Skip to main content

Home/ Hospitality Technology/ Group items tagged cyber

Rss Feed Group items tagged

mtedd003

Cyber Security Marketing Tactics That Actually Work - 0 views

  • Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping.
  • This should come as no surprise given that the average annual cost of cyberattacks worldwide is about $9.5 million, according to Ponemon Institute.
  • clearly a need for effective cyber security products and services, there are also many solutions on the market, making it more difficult to capture the attention of your target audience.
  • ...22 more annotations...
  • New cyber security companies are popping up all the time in response to the heightened demand. This can make it hard to stand out in the crowd, and it makes it essential for you to communicate what makes your brand different.
  • you also want to be credible.
  • your potential customers need a significant amount of education to understand what threats they face and what solutions they may need.
  • This is especially true given that CEOs and other C-level executives are not as well versed in information security, which can impact a company’s decision to include cyber security as part of their overall preparedness plan.
  • Though there is plenty of evidence pointing to the necessity of cyber security in protecting valuable data, the truth is that many businesses just don’t prioritize cyber security until it is too late.
  • only one in five, or 22% of those surveyed said that they fully incorporate information security into their strategy and planning.
  • data suggests that cyber security marketers must find ways to create a sense of urgency for potential customers
  • Content marketing can help you build credibility while addressing the major challenge of educating your prospects. In order for your content to be effective,
  • ensure that it is unique.
  • Blogs are great for attracting prospects in every stage of the buyer’s journey. Try to create some evergreen blog content that will be universally relevant
  • Offering downloadable content like e-books and whitepapers is also an excellent way to convert your site traffic into leads that you can later nurture.
  • Another aspect of downloadable content that you’ll need to consider is the landing page.
  • case studies are one of the most important tactics for B2B companies.
  • Email Marketing
  • Downloadable content like e-books, case studies, and reports that provide readers with a more in-depth understanding of important cyber security topics. Links to your most recent blog posts talking about recent attacks or security concerns and those that break down complex cyber security topics for a wider reading audience. Video content that emphasizes the importance of cyber security and communicates the value of your company’s offering. A digest of relevant articles from reputable industry publications that helps readers better understand hot topics in cyber security. Monthly offers and sales promotions like a free trail, which can encourage prospects to sign up.
  • Webinars are a great way for cyber security marketers to connect with bottom-of-the-funnel leads.
  • interactive element.
  • Webinars can sometimes be costly to produce. However, as with other parts of your marketing campaign, there is also an opportunity to repurpose your webinar to get more out of this content.
  • Paid campaigns are great at accomplishing two goals – amplifying your content marketing efforts and getting prospects to arrive at your demo request landing page.
  • Don’t exaggerate your solution’s results.
  • Use data in your messaging. 
  • Create an easy-to-navigate library of premium content. 
  •  
    The Cyber-security Market report has predicted worldwide spending on cyber-security will surpass $1 trillion by 2021. This is a result of annual cyber-attacks costing $9.5 million in global damages. The many solutions on the market require cyber-security services to be innovative on how they market. Cyber security companies want to stand out to customers while still remaining credible. Many businesses are also uneducated and/or don't prioritize cyber-security. The use of blogs and downloadable e-books allow marketers to educate while promoting their product. Cyber security marketers have to make sure they have an easy user-interface, use data in messaging, and don't over exaggerate the capabilities of their products.
sbarr011

Who takes responsibility for cyber security in a hotel? - 0 views

  • it is vital that franchisors and their corporate security teams communicate franchisees’ contractual duties;
  • It’s you who may need to ensure all policies are upheld, that’s why it pays to provide incentives that will make it worth franchisees’ while to comply.
  • The study also reported that the cost for each lost or stolen record containing sensitive and confidential information increased from an average of $154 to $158.
  • ...9 more annotations...
  • And, while there’s no definitive answer to who owns cyber security in a hotel franchise, hotel owners or franchisees can take measures, such as investing in cyber insurance and maintaining updated systems, to prevent a cyber attack.
  • there have been multiple data breaches in some of the biggest hotel chains, with 55% of data compromises resulting from a corporate/internal network breach.
  • If the lines are still blurred come May 2018 – when GDPR is implemented – hotels may not be compliant and will face strict penalties.
  • Last year’s Ponemon study found the average total cost of a data breach is $4 million.
  • Adding to the cyber security difficulty: most franchisees have multiple properties, each with their own brands and contracts, making it even more important for cyber security policies to be implemented and upheld.
  • However, currently, too many hotel owners rely heavily on central reservation systems; thus, they don’t have much, if any, involvement in data collection or storage. That makes it difficult to implement an effective cyber security policy.
  • Many of the vulnerabilities are due to a gap in hotel franchise’s cyber security responsibility.
  • Unfortunately, this industry is a popular target for attack, because of the type of data it holds – credit card data, frequently used throughout the hotel either at check-in, in bars, restaurants, or shops – as well as relatively poor cyber security.
  • According to a recent Trustwave 2016 Global Security Report, the hospitality industry accounted for the second largest share of data compromises among any other last year.
  •  
    This article discusses the liability for a cyber breach at various branded hotels between the franchise owner or the corporation. The Trustwave 2016 Global Security Report stated that the hospitality industry had the second largest amount of data breaches. Additionally, more than half of the breaches are from a corporate/internal network breach. According to a Ponemon study, the average cost of a data breach is $4 million. While this is alarming, it is a surprise since hotels store numerous amounts of personal customer data including guest's credit card information. The article states that cyber hacks are largely due to the gap in not knowing who is responsible for the cyber security. There is an issue of control of data versus franchise network requirements. The hotel brand places individual franchisees in control of their own cyber security. However; they must rely on many centralized corporate owned reservation systems that could be possible access point for cyber attacks. The article suggests that the individual franchisee should make more effort in protecting their customers information as the hotel brand will take most of the blame. This does not help either side. Also, it mentions that in order to protect the hotel franchise it is important to have updated systems and should consider investing in cyber insurance.
nbakir

Hospitality industry more prone to cyber attacks | TravelDailyNews International - 1 views

  •  
    The article by, a financial policy author, explains in detail the extent of cyber-attacks in the hospitality industry. The article explains that the hospitality industry is more prone to cyber-attacks, given the nature of information most of the organizations generate daily in their operations. The article explains that most organizations in the hospitality industry may not be aware that they have already been hacked. The article emphasizes the importance of internal audits and the critical evaluation of cyber footprints in hospitality organizations to minimize cyber-attacks. The author of the article delves into the cybersecurity risk factors in the hospitality industry and reports about the UAE IAA members' seminar which was aimed at sharing information and networking with a focus on building cyber-resilience against cyber-attacks. The article shows the prevalence of cyber-attacks in the hospitality industry noting that each stolen data record costs an average of $148 with the average cost of a cyber-attack being valued at over 3 million dollars (Karantzavelou, 2020). The article quotes a statement by the Jumeirah group chief internal audit officer who asserts that protection against cyber threats should be the DNA of every organization, and they should be continuously on the lookout for potential threats and ensure adequate protection. Members in the seminar advised on the importance of having internal auditors to provide assurance, suitable frameworks, and to set up controls to mitigate key cybersecurity risks. The article explains that hotels are prone to Cyber-attacks since they collect varied, valuable and sensitive customer information. The article also cites a cyber-breach in 2018 where up to 500 million customer details and passport information was compromised in an international hotel chain for up to four years continuously without detection (Karantzavelou, 2020). At the bottom line, contributors in the seminar explain the importance of cybe
kdibe001

Budgeting for Cybersecurity: Risk vs Reward - NuData Blog - 0 views

  • Companies are facing an onslaught of cybercrime – everything from DDoS attacks to breaches to insider theft – and the numbers are staggering. Cyberattacks typically cost large businesses $861,000 and small business on average about $86,500, according to Kaspersky Labs. Jupiter Research is estimating that the cost of data breaches will reach $2.1 trillion globally by 2019. It is the frequency of attacks and the cascade of numbers which now makes this a CEO and Boardroom issue as cyberattacks could cause some major damage or even take whole businesses down.
  • IT Security budgets are set to grow 14% on average over the next three years with small business spending as little as a $1,000 all the way to a million dollars for large companies. While some analysts like Cybersecurity Ventures predict that there will be a burst of spending – 12-15% year over year growth through 2021, Gartner Research reports that IT security spending will account for less than 5% of worldwide IT spending.
  • You can also get more budgeting dollars by leveraging bottom line increases such as incentives for VIP customers, revenue increases, and spend increases throughout the customer lifecycle.
  • ...1 more annotation...
  • Security spending does not equal security effectiveness
  •  
    I found with this article that cyber attacks are becoming alarmingly more common than we have prepared ourselves for. Businesses now need to invest in their own cyber security department or, as the article suggests, apply a cyber security budget to each department. With security budgets predicted to increase 14%, money should be collected through the customers over a lifetime of the customer so that the budget is continually there. I found this article to stand out to me because I never thought of cyber security being so crucial, but it easily makes sense. I think a lot of business lack in providing the proper amount of security to prevent cyber attacks. Personally, I never heard of a cyber security department so this was new for me to read about.
kyleemcroberts

5 Key Lessons Learned from Critical Infrastructure Cyber Attacks - 0 views

  • 5 Key Lessons Learned from Critical Infrastructure Cyber Attacks
  • Cyber criminals are highly motivated, creative, and nimble
  • Consider the rise of cryptojacking, which uses mining malware to hijack computers to mine cryptocurrency.
  • ...8 more annotations...
  • Don't be complacent — limit Internet access points with silos.
  • The attackers were just trying to look for unused processing power that they could use for their benefit."
  • finding the time to consistently audit and always be improving security is critical too
  • Keeping the critical infrastructure efficient and effective is challenging enough.
  • Train your humans.
  • This example underlines the importance of educating employees to always be vigilant and raising awareness of potential threats.
  • Stay current.
  • Concerns that new operating systems or software updates might destabilize crucial infrastructure can inhibit the best practice of always updating.
  •  
    There have been many cyber-attacks in many different nations and that is for many different reasons, such as outdated, human error, and all software being in one vulnerable spot. It is important to always update your programs, use cloud computing, and to educate your personal on all cyber-attacks. It is also important for your teams to understand the "why" behind updating and cloud computing and this is to always keep an upper edge on cyber-attacks. Cyber criminals are always changing their ideas and new ways to take over networks and workday and night to find someone to slip up and it can cause the complete down fall of a company or nation.
jalipman

Sun, Sand and Cyber: Does the Hospitality Industry Need to Invest in Cybersecurity Now?... - 0 views

  • To ensure businesses are in the best possible position to compete during and long after the Coronavirus pandemic is over, both customers and employees need to be educated on the security measures on offer to feel comforted in this brave new business climate. 
  • For businesses to feel empowered against today’s many challenges, a consistent approach to risk management is absolutely crucial. A CISO with the authority to carry out real change and impart strong governance across the business would be hugely valuable.
    • jalipman
       
      An entity to regulate and update cyber security in order to keep all information safe would be very helpful. But it could be argued that an organization that has access to all systems could pose a larger risk to cyber security than it would negate.
  • These burdens come into sharper focus when you consider the digital environment in which hotels are operating. Individual hotels are often connected to the organization’s national or international network, meaning only one hotel has to be breached before the entire company is at risk of hemorrhaging huge volumes of its data.
    • jalipman
       
      This is a good example of why every hotel needs to be constantly updating and on alert for cyber attacks because if one hotel server is compromised the entire national system is at risk.
  • ...9 more annotations...
  • Most crucially, a cybersecurity strategy must include a solid plan for Business Continuity and Disaster Recovery in order to prepare for any worst-case scenarios. In the era of COVID-19, incidents of the worst kind are fast emerging and businesses deserve a fighting chance to succeed.
  • The root of this cyber crisis lies in the way hotels are hampered by disparate legacy systems and out-of-date software where breaches are rife for the taking, particularly on hotels’ Point of Sale (POS) systems and other external vendors. Adding to this, hotels often outsource their customer IT connectivity but unfortunately forget to consistently monitor and audit suppliers’ security measures. 
  • Today, the systems used for various functions in a hotel’s back and front operations are manned by employees who are not yet well-equipped to pick up on and counter large-scale cyber-attacks until it’s too late.
    • jalipman
       
      Simply put, hotels are not focusing enough on these attacks and their security systems are made primarily to identify and ongoing attack rather than preemptively stop them.
  • Mobile phones, tables and laptops connected to open networks become a hunting ground for hackers to harvest banking details through card payments. 
    • jalipman
       
      Not only is personal information stored but guests use these open networks for many different things allow hackers a direct link to the guests devices as well.
  • Worth billions of pounds, the hospitality industry is a perfect victim for cyber-criminals. Its make-up of luxury resorts and hotels alongside huge volumes of high net-worth individuals has fast become prey for hacker
  • While financial services and the public sector have been forced to endure an endless stream of cybercrime, the hospitality industry has also become a prime contender for hackers in the wake of its rich data-base. 
    • jalipman
       
      The constant influx of new information makes hospitality company databases prime targets for hackers.
  • No matter the size of the business, inefficient cyber support diverts crucial time from business activities and relationships with customers.
    • jalipman
       
      Not allocating for proper cybersecurity not only puts you at risk but takes away from time you spend on business when you are dealing with potential or ongoing threats that would have been better addressed by a proper cyber security system.
  • With global business fighting relentlessly to survive against the chaotic threat of the Coronavirus, all industries are exposed to criminal cyber-threats, and so the security of highly sensitive data must be handled appropriately.
    • jalipman
       
      In unprecedented times like we are currently going through things like cybersecurity will be put on the back burner in order to deal with issues at hand but this can create environments for cyber attacks.
  • British Airways and Marriott International are two major hospitality companies to be victims of high-profile breaches in recent memory. They serve as a stark reminder of the heavy costs faced when the safety of customers’ data is compromised. 
lderi004

Cyberattacks are surging and more data records are stolen - 1 views

  • Almost 2 billion data records around the world were lost or stolen by cyberattacks in the first half of 2017
  • There were 918 data breaches which compromised 1.9 billion data records in the first six months of 2017,
  • The number of lost, stolen or compromised records increased by 164 percent compared to the same period in 2016.
  • ...3 more annotations...
  • New regulations such as the U.K. data protection bill, the European Union's General Data Protection Regulation and Australia's Privacy Amendment (Notifiable Data Breaches) Act are set to come into force in the coming months and years, and will push firms to disclose hacks and security breaches.
  • Security is no longer a reactive measure but an expectation from companies and consumers
  • Cyberattacks are now the number one external risk factor facing businesses, according to 23.1 percent of 39 CFOs surveyed by CNBC.
  •  
    As we begin to discuss cyber security this week, I found this article on increasing number of cyberattacks very eye opening. It was no surprise that due to an increase in technology usage, new risks would present themselves to organizations. However, the number of compromised records has sky rocketed to say the least, increasing by over 164 percent from 2016 to 2017. The article goes on to say, "cyber security is no longer a reactive measure, but a requirement for companies, and consumers." CFOs now even consider cyber attacks to be the number one external risk factor for businesses. Overall, its certain organizations today should budget for effective cyber security, in order to prevent any potentially harmful cyber attacks in the future. 
azephyr

Cybersecurity in Hospitality Industry - Types of Threats - Logsign - 0 views

  • implementation of electronic devices and similar conveniences also pose serious threats regarding the security of our sensitive information. That is why cyber security practices gain much more importance in the hospitality industry. I
  • The term cyber security is used to refer to the methods and practices that aim to defend devices, networks, servers, electronic systems and all kinds of data from ill intended attacks.
  • Cyber security professionals aim to keep such malicious intended individuals away from your systems.
  • ...7 more annotations...
  • Cyber security practices often involve the use of a tool or software such as antivirus programs, firewalls, anti malware software and such. In accordance with the needs and vulnerabilities of your organization, various cyber security solutions can be employed and configured. You can opt for getting professional help and/or hiring a team of cyber security professionals for this task.
  • In the past years, we have witnessed many hotels being victims of cyber criminals. Such incidents lead serious data leakages and hurt the reputation of the organization.
  • Customer Data/Identity Theft: When booking a hotel room, we share some of the most sensitive pieces information regarding us: Our name, address, payment information. That is why most hackers try to steal customer information from the hotels using malware, computer viruses and social engineering methods.
  • he term phishing refers to the techniques used to deceive and convince professionals to leak information. The most popular phishing techniques include fake web pages, phone calls, text messages and e-mails.
  • Darkhotel hacking: This technique involves hacking the hotel WiFi and steal information from the visitors.
  • If you want to protect your organization from cyber threats, first you need to inform your employees.
  • Secondly, you must invest in some bullet-proof cyber security software including but not limited to antivirus, antimalware and firewalls. You must also hire a team of IT specialists to ensure that your organization is protected 24/7.
  •  
    This article talks about the type of threats the hospitality industry can face, an explanation of cybersecurity, and how to protect your organization from cyber threats, especially phishing.
svail001

Cyber Attacks Are Spiking - Is Your Hotel Prepared? | By Jeff Venza - Hospitality Net - 0 views

  • “Thinking of cybersecurity solely as an IT issue is like believing that an entire company’s workforce, from the CEO down, is just one big HR issue.”
  • recent reports reveal at least 16 billion records
  • have been exposed through data breaches since 2019
  • ...11 more annotations...
  • The COVID-19 pandemic was, in many ways, the perfect storm for an influx in cyber exploitation
  • With this in mind, cybersecurity should be viewed as a company-wide initiative, with considerations made across each level of any tech-driven organization.
  • we must also recognize that more sophisticated technology creates an environment for increasingly sophisticated cybercrime
  • studies show that nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks.
  • only 5% of companies’ folders are adequately protected
  • To this effect, global cybercrime damages are predicted to cost up to $10.5 trillion annually by 2025
  • And for hotels, a security breach resulting in compromised guest data can damage a property’s reputation beyond repair
  • Instead, companies today should be leveraging a formal cybersecurity program in conjunction with dedicated technology and resources to effectively protect the information housed within their digital infrastructure.
  • Much like cyber risks are ever-evolving, a hotels’ cybersecurity protocol must also evolve and adapt based on frequent reassessments of risks and vulnerabilities
  • cybersecurity cannot be treated as an afterthought, nor should it be viewed as an optional investment; rather, it’s the cost of doing business in any data and tech-driven landscape.
  • the average cost of a data breach is $3.86 million as of 2020
  •  
    This article stresses the importance of cyber security specifically within the hospitality industry. The author of the article describes how a strong cyber security management system should not be an afterthought for hotels and should be seen as a cost of doing business especially in a tech driven industry. The article lists some key components and areas to focus on for hotels to manage cyber risks and threats
Maria Zuniga

Cyber and data security in the hotel industry - PwC Middle East - 0 views

  • In the Digital Era, technology is everywhere; people can connect to your company, your employees, customers, providers and competitors through laptops, smartphones and even wearable devices.
  • With increasing reliance comes increasing risk, many of which are outside the Enterprise’s control.
  • Legal and regulatory problems bring their own special range of issues. Locking horns with regulators, litigants and judges is the last thing that business needs.
  • ...13 more annotations...
  • This is a landmark piece of legislation that will radically change our perceptions on how personal data should be handled in business
  • The simple truth is that cyber security and data privacy problems can be big news and newsworthiness drives awareness levels
  • Cyber and data security emerged to prominence as a massive risk area, due to a series of high profile breaches affecting payment cards
  • There is also the economic interest in gaining commercial advantages from the use of personal data. Gaining better customer insights and providing them with personalised services are now recognised by many in the hotel industry as core business goals.
  • The purpose of the GDPR is to put people back in control of their personal information and to improve how entities look after personal information while it is in their custody.
  • when things go wrong and they are fully aware of the fact that some of the world’s biggest, richest and more powerful entities have been humbled by poor approaches to security and privacy.
  • This case has established a need for the development of comprehensive information security programmes, annual security audit cycles and post-incident investigations in the hotel sector.
  • Businesses need to think about trust, confidence and brand health and reputation.
  • they have to do much more to tackle the security and cyber risks they face and to live up to the expectations that society places in them
  • People responsible for security and privacy in hotels ought to ask themselves whether their entities have appropriate Visions for desired end states. If not, they should bring together the stakeholders to discuss ways to take things forward.
  • regulation is seen as the antidote to market imperfection.
  • Trust, confidence and brand health may operate in a different timeframe to share prices.
  • In other words, suffering security and privacy failure might be like a cancer, where the harm is hidden from view until it is too late. This returns the focus to legal risk.
  •  
    This article is extremely important. I feel like everyone should read it because it goes hand in hand with what we have learned this week in class. The topic of cyber security is something that people need to shift paradigms. This article brings us great points about the digital era we live in. since everything we do in business now a days has to do with technology, it is important to have security and trust in this. With the increase reliance on this technology comes a higher risk. The article brings up that awareness levels of cyber security and data privacy issues are growing at a steady pace. It is extremely important that in the hospitality industry, Businesses think about trust, confidence and brand health and reputation. This highlights the fact that it doesn't matter if security systems are costly, in the long run if something goes wrong that will end up being the most costly. The article mentions that there will be a regulation established by the EU called General Data Protection Regulation (GDPR). The purpose of the GDPR is to put people back in control of their personal information and to improve how entities look after personal information while it is in their custody. In conclusion, this gives companies a competitive advantage.
Qianqian Kang

Cyber security breaches at hotels are a growing concern - 0 views

  • Mangal says that all hotel employees need to be aware of cyber security threats. “It's in the interest of every employee to look out for their guests’ well-being,” she says. “As much as [guests] expect a physical building to be secure, they also expect that their data would be kept secure.” While protecting guests is paramount, an additional reason for hotel professionals to care about cyber security is that breaches hurt a hotel’s brand. “If you compromise your data, you're also, to an extent, tarnishing your brand name. It's everybody's job in the hotel environment to be a hotel brand ambassador.”
  • Mangal encourages hotel operators to be careful when they store data and to make sure their information storage systems are up to the task. She says that in many cases, hotels’ systems are no longer adequate. Hotel operators are often reluctant to overhaul their systems because of the cost.
  • It's not a foolproof system, but it definitely does make it safer,” she says. She adds that hotels should foster of a culture of data security and establish policies and procedures to protect data. Training employees to follow best practices is also important.
  • ...2 more annotations...
  • In the future, Mangal says that hotel operators may want to invest in biometric technology and to use fingerprints or facial scans to restrict access to data.
  • Mangal says that hotels are unlikely to hire more IT professionals directly but that they will continue to contract with firms that specialize in cyber security. “Indirectly, there is a growing need for specialists and IT or tech professionals” to upgrade hotels’ data security and to train employees, she says.
  •  
    This article brings us the real version of how important to launch cyber security system, as there are actual cases in which hotel face loss because imperfect security net. Thus, the professor Mangal suggests that all hotel employees should keep an eye on the threats. At the same time when we protect our customer, we protect and branding our reputation as well. In the future, advanced technology such as biometric technology will be implemented to restrict access to data. Although hotels are unlikely to hire IT professionals directly, but they truly need cooperate with firms which specialized in cyber security, at the same time, help hotels strengthen the training of employees.
rderonville

Cybersecurity Tactics for a Hotel Industry that's Under Siege | News | Hospitality Maga... - 1 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar.
  • n addition to airlines and banks, hotels maintain a rich database of personally identifiable and financial data on file.
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required. As a result, they can be exploited for the credit card data held on the POS terminals.
  • ...4 more annotations...
  • Reputational damage and revenue loss from a breach headline not only impact individual edge locations, but the corporate brand as well.
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • If used correctly, hotels could see anomalies that could lead to breaches prior to any damage being done — allowing them to halt hackers in their tracks.
  •  
    Hotels POS systems are at risk for customers. Hackers are using tactics like Phishing and ransomware. Hotels must take action and arm themselves with a "toolbelt" of security options to combat the hackers.
  •  
    This article explores the issues with cyber security in the hotel industry. it is to be taken seriously because customer information is on the line and so is the company's reputation and revenue. Hotels must look into their POS systems because, according to the article, is a weak security point. However, it holds much of the consumer's information like credit card numbers, expiration dates, and etc. The POS system is vulnerable so the secuiry put in place to protect it must be updated. Personal details for hotel guests are stored in many different places in a hotel's many systems. This includes the restaurant, gift shops, billing, facilities, and etc. According to the article, hotels needs a "toolbelt" of various security technologies to prevent malicious attacks. The three mentioned in the article are File Integrity Monitoring, Unified Threat Management, and Security Information and Event Management. Please look into the article to read what each of these systems can do in regards to cyber secuity for the hospitality industry. A good way to implement these tools is to look into outsourcing a managing security firm that specializes in cyber security. This can help minimize and even diminish things that can cause breaches in systems. In my opinion, this article gives solutions to hotels in regards to cyber security. Sometimes installing a firewall or antivirus is simply not enough. A security firm that specializes in this area can be considered. It may be expensive depending on the business to do that, however, it will be even more expensive to have a tarnished reputation for not securing customer information and to deal with lawusuits.
guanhuahao

Top Cybersecurity Tools for Business - 0 views

  • All cyber threats are not equal. Some may hold your data for ransom, while others may destroy your information for good.
  • Digital tech analysis firm Juniper Research predict that the cost of data breaches will rise from $3 trillion annually to over $5 trillion in 2024.
  • organizations should look to Next Generation Anti-Virus solutions (NGAV) to protect their assets. NGAV takes traditional AV and then adds advanced analytics, behavioral analysis powered in real-time by large scale cloud back-ends to thwart known and unknown attacks. Leading NGAV solutions include Sentinel One, Carbon Black, and CrowdStrike.
  • ...16 more annotations...
  • The National Institute of Standards and Technology (NIST) offers cybersecurity guidelines for best practices to manage cyber risk. These include identify, protect, detect, respond and recover. Another resource is the NCSA’s national program, CyberSecure My Business.
  • Firewall Often referred to as a company's "first line of defense," a firewall is a security control that filters and screens network traffic entering and exiting your corporate network.
  • People can rely on the password manager to create and store dozens of passwords in an encrypted database without having to remember them.
  • Password managers are quite helpful, and some are even free.
  • store the first part of sensitive site passwords
  • but keep the last few digits memorized and fill them manually.
  • This way, if there is ever a compromise of the password database, hackers don't have those full passwords.
  • You should also consider implementing multi-factor authentication (MFA). MFA authentication uses more than one thing or "factor" to log you in
  • , biometrics is part of this last category
  • SPAM & Malware filters screen email for unwanted and dangerous elements, blocking them before they ever reach your users.
  • In the world of cybersecurity, there's a phrase, "humans are the weakest link." An employee who accidentally clicks on the wrong link or email attachment can put in motion a chain of events that results in a cyber breach. Security awareness training is an anti-phishing tactic all organizations should employ.
  • RDP access must be protected by a VPN connection.
  • reduce the risk of getting hacked is to ensure your systems and software are updated regularly, or "patched.
  • patching shouldn't end with the operating system. Your patch program should also look to patch all other applications running on your systems
  • regardless of the security tools implemented to prevent a data breach, you should plan for a compromise occurring.  
  • That's where 24/7/365 network and endpoint monitoring comes in
  •  
    Cyber attacks open more and more often and varied since cybercriminals are becoming more cunning and their methods more challenging to detect. This article introduces some types of strategies implemented to protect companies' businesses from cyber threats and cybercriminals. Including using Anti-virus software, firewalls, password managers (very useful while some even free), VPN, patch management program which not only for operating program but also for other applications running on your system, consider the email SPAM/Malware filters and security awareness training for the employee since "humans are the weakest link." An employee who accidentally clicks on the wrong link can put in motion a chain of events that results in a cyber breach. Finally, plan a 24/7/365 network and endpoint monitoring.
Henrique Rodrigues

Where Should You Be Spending Your Cybersecurity Budget? - 0 views

    • Henrique Rodrigues
       
      This article focuses on what should be the goal on a cyber security budget. Cyber security has become a very sensitive matter these days and even though there is an in creasing number of software to protect the companies, there are also newer attacks going on. Therefore, how do we choose and evaluate what should be the focus of this budget? The article displays different threats and how companies should identify the most critical material and data that should be protected and how to do so. Many of the risks will come from the three main vectors: external threats, internal threats, or the supply chain threats. The importance of employee training, cyber insurance, risk management framework, and other allocations that the cyber budget should be geared for.
  • The goal of cybersecurity is to help mitigate or prevent a cyber attack that could cause significant harm to your business, your operations, your financial performance, or your customers.
  • But organizations with mature cybersecurity programs are increasingly aware of the fact that they cannot address every cyber threat since bad actors will continually find ways to hack and mine data. Instead, they choose to focus on preventing catastrophic attacks from taking place.
  • ...1 more annotation...
  • With this in mind, your cybersecurity budget should be geared toward identifying the most critical material risks to your organization which could be caused through cyber means—and reducing, mitigating, or transferring those risks.
anonymous

The Hospitality Industry Under Attack - 0 views

  • According to a study by the Ponemon Institute, the average consolidated total cost of a data breach is now $3.8 billion, representing a double-digit increase in recent years. In the United States, the country hardest hit by cybercrime, the average cost of a computer breach is now $6.5 million, well ahead of the global average.
  •  
    In order to combat cyber attacks within the hospitality industry, the National Restaurant Association and PCI Security Standards Council have partnered. They have created.. "Small Merchant Taskforce, which raises payment card security awareness for the hospitality industry." With cybercrime increasing it is a necessary step to take, not all businesses, especially small, can afford the "best" cyber security systems. This task force will help educate various members and help find solutions to protect businesses and customers. "A study by Verizon stated that 99 percent of breaches in 2014 were caused by known vulnerabilities with fixable patches." That being said, all business operators need to take the initiative and be proactive when it comes to handling customers' private information.
  •  
    I think one the biggest issues related to cyber attacks is that owners are not aware of the issue. So it is important to educate them and help them understand the importance to budget cyber security into their expenses. I am glad that the task force is taking that step to help protect business owners and customers from cyber attacks.
anonymous

Insiders suspected in Saudi Aramco cyber attack | SciTech | GMA News Online | The Go-To... - 0 views

  • Hackers from a group called "The Cutting Sword of Justice" claimed responsibility for the attack. They say the computer virus gave them access to documents from Aramco's computers,
  • The hacking group that claimed responsibility for the attack described its motives as political
  • the group said Saudi Aramco was the main source of income for the Saudi government, which it blamed for "crimes and atrocities" in several countries, including Syria and Bahrain.
  • ...9 more annotations...
  • According to analysis of Shamoon by computer security firm Symantec, the way the virus gets into networks may vary, but once inside it tries to infect every computer in the local area network before erasing files to render PCs useless.
  • Yet those sources say such protections could not prevent an attack by an insider with high-level access.
  • insiders were implicated in just 4 percent of cases last year.
  • The hackers behind the Shamoon attack siphoned off data from a relatively small number of computers, delivering it to a remote server
  • Because the virus wiped the hard drives, it is difficult for Saudi Aramco to determine exactly what information the hackers obtained.
  • The Shamoon virus is designed to attack ordinary business computers
  • . It does not belong to the category of sophisticated cyber warfare tools
  • Saudi Aramco has said that only office PCs running Microsoft Windows were damaged. Its oil exploration, production, export, sales and database systems all remained intact as they ran on isolated and heavily protected systems.
  • It is standard industry practice to shield plant operating networks from hackers by running them on separate operating systems that are protected from the Internet.
  •  
    Saudi Arabias national oil company, Aramco, was attacked by a computer virus, Shamoon, and it is suspected that an insider or employee assisted the hackers. The virus spread through the network and infected about 30,000 PC business computers and wiped their hardrives. This is one of the worst attacks against a single business. The hackers who claimed responsibility, The Cutting Sword of Justice, were politically motived. The companies more important documents including plant operating networks were not affected by the virus because they were on a separate and higher security network. Recently, other Middle Eastern natural gas firms with relations to Saudi Arabia have been hit by cyber attacks. Because the Aramco hackers admitted their motives against the Saudi Arabian government income sources, I think that all the cyber attacks may be politically motivated. As a Middle Eastern oil company with relations to Saudi Arabia, this is a major indication to take precautionary measures and increase network security. This attack demonstrates that no matter how much security you have in place, if an insider is willing to assist hackers or provide hackers with necessary information, you are no longer protected. It would seem imperative that employees with this access are chosen carefully or network access is very limited.
kimmumford

HPE Newsroom | Why Securing Connected Sports Stadiums Is a Must - 1 views

  • pturing a few credit card numbers at the corner cafe when they can do the same to thousands of people in one place?
  • The NFL monitored for scam websites before the event and brought in a cybersecurity team to track all data activity during the game. And it worked—so far, no cyber crimes have been reported.
  • eams, says creating secure applications and focusing on point-of-sale and other important data exchanges is just half of the cybersecurity solution, though. Patron participation is the other, starting at the gate, physical screenings should go hand-in-hand with cyber screenings.
  • ...6 more annotations...
  • Stadiums need to segregate all that traffic from the important stuff,” such as credit card information and passwords.
  • focusing less on the Snapchats and more on point-of-sale transactions during events.
  • IT professionals should monitor and restrict these growing digital access points in the building as well.
  • Avoiding cyber attacks at sporting events comes down to educating patrons about the risks
  • the next few years new technologies will arise to offer better, more cost-effective encryption options (possibly through quantum computing technologies) to help mitigate cyber cri
  • o date, though, it seems cyber safety will continue to rely heavily on the fans entering the stadium.
cpaez007

Hotel sector faces 'cyber crime wave' - 0 views

  • Hilton Hotels, Starwood Hotels & Resorts, Mandarin Oriental and the Trump Collection have all admitted that their payments systems were compromised this year as hackers hunting for credit card details switch their attention to the leisure industry. This week Hilton and Starwood said guests’ personal details had been taken after hackers gained access via payment systems.
  •  
    Hotel industries have been under attack from excessive hacking, as seen with Hilton being targeted for private financial information from guests. In 2014, it was noticed that hackers had been targeting Hilton throughout the course of 17 weeks. They state that the industry itself has not really focused budgeting on cyber security. It seems that the process is done by integrating a virus into these hotels POS system. The virus was actively attacking the Micros program, which was being used in more than 300,000 hotels and resorts. An ultimate treasure chest for information, some of which was not even encrypted. In addition, the virus appears in the system as a legitimate software, and then it obtains over 90 percent of stored information. This hacking is being conducted by organized groups, who moved from the retail industry because it had indeed improved its cyber security. With hotels it seems that the concept has not been taken as seriously. There are many hotels susceptible to such an attack. As long as there is a sales software, then someone is looking to get into it. A person could be sitting inside of your location, and infiltrating a guests' wireless internet, and they would not even know. In order to engage this threat, locations must be proactive in attempting to stop what is occurring. The only question is, how much are they willing to invest in cyber security?
alexsolano36

Why Cybersecurity Isn't Only a Tech Problem - 0 views

  • By now, most accept that they need to invest significant cash and resources into cybersecurity capabilities
  • ather than the full C-suite and board.
  • we’re failing at cybersecurity
  • ...27 more annotations...
  • today as comparable to trench warfare in World War I.
  • First, no company has all of the resources to fix every cybersecurity issue, and not all fixes are equally important.
  • starting with a company’s most critical business activities and how cyber attacks could disrupt them that one can start to prioritize this whole process of risk mitigation.
  • skip the ste
  • focusing on individual technologies t
  • without ever addressing the fundamental issue, which is protecting the business activities for which the computers were procured.
  • hey translate in their minds being compliant with requirements as equivalent to being adequately protected.
  • nds up actually diminishing the security of these companies, as opposed to achieving its goal of increasing protection.
  • cybersecurity has been, it’s come out of the technology department.
  • versus one that’s related to any other complex business risk that a company might face.
  • eally large cybersecurity budgets, don’t nearly get the cyber protection benefit that they should, given the dollars that they spend.
  • with r
  • Another avenue that companies can take is, is there anything about the business that the company is in, the way in which it operates, that might attract some sort of attacker.
  • And that really starts with looking at cyber risks as a business risk that could come and occur as a result of a cyber attack.
  • to help quantify what those risks are, and bringing an IT department and your cybersecurity resources to understand what the threat environment might by that might affect those risks in some way or make them to come about.
  • this perception on the part of non-technical business leaders that the cybersecurity field is so complex, so impenetrable that they would never be able to understand
  • And so, the cybersecurity team decided to put the network used for the development of new automobiles inside their corporate network, because they thought, ah, at attacker would need to go through two networks in order to be able to then steal information.
  • cybersecurity people had no idea how the companies that they worked for actually design cars, and so they proposed security mechanisms that both interfered with work and ended up resulting in the company being more vulnerable because all of these outsiders now had complete access to the corporate intranet globally.
  • You know, we’ve found that cybersecurity writ large is full of platitudes that seem obvious and compelling at first read, but if you think about them more thoughtfully, they’re sometimes misinformed.
  • , informing employees about the cybersecurity implications of their own work
  • but also who your adversaries are. H
  • $3 million a year on cyber threat intelligence.
  • In all areas of risk, whether it be financial risk, physical risk, or cyberrisk, there are no guarantees that what you do will be sufficient to fend off the attack that you actually face.
  • , you need to have cybersecurity reviews as you change your business, just like you look at other risks when you’re making changes to your business.
  • Based on our experience, when a company is looking for a home for the cybersecurity organization, they should first look at where their most significant cyber risks reside.
  • A company needs to have the technical capabilities to respond to the most likely forms of cyber attack on their most critical business activities.
  • instead of telling me what vulnerabilities need to be fixed with whatever priority
  •  
    This article talks about how companies make the grave mistake of thinking that cybersecurity is merely an issue that should be addressed by an IT team and that no one else is responsible for addressing risks and understanding them. Most C-suite employees don't understand what the risks are, and usually these risks vary from company to company. It is not that you should only consider that you can get hacked, but you should consider and identify what kinds of information can get hacked and why. The article denotes an example of an Asian automobile company that needed to implement a new system to mitigate security risks and in the process, ended up locking up other companies who needed to use their systems to find out about their products. So those companies started to create fake profiles to try and access the information -- all so that they could just do their job. This showed that people are more interested in just getting their job done than understanding cybersecurity and why certain systems are in place. The way of thinking up security systems should be creative and involve all parts of an organization. Departments won't know what their role is until they identify what information is important to them, what their purpose is in the company, and what is valuable to them. By identifying this, they can come up with ways to secure this information and monitor its delivery. Businesses don't look at cybersecurity as a risk of their business just as a shipping company would look at weather risks as a potential threat to their revenue. It is looked at as more of an abstract concept and this stops people from implementing successful strategies to keep their information safe. Cybersecurity shouldn't be viewed as "so impenetrable" that no one would ever understand it. This requires everyone to get involved and understand the implications of cybersecurity on their own work, specifically, and identify who their main adversaries may be.
irinatroitskaya

Hospitality: Shelter Your Business from Advanced Cyber Threats | Hospitality Technology - 0 views

  • According to Verizon’s 2017 Data Breach Investigations Report, accommodation was the top industry for point-of-sale intrusions.
  • Hospitality, whether hotels or restaurants, transact more credit cards than almost any other industry, making them an extremely attractive target.
  • The hospitality industry’s rapid push to digitalization means that it is still playing catch-up on the security front.
  • ...7 more annotations...
  • The 2017 Lodging Technology Study by Hospitality Technology found that 74% of hotels do not have breach protection and less than half use end-to-end encryption for cardholder data or use tokenization at the card swipe.
  • PoS systems are a weak security point for many networks as they are in constant use and often are not patched or updated.
  • Denial-of-Service attacks make up approximately 20% of hospitality cyber incidents.
  • Early detection is key to controlling attack costs and reputation damage.
  • Host- and network-based firewalls should be used as the first part of a layered security approach.
  • A good endpoint prevention stack consists of an antivirus solution to handle known threats and a prevention layer that effectively prevents unknown, advanced attacks.
  • No technology, however, can substitute for an overall culture of security.
  •  
    The article describes the main cyber threats that the hospitality companies face. Over past few years, nearly every major hotel group has been attacked. The same is true for the F&B industry. One of the reasons for that is that the hospitality companies are the ones that process credit card information more than in any other industries. Moreover, hotels and restaurants have many access points for the malware: from wifi networks to POS's. The attackers may also use the third party suppliers (for example, OTA's) to access the hotels' systems. Verizon 2017 Security Payment Report states that less than a half of all hospitality businesses have full credit card payment security compliance. The main type of the attack is POS intrusion. Denial-of-Service Attacks constitute about 20% of the total number. Although they are not so dangerous in terms of sensitive information, they can disturb the company's operations causing significant losses as well. Thus, the hotels and restaurants need to invest in early detection protection provided by the effective firewalls and antiviruses. However, it is also very important to understand that no technology may ever fully substitute the security culture of the company's employees. Many attacks are conducted due to the personal weaknesses of the associates answering the calls, for example. So, in my opinion, in addition to the cyber security systems, there should be appropriate personnel training as well as well elaborated procedure protocols.
1 - 20 of 196 Next › Last »
Showing 20 items per page