractors into releasing confidential information or letting an intruder into a corporate network will also intensify accordingly.
  • Cybersecurity awareness training for people across the entire supply chain and ecosystem will prevail.
  •  
    By 2026, the investment in cybersecurity will increase to $270 billion globally. After the COVID-19 pandemic companies will need to reevaluate their cybersecurity systems to adapt to telecommuting as many companies will have some of their employees working from home. Biometric security such as a fingerprint or iris scan will become more common as the typical password will no longer be as secure as it once was.
« First ‹ Previous 141 - 160 of 253 Next › Last »
Showing 20 items per page