Skip to main content

Home/ Hospitality Technology/ Group items tagged cyberattack

Rss Feed Group items tagged

rnobl005

The damage from Atlanta's huge cyberattack is even worse than the city first thought | ... - 0 views

  • The damage from Atlanta’s huge cyberattack is even worse than the city first thought | TechCrunch
    • rnobl005
       
      After reading the discussion prompt for this week, the recent cyberattack on Atlanta immediately came to mind. This scenario is a prime example as to why cities need to invest in cybersecurity. The city paid the ransom demand of $50,000, but the damage of the attack itself was much more costly - they estimate having to spend $9.5 million to rebuild many programs that are not salvageable. It's hard to say if this was preventable had Atlanta invested in some form of cybersecurity but I think this is a new trend that major cities should be aware of and start taking preventative measures on.
  • The damage from Atlanta’s huge cyberattack is even worse than the city first thought | TechCrunch
  • More than two months after a cyberattack hobbled many of its critical municipal systems, the city of Atlanta is still sorting through the wreckage of what is likely the worst cyberattack targeting a U.S. city to date.
  • ...7 more annotations...
  • On March 22, Atlanta’s connected systems city-wide were hit with a ransomware message locking their respective files and demanding an approximately $50,000 payment in bitcoin
  • Atlanta residents were unable to do simple city system-dependent tasks like paying parking tickets or utility bills. City employees didn’t get the all-clear to turn on their computers until five days later and many city systems still have not recovered.
    • rnobl005
       
      The cybersecurity article focused on global issues and potential military conflict, but this article proves that cybersecurity can impact the more mundane aspects of our life.
  • at least one third of the 424 software programs that the city runs remain offline or partially inoperable. Almost 30 percent of those programs are deemed “mission critical” by the city meaning that they control crucial city services like the court system and law enforcement.
    • rnobl005
       
      Again, on a global scale the Atlanta court system doesn't sound super threatening. But for the city it's obviously a huge blow and will take years to bring everything up to speed.
  • While reporting the updated numbers, Rackley estimated that $9.5 million would need to be added to the department’s $35 million budget to address the remaining damage
  • That amount is on top of the more than two million dollars in emergency procurements sought by Atlanta Information Management following the attack.
  • Earlier this week, Atlanta’s Police Chief disclosed that the cyberattack destroyed “years” worth of police dash cam video footage.
    • rnobl005
       
      Another terrible loss due to the cyberattack.
  • Atlanta has been regarded as a frontrunner for Amazon’s second headquarters in some analyses, though it’s not immediately clear how the cyberattack will affect the city’s odds.
lderi004

Cyberattacks are surging and more data records are stolen - 1 views

  • Almost 2 billion data records around the world were lost or stolen by cyberattacks in the first half of 2017
  • There were 918 data breaches which compromised 1.9 billion data records in the first six months of 2017,
  • The number of lost, stolen or compromised records increased by 164 percent compared to the same period in 2016.
  • ...3 more annotations...
  • New regulations such as the U.K. data protection bill, the European Union's General Data Protection Regulation and Australia's Privacy Amendment (Notifiable Data Breaches) Act are set to come into force in the coming months and years, and will push firms to disclose hacks and security breaches.
  • Security is no longer a reactive measure but an expectation from companies and consumers
  • Cyberattacks are now the number one external risk factor facing businesses, according to 23.1 percent of 39 CFOs surveyed by CNBC.
  •  
    As we begin to discuss cyber security this week, I found this article on increasing number of cyberattacks very eye opening. It was no surprise that due to an increase in technology usage, new risks would present themselves to organizations. However, the number of compromised records has sky rocketed to say the least, increasing by over 164 percent from 2016 to 2017. The article goes on to say, "cyber security is no longer a reactive measure, but a requirement for companies, and consumers." CFOs now even consider cyber attacks to be the number one external risk factor for businesses. Overall, its certain organizations today should budget for effective cyber security, in order to prevent any potentially harmful cyber attacks in the future. 
smend120

Cyberattack on Luxury Resort Should Put Hospitality Industry on High Alert | Fisher Phi... - 0 views

  • Cyberattack on Luxury Resort Should Put Hospitality Industry on High Alert
  • Cybercriminals are finding new ways to hold their victims hostage
  • a recent cyberattack on a luxury resort should serve as a warning for your business.
  • ...17 more annotations...
  • The Allison Inn & Spa, recently fell prey to a ransomware attack that left its employees’ and guests’ personal information exposed
  • the stolen information – which includes data from 1,500 employees and more than 2,500 guests, including dates the guests stayed at the hotel as well as employees’ birthdays, phone numbers, and Social Security numbers – was posted on the public internet in easily searchable form.
  • Typically, stolen confidential information such as this is only published on the “dark web” and is not as easily retrieved through any type of online searches.
  • New Tactic Reveals New Dangers
  • If affected devices cannot be removed from the network (or if the network cannot be temporarily shut down), secure the network by powering down infected devices to avoid any further spread of the ransomware infection;
  • the public release of the confidential guest and employee data may have been an “experiment” to see whether it could further ratchet up pressure on the business to pay out the ransom.
  • this new tactic may be a trend we see from cybercriminals looking to extort their victims in future ransomware attacks.
  • they were hoping to force the business to pay them a ransom.
  • be prepared to implement comprehensive cybersecurity risk management processes.
  • Determine what systems were impacted and immediately isolate them
  • What Should Your Business Do?
  • Triage impacted systems for restoration and recovery
  • Engage your internal and external stakeholders
  • Retain legal counsel to provide guidance
  • Retain a third-party incident response provider
  • Report the incident to law enforcement
  • companies should consider deploying multifactor authentication in order to gain access to company networks, provide robust cybersecurity training to all employees on an annual basis, and maintain offline, encrypted backups of all internal data.
  •  
    Cybercriminals are constantly coming up with novel schemes to kidnap their victims. A recent cyberattack on a five-star resort should act as a cautionary tale for your company. In Oregon, the Allison Inn & Spa recently became the target of a ransomware assault that revealed the personal data of its staff and visitors. The stolen data was published in easily accessible form on the public internet and includes details from 1,500 employees and more than 2,500 guests, including dates of the guests' hotel stays as well as employee birthdays, phone numbers, and Social Security numbers. The "dark web" is typically the only place where stolen private information like this is released, making it harder to find through regular online searches. The goal of the cybercriminals was to coerce the company into paying a ransom. The public disclosure of the private visitor and staff information seems to have been an "experiment" to see if it would increase pressure on the company to pay the ransom. Cybercriminals may use this new strategy frequently in the future to demand ransom from their victims. The implementation of thorough cybersecurity risk management procedures should be considered by resorts. In the event of a cybersecurity attack, determine which systems were affected by the attack and immediately isolate them. Then, prioritize those systems for restoration and recovery. After which, involve internal and external stakeholders and retain legal counsel for advice. It is crucial that you hire a third-party incident response provider and notify law enforcement. Multifactor authentication should be used by businesses to protect network access, and they should also annually train all staff in cybersecurity best practices and keep offline encrypted backups of all internal data.
lderi004

Cyberattacks on Hotels -- What Should Hotel Owners and Operators Do? - Cybersecurity La... - 0 views

  • Almost as soon as there were data breaches, hotels became a prime target of hackers, and the hospitality industry has consistently been one of the most commonly targeted businesses
  • Most commonly, hackers compromise systems so that they can obtain credit card numbers and sell them on the dark web.
  • More sophisticated hackers collect information on individuals as a means of compromising other computer systems and to impersonate individuals
  • ...3 more annotations...
  • As further described below, the hospitality industry possesses a number of factors that make them attractive to hackers: large volumes of valuable information, multiple vectors for accessing information, large workforces and dependence on vendors, to name a few.
  • First, the increasing incorporation of technology into hotel operations can lead to more breaches.
  • Predicting the future is a difficult and fraught task, but in this case, it is straightforward – there is no reason to expect that the number of cyberattacks will drop
  •  
    I was very intrigued with this article, as Braun mentions cyberattacks on hotels in a very straightforward manner. Hotels are in a competition of enhancing their technology everyday, however, with this enhancement comes more of a liability of getting cyber hacked. In addition, our industry deals with a lot of third party companies, making it easier to hack information as well. As Braun mentions, attacks nowadays, are not only for credit card information, but also simple data on guests, such as passwords to loyalty programs, and other credentials. Therefore, as technology grows, the only thing predictable is that hacks will get more dangerous. So, the one true thing our industry must do is prepare ourselves as best as we can. 
ldevaul

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
espence13

Marriott Hotels: Series Of Data Breaches Reveals Lack Of Security Awareness - 0 views

  • The data breach hitting Marriott Hotels Group was huge. The joint-second largest to have ever taken place, in fact, after Yahoo’s disastrous 2013 breach (and on par with Yahoo’s 2014 breach). While the amount of data that was taken from Starwood Hotels’ reservation systems (a company acquired by Marriott in 2016) was vast, what’s most staggering is the fact the breach went undetected for four years, and an acquisition also took place but the alarm still wasn’t raised. Since news originally broke of the release, it’s also been revealed that the hotel group’s own security team was hit by an attack in June 2017. Clearly something has gone amiss.
  • The issue is compounded by the fact that security is still not high enough up the list of priorities for business leaders. Despite well-known organizations frequently hitting the headlines for data breaches (in 2018 alone we’ve had Ticketmaster, Quora, British Airways, Under Armour and plenty more) and a ‘when not if’ warning  being peddled by the security industry for years, many businesses still haven't got to grips with just how critical proper security is. The fact that reviewing security may not have been part of the acquisition process of Starwood by Marriott – and if it was, not well enough – is further evidence of this apparent blindness to the impact of poor security. So, what’s going wrong? A research report from security company Bromium earlier this year suggested that the average large enterprise spends $16.7 million per annum on security, with the vast majority found to be on ‘the human cost of maintaining cyber security systems’. While most firms clearly aren’t 2,000 people sized enterprises, the research provides a good indication that spending on security isn’t the issue. Instead, it’s people.
  • We need to look at different approaches to skills development and, in many ways, imitate cyber criminals themselves who are continually iterating ideas to solve problems, rewarding perseverance and curiosity as well as encouraging further development. The ‘white hats’ need to approach their roles the same way – not rely on what they heard in a classroom six months previously.
  •  
    The recent cyberattack at Marriott International Inc. has many hoteliers wondering what are the legal and business risks associated with security attacks? The recent breach at Marriott further proves the point that businesses should prepare now or be willing to pay for it later. In November 2018, the Bethesda, MD-based hotel company revealed there had been unauthorized access to the Starwood guest reservation database, which contained guest information relating to reservations at Starwood properties on or before Sept. 10, 2018. Businesses face a multitude of risk when looking at the potential consequences resulting from a cyberattack or breach. As we've seen recently with the Marriott breach, there can be significant impact to brand equity in the marketplace. This impact can be far reaching for publicly traded businesses, resulting in material impacts to businesses and business valuation, and long-term impact to user adoption. In addition to the downside risk from the market, businesses must also mount expensive defenses against litigation that increasingly takes the form of class actions. Reputation is important in every trade but is especially important in the hospitality industry. This, coupled with the fact that consumers are becoming more sensitive to privacy and security related issues, means that businesses in the hospitality industry must manage against these types of risk and allocate appropriate levels of funding toward information security. What should hoteliers learn from the Marriott breach? Pay attention. Marriott was aware that there was a potential issue shortly after it acquired Starwood, but did not, apparently, investigate in detail. Marriott may not have created the problem, but it bought the problem and didn't treat it with the seriousness that was necessary.
jorgeegutivav

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Modern Restauran... - 0 views

  • With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • permeable security in the hospitality sector threatens consumer privacy, shareholder value, and national security.
  • ...15 more annotations...
  • many hospitality companies are reconsidering their cybersecurity infrastructure. However, industry specific challenges like high employee turnover continue to expose the sector.[6]Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Are newly introduced technologies simply bolstering traditional methods of cybersecurity, or are they being used for methods of cybersecurity that are new and innovative, instead of simply faster or more efficient versions of the same product?
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.”
  • Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks. 
  • The problems with this approach are twofold:
  • someone has to be a victim first so that IOCs can be derived and shared with others; additionally, blocking IOCs has a very short half-life.
  • All an adversary has to do is come from a new IP address or recompile their malware so that it has a new hash value (both of which are extremely trivial) and their attacks will sail through defenses that depend on IOCs.
  • As hackers repeatedly gain access to valuable systems and data using the same methods, cybersecurity teams continue to chase after them to secure compromised systems.
  • Very little cybersecurity effort is put towards addressing the methods used by adversaries; instead, security teams are locked in a pattern of waiting for inevitable attacks, trying to minimize the damage they cause, ensuring that remediation occurs as quickly as possible, and blocking only exactly identical attacks.
  • Incident response only helps prevent attacks that exactly replicate past ones.
  • a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale.
  • Instead of seeking discrete, static IoCs based solely on what has already occurred, proactive cybersecurity analysts can instead use the intelligence they have derived about adversaries’ methodologies – commonly referred to as tactics, techniques, and procedures (TTP). 
  • From these TTPs, analysts can identify the general form and components of an adversary campaign. In addition, they can determine abstract indicators like how the adversary is attempting to hide his actions. 
  •  A proactive cybersecurity tool would be able to recognize possible adversary TTPs and indicators that describe a threat (or threatening behavior) in general terms. The system would then act on any traffic which met this pattern before it reaches inside a network, as the attack occurs, and do so in a way invisible to adversaries.
  • Using this basic model, a cybersecurity tool could truly prevent common exploits before they were executed, and could even predict and protect against future, not yet seen exploits.
  •  
    In the wake of the Marriott International cyberattack, the article presents the issues with the current issues in the methodology of cybersecurity; first explaining the data of how popular they are in the hospitality industry, and what it means for the industry, before going into the process of how a cyberattack happens and the measures taken to prevent it. Traditional cybersecurity is one of an "incident response" which can only be implemented once a cyberattack occurs and can only prevent it temporarily as a hacker can do similar tasks with different IP addresses and new malware. In order to circumvent this failure of cybersecurity, the article offers a new method in which TTPs (tactics, techniques, and procedures), are used to identify certain components of a hacker and identify how they would carry out an attack, before acting on it before the attack would "reach the network".
  •  
    This article discusses one of the largest fears of most hospitality firms, and that is keeping their client's personal information private. Most large companies in this industry have become giant data centers for the personal information of millions of people. Breaches of this type of information place the lives of many people at stake. For example, Marriott International had a security breach of over half a billion of its clients which began in 2014 and was not detected until September of this year. Keeping an individual's information away from malignant forces is just plain business sense and any more attacks of this manner will severely hurt the reputation of the business experiencing it.
obena010

When It Comes to a Cyberattack, We Are All Vulnerable - By David Trumble - 0 views

  • When It Comes to a Cyberattack, We Are All Vulnerable
  • Cyberattacks have nearly paralyzed mega enterprises including Facebook, Target, Wells Fargo and even the venerable credit reporting agency, Equifax. 
  • Here are some compelling, if not terrifying, statistics on the growing threat of data breaches:
  • ...4 more annotations...
  • organizations must take preemptive measures not only to mitigate the financial and reputational impact of these events but ultimately to protect their customers.
  • Deploying the latest software protection is only the beginning. Transparency to customers and actionable steps to correct such a catastrophic event are critical to an orderly recovery.
  • An effective plan includes a risk assessment to identify vulnerabilities across a wide spectrum of threats including, but not limited to, cyberattacks.
  • Here are six important questions to ask your crisis management team:
  •  
    Talks about the effects and the importance of being prepared for a cyber attack.
anaslip

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Hospitality Tech... - 0 views

  • Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector
  • Marriott International revealed that a massive cyberattack compromised personal information for up to half a billion individual guests of its properties.[1] The data breach ranks as the second largest known theft of sensitive personal records to date.
  • This marks the second major cybersecurity failure for Starwood, the Marriott division affected. Before being acquired by Marriott in 2016, the company’s cash register system was penetrated by malware looking to steal credit card information. [3] Other major organizations in the hospitality industry, including Hilton and Hyatt, have reported similar attacks. In 2017, for example, Holiday Inn parent company InterContinental Hotels discovered a breach lasting three months and affecting 1,200 properties. With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • ...5 more annotations...
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • However, industry specific challenges like high employee turnover continue to expose the sector.[6] Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.” What this means is that an adversary—commonly referred to as a “hacker”—finds some way to gain access to a target and compromises it. The target can be accessed through vulnerabilities in web frameworks, internet browsers, or internet infrastructure such as routers and modems. Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks.
  • Rather than rely solely on the incident response and recovery methods that have been used for many years, a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale. This kind of approach, when paired with incident response tactics, could provide true security to vulnerable, critical networks.
  • A TTP-based cybersecurity tool would work in concert with existing incident response, internally-focused cybersecurity efforts, adding a layer of prevention over the top of this vital but flawed process.
  •  
    In today's world no business entity is impervious to cyber-attacks. Marriot, Hilton and InterContential Hotel Groups were all recently affected by such acts. The traditional cyber-attack method which the hospitality industry employs is oftentimes simply a reaction to the attack- "incident responses". Instead, the industry needs to shift its focus and allocate resources to aid prevention of future of attacks. This new focus was be surrounding tactics, techniques and procedures (TTP) - the ability to identify adversary and implement the necessary processes to hinder attacks.
  •  
    This article tells us about the importance of having a good cybersecurity. There are some big hospitality companies like Marriott and Hilton which have revealed that many cyberattackes compromised personal information for many guests and that cybersecurity has to be improved.
cmick006

Hackers Target WHO, COVID-19 Research Firm with Cyberattacks - 0 views

  • The Office for Civil Rights recently warned healthcare providers that hackers have increasingly impersonated health agencies tasked with the Coronavirus response, as well as the FBI and the Department of Justice.
  • , healthcare organizations need to be reviewing and discussing their data protection strategies as more work shifts into the remote environment to ensure they’re protected in the event of a compromise.
  • “It is a critical time to make sure all your data is backed up, especially as many of the company assets are moving out of the office,” he added. “If it’s critical to always have your systems running and you could not afford the downtime to rebuild your systems, you need more than just cloud backup and would need to implement a disaster recovery solution to continue your operations with minimal downtime.”
  •  
    Cyberattacks on health organizations. These organizations need to implement better data protection. Personal and medical data has been hacked and there is a continuous effort put forth to breach the systems that house this information. With more and more companies researching potential vaccines and remedies for Covid, now more than ever, organizations must have more than just cloud backups; disaster recovery plans should include offsite backups at a minimum.
deranique

Experts at Davos 2023 sound the alarm on cybersecurity | World Economic Forum - 0 views

  • 2023 will be a consequential year for cybersecurity.
  • "There's a gathering cyber storm,"
  • "This storm is brewing, and it's really hard to anticipate just how bad that will be."
  • ...17 more annotations...
  • cyberattacks such as phishing, ransomware and distributed denial-of-service (DDoS) attacks are on the rise.
  • Cloudflare
  • a major US cybersecurity firm that provides protection services for over 30% of Fortune 500 companies
  • "There's been an enormous amount of insecurity around the world,"
  • "I think 2023 is gonna be a busy year in terms of cyber attacks."
  • Experts warned that cyberattacks are increasing in sophistication and frequency.
  • “This is a global threat, and it calls for a global response,”
  • “This is a global threat, and it calls for a global response and enhanced and coordinated action,” Jürgen Stock, the Secretary-General of the International Criminal Police Organization (INTERPOL),
  • “The key to winning the battle against cybercrime is, of course, to work together to make it a priority across the geopolitical fault lines.”
  • This concern has been raised particularly around critical infrastructure sectors like energy, public transportation and manufacturing. SecurityScorecard, a US cybersecurity rating and analysis firm, reported recently that 48% of critical manufacturing companies surveyed were at significant risk of a cyber breach.
  • “Vulnerabilities within the critical manufacturing sector haven’t gone unnoticed by cybercriminals either,” said Aleksandr Yampolskiy, SecurityScorecard's CEO.
  • The Forum's report also notes that the potential targets for cyberattacks are increasing. Today, targets include not only government agencies or major corporations, but largely any organization that handles consumer data—no matter how small.
  • There is no such thing as a hundred percent security. It's about resilience in the face of insecurity.”
  • Consumers, too, need to increase their cybersecurity awareness in 2023, experts say.
  • As more things get connected to the internet there's just more risk. ”— Matthew Prince, Cloudflare CEO
  • Zero Trust approach to cybersecurity, which creates a framework that eliminates implicit trust and ensures that any user—even those who are supposed to be inside an organization's network—is authenticated and validated at every turn.
jiayi017

Stopping Data Breaches in Hospitality | Impact Networking - 0 views

  • Nearly half of all cyberattacks target SMBs, a number which is expected to increase.
  • Human error is the number one cause of data breaches from cyberattacks, with 52% of incidents directly attributable to them.
  • The majority of attacks that occur within businesses happen because somewhere along the line, someone made a mistake. Perhaps they opened an attachment they shouldn’t have or visited a risky website.
  • ...7 more annotations...
  • 93% of companies without a disaster recovery plan who suffer a major data disaster are out of business within one year.
  • SMBs simply don’t have the resources to survive breaches and are risking their entire business by not fully preparing against attacks.
  • Research suggests that 70% of consumers would stop doing business with a company if it experienced a data breach.
  • even for businesses who can survive a breach and save their data, long-term consequences can be dire.
  • Consider a true next-gen antivirus for everyone under your network to minimize the potential for attack.
  • By keeping all your data periodically backed up in secure data centers, you can rest a lot more easily knowing that should the worst happen, you can respond quickly and effectively.
  • One of the most effective ways of counteracting the dangers of cyberthreats is by training employees and establishing policies around a security strategy.
  •  
    This article describes the destructive effects of cyber attacks on enterprises, especially small and medium-sized enterprises. Because it does not have sufficient prevention and sufficient resources for disaster recovery. The most direct cause of current cyber attacks is that people open some risky websites or emails in the wrong place. For the hospitality industry, there is a large amount of customer privacy and sensitive information. Once attacked, its destructiveness is unimaginable. And to protect consumer data, most service industries just comply with local state laws, but most state laws have not made greater progress in information protection. Therefore, enterprises should protect themselves and their customers from cyber threats from the three aspects of their own network endpoints, disaster recovery and education.
chadidscha

Cyberattacks are surging. CT's workforce isn't keeping up - 0 views

  • A growing wave of cyberattacks is threatening governments, businesses and everyday residents. Across the globe, there is a critical shortage of skilled professionals to guard against these criminals.
  • The state’s cybersecurity workforce increased by only 1 percent between 2015 and 2020, which was the seventh slowest rate in the nation, according to data from the Bureau of Labor Statistics. By comparison, the ranks of these key professionals more than doubled in a dozen states over that timeframe.
  • Globally, cybersecurity experts are in extraordinarily high demand. An analysis from Cyberseek, a public-private partnership that measures cybersecurity workforce shortages in the United States, notes the talent gap is severe in every state besides Maine.
  • ...1 more annotation...
  • Nationally, the number of unfilled cybersecurity jobs is estimated to be 464,000, including 3,800 in Connecticut, according to Cyberseek, which is backed by a subdivision of the U.S. Department of Commerce.
  •  
    Cyber-attacks has become an increasing problem within the US and the lack of unfulfilled jobs regarding cyber security poses just as big, if not bigger, of a problem. All states, besides Maine, are in dire need to fulfill jobs across the private business sector and government related positions. At this point, many companies, including the government, offer free training (acquiring proper certifications) in hopes of gaining more employees to help with the fight against cyber war.
swhit133

Fighting Internet Crime: Protecting Your Small Business From Cyberattacks - 0 views

ata breaches at major corporations like Yahoo, Equifax, Target and Sony Pictures may capture the big headlines, but small businesses also face significant financial, operational and reputational ri...

https:__www.forbes.com_sites_dinahwisenberg_2017_12_20_fighting-internet-crime-protecting-your-small-business-from-cyberattacks_#e288baf30ee1

started by swhit133 on 24 Oct 18 no follow-up yet
galca008

Improving data security in the hotel industry lets guests sleep peacefully | Hotel Mana... - 1 views

  • The hospitality industry is quickly growing as a favored target of hackers and cybercriminals. In fact, according to the 2016 Trustwave Global Security Report, hospitality is the vertical industry with the second-highest number of data breaches, behind only the retail industry.
  • Hotels are high-value targets for cybercriminals because they not only hold payment card information on guests, but also a wealth of other sensitive personal data that can be used to steal their identity.
  • The fallout from a widespread data breach that compromises guests’ payment card data or personally identifiable information can be disastrous for a hotel chain. The average cost of a data breach in 2016 was $4 million. This figure encompasses everything from breach mitigation to crisis team management costs, business losses and even the more intangible consequences: damages to brand reputation.
  • ...6 more annotations...
  • However, with more countries migrating to chip cards and EMV-compliant POS systems, attackers have shifted their focus to card-not-present fraud and are targeting industries where consumers are making their payments and reservations over the phone—such as hotel contact centers.
  • If guests aren’t convinced that the hotel is keeping their personal and financial data secure, they will take their business elsewhere. In order to protect their brand reputation and their business, hotels need to create a culture of security throughout their entire organization that focuses on protecting guests’ digital property in addition to their physical property. One of the best places to start is their contact center.
  • In an era of increasing cyberattacks, hotels can make themselves less of a target by adopting technology to ensure that payment card data and other personally identifiable information is kept secure and segregated from the contact center.
  • With such an approach, customers calling to make a reservation or order additional services discreetly type their card numbers into the telephone keypad, rather than reading them out loud to the agent on the phone line. The data is securely routed to the payment gateway or a more secure server so it is never shared with the agent and is not held in the contact center infrastructure. This ensures that there is no possible spillover of the data to the unsecured or unmonitored areas of the business. It also reduces the number of individuals with access to the sensitive data, and makes the hotel contact center a less attractive target for cybercriminals. As an added benefit, this approach makes it easier for the hotel to comply with Payment Card Industry Data Security Standards by reducing the scope of compliance. By keeping payment card data out of the contact center, hotels can significantly reduce the high costs and extensive time associated with maintaining PCI DSS compliance.  
  • With stronger security practices for handling guests’ sensitive data, the hotel industry as a whole can transform itself from being one of the most likely targets for data breaches to becoming a model for data security, thereby ensuring that fewer customers ever have to go through the experience
  • Guests can sleep peacefully knowing that their data is secure, and the hotel can rest assured that its name won’t be making headlines as victim of a costly data breach.
  •  
    The hospitality industry is a major target for cyberattacks, resulting in sensitive guest information being compromised. When these attacks happen it leaves guests restless, because they know or believe their information is not safe. This article discusses this issue and how security can be improved to avoid these attacks.
  •  
    The article titled, "Improving data security in the hotel industry lets guests sleep peacefully" shows how the breach of data security can be anywhere. As technologies improve, so do ways in which cyber security can become at stake. According to this article, "Hotels are obligated to maintain the physical security of guests and their belongings during their stay-if guests don't feel safe staying in their room or leaving their belongings there, they won't continue to patronize that hotel brand. The same thinking applies to data security: If guests aren't convinced that the hotel is keeping their personal and financial data secure, they will take their business elsewhere". Thus, hotels need to make sure they are safeguarding information such as their payment information as well as other confidential information. Hackers are becoming even more sophisticated, where they can target specific industries, such as hotel industries since guests speak with hotel representatives over the phone to provide payment information. In the even that a hotel's data has been compromised, what is its responsibility? First, they should send the client a letter of apology, and then handle the complete process efficiently, so the client can at least feel they re supported. The avoidance and handling of data breach is becoming even more common nowadays with the rise of technology.
tricc003

Hyatt launches bug bounty program | Hotel Management - 0 views

  • The new initiative is designed to allow Hyatt to “tap into the vast expertise of the security research community to accelerate identifying and fixing potential vulnerabilities.”
  • Hyatt Hotels has launched a bug bounty program via HackerOne, seeking to reward researchers who find vulnerabilities in its sites and apps.
  • The ethical hackers can use the platform, as well as rival services such as Bugcrowd, to report vulnerabilities, security flaws, leaky servers and more before less well-intentioned individuals stumble across them, potentially leading to cyberattacks or data theft,
  • ...3 more annotations...
  • Back in 2015, 250 properties managed by Hyatt across a number of countries, including the U.S., UK, China, Germany, Japan, Italy, France, Russia and Canada, were subject to a cyberattack.
  • Researchers who report valid, high-severity flaws can expect rewards of up to $4,000; important bugs will earn them $1,200 and less severe vulnerabilities are worth between $300 and $600.
  • A second data breach, in which 41 locations were affected and unauthorized access to payment card information was detected, occurred in 2017.
  •  
    Several different hotel chains have fallen victim to hackers who have stolen the personal information of their guests therefore Hyatt is taking matters into their own hands. The hotel chain is offering a bug bounty program via HackerOne which will reward ethical hackers with monetary compensation for reporting flaws in their network and programs. They will then take the information that these hackers provide them with & work to strengthen the weaknesses in their cyber security.
allisonweets

Guests: Hotels are not investing enough in cybersecurity | Hotel Management - 0 views

  • More than 22 million U.S. travelers self-report as being the victim of a cyberattack through their business with hotels, according to the Morphisec 2019 Hospitality Guest Threat Index.
  • Following the Marriott International/Starwood Hotels & Resorts Worldwide breach that was discovered nearly a year ago, U.S. Commerce Secretary Wilbur Ross noted that “many companies have been scrimping on the cybersecurity budget” — both in the hospitality sector and beyond.
  • Almost 60 percent of consumers said restaurant point-of-sale systems are the most susceptible to cyberattacks within the hospitality industry.
  • ...4 more annotations...
  • Millennials (24- to 35-year-olds) believe they are most vulnerable to a cybersecurity breach when staying at a traditional hotel rather than when booking with Airbnb.
  • More than 25 million U.S. consumers self-reported that a restaurant visit has resulted in a data breach.
  • Earlier this year, Morphisec discovered FIN8, a cybercrime group most known for targeting the retail industry, was actively targeting POS systems within hospitality companies in the U.S. and abroad.
  • “Increasingly, attackers are targeting weakly defended point-of-sale systems as an entry point into the broader hospitality organization network. With many POS devices in the hospitality industry still running on Windows 7 or even Windows XP-based embedded operating systems, they are increasingly vulnerable to breaches, and cybercrime groups are taking notice.”
  •  
    This article discuss the idea that cybersecurity has been neglected according to consumers and more emphasis should be placed on protecting their private information. It has been found that point-of-sale systems are the most common victims of these breaches, and most often at restaurants. Attackers are targeting systems with weak points and outdated software, making them at a considerably higher risk for breaches and cybercrime. Companies must start investing more in heightened security measures in order to retain consumer loyalty.
mfont039

Spookier Than Ghosts: 5 of the Biggest Cyberattacks We Saw in 2019 - 0 views

  •  
    This article remenisces on the biggest data breaches of 2019 where millions of people's social security numbers, financial data, medical records, and private information were exposed. Some of the 2019 data breach were cuased by third party app developers or hackers working alone. The data breach happened with Facebook, Capital One, Canva, Quest Diagnostics and DoorDash
kdibe001

Budgeting for Cybersecurity: Risk vs Reward - NuData Blog - 0 views

  • Companies are facing an onslaught of cybercrime – everything from DDoS attacks to breaches to insider theft – and the numbers are staggering. Cyberattacks typically cost large businesses $861,000 and small business on average about $86,500, according to Kaspersky Labs. Jupiter Research is estimating that the cost of data breaches will reach $2.1 trillion globally by 2019. It is the frequency of attacks and the cascade of numbers which now makes this a CEO and Boardroom issue as cyberattacks could cause some major damage or even take whole businesses down.
  • IT Security budgets are set to grow 14% on average over the next three years with small business spending as little as a $1,000 all the way to a million dollars for large companies. While some analysts like Cybersecurity Ventures predict that there will be a burst of spending – 12-15% year over year growth through 2021, Gartner Research reports that IT security spending will account for less than 5% of worldwide IT spending.
  • You can also get more budgeting dollars by leveraging bottom line increases such as incentives for VIP customers, revenue increases, and spend increases throughout the customer lifecycle.
  • ...1 more annotation...
  • Security spending does not equal security effectiveness
  •  
    I found with this article that cyber attacks are becoming alarmingly more common than we have prepared ourselves for. Businesses now need to invest in their own cyber security department or, as the article suggests, apply a cyber security budget to each department. With security budgets predicted to increase 14%, money should be collected through the customers over a lifetime of the customer so that the budget is continually there. I found this article to stand out to me because I never thought of cyber security being so crucial, but it easily makes sense. I think a lot of business lack in providing the proper amount of security to prevent cyber attacks. Personally, I never heard of a cyber security department so this was new for me to read about.
alo328

The biggest hacks, data breaches of 2020 | ZDNet - 4 views

  • Data breaches, network infiltrations, bulk data theft and sale, identity theft, and ransomware outbreaks have all occurred over 2020 and the underground market shows no signs of stopping.
  • Many companies and organizations, too, have yet to practice reasonable security hygiene, and vulnerabilities pose a constant threat to corporate networks. As a result, we've seen a variety of cyberattacks this year, the worst of which we have documented below
  •  
    This article lists and describes cyber threats that have occurred on companies in 2020. It is very important to note that big companies have been impacted by security breaches. In the article it stated that since work has changed to a "work from home" approach, there has been a raise in cyberattacks and security breaches.
1 - 20 of 55 Next › Last »
Showing 20 items per page