Skip to main content

Home/ Hospitality Technology/ Group items tagged breach

Rss Feed Group items tagged

yvenisem

Going livestream: How in-person summits have become virtual events - 0 views

    • yvenisem
       
      My thoughts exactly, there is a missing element
  • So how can a business possibly recreate that kind of experience online?
  • there’s been increased dependency on technology to help support business continuity
  • ...8 more annotations...
    • yvenisem
       
      I think the reason for this is that many people don't have the funds or time to travel long distances, but this format is much more accessible. Plus, it was free so that helps lol
  • adding that the online event had more than three times the usual number of registrations
    • yvenisem
       
      relates a lot to this week's discussion on relying on tech too much
  • (the virtual conference was free to attend this year, whereas it usually costs upwards of $1,000)
  • created 14 local events in various languages and time zones, with regional heads addressing their relevant markets.
    • yvenisem
       
      This is definitely much more accessible. This can also do well in terms of revenue for future events
  • switching to being an online speaker isn’t quite the same. “You don’t have the body language, you don’t have the eye contact,” she explained.
    • yvenisem
       
      This would be my main concerns in producing events. I feel like ther has to be a personal element to it instead of just looking at people through acomputer screen
  • vents organizers may be encouraged to film their speakers in a way that works better for a small-screen format, instead of the usual “dark room with a very small person,
    • yvenisem
       
      this could be a hybrid thing
  • “While online events might seem less permanent, there’s actually a much higher chance that any misdemeanors or breaches of copyright or online regulation will be captured or stored.”
    • yvenisem
       
      I never considered this, but this definitely has to be something to consider when in something like this
  •  
    One of the main reasons why I chose this article is because my industry is currently seein a huge shift in the way we do things that can either stay or have impressions in the industry after COVID. One of the main concerns when it came to in-person events going online is how we would be able to recreate the same experience. Several large events that see thousands of people had to convert to online platforms. For example, "in 2019, around 20,000 people attended SAP's Sapphire Now conference in Orlando". Imagine 20,000 people logging on to view the same same content an then some! In this case, the event saw larger audiences with "more than three times the usual number of registrations". Granted, the conference was free to attend this year. However, now that this conference was more accessible to people who in normal circumstance would be unable to attend due to time and fianancial constraints, it was a no-brainer that more people would attend. This bodes very well in terms of revenue for the future since if those extra 40,000 people enjoyed it, they would most likely be willing to pay for the service and consider the event and investment. I think the wider topic of the article is accessibility. Before technology, it was harder to bridge the gap between the haves and the have nots. Now that technology is becoming more accessible (in the first world), many are better able to see beneficial information. Not only that, but when considering the "14 local events in various languages and time zones", people are better able to cast wider nets. This article wasn't all good, however. One thing that many people have not adressed that I as an event professional am concerned about is the fact that going online is just not the same. A speaker said in an interview that it's harder to ready body language, which can impact how much a speaker is able to reach their audience. Another thing that has to be given intense consideration is the fact that there can be some legal ramifica
yvenisem

The Advantages of Manual or Computerized Accounting | Small Business - Chron.com - 0 views

  • Such information may be analyzed to help business owners make future financial decisions, using the advantages of either manual or computerized accounting.
  • Computerized accounting has the advantage of increased efficiency and time management when compared with manual accounting.
  • Computerized accounting has the advantage of higher accuracy when compared with manual accounting
  • ...19 more annotations...
  • The potential for human error is greater when employees are manually completing accounting procedures.
  • The advantages of manual or computerized accounting systems may be equal when it comes to reliability.
  • Manual accounting can function independently of machines so that work continues when "the system" isn't working.
  • modern backup systems and increased functionality, the disadvantage of reliability in computerized accounting may be lessened.
  • the subtlety and focus of an analysis’ conjecture or hypothesis depends on the person operating the system.
  • manual accounting may have an advantage over computerized accounting systems.
  • computerized accounting systems lose their potential for sophisticated analysis.
  • analysis may be hampered or obstructed by software design.
  • Computerized systems can cost millions of dollars to purchase, implement and maintain. It may be necessary to purchase updated software with some regularity.
  • automatically updated and instantly available.
  • It can be costly to staff qualified accountants to complete manual accounting processes, but it can also be costly to staff accountants familiar with specific computerized accounting software and programming.
  • Computerized systems can produce invoices, purchase orders and other documents more quickly.
  • small business owners who are not tech-savvy may prefer to use physical records instead of software
    • yvenisem
       
      still a dangerous game to play
  • All calculations are performed manually, which eliminates the risk of duplication mistakes and corrupt data
    • yvenisem
       
      didn't consider this
  • Computerized accounting systems are significantly more complex and involve a learning curve
    • yvenisem
       
      can be daunting to learn for many people
  • Additionally, there is no risk of data loss or leaked financial information due to data breaches.
    • yvenisem
       
      good pro
  • Some may require switching to the latest computer technology, leading to higher costs
    • yvenisem
       
      might not be financially feasible for many
  • manual accounting is prone to human error
    • yvenisem
       
      #1 con in my eyes
  • computerized accounting provides companies with financial intelligence
    • yvenisem
       
      so much easier to do everything where you know what the finanical outlook will be like
  •  
    This article compares the advantages and disadvantages of having a computerized accounting system and then also completing the task by hand. When looking at different factors it is clear that it seems like an owner would run a risk going either way because where the computer would lack in areas, the human touch would prevail and then where a human touch would lack in other areas, the computer would prevail. Therefore, I would conclude that it is probably better to have a little bit of both to help make the process smooth but not over bearing on a human or even on the computer.
  •  
    This article basically goes over the pros and cons of switching over to computerized accounting systems like Quickbooks and Freshbooks. It goes over the main concerns like data breached and human error, but it also deleves a little deeper to discuss how many of the software require regular system and hardware updates in order to have the software run efficiently.
blevi022

Biden, Gates, Musk and Other V.I.P. Twitter Users Are Hacked in Bitcoin Scam - The New ... - 0 views

  • A Brazen Online Attack Targets V.I.P. Twitter Users in a Bitcoin Scam
  • In a major show of force, hackers breached some of the site’s most prominent accounts, a Who’s Who of Americans in politics, entertainment and tech.
  • Dozens of the biggest names in America — including Joseph R. Biden Jr., Barack Obama, Kanye West, Bill Gates and Elon Musk — posted similar messages on Twitter: Send Bitcoin and the famous people would send back double your money
  • ...6 more annotations...
  • It was all a scam, of course, the result of one of the most brazen online attacks in memory.
  • But soon after, the list of victims broadened to include a Who’s Who of Americans in politics, entertainment and tech, in a major show of force by the hackers.
  • Twitter’s investigation into the breach revealed that several employees who had access to internal systems had their accounts compromised in a “coordinated social engineering attack,” a spokesman said, referring to attacks that trick people into giving up their credentials
  • the attack was concerning to security experts because it suggested that the hackers could have easily caused much more havoc
  • Security experts said that the wide-ranging attacks hinted that the problem was caused by a security flaw in Twitter’s service
  • Cybersecurity experts said the attack showed how vulnerable social media remains to attacks
  •  
    While this story isn't directly about hospitality it shows that poor security by technology companies like Twitter can lead to compromised access social media accounts of prominent figures. The Social Media Hospitality could be and used scam their customers.
irinadolgopolova

How to Prevent Malware Attacks and Promote Cybersecurity at Your Hotel - 0 views

  • Each time a hotel’s guest records get breached, the property is burdened with financial strain and faces broken trust with guests. As a hotelier, you don’t need to be an expert in cybersecurity, but you absolutely need to understand the basics to protect your business and your guests.
  • hotels process lots of transactions and store tons of guest data. A hacker can simultaneously target a property’s point-of-sale and property management system to capture payment card information as well as personal data, like passport numbers and email addresses.
  • Research from Symantec, a cybersecurity firm, found that more than 65% of hotels are routinely leaking booking reference codes through third-party sites. Why is this important? Because the information shared through these codes would allow a bad actor to login to a reservation, view personal details, and even cancel a booking altogether. When this happens, your guest information is vulnerable and you risk destroying the guest relationship.
  • ...3 more annotations...
  • Compliance with the Payment Card Industry Data Security Standard (PCI-DSS) not only helps to ensure that data security software, hardware, and practices are safer, but also helps to protect against fines and penalties when a breach occurs,
  • The right technology is only half the equation; over the years, security experts have also identified employees as part of the problem. Hotels must train their staff to handle personal information security, comply with privacy policies, and change user access credentials regularly.
  • Even with a great PMS/POS system and the right training, it’s important to perform routine penetration testing and risk assessments. There’s no straightforward answer as to how often you should pen test your network, but experts warn once a year probably isn’t frequently enough
  •  
    The article is about the reasons why the hotels are attractive for hackers, the author also explains the key concepts in the cyber security. Then, the biggest cyber attacks in hotel industry are described in the article. At the end, the author tells us how hoteliers can improve the security measures.
yuqiongliang

4 Ways Cloud Computing Benefits The Hospitality Industry - 1 views

  • you can give yourself a competitive advantage and make your life easier at work.
  • you can give yourself a competitive advantage and make your life easier at work.
    • kaylaabad
       
      Pro of implementing cloud computing in the industry.
  • With cloud computing, you only pay for what you need.
  • ...10 more annotations...
  • You also cut hardware costs, energy costs, and operational costs with the cloud. Your need for excessive hardware in your hotel is reduced and, as a result, you won’t burn throughout as much electricity. The cloud also cuts project time, which results in cut costs and higher productivity.
    • kaylaabad
       
      "With cloud computing you only pay for what you need." Costs are reduced in many ways with cloud computing - hardware, energy, and operational costs are cut. Also, project time is reduced cutting costs and bringing about higher productivity.
  • you store your data securely and remotely instead of in an on-site physical location.
    • kaylaabad
       
      Pro of cloud computing in the industry - data is stored securely and remotely
  • don’t have to worry about losing all of your data if a natural disaster or security breach occurs at your location
    • kaylaabad
       
      "You don't have to worry about losing all of your data if a natural disaster or security breach occurs at your location"
  • The cloud gives you the flexibility to work from anywhere.
    • kaylaabad
       
      Pro of cloud computing in the industry - cloud gives you the flexibility to work from anywhere
  • The whole world is your office
    • kaylaabad
       
      "The whole world is your office"
  • you can improve staff collaboration immensely.
    • kaylaabad
       
      Pro of cloud computing in the industry - you can improve staff collaboration immensely
  • Cloud Computing Helps Hotels Cut Costs
  • Cloud Computing Solutions Are Reliable And Secure
  • Cloud Computing Gives You The Flexibility To Work Remotely
  • Cloud Computing Helps You Improve The Guest Experience
  •  
    This article outlines four assets that cloud computing can present to the Hospitality Industry. Cloud computing essentially aids the industry in providing the best possible service to its guests - while also simplifying the working lives of employees which is always a big plus. Cloud computing helps cut costs, solutions are secure and remote, gives flexibility to work anywhere at anytime, and improves the guest experience. All in all, the pros outweigh the cons with the cloud computing.
  •  
    Cloud computing is a popular new wave, and not only individual users are its beneficiaries, but also travel companies are promoting the use of cloud computing technology to increase their competitiveness
cmick006

Hackers Target WHO, COVID-19 Research Firm with Cyberattacks - 0 views

  • The Office for Civil Rights recently warned healthcare providers that hackers have increasingly impersonated health agencies tasked with the Coronavirus response, as well as the FBI and the Department of Justice.
  • , healthcare organizations need to be reviewing and discussing their data protection strategies as more work shifts into the remote environment to ensure they’re protected in the event of a compromise.
  • “It is a critical time to make sure all your data is backed up, especially as many of the company assets are moving out of the office,” he added. “If it’s critical to always have your systems running and you could not afford the downtime to rebuild your systems, you need more than just cloud backup and would need to implement a disaster recovery solution to continue your operations with minimal downtime.”
  •  
    Cyberattacks on health organizations. These organizations need to implement better data protection. Personal and medical data has been hacked and there is a continuous effort put forth to breach the systems that house this information. With more and more companies researching potential vaccines and remedies for Covid, now more than ever, organizations must have more than just cloud backups; disaster recovery plans should include offsite backups at a minimum.
corrie242

Top 9 Technology Trends in Event Management Right Now - Meetingbox - 2 views

  • Studies reveal that technology adoption in event management is capable of increasing attendance by 20% and productivity by 27% and decreasing costs to at most 30%!
  • Speed, utility and engagement are the three main pillars
  • 5G
  • ...16 more annotations...
  • With the increasing complexity of experiences, the necessity to map out these experiences increases as well. With tools like drag and drop diagramming, 3D walkthroughs and seating software, planners and venues can map out experiences in detail.
  • Event diagramming
  • With increasing implementation and relevance for augmented reality and virtual experiences, this technology will be the threshold for the biggest paradigm shift yet in event technology and automation.
  • A similar tool to the already existing Radio frequency ID (RFID), Beacon technology discreetly tracks attendee behavior and preferences, which can be used as an engagement tool to create personalized experiences for attendees and provides event insights for event planners. Wondering how it works: Beacon devices equipped with Bluetooth low-energy signals can broadcast data to any mobile phone that supports Bluetooth connectivity.
  • you can create an augmented reality experience by turning existing walls and structures into 3D interactive displays. This tool allows event planners to incorporate transformational design elements into any space they seem fit. Projection mapping proves to be a cost-efficient and effective way to create optical illusions in nearly every location.
  • Beacon technology
  • Projection mapping
  • Virtual and Augmented Reality
  • Facial recognition
  • benefit for planners from a security perspective.
  • reports of security breaches at major events
  • They could be used for gathering real-time data that can help event planners enhance the experience and security of their attendees.
  • Event automation tools
  • provide all the information concerning an event such as schedule, speakers, registration, networking, and support. There are also apps integrated with chatbots that offer a higher level of support to the organizational team.
  • Data Security
  • Cybersecurity data breach is a scaring reality nowadays. And therefore, the question “Is the event organizer doing enough to protect the data collected from guests?” is more important than ever. Planners should take this issue seriously.
  •  
    This article outlines the current technology trends in event management. It also entails what strategies event planners are using to market mega-events, to attract attendees and to get real-time feedback about the event.
biancafavilli

Tourism security in an age of cyber threats | NTA Courier - 0 views

shared by biancafavilli on 13 Feb 20 - No Cached
kmert005 liked it
  • the safety of clients and staff has to be the No. 1 priority.
  • hat means contingency plans must be updated on a regular basis and security plans must show adequate flexibility to incorporate good customer service and proper protection.
  • it is essential to dispel the idea that tourism security is static.
  • ...4 more annotations...
  • leisure travel is an expendable industry, and there is nothing that can destroy the industry’s reputation more effectively than a lack of security or safety.
  • the latest threat to the industry was underlined by the hacking of Marriott International’s Starwood database, potentially exposing the personal information of approximately half a billion people.
  • This cyberbreach serves as an example that the world of tourism security is fast-changing.
  •  It is essential that every tourism entity assume that, at some point, it will suffer some form of attack, whether physical or cyber. Do not wait for an attack to occur to begin to figure out how to mitigate the damage. Remember that an attack not only damages the client, but it also harms the entire industry.
  •  
    In this article, the author emphasizes that security in the tourism industry should be number one. With the advent of technology, cyber contingency plans must be a part of the overall security plans of tourism businesses. The author also admonishes hospitality businesses to be proactive when dealing with cyber security breaches to withstand malware and infections as well as to be honest with customers when security breaches occur to maintain the customer's trust.
teresastas

Railroads say they don't need cybersecurity mandates - The Washington Post - 0 views

  • The Biden administration plans to impose new cybersecurity mandates on railroad and rail transit systems.But a leading railroad association insists it's already voluntarily following the practices that are now going to be required by the federal government.
    • teresastas
       
      Biden administration is planning on imposing new cybersecurity mandates on railroad and rail transit systems. This includes passenger rail systems like Amtrak and large subway systems like those in New York. Homeland Security Secretary announced the new proposed regulations under TSA eelier this week. The new regulations came as a surprise to the rail industy who feel that they are already taking cyber security seriously and don't need the government's heavy hand involved. They have three day's to submit feedback.
  • Our freight rail system is essential not only to our economic well-being, but also to the ability of our military to move equipment from ‘fort to port’ when needed,” the secretary said at the virtual Billington Cybersecurity Summit, where he announced the intended new regulations.
    • teresastas
       
      We often forget about Rail when we think about Transportation but it is essential for our military and for our major cities like New York. As well as the transport of goods across country.
  • In fall 2020, ransomware hit the Southeastern Pennsylvania Transportation Authority, which operates Philadelphia’s transit network. And in April, a hacker group believed to be linked to the Chinese government breached the computers of the Metropolitan Transportation Authority (MTA), which operates New York City’s subway system — the country’s largest.
    • teresastas
       
      We often don't hear about the hacks that aren't successful but how awful would it have been if hackers would have breached into MTA and taken over NYC's subway system!
mcont036

Cybersecurity guide for the hospitality industry - Help Net Security - 1 views

  • A practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive target for hackers: the hotel property management system
  • allowing hotel owners to control and limit access to their PMS and protect guest privacy and payment card information.
  • According to a recent industry report, hospitality ranked third among industries compromised by cybersecurity breaches in 2019, and the industry suffered 13% of the total incidents.
  • ...3 more annotations...
  • About two-thirds of these breaches were attacks on corporate servers, which often store guest information and communicate with on-site property management systems.
  • The design protects data moving within this environment, and it prevents user access to the various systems and services.
  • “Zero trust principles mean access is not granted to devices or user accounts based solely on their physical or network location or who owns them. Instead, authentication and authorization of both subject and device are required before users can access a network’s resources
  •  
    The National Institute of Standards and Technology created a practical cybersecurity guide to help hotel owners protect their PMS from hackers. Hotel owners can learn to protect the privacy of the data stored in their systems, which is highly vulnerable. The guide also advocates for the zero trust principle, which dictates that access to a system is never fully granted, but must be continually evaluated through authentication and authorization.
wenjieyang

3 Data Protection Tips for the Hospitality Industry | Endpoint Protector - 0 views

  • 1. Hire cybersecurity personnel
  • hospitality companies do need to acknowledge the need for cybersecurity personnel and hire a team that can keep their cybersecurity framework up to date and react in real-time to any security incidents that may arise.
  • 2. Protect against insider threats
  • ...7 more annotations...
  • Whether through ignorance or malice, employees are often at the heart of data breaches.
  • Another way companies can protect against human error or insider threats is through strong data protection policies.
  • limiting access to sensitive data only to those employees who need it to perform their job functions and restricting the use of personal mobile phones or portable storage devices in the work place.
  • 3. Look into compliance
  • hospitality companies must ensure that they have a high level of data protection in place.
  • Companies must therefore look into where their customers come from and what data protection laws are in place in their countries of origin and ensure they can protect their sensitive data accordingly.
  • Abiding by these standards should ensure that hospitality companies are protected from most potential data breaches and can thus stay clear of any penalties that would otherwise come their way.
anonymous

Data Privacy and Security in the Travel Industry - Security Boulevard - 0 views

  • As COVID-19 mauls the travel sector and hotels, airlines and cruise lines shutter their doors or park their planes and ships, this interlude may present them an opportunity to address how they handle passenger information. Each of these sectors of the travel industry collects personally identifiable information and each has suffered considerable breaches or lapses in how data is handled.
  • Like British Airways, the hotelier Marriott Corp. was socked with a £99 million fine by the ICO for its 2018 exposure of 383 million customers booking information.There is no doubt that the hotel industry is awash with personal data on their guests and are ripe for targeting by cybercriminals.
  • Every infosec professional will tell you, don’t collect what you can’t protect. These examples from within the travel industry serve to drive home that point. In the case of the Gekko Group and Spice Jet, their attempts to protect their data revealed configuration errors or a lack of understanding. With respect to Marriott, British Airways and Carnival, they were subjected to an attack that managed to maneuver through their defenses. What is inexplicable is the time delay between discovery and disclosure
  •  
    The article breaks down Data Privacy in the Travel Industry. It explains how the pause due to the pandemic is a good time to address security concerns. The article covers examples in the cruise sector, the airline sector and the hotel sector. It also warns companies that it shouldn't collect what it cant protect.
mattiebell

Hilton Hotels Hit By Payment Malware - 0 views

  • Hilton has revealed that some of its payment systems have been infected with malware that organised the theft of targeted customer informat
  • ion.
  • nfected POS (Point of Sale) systems in hotels.
  • ...6 more annotations...
  • i
  • we identified and eradicated unauthorised malware that targeted payment card information in some point-of-sale systems at our hotels
  • 54 North American locations were compromised by point-of-sale malware
  • hospitality service providers face extraordinary challenges with customer data security at point of sale (POS)
  • often the weak link in the chain and the choice of malware,
  • Encrypting the data in the card reading terminal ahead of the POS eliminates the exposure of live information in vulnerable POS systems
  •  
    This article is about the POS system at Hilton hotels and how it was breached by malware that put consumer data at risk. I found this article interesting because Hilton does not use unattended POS systems, which are what are most commonly targeted in information phishing attacks. This is definitely something that affects all aspects of the hospitality industry, and we know that consumer data is very sensitive. Hotels and other hospitality agencies are trusted to maintain high levels of confidentiality. It would be interesting to see how such a malware would have affected a smaller company with less counterattack resources.
llibe010

The Top Five Cyberthreats Hotel Brands and Franchisees Need to Know About | Netsurion - 0 views

  • ay for guests, it also opens hotels to digital threats perpetrated by malicious actors. Consequently, hotel operators should be aware of the types of cyber attacks, which can significantly hurt their brand reputation and bottom line, not to mention the safety and welfare of employees and guests.
  • In January, for example, cyber criminals took over a luxurious Austrian hotel’s computer-controlled key-card system, locking 180 guests out of their rooms until hotel managers paid a nominal ransom
  • A ransomware attack may disable or alter performance of hotels’ computer-driven systems such as air conditioning and lighting, putting guests’ comfort and, worse yet, safety at risk. In addition, booking systems are extremely vulnerable to ransomware attacks because they process information belonging to the hotels, third-party applications and their customers.
  • ...18 more annotations...
  • 1. Ransomware:
  • hey present further ransomware opportunities to hackers by using computers to automate functions.
  • distributed denial of service, or DDoS
  • One of the largest data breaches in history was conducted through a third-party vendor when hackers stole data from 70 million credit cards by gaining access to a mega-retailer’s network through credentials belonging to an HVAC contractor.
  • 2. Remote hacking through third-party vendors:
  • 4. DDoS attacks on the hotel network:
  • 3. Phishing scam targeting customers and hotels:
  • Train employees. Hotels should train employees to not open suspicious emails or links inside them as they may contain malware.
  • Statistics indicate that such incidents will become more frequent, so it is not a matter of if but when the next cyber attack will occur.
  • Integrate a managed SIEM. Hotels should bring on a managed security information and event management (SIEM) platform for their remote locations to be warned right away of cyber attacks. They may also want it for inside the perimeter if they lack the expertise and resources to properly use SIEM internally.
  • Maintain PCI compliance. The Payment Card Industry Security Standards Council (PCI SSC) has put forth a set of stipulations, the Payment Card Industry Data Security Standard (PCI DSS), in response to rapid PCI expansion. Hotels should make sure they are compliant with these regulations, which require businesses to send credit-card information in a secure environment, to prevent paying heavy fines and losing data, revenue, and customer trust.
  • Install antivirus on all devices. Hotels should ensure they have reliable anti-virus and anti-malware software installe
  • 5. Theft of personal information over public Wi-Fi.
  • According to the FBI, the number of cyber threat occurrences quadrupled to 4,000 per day last year from 1,000 per day in 2015
  • The number of cybersecurity incidents worldwide increased 38 percent in 2015 from 2014, according to the Global State of Information Security Survey 2016 by PwC, CIO, and CSO.
  • In addition, there are large volumes of payment card transactions between restaurants, on-site shops, spas, parking, and the front-desk, ensuring there is plenty of customer data for a hacker to compromise.
  • Hotels are especially vulnerable to this type of attack where a type of malware disrupts access to a system until a ransom is paid. This is because they often use integrated POS systems
  • Hackers can break into hotels’ payment systems through a remote access point belonging to one of its vendors, so they should closely monitor third-party access to their networks
  •  
    This article outlines some of the main cyber attacks on the Hospitality industry. It exposes the threats due to the wealth of data stored in PMS, POS and CRM and suggests steps to take to protect against malware and randsomeware. The article further highlights the necessity for antivirus software on all devices.
  •  
    The article describes the five most common cybersecurity risks for hotel brands such as ransomware, remote hacking and DDoS attacks. The operational elements of each risk have also been discussed. It also covers best practices that hotels and other hospitality organizations can adopt to curb breaches.
earagon22

PCI and PSD2 Compliance: Why Are Hotels on the Hook? - 0 views

  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • Established in 2006, PCI stands for the Payment Card Industry Data Security Standard, which contains guidelines for accepting, storing, and processing credit card information
  • ...12 more annotations...
  • These days, cyber security and regulatory compliance aren’t just necessary skills for the IT team. Every hotel manager - even the “non-tech savvy” ones - must understand these crucial components of data protection in order to protect their businesses.
  • A few rules of thumb include using PCI-compliant POS and PMS providers, storing both digital and paper data securely, and limiting access to sensitive data to only the employees who truly need it.
  • Examples of these guidelines include using an online checkout/payment page controlled by a licensed 3rd-party service provider, storing credit card data via a 3rd-party “vault” provider rather than in your own system, and masking the full credit card number on receipts, showing only the last 4 digits instead.
    • earagon22
       
      As an example, if guests book through a 3rd-party like Expedia then I at the front desk see an Expedia card not the guest's card. The card I see is pre-loaded with the amount of the stay ONLY. Even then, I cannot see the 3rd party's full cc number. I only see the last 4 digits just like guest credit cards.
  • “The attack on Marriott was hapless and still has many gaps to fill on what actually happened. A popular entry point for adversaries is through email spoofing. This tactic is used in phishing in order to get malware onto a target network to then move laterally across all systems,” Ryan Cornateanu, Application Security Engineer @ CrowdStrike.
    • earagon22
       
      This attack mentioned compromised cc details, passport numbers, and dates of birth for 300 million guests in their database. This happened in 2014. https://hoteltechreport.com/news/marriott-data-breach#:~:text=And%2C%20the%20financial%20burden%20is,the%20largest%20data%20breaches%20ever.
  • because of increased payment security, the amount of chargebacks will likely become much lower, which is something all hoteliers can celebrate.
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should still comply, since regulations like these are often mirrored in the United States and other countries soon after.
  • PSD2 includes enhanced guidelines for online payments and the handling of sensitive data to reduce the risk of credit theft, fraud, and security breaches. One major change is the requirement of Strong Customer Authentication (SCA) for online transactions. With SCA, rather than simply typing in a credit card number and clicking “pay,” consumers will need to provide a second layer of authentication, which could be a PIN code or an SMS verification code, before the payment can go through.
  • Guests book nearly three-quarters of hotel reservations online, so PSD2 will likely impact every hotelier as Strong Customer Authentication (SCA) becomes a requirement for payment processing.
  • Are any charges processed after the guest has checked out, such as minibar chargers? To prevent any hiccups with payment after check-out, charge an authorization on the guest’s card for the full incidental amount and have the guest provide two-factor authentication in person, such as chip-and-pin, when the guest checks in.
    • earagon22
       
      A property rule where I work is that each guest must insert or tap their cc at check-in in order to follow this rule and we take an incidental hold each night. Guests that have not traveled for years are surprised by incidental holds which makes sense based on when this was implemented.
  • The key takeaway here is that transactions initiated by the hotel at a time when the guest isn’t present won’t comply with PSD2 requirements.
  • protect consumers’ sensitive data, and, as a result, every merchant that uses credit card information must follow these rules, from small businesses to large corporations.
  • By partnering with a trusted technology solution and investing in PCI and PSD2 compliance now, hoteliers can prevent the potential catastrophe that could come with the theft of sensitive data.
  •  
    PCI compliance is a crucial and necessary set of guidelines that all hotels must follow. The Payment Card Industry Security Standard was created in 2006 and outlines rules regarding accepting, storing, and/or processing card information. These rules were put into place to protect consumers sensitive information. For example, in 2014 Marriott hotels was attacked and 300 million guests information was compromised. This attack led to new regulations being put into place, the Payment Services Directive 2 (PSD2). These regulations take into account international customers and enhanced guidelines for sensitive data.
ryanbonifas

Sacred Rose Festival Attendees Report Thousands in Overcharges - 1 views

  • Many music fans who attended the Chicagoland area's inaugural Sacred Rose Festival this past weekend and used their credit cards while there subsequently reported thousands in surprise overcharges.
  • The fest has responded saying it was a glitch with an onsite vendor.
  • the four-digit charges curiously appeared on the customers' cards after they visited a merchant on the festival grounds.
  • ...4 more annotations...
  • Various Redditors reported that they each received surprise charges amounting to $1,190, $1,300, $1,500, $1,700, $3,200 or more. One charge of nearly $5,000 was reportedly declined by a customer's bank.
  • the glitch in venue payment processing resulted in the charges, and that they were being reversed.
  • Here is their statement: 'You may have accidentally been charged a large amount from F&B at SeatGeek Stadium when using a credit card. Our payment processing is secure but had a configuration error. There was no exposure and/or fraud; we are PCI compliant. We are reversing all of these charges and you should see the amount credited to your card in 3-5 business days.'
  • There was a technical glitch with the point of sales system regarding the tips inaccurately processed.
  •  
    The overcharge nightmare of an establishment and their quick response to guests has led Sacred Rose Festival to scramble in response to outraged customers. The festival has shared the error came with the systems configuration and are PCI compliant with no exposure to breaches or fraud, but one would venture a guess there is more to this story.
jsanc478

Radisson Hotel hack shows vulnerability of hospitality industry - 3 views

shared by jsanc478 on 14 Apr 22 - No Cached
  •  
    This article talks about a situation the Radisson Hotels had on 2018, they confirmed a data of breach that exposed personal details of small percentage of members rewards. It was first reported by a Business Traveller after receving an email that his details has been compromised. Radisson took incident and did an extensive investigation to prevent future breach of data happening to their customer.
  •  
    Technology as with anything has the pros and cons. Whatever we put on the world wide web is at risk to be hacked, this is the harsh truth. By simply purchasing online or self check out, we are vulnerable. The sad thing is that hotels worldwide has the traffic of visitors and stores a wealth of information, a field day for hackers. As technology increases so is the need to employ cyber security and perhaps inventing high tech robots to guard information should be coming more to the forefront. Daily there are people developing codes to break in.
amoon008

Tackling Security Threats In The Hospitality Industry | MetaCompliance - 0 views

  • The hospitality industry faces vast security threats, making it a natural target for cybercriminals because of the value and volume of personally identifiable information that these organisations hold.
  • Marriott, Radisson Hotel Group, InterContinental, Four Seasons, and Hilton Hotels are just some of the major corporations that have hit the headlines in recent years as a result of a data security attack.
  • approximately 55 million online hotel bookings are affected by fraudulent websites and call centers posing as hotel websites, according to the American Hotel and Lodging Association.
  • ...7 more annotations...
  • The majority of all cyber-attacks can be traced back to a phishing email that tricks the victim into divulging their credentials or downloading malicious malware.
  • A study conducted by Intel found that 97% of security experts fail at identifying phishing emails from genuine emails.
  • many hotels becoming completely digitalised in a bid to gain competitive advantage and keep up with online travel agencies such as Expedia and Hotels.com
  • Worryingly, ransomware is evolving into a new type of threat where cybercriminals are not just encrypting data but are also stealing it and threatening to release it on the internet
  • In recent years, hackers have been deploying new tactics and Distributed Denial of Service (DDoS) attacks have been growing in popularity. This type of attack is an attempt to make an online service unavailable by overwhelming it with huge volumes of traffic from multiple sources to cause great damage. This can include loss of data, loss of revenue, reputational damage, and a loss of customers.
  • According to a survey, almost half (44%) of firms have experienced a significant, business-altering data breach caused by a vendor.
  • With the hotel industry increasingly prone to malicious cyber attacks, there are a number of ways organisations can combat cyber security threats
shuo zhang

Feds Offer Best Practices for Customer Privacy | Top Stories | | Hospitality Magazine (HT) - 0 views

  • Hospitality industry operators often collect information to better serve their customers.  Information may be collected during various touch points, including employee-guest interactions, the company website, and through business partners, and may include personal identifiable information, preferences, groups with which customers are affiliated, etc.  While customers understand that sharing their personal information helps businesses better serve their needs, they also have a right to know how that personal information is being collected, used and shared.
  • Protecting Consumer Privacy in an Era of Rapid Change:  A Proposed Framework for Business and Policymakers
  • This final report calls on Congress to enact general privacy, data security and breach notification, and data broker legislation in order to protect consumer privacy.
  • ...5 more annotations...
  • The privacy framework applies only to commercial entities that collect non-sensitive data from more than 5,000 customers per year
  • This element recommends that entities build in privacy at every stage of product development. Substantive protections include data security efforts such as encryption, reasonable collection limits, sound retention and disposal practices, and data accuracy. Policies and procedures should be designed that:
  • •Protect personal information from unauthorized access; •Keep personal information accurate and up-to-date; •Require that business partners with which information is shared exercise reasonable efforts to maintain the confidentiality of personal information about customers; •Educate employees regarding privacy and best practices for protecting customer information; •Protect personal information transmitted via websites during online transactions or when using other technology.
  • : A customer should be offered a choice at the time, and in the context, that his or her data would be used.
  • A customer should be provided with reasonable access to company-maintained data.
  •  
    The problem of the security in the internet is always risky for companies. Even though the customer trust the companies, but acctually, the companies sell your information without ask you if you want to share your information. For me, the organization for keeping the customers' information secured is useful and make sense, but I don't believe any companies want to pay for such service. They want to get income through selling the customers' information to other for comercial using. However, if the government make policy and establish law for protecting the customers information, it will be different. I think it will become a trend to promote. 
yessica henriquez

Hotel Security Demands More Investment In Latest Integrated Systems - 0 views

  • However, most hotel chains and investors have little interest in anything more. Highly intelligent security systems that give staff electronic instructions and control all relevant building automation systems in an emergency, such as turning off the air conditioning systems, opening fire doors, opening smoke extraction vents for smoke-free stairwells, activating emergency lighting, activating CCTV systems for locating the sources of danger, individual and logged evacuation announcements, detailed information for rescue services on action already taken etc., are rejected for cost reasons - even in VIP hotels
    • Grant Beck
       
      This reminds me of all the discussions in class about smart rooms.
  • contribution to profit, or the perceived lack of it,
  • Because security is not profitable, investors and hotel operators are reluctant to invest in safety and security
  • ...9 more annotations...
  • serious security breach can significantly damage a hotel operator's brand name
  • only asset owned by many hotel operators today is their brand
  • people have a false sense of security.
  • Hotels may be concerned about the costs of higher-level security systems but criminal activity could cost a hotel its reputation and not to mention, a person his or her life.
  • Any reductions in policy premiums are based only on passive systems and do not reward commitment to active systems
  • such systems can dramatically reduce the financial repercussions of a claim following a serious incident.
  • even though
  • Interest in security has always been event-driven.
  • Hotels may be concerned about the costs of higher-level security systems but
  •  
    Hoteliers don't give security a high enough priority Security is not as high on the hotel agenda as it should be according to Michael Hartmann, Senior Vice President for Hospitality Solutions with Siemens Building Technologies . Here he looks at the reluctance to invest in the latest security systems, the different levels of security typically employed and the benefits of an integrated approach.
« First ‹ Previous 161 - 180 of 253 Next › Last »
Showing 20 items per page