Skip to main content

Home/ Hospitality Technology/ Group items tagged council

Rss Feed Group items tagged

dlcrawford

Council Post: 15 Things Every Business Should Consider Before Buying Enterprise Software - 0 views

  • you need to talk to people who are already using it. And the biggest question you should ask them is what happens when things go wrong.
  • Before closing a deal, use the software with the data and in the environment intended
  • Using them in context is key in determining if the software performs the desired function, handles problems correctly, and deals with the scale and scope of the data you plan to process.
  • ...5 more annotations...
  • You are not purchasing software -- you are investing in creating more efficient and productive business habits for your employees
  • 7. Make Sure You Can Get Your Data Out
  • incorporate reputation, stability, R&D and references into the decision-making process
  • "How will this software investment enhance my services to benefit my customers’ businesses?
  • There should be a clear upgrade path that allows scaling and coverage of an expanded scope
  •  
    This article lists a few additional items to consider when making software purchasing decisions. Many of the considerations were listed in the lecture, but there is an additional perspective to why that consideration is important listed here.
anonymous

New Carbon Capture Technologies Just Waiting For IRS Green Light - 0 views

  • Innovative carbon-capture projects are ready to launch in the U.S., according to experts gathered yesterday by the Atlantic Council, but they are waiting for IRS guidance expected since fall.
  • The guidance should resolve uncertainty over how companies can take advantage of the carbon capture tax credit in Section 45Q of the Internal Revenue Code.
  • we think is the next generation of carbon capture.”
  • ...8 more annotations...
  • CCS is taking off now in part because of the IPCC’s 2018 report on 1.5º of global warming.
  • some governments increased their ambition from a 40% or 50% reduction in emissions by mid-century to net-zero emissions.
  • “We’ve seen more governments embrace net-zero targets,”
  • Even without the new policies, three new CCS projects are in development in the U.S., all tied to power plants,
  • Ten are in development in Europe, equal to the total number now operating in the U.S.
  • “First, we'll see more carbon capture on natural gas power plants,”
  • “and in many places the license to operate for natural gas-fired power plants will be dependent on capturing their CO2.”
  • Second, many projects will capture methane to produce hydrogen, storing the CO2.
  •  
    As there is a rush to fix emission gases in our ozone, some scientists are invented new technology to help eliminate CO2 gases in our air. One of their inventions helps take CO2 gases from the air and fixes it into basaltic rock. Another stores CO2 gases for power for natural-gas power plants. However the USA is still waiting for approval from the IRS to implement a carbon capture tax credit.
aleliason1992

Redcar cyber-attack: Council using pen and paper - BBC News - 0 views

    • aleliason1992
       
      This article is about cyber security. I liked this article because it demonstrates cyber attacks on a smaller scale that still shows a massive inconvenience to those who do not back up their data and do not have their security systems up to date. it is clear to me that the easiest attacks of the future are cyber based and to leave yourself vulnerable to save a few bucks is a thing of the past.
agrie013

Hospitality Upgrade | Online Skimming Threatens Hospitality E-Commerce Sites - 0 views

  • Attacks against the hospitality industry to gain payment information continue. There is a growing threat to all e-commerce websites called Web-based or Online Skimming. These attacks infect e-commerce websites with malicious code, known as sniffers or JavaScript (JS) sniffers and are very difficult to detect. Once a website is infected, payment card information is “skimmed” during a transaction without the merchant or consumer being aware that the information has been compromised.
  • Today two industry cybersecurity organizations, PCI Security Standards Council (PCI SSC) and the Retail and Hospitality ISAC, joined forces to highlight this growing threat.
  • By exploiting vulnerable plugins, brute force login attempts (credential stuffing), phishing and other social engineering techniques, the hackers attempt to gain access and inject malicious code.  “These attacks are either directly into e-commerce websites or often into a third-party’s software libraries that merchants rely upon.  These service providers may not be aware of the risk they create for their customers if they are not focused on security and the potential threats targeting them
  • ...1 more annotation...
  • The ability to detect these threats before they can cause damage is significantly important. Examples of PCI DSS Requirements providing ”detection” controls include: Reviewing code in order to identify potential coding vulnerabilities (Req. 6) Use of vulnerability security assessment tools to test web applications for vulnerabilities (Req. 6) Audit logging and reviewing logs and security events for all system components to identify anomalies or suspicious activity (Req. 10) Use of file-integrity monitoring or change-detection software (Req. 11) Performing internal and external network vulnerability scans (Req. 11) Performing period penetration testing to identify security weaknesses (Req. 11) Alerting on posts to newly observed domains in proxy logs can further provide additional avenues of detection for future phishing attacks as well as the initial reconnaissance phases of an attack on a thirdparty JavaScript library. 
  •  
    This article goes in to detail that attackers have targeted information that is acquired on websites such as credit card and other personal information. This writing does tell how PCI and Retail and Hospitality ISAC joined forces to help prevent such attacks from happening on these websites. Now PCI and ISAC are the standard when it comes to protecting information. These attacks are easily undetectable by these websites because they are only skimming for the information. this article does give tips for prevention and detection. PCI is the industry standard and by them teaming with ISAC it will make these websites and your information more safe.
laura kaczkowski

Travel Agents Increase Use of GDS to Book Hotel Rooms - 3 views

  • Advanced Search Search Products & Services    News Releases Close Send a release Member sign in Become a member For bloggers For journalists Global sites Products & Services Knowledge Center Browse News Releases Contact PR Newswire
  • he leading global provider of revenue generating solutions for hoteliers, clearly demonstrates how crucial Global Distribution System (GDS) platforms and GDS Shopping Displays are to travel agents:
  • Travel agents in 25 countries across the Americas, EMEA (Europe/Middle East/Africa) and Asia/Pacific regions who subscribe to one of the four major GDS systems were asked to participate.
  • ...8 more annotations...
  • where 26 percent of travel agents stated that they used their GDS platform more often than in the past and 19 percent said they used the GDS Shopping Displays more often than before.
  • "Travel agents are increasing GDS hotel use, and have once again confirmed their confidence in GDS Shopping and Booking Displays,"
  • 84 percent of respondents indicated that they were using their GDS platform the same amount or more often than in the past, with 35 percent stating that they are using GDS more.
  • n the survey, travel agents worldwide also indicated that promotional messages are effective and often prompt bookings: 66 percent of all travel agents surveyed who were aware of promotional messages requested additional information by looking at the screen attached to the promotional message.
  • "This survey definitively shows that promotional messages are not only an excellent way to reach travel agents, but also a valuable sales catalyst,
  • s the leading provider of revenue generating solutions for hoteliers across the globe. TravelClick offers hotels world-class reservation solutions, business intelligence products and comprehensive media and marketing solutions to help hotels grow their business.
  • is one of the fastest growing marketing research firms in the United States. With offices across the country and in Europe and partnerships with many of the largest companies in the financial services, consumer package goods, automotive, healthcare, media, technology and travel and leisure industries worldwide, PMI also offers advanced advertising and brand measurement along with direct marketing expertise.
  • Learn about PR Newswire services

    Request more information about PR Newswire products and services or call us at (888) 776-0942.

    Featured Video

    FEMA And The Ad Council Unveil New Series Of Ready PSAs As Part Of Ninth Annual National Preparedness Month
  •  
    In the article, "Travel Agents Increase Use of GDS to Book Hotel Rooms," it talked about how the leading global provider of revenue is generating solutions for hotels, it shows how important GDS platforms are to travel agents. "84 percent of respondents indicated that they were using their GDS platform the same amount or more often than in the past, with 35 percent stating that they are using GDS more." Back in 2009, when the last study was conducted, about 26 percents of travel agents said that they used their GDS platform more often than in the past. This study also states that the annual GDS shopping displays will be over $50 million in 2011, which will increase more than a million bookings compared to 2010. There was another survey that was done and they surveyed different travel agents from across the world that were subscribed to a major GDS system. In the survey the travel agents indicated that promotional messages are effective and often prompt bookings. Out of the travel agents they surveyed, 66% said that they were aware of the "promotional messages requested addition information by looking at the screen attached to he promotional message." From this survey it showed that promotional messages are an excellent way to reach travel agents and from reaching the agent, they also reaching the customer, it's a win-win reaction.
  •  
    I enjoyed the part about brand and promotional messaging, that is always a lure for me. When I see an attractive offer, evern If I'm not interested in booking or going to the destination, I often click on it anyway just to see the offer. It is a very effective marketing tool.
anonymous

How hotels are becoming smarter about waste | Hotel Management - 0 views

  • Resorts, hotels and restaurants generate a lot of waste—from food, packaging, amenity containers, waste water from toilets, kitchens and laundries.
  • Food waste accounts for more than 50 percent of waste in the hospitality industry. In the U.S., more than $218 billion is spent on growing, processing, transporting and disposing of food that is never eaten. This is mostly from homes and the foodservice industry, which includes hotels, with a whopping 70 billion pounds of food wasted every year.
  • The city of San Francisco has taken some of the most significant waste management steps in the country. After adopting a zero-waste policy in 2002, the city partnered with Recology, its long-term materials management service provider, to implement a five-pronged strategy, which is aiming for zero waste by 2020: Create convenient programs Conduct extensive public outreach Provide generator and service provider incentives Process trash to recover materials Adopt waste-reduction policies
  • ...3 more annotations...
  • Recology provides similar economic incentives through its “pay-as-you-throw” program  in which the less trash a business discards and the more it recycles and composts, the less it pays for pick-up services.
  • “Zero Waste means designing and managing products and processes to systematically avoid and eliminate the volume and toxicity of waste and materials, conserve and recover all resources and not burn or bury them. Implementing Zero Waste will eliminate all discharges to land, water or air that are a threat to planetary, human, animal or plant health.”
  • For business, especially hotels and restaurants, Stephanie Barger director of market development, zero waste programs at the U.S. Green Building Council, emphasized that “zero waste businesses are better businesses—better for themselves, better for customers and the communities in which they operate.”
  •  
    This article goes over the idea of zero waste. It continues on to explain what it means and how hotels are adapting to it.
allisonweets

Why is Computer Networking Important? | Digital Divide Council - 1 views

  • Information is the building block for effective communication.
  • This mainstream technology has proven to be an effective means to enhance proficient, flexible and streamlined communication while maximizing on productivity and resources.
  • Computer networking is a pool of integrated computers configured to one another.
  • ...18 more annotations...
  • Computer networking enhances seamless communication, cohesive functioning, and resource sharing.
  • Personal Area Networks are interconnected technology devices that serve a single individual within one facility.
  • LANs are limited to a single building like an official establishment.
  • MAN covers a distinctly larger are than LAN. MAN consists of configured computers covering a town, city or campus.
  • WAN covers a larger geographical area than MAN. The network connects a country or even continents.
  • HAN is a computer network limited to a defined boundary like a house or home office.
  • Computer networks reduce your hardware costs significantly.
  • resource pooling is efficient.
  • This eliminates the need to buy single IT assets for each employee.
  • With a central server, you lower the number of storage servers needed. And you increase the efficiency of operations.
  • You can access your data from any device. This enhances free movement while accessing your data wherever you may be.
  • Computer networking is a massive boon to the communication landscape. Networking allows you to send and receive text messages and files in real time.
  • Employees can download and exchange corrupt files which expose your server to viruses and malware. Shared resources open doors of opportunities for security breaches.
  • Small equipment such as modern routers is expensive. The networks also need regular monitoring and maintenance.
  • Computer networks are flexible, but employee productivity is a concern.
  • Quality technological solutions are a significant determinant of the success of any business.
  • Computer networking offers immense technological solutions to businesses and institutions in various formats.
  • “To win in the marketplace, you must first win in the workplace”- Doug Conant.
  •  
    Computer networking is essential within organizations to build effective communication and allows sharing of resources. Various forms of computer networks each serve a specific purpose based on the size of area being served. Computer networking has many advantages but also has drawbacks that must be considered. Networks have the ability to reduce costs, increase storage, enhance flexibility, and provide easy access to information. Despite this, computer networks are subject to the threat of security breaches and can be very costly for an organization. Employees may also find themselves being distracted by the vastness of information made available by the Internet. In all, computer networks can offer countless solutions to technological problems within organizations.
marble_bird

Hotel_ITSec.pdf - 0 views

shared by marble_bird on 15 Jul 20 - No Cached
  • During the past decade, information technology (IT) has significantly changed the way the hotel industry controls and manages operations. While many technologies have been utilized, some newer technologies have emerged in the literature and in practice, and many of them impact the hotel’s security.
  • Among the results, this study identified a gap between hoteliers’ understanding of IT budget adequacy and the adequacy of installed IT security systems.
  • Advancements in technology are increasing at a remarkable rate. As technology becomes more important, organizations that do not keep up with these advancements could lose business opportunities to other competitors that do
  • ...53 more annotations...
  • The four leading technologies which have showed a high adoption rate from the industry and have received attention from academia are: self-service, wireless, green, and security technologies. The advantages of these technologies for hoteliers include enhanced customer services and operational efficiency (Doyle, 2007), decreased guest wait times, more efficient methods to settle bills (Singh & Kasavana, 2005), reduction of energy costs (Meeroff & Scarlatos, 2007), and protection of sensitive customer data and credit card numbers
  • In addition, exploring the influential factors of security system usage will provide greater depth of knowledge with respect to why some hotels have adopted more security systems than others.
  • there is still a lack of understanding of the nature of risk associated with inadequate IT security, especially among operators of hotels that do not have their own IT departments.
  • Self-service technologies are commonly defined as devices or applications which permit users to produce a service independent from the direct involvement of the service provider (Meuter, Ostrom, Roundtree, & Bitner, 2000). The use of self-service technologies in the hotel industry has grown considerably, especially in the areas of self check-in, in-room check-out, and foodservice kiosks
  • IT systems refer to general support systems such as mainframe computer, mid-range computer, and local area network.
  • Some of the most significant wireless technology applications involve the use of mobile handheld devices, such as personal digital assistants (PDA), tablet PCs, and cellular phones, or RFID (radio frequency identification). RFID utilizes computer chips and antennas, allowing the chips to wirelessly communicate with a receiver.
  • While the major usage of RFID in the hotel industry was for inventory control purposes, it also has the potential to be utilized in ways that can provide more conveniences for the guests.
  • Other possible uses include placing RFID tags on items of high value as a means of theft prevention or integrating tags into guest loyalty cards for easy identification
  • IT investment that lowers environmental impact and IT that manages the environmental impact of other systems are commonly referred to as “green technology”
  • Many hoteliers might think becoming more environmentally friendly will cost more for their hotels. However, it has been demonstrated that “going green” is not only the right thing to do for the environment but also provides tangible bottom-line benefits for hotels by reducing consumption of energy and water, as well as other related costs.
  • Some of the risk factors involved include reliability, security, and privacy issues
  • risk associated with a breach of IT systems security (e.g., network break-ins) is very high. Consequently, no sector of the business community is exempt from attacks on their IT systems, with an attack being defined as a technique used to exploit a system’s vulnerabilities.
  • Many of these attacks involve attempts by thieves to gain access to customer credit card data, and these attempts constitute a major portion of the risk inherent in IT security
  • if a system is breached and the merchant is not PCI compliant, the merchant then is responsible for all costs associated with improperly used credit card information taken from that system (Kress, 2008). These losses could bankrupt a business if the security breach goes undetected for even a short time.
  • IT security systems are those measures taken to protect the confidentiality and integrity of proprietary data.
  • two main paradigms of adoption are believed to occur: bottom-up adoption and top-down adoption.
  • Thus, it is reasonable to assume that organizational factors (e.g., financial factor, human resource) will influence the implementation stage of security systems at a hotel.
  • A hotel with sufficient IT budget will install more security systems than those with insufficient IT budget.
  • That is, if a hotel does not have its own IT department, it will have a negative influence on successfully installing or maintaining necessary security systems.
  • A hotel with its own IT department will install more security systems than those without.
  • Overall, the state of IT spending on security continues undiminished because managed security services are required for almost every application (Communications News, 2007).
  • A hotel with more technologies being utilized will install more security systems than those with fewer technologies.
  • Given the importance of security and privacy at a luxury hotel, this study expects luxury properties to have installed more security systems than other segments
  • Most hotel employees use their property management systems for hotel operations and should be able to check their e-mails.
  • To justify the low response rate, previous studies which have compared response rates of mail and e-mail for surveys were reviewed.
  • The sample obtained in this study represented the targeted sample: over 80% of the respondents were working in hotel operations. Furthermore, the purpose of this study was to explore hotel operators’ insight of technology usage, IT budget, and security measures rather than to confirm existing theories or to generalize the results.
  • The respondents were asked to select from a total of fourteen securities related systems
  • The profile of the respondents revealed that they were experienced hoteliers with more than ten years experience in the industry
  • Fifty-three percent of the respondents reported that they were with chain hotels that would be considered mid-range properties with an average of 175 rooms (median of 107). Over 80% of the respondents reported working in operations, while fewer than 4% reported working in either IT or engineering (Table 1).
  • Nearly 70% of the respondents’ properties did not have their own IT department (69.2% did not have, and 30.8% had their own IT departments, n = 234, missing data = 10).
  • Fifty-three percent of them (n = 244) thought the most important goal for hotel technology would be enhancing the customer’s experience.
  • second identified goal was utilizing technology to help generate revenue (41%)
  • differentiate properties from their competition (20%), to lower expenses (16%), and to increase security (6%).
  • Internet kiosks in the lobby represented the most frequently used self-service technology (36.5%, n = 244), followed by kiosks for airline check-in/board pass
  • With respect to security systems currently in use, antivirus security systems represented the most frequently used security system (92.2%), followed by hardware firewalls, software firewalls, physical security, and encrypted login security systems.
  • intrusion detection was the most frequently identified system (15.6%), followed by vulnerability assessment scanning (13.5%), Internet scanning (13.1%), antivirus (11.5%), digital ID server (11.5%), and nonreusable passwords (9.8%; Table 2).
  • Thus, the hypothesis was supported that there was a linear relationship between the three factors and the adequacy of security systems.
  • The positive standardized coefficient (β) of .389 indicates that there was a statistically significant (p < .001) linear relationship between IT usage (the number of wireless, self-service, and green technologies a hotel was using) and the adequacy of security systems
  • The study revealed certain things of interest, the most significant of which is the need for greater emphasis on IT security among hoteliers.
  • only about 30% of all respondents reported having their own IT departments. Since budget hotel properties are extremely unlikely to have an IT department, it is highly likely that the very large majority of IT decisions throughout the industry are being made by hotel operators for whom IT is not their primary area of concern.
  • Furthermore, the focus of hoteliers for future IT implementations is enhancing the guest experience (53%) and generating revenue (41%). Very few respondents (6%) identified increasing security as a 5-year IT goal.
  • While almost all respondents use information systems as part of their jobs, very few are trained in the development, maintenance, and secure use of these systems.
  • no correlation was found between the respondents’ perceived adequacy of their IT budgets and the adequacy of installed security systems, as adequacy of IT budget did not appear as a significant term in the regression analysis.
  • Nearly 10% of respondents do not have so much as anti-virus protection for their systems, and nearly half do not even take simple physical precautions to protect their IT systems.
  • we note that no correlation exists between the respondents’ perceived adequacy of their IT budgets and the number of installed IT security systems, as the number of installed systems was not a significant factor in the regression analysis.
  • the large majority of respondent properties do not have their own IT departments. Second, the people making IT decisions generally do not have IT backgrounds or training. Third, the large majority of respondent properties have little more than firewalls or antivirus software to protect their proprietary data, and these systems alone are not adequate to meet PCI standards, as they do not take steps to encrypt and protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test their networks, and maintain an information security policy as required by the Security Standards Council.
  • it is reasonable to conclude that the respondents did not have an adequate understanding of the nature of the IT security hazards facing them for the average property does not have installed systems adequate to meet PCI standards, yet they reported having adequate budgets.
  • In order to adequately protect proprietary data, one must have an understanding of network security, which is an understanding apart from software functionality.
  • Properties with their own IT departments, however, reported that they had a higher number of installed IS security systems than did those properties without their own IT departments.
  • roperties without their own IT departments, in particular, have a less adequate understanding of their IT security needs than may be necessary.
  • This study found hoteliers’ lack of attention to security provision, training in IT, and PCI compliance can place hoteliers at great risk. For example, the cost of a single incident at a noncompliant property could result in the loss of the entire business.
  • It will be useful to examine the reasons why luxury properties are more likely to employ adequate security measures to determine whether this greater use is attributable to better understanding of security issues or some other factor.
  • The study was limited by the nature of online surveys; the response rate was quite low. Future studies could test the proposed research model via paper-based mail surveys to increase a response rate.
  •  
    This article covers a study performed on various hotels to determine management's level of IT knowledge and security implementations in relation to the hotel's IT security budget. The article discusses four types of technology impacting the hotel industry and how management responses to trending technology can affect a business, particularly in terms of a data breach and overall security. The study finds that an alarming percentage of hotel managers are not adequately informed on the risks and procedures of IT management and security, and many do not have proper IT security measures in place despite having an appropriate budget.
rhoff019

Council Post: Cybersecurity As We Know It Is About To Change - 0 views

  • the global cybersecurity market is set to increase to $270 billion by 2026. This signals the priority boardrooms have placed on cyber risk management even as digital transformation takes place en masse.
  • COVID-19 has become the catalyst to trigger change in the ways we manage and operate technology.
  • Virtual desktops emulate a computer system so that IT can control access as such adding input/output devices as well as software and applications. This could become an important control point when remote workers are operating outside the safety of a corporate network.
  • ...15 more annotations...
  • Telecommuting Is The Only Way Of Working For Many
  • With the remote working concept taking center stage, re-evaluation of these policies is needed to address the new cyberthreats.
  • With millions of employees working from home, hackers’ focus has shifted from enterprise to remote working individuals. To handle the menace that exists in cyberspace, decentralized cybersecurity will rise where greater emphasis will be placed on data sources such as actual remote employees themselves.
  • User access controls have largely revolved around single or two-factor authentication. These methods rely on “something you know (username)” and “something you have (password).”
  • This means identity protection will be a top priority, and the best defense should involve building authentication systems that focus on “who you are.” This would require advanced biometric solutions such as fingerprint/thumbprint/handprint, retina, iris, voice and other facial recognition technologies.
  • The current state of privacy regulations is designed around the enterprise network and building the proverbial wall to keep sensitive data out of prying eyes.
  • With swift digitalization, security controls will shift to data sources, similar to the trend witnessed in IoT.
  • From a risk management perspective, global privacy policies will need to encapsulate standard operating procedures regarding BYOD, GDPR compliance and state privacy laws.
  • The shift to cloud services offers employees, customers, suppliers and everyone else across the ecosystem a seamless and frictionless way to access data and applications. Remote access by various users would compound security challenges and present many new potential attack vectors. In the post-pandemic world, IT resources could shift toward data, particularly keeping data secure across cloud platforms.
  • This will facilitate cybersecurity teams to apply varied access controls and demarcate data storage to minimize the risk of cyber intrusion and data breach.
  • Innovative technologies such as ML/AI and AR/VR will see greater adoption. As we have already witnessed, video conferencing applications will continue to rise as non-contact interactions surge.
  • Sectors such as retail, hospitality and manufacturing will layer their adoption of robotics with added AR/VR capabilities.
  • Cybersecurity teams that are saddled with an events-based approach will be overly burdened with triages when a cyber breach occurs. By embracing an intelligence-driven approach, businesses can digitalize confidently with external threat intelligence as the guiding beacon.
  • Social engineering techniques to trick untrained and unsuspecting employees, third parties and contractors into releasing confidential information or letting an intruder into a corporate network will also intensify accordingly.
  • Cybersecurity awareness training for people across the entire supply chain and ecosystem will prevail.
  •  
    By 2026, the investment in cybersecurity will increase to $270 billion globally. After the COVID-19 pandemic companies will need to reevaluate their cybersecurity systems to adapt to telecommuting as many companies will have some of their employees working from home. Biometric security such as a fingerprint or iris scan will become more common as the typical password will no longer be as secure as it once was.
akallison93

Biometrics, Digital Identity To Save Travel | PYMNTS.com - 0 views

  • “The World Travel & Tourism Council, a London-based trade group, recently issued new recommendations in its Global Guidelines for Safe & Seamless Traveller Journey report, underscoring requirements for the swift and coordinated implementation of biometrics and digital traveler identity services.”
  • outlined several key considerations for public and private sector entities striving to collaborate on biometric verification measures. It notes that governments must work together on solutions so that data collection and sharing can be based on official documentation. It also explains the importance of establishing an industrywide consensus on privacy standards, interoperability and functionality that would make any solutions easier and more secure for users.”
  • American Airlines recently adopted a biometric health wallet app designed that allows passengers to track and verify their COVID-19 test results and documents. The solution, VeriFLY, allows consumers to leverage facial biometrics and ensure that their data matches countries’ requirements, with the app displaying a pass or fail message on their devices once the information has been processed.”
  • ...4 more annotations...
  • That goes together with concepts like digital “immunity passports” that ride along with travelers carrying vaccination data and other encrypted personal health information.
  • but some hotel chains and management firms have looked to digital ID solutions to address consumers’ safety concerns.
  • MGM Resorts debuted a contactless check-in process that allows customers to use its mobile app to verify themselves, pay for their rooms and even receive digital keys.”
  • Biometrics are playing a huge role in new identity needs, and that function is widening.
  •  
    Informative article on the role of Biometrics in the travel industry during Covid-19.The article explains the concept of immunity passports and what you have to do now, and what you will have to do in the future, regarding air travel. The article also briefly explains how biometrics are affecting and changing the hotel industry.
tcale003

Party, event planners lose business over coronavirus pandemic - 0 views

  • Natasha Miller expected her San Francisco event planning company to organize more than 600 events this year, basking in the glory of previous corporate parties planned for corporations such as Google and Yelp.
  • As more cases of coronavirus are confirmed globally, Entire Productions feels the crimp caused by the outbreak as her clients are “pulling the plug” on contracts.
  • four to six more weeks of cancellations.
  • ...11 more annotations...
  • organizers are canceling or postponing events throughout the country because of the outbreak of COVID-19.
  • which has 10 full-time employees, suffered a loss of more than $15,000 in the past month alone.
  • Smaller-scale event planners also feel a high level of uncertainty.
  • “None of this is going to allow us to make up for the lost revenue and growth,” she said. 
  • “My prediction is that my business will make 50% less of what it expected to do, if not less.”
  • 'No Income at all for this month'
  • The event planning business generates $325 billion of direct spending in the USA and helps support more than 5.9 million jobs with $249 billion of labor income, according to an Oxford Economics and Events Industry Council study in 2018. 
    • tcale003
       
      An event company in San Francisco was planning over 600 events this year. As the Covid-19 pandemic has spread globally, many clients have canceled or postponed their events. Organizers are predicting that their businesses will make 50% less than what is expected if not less.
  • organizers are canceling or postponing events throughout the country because of the outbreak of COVID-19.
  • “My prediction is that my business will make 50% less of what it expected to do, if not less.”
  • which has 10 full-time employees, suffered a loss of more than $15,000 in the past month alone.
  •  
    With Covid-19 crippling businesses everywhere, event planning companies are no exception. With gatherings more than 10 people, being postponed or cancelled, most events and concerts have been cancelled. With contracts, deposits paid for, and purchased tickets, event planners are struggling to stay afloat.
davidclark33

Coronavirus cybercrime can attack your restaurant system, too | National Restaurant Ass... - 0 views

  • Protecting your business from a data breach is a constant struggle, and it’s even more important during a disaster.
  • Eliot, director of education and strategic initiatives for the NCSA, says cyber incidents and attacks, such as coronavirus-themed email phishing scams, increased as much as 300% to 350% in the first quarter of 2020 and adds that cyber scammers are now trying to target restaurant companies in particular.
  • Cybercriminals have mostly directed malicious emails at telework employees or people donating time and money to those impacted by coronavirus. “We're seeing a huge increase of cyber-related scams promoting coronavirus information or relief efforts. “It’s a big issue.”
  • ...4 more annotations...
  • The PCI Security Standards Council claims that since March, malicious virus-related reports are up 475%. The reason for the uptick is that cybercriminals are trying to take advantage of rapid changes to the payment-card data environment. In addition, 41% of small businesses have said they’ve suffered breaches costing more than $50,000 to fix.
  • Contactless payment is one of the big changes within the payment data environment. Several restaurant companies – from chains to independents – are offering it because it reduces customers' physical interaction with the restaurant's POS system. As part of this move, some businesses have eliminated credit-card PIN numbers.
  • Eliot says malicious email is usually the easiest way for cybercriminals to access your networks. The emails typically show up as urgent requests for sensitive information, often pretending to be from the Small Business Administration or the Centers for Disease Control and Prevention. When the intended victim types in his or her credentials and clicks on a specific link or downloads an attachment, criminals are in.
  • Anyone looking for easy-to-implement security tips can try these six to start. Reduce areas where payment-card data is stored. The best way to protect against a data breach is to avoid storing any card information at all. With many small operators offering curbside pickup and accepting payment over the phone instead of through face-to-face transactions, it’s important they train employees not to write down payment card details. Instead, have them enter numbers directly into a secure terminal. Use strong passwords. Using weak and default passwords is one of the leading causes of payment data breaches among businesses. Effective passwords must be strong and updated regularly. The most recent guidance is: the longer, the better. Think of it almost as a “passphrase” rather than a password. Use it in the form of a sentence, but mix in different characters within the phrase. It’s much harder to break a long passphrase than it is a short, complex password. Weak and vendor default passwords often result in small business data breaches. Also, don’t repeat your passwords. Update your software often. Criminals look for outdated software to exploit flaws in unpatched systems. Timely installations of security patches are crucial to minimizing the risk of a breach. Whenever updates are available, use them. They will improve performance and close out some of the vulnerabilities cybercriminals are searching for. Enable two-factor authentication. It's so important for restaurateurs, especially where their POS systems or any of their sensitive databases are concerned, to have two-factor or multi-factor authentication enabled. If an instance where credentials are stolen occurs, there will be a second layer of verification the operator can rely on to potentially reduce the chances that information will be breached. Segment your networks. If you are going to store payment data, make sure your POS system has its own separate, secure network. Do not store sensitive documents on public cloud services such as Google Docs or DropBox. If you’re going to store sensitive documents, house them in an encrypted, locked down location.   Be hyper-vigilant. Criminals are going to try to take advantage of this pandemic situation as much as possible. You can protect yourself by not giving out sensitive information, especially within unsolicited emails. Don’t click on links you’re not expecting and do everything in your power to protect all sensitive information.
  •  
    This article is about data breaching and cyber crime in the restaurant business. The article specifically talks about the increase in cyber crime during a crisis, and in this case, a pandemic. It talks about contactless payment as a great form of protection for restaurants as well as customers. At the end of the article, it lists six easy to implement security tips.
sdavi111

7 Steps to Securing Your Point-of-Sale System | PCMag - 0 views

  • Consider how the Target store hack in 2014 was one of the biggest point-of-sale (POS) system data breaches in United States history that exposed more than 70 million customer records to hackers, and cost the retailer's CEO and CIO their jobs. It was later revealed that the attack could have been avoided if Target had just implemented the auto-eradication feature within its FireEye anti-malware system.
  • the reality is that most POS attacks can be avoided.
  • be sure your company has a virtual private
  • ...18 more annotations...
  • network (VPN) in place to safeguard data that's traveling back and forth on your company's
  • network.
  • Most of the aforementioned attacks have been the result of malware applications loaded into
  • the POS system's memory.
  • important point to note here is that a second app must be running (in addition to the POS app),
  • This is why iOS has traditionally facilitated fewer attacks. Because iOS is only able to fully run one app at a time, these types of attacks rarely occur on Apple-made devices.
  • otherwise the attack can't occur.
  • Companies such as Verifone offer software that's designed to guarantee your customer's data is
  • never exposed to hackers.
  • These tools encrypt credit card information the second it's received on the POS device and once again when it's sent to the software's server. This means that the data is never vulnerable, regardless of where hackers might be installing malware.
  • install endpoint protection software on your device.
  • Employees can steal devices with POS software installed on them, or accidentally leave the device at the office or in a store, or lose the device. If devices are lost or stolen, anyone who then accesses the device and the software (especially if you didn't follow rule #2 above) will be able to view and steal customer records.
  • Systems that connect
  • to external networks are more susceptible to attacks from hackers
  • Consider keeping things internal and secure, use a corporate network to handle critical tasks like payment processing.
  • you'll want to comply with the Payment Card
  • Industry Data Security Standard (PCI DSS) across all card readers, networks, routers, servers, online shopping carts, and even paper files. The PCI Security Standards Council suggests companies actively monitor and take inventory of IT assets and business processes in order to
  • detect any vulnerability.
  •  
    Even though this article is from 2019 it is still extremely relevant today. POS systems are found in most hospitality outlets and the chances for a security breach are high. I have often thought when I had my credit card to a waiter and they are gone for 10 minutes are they copying the number, is it being added to a database that can then be hacked? The importance of having the proper securities in place, the proper malware and security software is really important. Having had a catering company for 20 years I had to do PCI compliance tests every 6 months and for years I just handed it over to my IT to do the test. He would suggest things to make us safer and since it usually cost money I would shake it off. It wasnt until the credit card processing company i was using had a security breach that I realized how important these PCI rules were. It is something going forward I will always pay attention to!
nashalsiddiqi

What are the three big technology issues for the hotel industry? | PhocusWire - 0 views

  • The fragmented nature and location of hotel systems means a guest’s credit card number could exist in multiple systems in formats of varying security in locations of varying security.
    • kmira026
       
      1st technology issue for hotel industry
  • HTNG has set up a workgroup that will a framework that will enable hotels to concentrate the storage of sensitive card data in a single system, managed securely by a vendor or the hotel company.
    • kmira026
       
      Solution for 1st technology issue
    • nashalsiddiqi
       
      is this enough?
  • it has become critical for hotels to appear correctly and accurately in search results, as search engine sites have essentially become the gateway to travel research and inspiration.
    • kmira026
       
      2nd technology issue is Unique Global Identification Numbers. Something as small as a incorrect address can cause a problem
  • ...18 more annotations...
  • In both Europe and the US, regulations are being released and revised to provide support to guests with disabilities.
  • With the increase in electronic distribution of hotel information and transactions, hotels are working to provide better information and service to guests with disabilities.
    • torte003
       
      The three main technology issues hotels are facing are PCI, ID numbers , and support for best with disabilities.
    • torte003
       
      PCI is a main security threat that they face. Having a hotels cc system hacked and all their guest information stolen is an extreme nightmare. They have tasks forces that help educate hotels on how to protect and learn more about the procedures to keep that secure.
  • I can hear some of you now – what good can possibly come from creating an ‘association of associations’? Aren’t we just creating more overhead, more cost and more bureaucracy? In a word, no.
  • From my own perspective
  • I hate wasting our scarce
  • resources, and worse, wasting the resources of our members who volunteer their time to work for us
  • Other council member organization initiatives include a white paper authored by AH&LA, a payment technologies committee established by HEDNA, and the support by OpenTravel of needed XML specification changes as required by the industry.
  • thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service.
  • three key technology issues that are having, and will continue to have, a direct strategic impact on the hospitality industry:
  • Search engine optimization is a great thin
  • PCI (payment card industry) complianceUnique identification numbers for hotelsSupport for guests with disabilities
    • torte003
       
      Having wrong information about your hotel or business can be such a negative impact on business. With everyone now on google or yelp having the right information is crucial.
  • ‘holy grail’
  • y company has become critically important for the financial stability and market credibility of the hospitality industry.Members of the HTSIC have addressed this issue in a coordinated
    • vanessavioli
       
      Cyber security is almost equal to climate change in the impact on the industry. As we move into being a cashless society, keeping guests information private is integral to the continued growth of the industry.
  • Initiatives specific to distribution include the creation of standard room definitions and descriptions, guaranteeing accessible guest rooms and removing the accessible guest room from inventory when booked. HEDNA has worked on creating this vocabulary, and OpenTravel has revised its hotel schema, annotations and code list to reflect these changes.
    • vanessavioli
       
      This is an extremely important issue for the industry. Creating an industry standard vocabulary to ensure that guests with disabilities receive the specific room and accommodations they need is a game-changer. The ease of mind that it would create for those customers is priceless.
  • And our biggest strength is our commitment to work together, to eliminate redundant work or conflicting positions, to be transparent and open in our dealings with each other, and to address the most important technological needs of the hospitality industry.
    • vanessavioli
       
      With the ease of current technology, concerns about many of the bureaucratic aspects of something like this can be quickly done or even potentially eliminated.
nashalsiddiqi

PCI What? | Column | Hospitality Magazine (HT) - 1 views

  • I asked politely if the hotel was complaint with PCI Standards. "PC what?" she asked with a friendly smile.
  • PCI DSS, a business or organization should be able to assure its customers that their credit card data, account information and transaction information is safe from hackers or any malicious system intrusion (www.pcicomplianceguide.org). This includes physical copies of consumers' credit card information.
  • Extra attention should be paid to any wireless transactions. Wireless technology is considered the least secure by the PCI Council. Therefore, wireless hospitality applications that carry credit card information such as a wireless point of sale terminal should be evaluated very carefully
rhera004

A History of Event Planning (And Why It Matters) | Social Tables - 0 views

    • rhera004
       
      Matchmaking purposes as well
  • Being an event organizer is one of the most stressful careers, but when things come together, there’s nothing like it.
  • 82 percent of small business owners say face-to-face events and in-person meetings are important.
  • ...7 more annotations...
  • 97 percent say that meetings deliver return on investment.
  • 2013, employing 2.3 million Americans and generating $42 billion in tax revenue.
  • But the first CVB wasn’t established until 1896, in Detroit, Mich.
  • International Association of Exhibitions and Events (IAEE), came into being in 1928. The Convention Industry Council (CIC) and Professional Convention Management Association (PCMA) were founded in the 1950s.
  • Now people not only have individual personal and professional email accounts, they multitask, prospect, network and curate content on a variety of social and digital platforms.
  • It’s that the French Revolution began with a meeting on a tennis court.
  • Meetings catalyze change.
  •  
    Quick History of Meetings/ Events info.
dlevine4195

Has COVID-19 Made Hotels More Sustainable? | The Manual - 0 views

  • These changes have largely been in the form of eliminating that most universal embodiment of hotel amenities, single-use plastic bottles for things like shampoo and soap, and reducing water usage.
  • hotels are also being savvier with energy usage, like using LED light bulbs and taking steps to gain environmental certifications like the Leadership in Energy and Environmental Design (LEED) certification from the US Green Building Council.
  • But the pandemic boosted the necessity of being able to do things while having limited contact with other people, and many hotels implemented remote, contactless check-in, room entry, and even food or amenities access.
  • ...10 more annotations...
  • Among its benefits, touchless tech is more energy-efficient and can eliminate the need for paper or the increased usage of non-ecofriendly cleaners. 
  • due to the lack of guests, there was a decline in the use of chemicals from cleaners and a reduction in carbon emissions.
  • This included a “dramatic increase in the use of disposable utensils, packaging, etc.”, that some sustainability initiatives were canceled or put on hold, and that “stronger, more toxic” chemicals were being used for cleaning and sanitizing.
  • Some hotels, though, took the pandemic as an opportunity to switch to more eco-friendly cleaning options
  • 2018, Hilton announced a whole host of environmental and social responsibility goals as part of its Travel with Purpose 2030 Goals
  • setting carbon reduction goals in line with the Paris Climate Accord, reducing water use by half, sending no leftover soap to landfills, and overall cutting its environmental impact in half by 2030.
  • However, that lack of guests allowed Hilton to start implementing other parts of their impact reduction plan, like having some of their hotels switch to using renewable energy. 
  • heir guests. Sustainability and eco-friendliness are more important for travelers and hotel guests than ever.
  • global travelers want to “travel more sustainably in the future,” and their 2019 Sustainable Travel Report highlighted that 70% of travelers are more likely to choose and book accommodations that are eco-friendly. 
  • Although current practices like using non-eco-friendly cleaning products and getting rid of unwanted waste may be cost-effective and save hotels money now, these and other findings show that travelers are willing to pay for hotels that go the extra mile for the planet, which will earn hotels loyalty.
  •  
    This article discusses how the pandemic has strongly impacted many hospitality companies to be more "green" for the future.. From contactless key options, to minimizing food waste, to using technology to reduce unwanted waste like paper, it is helping set new green goals for the our planet and future of the industry.
lhick022

LEED rating system | U.S. Green Building Council - 0 views

  • LEED is for all building types and all building phases including new construction, interior fit outs, operations and maintenance and core and shell
  • For existing buildings that are undergoing improvement work or little to no construction. Includes: Existing Buildings O+M also includes applications for Schools, Retail, Hospitality, Data Centers, and Warehouses & Distribution Centers.
  • For single family homes, low-rise multi-family (one to three stories) or mid-rise multi-family (four to six stories). Includes: Homes Multifamily Lowrise Multifamily Midrise
  • ...2 more annotations...
  • LEED recertification is an important step in protecting your building asset. Recertification helps you maintain and improve your building while keeping your sustainability investment in place
  • Platinum 80+ points earned Gold 60-79 points earned Silver 50-59 points earned Certified 40-49 points earned
  •  
    This article is about what can be LEED certified and how to go about getting certified. I just learned about this topic in my Hosp. Fac. Enviro. Sys. class, when I learned about it, I didn't realize that you have to be reevaluate.
llibe010

The Top Five Cyberthreats Hotel Brands and Franchisees Need to Know About | Netsurion - 0 views

  • ay for guests, it also opens hotels to digital threats perpetrated by malicious actors. Consequently, hotel operators should be aware of the types of cyber attacks, which can significantly hurt their brand reputation and bottom line, not to mention the safety and welfare of employees and guests.
  • In January, for example, cyber criminals took over a luxurious Austrian hotel’s computer-controlled key-card system, locking 180 guests out of their rooms until hotel managers paid a nominal ransom
  • A ransomware attack may disable or alter performance of hotels’ computer-driven systems such as air conditioning and lighting, putting guests’ comfort and, worse yet, safety at risk. In addition, booking systems are extremely vulnerable to ransomware attacks because they process information belonging to the hotels, third-party applications and their customers.
  • ...18 more annotations...
  • 1. Ransomware:
  • hey present further ransomware opportunities to hackers by using computers to automate functions.
  • distributed denial of service, or DDoS
  • One of the largest data breaches in history was conducted through a third-party vendor when hackers stole data from 70 million credit cards by gaining access to a mega-retailer’s network through credentials belonging to an HVAC contractor.
  • 2. Remote hacking through third-party vendors:
  • 4. DDoS attacks on the hotel network:
  • 3. Phishing scam targeting customers and hotels:
  • Train employees. Hotels should train employees to not open suspicious emails or links inside them as they may contain malware.
  • Statistics indicate that such incidents will become more frequent, so it is not a matter of if but when the next cyber attack will occur.
  • Integrate a managed SIEM. Hotels should bring on a managed security information and event management (SIEM) platform for their remote locations to be warned right away of cyber attacks. They may also want it for inside the perimeter if they lack the expertise and resources to properly use SIEM internally.
  • Maintain PCI compliance. The Payment Card Industry Security Standards Council (PCI SSC) has put forth a set of stipulations, the Payment Card Industry Data Security Standard (PCI DSS), in response to rapid PCI expansion. Hotels should make sure they are compliant with these regulations, which require businesses to send credit-card information in a secure environment, to prevent paying heavy fines and losing data, revenue, and customer trust.
  • Install antivirus on all devices. Hotels should ensure they have reliable anti-virus and anti-malware software installe
  • 5. Theft of personal information over public Wi-Fi.
  • According to the FBI, the number of cyber threat occurrences quadrupled to 4,000 per day last year from 1,000 per day in 2015
  • The number of cybersecurity incidents worldwide increased 38 percent in 2015 from 2014, according to the Global State of Information Security Survey 2016 by PwC, CIO, and CSO.
  • In addition, there are large volumes of payment card transactions between restaurants, on-site shops, spas, parking, and the front-desk, ensuring there is plenty of customer data for a hacker to compromise.
  • Hotels are especially vulnerable to this type of attack where a type of malware disrupts access to a system until a ransom is paid. This is because they often use integrated POS systems
  • Hackers can break into hotels’ payment systems through a remote access point belonging to one of its vendors, so they should closely monitor third-party access to their networks
  •  
    This article outlines some of the main cyber attacks on the Hospitality industry. It exposes the threats due to the wealth of data stored in PMS, POS and CRM and suggests steps to take to protect against malware and randsomeware. The article further highlights the necessity for antivirus software on all devices.
  •  
    The article describes the five most common cybersecurity risks for hotel brands such as ransomware, remote hacking and DDoS attacks. The operational elements of each risk have also been discussed. It also covers best practices that hotels and other hospitality organizations can adopt to curb breaches.
Danaisy Abascal-Yero

How Cruise Travel Is Sailing Into a Sustainable Future | TravelPulse - 0 views

  •  
    This article emphasizes the different methods and approaches cruise ships are taking to become more sustainable in the future. They are doing so by pursuing innovations like renewable resources, regenerative travel, providing energy solutions, and more. They are seeking to reduce carbon emissions by 40% by 2030. One of the methods described in the article is that cruise ships are now integrating liquified natural gas (LNG) fueled ships which produce zero sulfur emissions and reduce greenhouse gases by 20% when compared to regular ship fuel. Cruise lines have already started to introduce this kind of innovation to newer ships. Ports are also taking initiatives to become greener by having solar-powered terminals, smart waste separation, electric transportation, etc. Cruise lines are also working with organizations like the Global Sustainable Tourism Council (GSTC) to make sure that culture, environment, and destination laws are enforced and protected.
« First ‹ Previous 41 - 60 of 61 Next ›
Showing 20 items per page