Skip to main content

Home/ Hospitality Technology/ Group items tagged breach

Rss Feed Group items tagged

TIAN LIU

Hotel tech trade association offers best practices for reducing payment card risk - SC ... - 0 views

  • "The result allows hotels to complete the process of removing all payment card data from all of their systems, dramatically reducing the cost of PCI (Payment Card Industry) compliance," according to the framework's executive summary. "Because hotels have no obligation or reason to tell customers if a breach of useless data occurs, the cost and impact of remediation, and the effect on brand reputation, are minimized."
  • In addition, according to HTNG, guests' credit card numbers typically are shared with a number of third parties during the booking process. As well, many hotels are independently owned and operated, and these franchisees often lack the technical resources to ensure security and compliance.
  •  
    Security is absolutely a big issue for the hospitality, it include a lot of content, not only keeping the guest safe in hotel's room. But also preparing the attached form internet to protect the guests' property. This system is designed to enhance payment card security and compliance across an industry that has been hard hit by hackers. Specifically, the framework provides guidance on implementing tokenization, a technology that substitutes card data with unique identifying symbols.
Amy Sena

Guest Room Tech Tops Investment Priorities as Locking Hack Makes Headlines | Columns | ... - 4 views

  • Pressure to provide ample bandwidth is on, with high guest expectations for connectivity. But at the moment, it’s room locking technology that’s in the hot seat.
  • Hotel guest room technology — and door locks in particular — received national attention in recent months when Forbes broke the news about a potential room lock security flaw found in Onity locks by a 24-year old software developer and security researcher. In a highly-contested decision (criticized as poor judgment by some and applauded as necessary full disclosure by others), the researcher released specific details of how to perform the lock hack. Since then a handful of hotels have alleged that the method was used by thieves in a series of guest room break-ins.
  • While the threat is limited to one manufacturer’s locking technology, it still could impact as many as 4 million hotel rooms.
  • ...2 more annotations...
  • Hotels, meanwhile, are putting a priority on upgrading locking technology.
  • But regardless of who is to blame, it’s the guest whose safety is compromised and the hotel whose name will be tarnished — much in the same way a payment security breach impacts consumers and merchants.
  •  
    Technology projects will be the biggest investments among hotel executives in 2013. This article focuses on the recent attention room locking technology has received and the priority hotels have placed on upgrading their locking technology. Although the security flaw is limited to one manufacturer, the impact will be felt among the entire industry. Guest safety must always be the top priority among hotel managers and staff. A guest room break in can ruin a hotels reputation in their respective community. Regardless of how the situation occurred a common perception is that the hotel was somehow at fault and guest safety is not a priority. As an industry we must always strive to create a safe environment for our guests. Upgrading our hotel locks, training staff proper safety procedures when entering and exiting guest rooms and proper check in procedures are what our guests demand of us to ensure their continued safety.
Dongyun Oh

Guest Room Tech Tops Investment Priorities as Locking Hack Makes Headlines - 0 views

  •  
    It's crowded at the top of the to-do list. We've just published the 2013 Lodging Technology Study, where hotel executives reveal which technology projects are top priorities for the year ahead. Their biggest investment (20% of their overall IT budgets) will be in guest room technology, focusing first on Wi-Fi access and bandwidth, and soon thereafter on upgrading door locks. Pressure to provide ample bandwidth is on, with high guest expectations for connectivity. But at the moment, it's room locking technology that's in the hot seat. Hotel guest room technology - and door locks in particular - received national attention in recent months when Forbes broke the news about a potential room lock security flaw found in Onity locks by a 24-year old software developer and security researcher. In a highly-contested decision (criticized as poor judgment by some and applauded as necessary full disclosure by others), the researcher released specific details of how to perform the lock hack. Since then a handful of hotels have alleged that the method was used by thieves in a series of guest room break-ins. While the threat is limited to one manufacturer's locking technology, it still could impact as many as 4 million hotel rooms. Onity responded with a fix, but is charging hoteliers for replacement technology, also a decision under criticism. Hotels, meanwhile, are putting a priority on upgrading locking technology. According to our survey, which was conducted at about the same time that the news broke about the potential lock flaw, more than one-third of hoteliers (35% overall) are planning to upgrade their hotel locks. About 20% will do so by the end of 2013, and another 15% will upgrade sometime thereafter. Right now, there are plenty of fingers being pointed with regard to ownership, if the hack method becomes a repeated source of break-ins. But regardless of who is to blame, it's the guest whose safety is compromised and the hotel whose name will
Hanqing Yang

Data Security and Your Next Hotel Stay: How the FTC Encourages Strong Security Practices - 0 views

  •  
    Summer's just around the corner, so imagine you're setting off on vacation. When you give your name and credit card to a hotel front desk clerk, you probably expect them to keep that sensitive information about you under lock and key. You probably don't imagine that this personal information would be easily available to malicious hackers.
  •  
    But unfortunately for customers of the Wyndham Hotel chain and its affiliates, that hasn't always been the case. Between 2008 and 2010, the risk of data breaches was unacceptably high. On three separate occasions, third parties attackers circumvented Wyndham's security systems and accessed credit card information. The FTC filed a complaint against Wyndham in 2012 alleging that the company's security practices - including failing to encrypt payment data and the use of default logins and passwords - constituted unfair and deceptive practices under the FTC Act. It is precisely for this reason that we have consistently argued for a flexible approach in understanding the unfairness and deceptive regulation prongs of the FTC Act; a cramped interpretation of the authorizing statute would preclude the agency from protecting consumers in our current era of computerized and network technologies absent further Congressional grants of authority, which could take years.
Cindy Saunders

Hotel Cyber-Security | Past Issues | Lodging Magazine - 0 views

  • Hotel cyber-security is facing increasing scrutiny from federal regulators. Case in point, last June the Federal Trade Commission sued Wyndham Worldwide hotels after apparently unsophisticated hackers allegedly stole the credit card information of more than 600,000 customers leading to a more than $10.6 million fraud loss.
  • So what are reasonable data security measures? The FTC itself has stated that the data security measures it considers reasonable “will depend on the size and complexity of the business, the nature and scope of its activities, and the sensitivity of the information at issue.” In other words, it is nearly impossible to know if your data security is adequate until the FTC tells you it is inadequate. While data security has been a hallmark of compliance for healthcare providers and banks for more than a decade, the hospitality industry has not been subjected to the same regulatory framework.
  • Review your privacy policy immediately
  • ...4 more annotations...
  • Stay one step ahead.
  • Data security work is often outsourced
  • If there is a breach, act quickly and decisively
  • Ask your attorney and IT professional to work together
  •  
    This article discusses how banking and healthcare have been held to a historically high level of cyber security, but only recently has the hospitality industry. It highlights a cyber attack on Wyndham Hotels and their reluctant response to take corrective action. The article offers steps that a hospitality company should take to protect themselves as they launch and work to protect their guests, their information and their company.
aali057

http://www.tourism-review.com/travel-tourism-magazine-information-security-is-a-serious... - 2 views

With the new innovations in technology, there are many security risks. Hotels have now started to execute a process in which these security breaches can be minimized. A security survey conducted in...

started by aali057 on 22 Oct 16 no follow-up yet
JIACHEN LI

Study: Hotel network security lacking - SC Magazine - 0 views

  • Most U.S hotels are vulnerable to malicious attacks and are "ill prepared" to protect their guests from internet security problems, claims a study published by Cornell University
  • hotels
  • having a robust set of firewalls that are managed and properly configured, splitting networks, and educating staff of the importance of security standards.
  • ...3 more annotations...
  • Ogle recommended that all hotels use Wi-Fi Protected Access (WPA) encryption,
  • For guests, Ogle recommended connecting to the internet using a Virtual Private Network (VPN)
  • ted anti-virus and firewall software and making sure each secured website starts with “https://” rather than “http://”. The danger of not securing a
  •  
    The Article attached to this link reports commun issues found in hotel internet networks. The author mentions a study conducted with 38 hotels. It resulted that 33 out of the 38 hotels had flaws in their network configuration and allowed the researcher to access unauthorized information via the internet. We all understand that reliable internet connectivity is a priority for guests and business travelers; however, security is a concern that can't be neglected. Another reason to be concerned is that so many softwares and applications are stored via internet. Adding a password is a simple measure that every business should consider. Network issues cold not only hinder guests but the hotel as well.
  • ...1 more comment...
  •  
    Nowadays, since many business travelers connect remotely to continue working while on the road, the potential for theft of corporate information exists. Some hotels still rely on relatively rudimentary hub technology for their networks, and these are particularly subject to hacking. Tested by Ogle, most hotels are lacking of security and responsibility for the safety when guest searching internet. Guests' information is easy for the hackers to steal, which means when we use the network in the hotel, we are almost peeped by other people we are unknown. Such a terrible thing! Hotel should increase its network's security, a hotel could potentially be considered at fault for not taking the necessary precautions to protect their guests from hackers. Based on this article, hotels can use Wi-Fi Protected Access (WPA) encryption, the password can provide kind of base wall to protect security. What is more, it is necessary that having a robust set of firewalls that are managed and properly configured, and educating staff of the importance of security standards.
  •  
    According to the research by Cornell University, most US hotels are vulnerable to hackers. There are two main reasons contribute to the issue. One is the flaws in many hotels' network topology, making it possible for customers to lose their privacy. The other is careless employees provide access information to help hackers' breach. Ogle thought that WPA encryption, VPN and training employees are good ways to solve the problems. I think that if the computer networks of hotel are weak, the guests' password, email message or other private information will not be protected, and they will even suffer loss. So it is important for a hotel to use different measures as Ogle recommended to ensure the safety of the computer network.
  •  
    this article is talking about the problem on the hotel network security. a author from the Cornell university said he tested wireless network at 38 hotels at the same time. he found that most hotels were easy to break into. moreover, as long as you use the Linux distribution BackTrack and a high-power wireless card and high-gain omnidirectional antenna, you can break into the hotel guest network and then get the password, email message and the website people are viewing. importantly, this procedure just cost 100$. this is full of loopholes. hotel manager should pay more attention on this problem. at the end of the article, the author recommend a security app called Wi-Fi Protected Access encryption. this app require the guest to enter the password if the guest wants to surf the internet.also, he recommend connecting to the internet using a Virtual Private Network (VPN), having updated anti-virus and firewall software and making sure each secured website starts with "https://" rather than "http://".
Qianlin Wang

Data Security Basics: Five Security Issues All Hotel Operators Need to Know | hospitali... - 0 views

  • This article looks at the top five issues facing hotel operators and what actionable steps can be taken to decrease the likelihood that your business will be stung by data thieves.
  • Franchise operators need to be aware, however, that an improperly configured RMA is vulnerable to data compromise attack by hackers. 
  • Transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. 
  • ...3 more annotations...
  • Hotel operators need to know that passwords, designed to keep criminals out, can also be a vulnerability in the absence of proper controls
  • Thanks to wireless networks, guests can speed though the check-in process, expedite valet parking and send room service orders directly to the kitchen.  At the same time, hotel operators should recognize that criminals can leverage improperly secured wireless networks to steal cardholder data and should implement strategies to thwart these efforts. 
  • Despite all best efforts, data compromise events can occur and every hotel operator should have a plan in place. Prompt action must be taken by hotels or restaurants that have experienced a suspected or confirmed security breach to help prevent additional exposure of cardholder data and ensure compliance with the data security requirements. 
  •  
    The article discusses five issues that hotel operations are facing, and how to decrease these issues in regards to data thieves. The first security issue discussed is "Remote Access", the article states "Many hotel operators and franchisors use remote management applications (RMAs)". This enable easy access to manage multiple locations downloads; conduct sales polls, and other systems within multiple companies. A advices to remote control issues are to change vendor default settings, in which you can create unique user IDs and complex passwords. Another advice is to "Configure the RMA", in which users are only allowed to connect to known MAC/IP. I personally don't think that creating a unique ID or account password may solve this issue, but allowing connection capability to a set IP/MAC is a wise intake. Although being able to just connect to a set MAC, will cause a limit on where and when you connect. The second security issue is "Network Security", many transaction volumes are being exposed, brand recognition as well; and that attract hackers. In order to reduce this problem, it is suggested that companies need to install and maintain a fire wall at all time. I agree with this other suggestion which is to Use outside resources to help identify new security vulnerabilities. This is great, because a company will be able to receive an outside outlook in regards to security. The last three issues that are on this list are: Password Management, Wireless Security, and Incident Response Plan. Overall it's evident that any system that has a password requirement is causing a major attraction towards security thieves. The suggestions within this article are great, but from my observation; many companies will have to put in time to track and monitor their systems. Systems can't allow to be left open without monitoring, and the internet is a lead way to all this, so any system that requires the internet must be monitored, and protected.
  •  
    Technology enables service. That's the idea, anyway. In the hotel industry, thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service. However, the hospitality industry continues to find itself targeted for damaging data compromise events by hackers. There are some good ways to decrease the attack of hackers. For example, Remote Access, many hotel operators and franchisors use remote management applications (RMAs).  Their ease of use in managing multiple locations makes them ideally suited to disseminate business downloads, conduct sales polls or survey inventory. RMAs are often packaged from vendors with default or blank passwords. Creating unique user IDs and complex passwords can reduce the risk of data compromise and help facilitate compliance with the Payment Card Industry Data Security Standards (PCI DSS). Another example is about Network Security, transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. The hotel can install and maintain a firewall at all times.  Disabling a firewall can put a business at heightened risk of Internet attacks and potential system compromise.
anonymous

Americans not ready for Canada's anti-spam law: report | Canadian Lawyer Legal Feeds - 0 views

  • CASL
  • will contain some of the toughest anti-spam provisions in the world, banning senders from delivering unsolicited commercial electronic messages without receiving express or implied consent from the recipient.
  • It applies to all messages sent from, or received in, Canada, which means American firms marketing in Canada fall under its jurisdiction.
  • ...3 more annotations...
  • 60 per cent of American marketing executives were completely unaware of the new law.
  • Individuals who breach the law can face penalties of up to $1 million, while corporations are liable for as much as $10 million.
  • “They’re saying, ‘never mind, we’ll stick to sending post cards in the mail, and do telemarketing instead
  •  
    This article is about the new new anti-spam laws that will be enforced in 2013 by the Canadian government. What was pretty interesting was the fact that 60 percent of American marketing companies were unaware of the new law. Funny thing is that most of those who were aware decided that they would simply resort to other forms of spam like telemarketing and postal mail.
Jenan Williams

http://www.hotelnewsnow.com/Articles.aspx/6318/Lessons-learned-from-hotel-attacks - 0 views

All too often, when we think of hotel security, terrorism is the first breach to come to mind. Although these attacks are few and far in between our daily security issues affecting the hospitality ...

started by Jenan Williams on 28 Sep 12 no follow-up yet
Alexander Suarez

Internet Security: Whom Should You Trust? - Forbes - 0 views

  • Comment Now Follow Com
  • Internet security is all about trust at a distance
  • Even with secure connections, encryption, and the various other authentication schemes there is always a way to spoof identity, provide forged documents or credentials, hold computers and servers hostage to “ransomware” or allow cyber-criminals to be whoever they want to be.
  • ...5 more annotations...
  • he Online Trust Alliance and its Mission
  • Privacy: Especially in the European Union, there is a greater focus on the control, collection, use and sharing of consumer data. The Online Trust Alliance is working to protect consumers in this regard;
  • The organization is deeply involved in seven areas that are highly relevant to business and how companies can safely interact with customers, clients and anyone that uses the Internet, while protecting internal confidential information.
  • Anti-Malvertising: to help protect consumers and sites from malicious advertising;
  • No organization is immune to the loss or compromise of confidential and sensitive data. Consumer information, employee records, proprietary and trade secret information, and intellectual property are all available for the taking if infrastructures are not properly protected and contingency plans developed should a breach occur.
  •  
    This article divulges into the world of internet security. It explains how with even the most secure connections there is always a possibility to spoof an identity, provide forged documents and/or allow cyber-criminals to be someone they're not.  The Online Trust Alliance or OLA, is an organization deeply involved in several areas that are highly business-relevant and in how companies should safety interact with customers, clients, and/or anyone who uses the internet while at the same time protecting their personal information.  In conclusion,  no organization is immune to a loss of personal information. Consumer information, employee records, etc are all available for the taking if not properly protected and/or a contingency plans developed in the event of. However, with the help and knowledge of the OLA,  preventing such instances from occurring can be drastically reduced .
annastone

Top 2015 Trends shows safety & security remains in the spotlight. ~ Wednesday, 14th Jan... - 0 views

  •  
    Monisa Cline, senior vice president, CWT Energy, Resources & Marine, commented, "The 2015 Energy, Resources and Marine Forecast is a key tool for our clients as they plan for next year. With traveler safety & security top of mind, we want to support our customers and their travelers every step of their journey."
  •  
    Carlson Wagonlit Travel is reporting on IT security issues that are occuring, especially in the international travel segment. They report that IT safety will remain at the top of their priorities. CWT handles large company travel for the likes of many Fortune 100 companies and has access to information which could be damaging should an IT security breach happen. I believe that additional travel agencies will also prioritize and make IT safety a top concern moving into the future.
mayr0604

Hotel technology investments to increase in 2015 to match guest expectations - 0 views

  • Hotels are matching heightened guest expectations with an increase in hotel technology budgets, investing an average of 4.9% of revenue in IT.
  • The biggest spenders by this metric are the mid-scale chains, which will spend 6.6% when compared to the 3.5% at the economy and luxury ends of the market.
  • Technology has moved from only being a boost to behind-the-scenes activities to a guest-facing tool that positively affects the overall hotel experience.
  • ...5 more annotations...
  • Migrating to the cloud continues to be a priority for many respondents. Services across the boar are being transitioned from on-property to the cloud, including PMS (15% moving to cloud), sales and catering (14%), POS(14%) and CRM (12%).
  • As the shift to cloud-based services continues, hotels must spend more money on security to prevent breaches or other embarrassing lapses
  • Mobile is also a priority when it comes to employees. Given the near-ubiquity of smartphones, hotels can now also consider mobile solutions that address particular employee considerations on this mobile channel.
  • The report also identified the top challenges for the IT respondents. 29% said that guests expect technological progress faster than hotels can reasonably keep up with. 21% find it difficult to properly manage the ROI on new technologies. 16% feel IT is under-budgeted. 15% are challenged by a resistant company culture as far as technology. 11% doesn’t have the appropriate talent to deliver the best IT.
  • Despite all of these investments, IT is still struggling to be accepted into the fold as far as influence and reach — only 40% of respondents agreed that the CIO has influence on par with other C-suite execs.
  •  
    This article reviews the newest technological investments that are being made within the lodging industry. The article outlines the industries greatest opportunities and accomplishments  concerning IT development. 
lazarobenitez

Why Cybersecurity in the Travel and Hospitality Sector is So Critical? - 0 views

  •  
    This article talks about the importance of cybersecurity in the hospitality industry. It explains the terrible consequences of a security breach for any company.
swhit133

Fighting Internet Crime: Protecting Your Small Business From Cyberattacks - 0 views

ata breaches at major corporations like Yahoo, Equifax, Target and Sony Pictures may capture the big headlines, but small businesses also face significant financial, operational and reputational ri...

https:__www.forbes.com_sites_dinahwisenberg_2017_12_20_fighting-internet-crime-protecting-your-small-business-from-cyberattacks_#e288baf30ee1

started by swhit133 on 24 Oct 18 no follow-up yet
rnobl005

The damage from Atlanta's huge cyberattack is even worse than the city first thought | ... - 0 views

  • The damage from Atlanta’s huge cyberattack is even worse than the city first thought | TechCrunch
    • rnobl005
       
      After reading the discussion prompt for this week, the recent cyberattack on Atlanta immediately came to mind. This scenario is a prime example as to why cities need to invest in cybersecurity. The city paid the ransom demand of $50,000, but the damage of the attack itself was much more costly - they estimate having to spend $9.5 million to rebuild many programs that are not salvageable. It's hard to say if this was preventable had Atlanta invested in some form of cybersecurity but I think this is a new trend that major cities should be aware of and start taking preventative measures on.
  • The damage from Atlanta’s huge cyberattack is even worse than the city first thought | TechCrunch
  • More than two months after a cyberattack hobbled many of its critical municipal systems, the city of Atlanta is still sorting through the wreckage of what is likely the worst cyberattack targeting a U.S. city to date.
  • ...7 more annotations...
  • On March 22, Atlanta’s connected systems city-wide were hit with a ransomware message locking their respective files and demanding an approximately $50,000 payment in bitcoin
  • Atlanta residents were unable to do simple city system-dependent tasks like paying parking tickets or utility bills. City employees didn’t get the all-clear to turn on their computers until five days later and many city systems still have not recovered.
    • rnobl005
       
      The cybersecurity article focused on global issues and potential military conflict, but this article proves that cybersecurity can impact the more mundane aspects of our life.
  • at least one third of the 424 software programs that the city runs remain offline or partially inoperable. Almost 30 percent of those programs are deemed “mission critical” by the city meaning that they control crucial city services like the court system and law enforcement.
    • rnobl005
       
      Again, on a global scale the Atlanta court system doesn't sound super threatening. But for the city it's obviously a huge blow and will take years to bring everything up to speed.
  • While reporting the updated numbers, Rackley estimated that $9.5 million would need to be added to the department’s $35 million budget to address the remaining damage
  • That amount is on top of the more than two million dollars in emergency procurements sought by Atlanta Information Management following the attack.
  • Earlier this week, Atlanta’s Police Chief disclosed that the cyberattack destroyed “years” worth of police dash cam video footage.
    • rnobl005
       
      Another terrible loss due to the cyberattack.
  • Atlanta has been regarded as a frontrunner for Amazon’s second headquarters in some analyses, though it’s not immediately clear how the cyberattack will affect the city’s odds.
jireh93

Data Security and Privacy for the Hospitality Industry | Clark Nuber - 0 views

  •  
    In a nut shell, this article focuses on the point of time when tourism reaches it peak season and why businesses should be playing close attention to data security and confidentiality. It is important that they ensure where customer personal information is being stored as well as maintain in a controlled/organized manner. Also, it's time that we go beyond the basic firewall system and have an actual intrusion detection system implemented. This can help to detect security and system breaches which can help prevent extensive damage and the lost of customers information. To close, the industry must make to cross train all staff so that they are knowledgeable beyond their daily job duties and understand the important of security and privacy. And of course, for situations that occur because its bound to do so, their needs to be a reaction plan set in place to alleviate any damages that were done.
aycasa

How Hotel Cybersecurity Keeps Guests and Data Secure - 1 views

  • Hotels need cybersecurity: Although they don’t have the volume of transactions that big box retail stores do, their transactions are generally larger, and their guests have more at stake than just their groceries.
  • But the personal information hotels store is only part of what’s at risk.
  • Hospitality organizations need to understand their vulnerabilities, as well as how to identify threats to their guests, property and data.
  • ...2 more annotations...
  • Hotels need to think about multiple endpoints and the remote connections they rely on to run the property’s operations.
  • Take advantage of cybersecurity professionals who can identify sources of intrusion, assess the extent of the breach and provide details of the compromised material.
  •  
    This article is talking about how the hotel cybersecurity keeps guest information data secure and why is very important. Most of the hotel has a really big database of the guest's personal information. Thus, it's easy to have security problems happen in the hotel. Hospitality organizations have to understand their vulnerabilities and always have to make a plan about how to protect hotel guest's data. This article also introduced 4 key areas cybersecurity teams need to focus on. First of all, instill security as a Cultural Norm. When the customer chooses the hotel to stay, which means they trust this hotel, they feel the environment is safe and they trust the digital assets as well. They will connect the Wi-Fi with their personal laptop or smartphone. Therefore, hotelier have to train their employee about provide the safety environment for their guests is necessary and everyone have to focus on it. Secondly, Think Beyond the Credit Card. Every billing system need to be protect customers personal and financial information, the hotel need to think about the multiple endpoints. Third, Be Smart About Responses. When the cybercrimes happen, they need to be reported responsibly and they have to know this thing at the first moment. Hotel have to keep training their security teams and be aware of some bad things happen. The last one, Don't sleep on Insider Threats. There is one thing that hotel have to focus on that the employee may steal data to sell it to other company.
  •  
    This article mentioned how hotels do not have as many transactions as popular stores have but their transactions are typically more than grocery transactions. Hotels have a lot of personal information for many people and that information should not be leaked, never. It was mentioned that hotels need security as it is a cultural norm, you have to think beyond the credit card, be smart about responses, and don't sleep on insider threats. "Hotels are vulnerable to cybercrimes through a variety of avenues that break with the traditional physical security measures deployed across the hospitality industry. Keeping guests and their assets - both physical and digital - safe is paramount to preserving both the image and financial security of hotels."
Maria Zuniga

Cyber and data security in the hotel industry - PwC Middle East - 0 views

  • In the Digital Era, technology is everywhere; people can connect to your company, your employees, customers, providers and competitors through laptops, smartphones and even wearable devices.
  • With increasing reliance comes increasing risk, many of which are outside the Enterprise’s control.
  • Legal and regulatory problems bring their own special range of issues. Locking horns with regulators, litigants and judges is the last thing that business needs.
  • ...13 more annotations...
  • This is a landmark piece of legislation that will radically change our perceptions on how personal data should be handled in business
  • The simple truth is that cyber security and data privacy problems can be big news and newsworthiness drives awareness levels
  • Cyber and data security emerged to prominence as a massive risk area, due to a series of high profile breaches affecting payment cards
  • There is also the economic interest in gaining commercial advantages from the use of personal data. Gaining better customer insights and providing them with personalised services are now recognised by many in the hotel industry as core business goals.
  • The purpose of the GDPR is to put people back in control of their personal information and to improve how entities look after personal information while it is in their custody.
  • when things go wrong and they are fully aware of the fact that some of the world’s biggest, richest and more powerful entities have been humbled by poor approaches to security and privacy.
  • This case has established a need for the development of comprehensive information security programmes, annual security audit cycles and post-incident investigations in the hotel sector.
  • Businesses need to think about trust, confidence and brand health and reputation.
  • they have to do much more to tackle the security and cyber risks they face and to live up to the expectations that society places in them
  • People responsible for security and privacy in hotels ought to ask themselves whether their entities have appropriate Visions for desired end states. If not, they should bring together the stakeholders to discuss ways to take things forward.
  • regulation is seen as the antidote to market imperfection.
  • Trust, confidence and brand health may operate in a different timeframe to share prices.
  • In other words, suffering security and privacy failure might be like a cancer, where the harm is hidden from view until it is too late. This returns the focus to legal risk.
  •  
    This article is extremely important. I feel like everyone should read it because it goes hand in hand with what we have learned this week in class. The topic of cyber security is something that people need to shift paradigms. This article brings us great points about the digital era we live in. since everything we do in business now a days has to do with technology, it is important to have security and trust in this. With the increase reliance on this technology comes a higher risk. The article brings up that awareness levels of cyber security and data privacy issues are growing at a steady pace. It is extremely important that in the hospitality industry, Businesses think about trust, confidence and brand health and reputation. This highlights the fact that it doesn't matter if security systems are costly, in the long run if something goes wrong that will end up being the most costly. The article mentions that there will be a regulation established by the EU called General Data Protection Regulation (GDPR). The purpose of the GDPR is to put people back in control of their personal information and to improve how entities look after personal information while it is in their custody. In conclusion, this gives companies a competitive advantage.
herzencortes

The Pros and Cons of IoT in the Hotel Industry | - 1 views

  • The Internet of Things is the network of physical objects embedded with electronics, software, sensors, and network connectivity enabling these objects to collect and exchange data.
  • “Third Wave of Innovation” following the Industrial Revolution and Internet Revolution.
  • The hotel industry has already started implementing IoT strategies into their properties to increase guest satisfaction, decrease unnecessary costs and labor, and increase productivity.
  • ...9 more annotations...
  • top five trends
  • IoT Drawbacks in Hospitality
  • cyber-attacks and security breaches
  • “a smart energy management system knows when a guest room is unoccupied and can automatically adjust the temperature to reduce energy consumption by as much as 20-45 percent,”
    • herzencortes
       
      Energy consumption is only one aspect where IoT can help, but more so, it will help in maintenance, sales, and overall guest experience in the hospitality industry
  • The Internet of Things is the network of physical objects embedded with electronics, software, sensors, and network connectivity enabling these objects to collect and exchange data.
    • herzencortes
       
      The internet of things is a fascinating concept, in the future it will help companies collect more data than ever and then in turn this data will be use to cater to guests and market to a much more specific market
  • Guest-room Automation
    • herzencortes
       
      Guest room automation, in my opinion is the next big thing. Today we see air conditioners that can turn off when guests leave rooms, lights that dim with natural lights, and televisions that turn on and off depending on guests being or not present
  • Predictive Maintenance – Predictive maintenance takes preventive maintenance one-step further by using sensor data to recognize hazardous trends and alert the appropriate maintenance engineer before the issue escalates.
    • herzencortes
       
      Predictive maintenance is imperative to keeping a property in shape. By including IoT labor costs and maintenance costs can be brought down
  • Mobile Engagement –
    • herzencortes
       
      Social media is king, andhaving data that allows for properties and other companies to target their posts can make the difference
  • Hyper-Personalization
    • herzencortes
       
      Particularly with high end properties, personalization is an important part of building a recurring client base and differentiation.
  •  
    More and more, hotels are using IoT (the Internet of Things) strategies. Just like we can use our phones to lock/unlock our house's front door, hotels can use different devices in their properties to boost a guest's satisfaction. Currently, some of the top IoT trends are: Guest-room automation, where a guest's room can change the temperature, switch on/off the lights, and do a few more personalizations around the room depending on whether or not a guest is currently in there; Predictive maintenance, where sensor data is used to prevent issues by recognizing dangerous trends and notifying maintenance before it gets worse; Mobile engagement, where guests can use their phones as room keys among other things; and Hyper-personalization, where rooms could remember a guest's room preferences (temp, lighting, tv channels, etc.) and then set up the room the same way the next time they stayed. However, the fact that all of this is internet-enabled means that there is also a significant risk of information being hacked into and stolen.
« First ‹ Previous 181 - 200 of 253 Next › Last »
Showing 20 items per page