Skip to main content

Home/ Hospitality Technology/ Group items tagged detection

Rss Feed Group items tagged

rebecca Bonet

Keeping hotel locks safe | Hotel Management - 1 views

  • Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • ...18 more annotations...
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate
    • TIANJIAN ZHANG
       
      Nowadays, locks security is an essential issue in hospitality industry. Actually, most hotels upgrate their locks systems with advanced technology. The role of technology in the security sector is fundamental, but despite the rapid technological progress, one thing has remained constant: the importance of trust. Whether hoteliers wising up to the fact that they've bought what could be called a flawed security system will be willing to trust the supplier of said equipment for a fix.
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues. 
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • , preventing
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security
  • “  Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software ,” Shea said. “  When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • For instance, a ‘wandering intruder alert’ warns hotel security personnel when a card is presented to a number of different doors.  Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues.  
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate ,”
  • As with any hotel upgrade, hoteliers understand that renovation and upgrades are a regular part of running their business
  • Looking past RFID solutions for instance, VingCard Elsafe has made our RFID locks compatible with next generation technologies, like Near Field Communications (NFC), providing our customers with an easy upgrade path at reasonable cost.”  
  •  
    This article discusses the security issues with room keys. These hotel locks will not open with cards that are read as duplicates or duplicatable. The locking mechanism has been specifically designed to alert the front desk and secuirty departments in the event these locks are tampered with. I'm sure at one point or another we have all experimented with our room key and tried to open other doors. A system like this will prevent activity like that.
  • ...2 more comments...
  •  
    VingCard Elsafe, the global leader in hospitality security and part of the ASSA ABLOY Group, announces that it has phased out the use of brass metal plating and painting in the manufacture of its locking systems, opting instead to use a more eco-friendly process to color stainless steel. VingCard Elsafe has adopted a new method of metal coloration called physical vapor deposition, or PVD, an environmentally friendly process that involves vaporizing an alloy onto stainless steel within a heated vacuum. PVD requires no chemicals and produces no waste or hazardous materials of any kind, resulting in no environmental impact whatsoever. The PVD process has other added benefits, as well. PVD-treated surfaces have high wear resistance for discoloration, and the stainless steel adds enhanced anti-corrosion properties. Besides eliminating the negative environmental effects of the brass plating process, the move by VingCard Elsafe to simplify its lock manufacturing process has had other related green benefits. By doing away with the need for secondary surface treatments of the locks, new product components are now supplied directly from metal stamping to the point of use in the assembly line. This means less shipping and transportation is required for product manufacture, resulting in a diminished carbon footprint.
  •  
    VingCard Elsafe is a new kind of lock system, which contains RFID technology and is compatible with the Near Field Communications. It has several advantages compared to traditional magstripe locks. First of all, it can add security to the RFID card and prevent cloning, which is much safer than the traditional key card. Another is that it can detect tampering and know when and where staffs use the lock. It can send alert to the front desk. Moreover, the front desk can know when the door is forced open. However, before using the lock system, training program should be provided. So this new kind of lock system brings safety to the guests and to the hotels.
  •  
    This article talk about the issue that hotel are having with their security system lock for guest room. These cards are easy to duplicate. The new system will alert front desk or security if the lock has been tampered with. Other alarms include detecting that a door is forced open 'mule tool' instruction when a door is open from the inside handle without an occupant in the room.
  •  
    This article discusses the current state of hotel lock safety. Monitoring safety has changed as these locks become more automated. The article states that, "Hotel Management corresponded with Tim Shea, president of ASSA ABLOY Hospitality, for ways in which vendors are keeping hotel locks secure." Through VingCard Elsafe's locks, hotel security and safety has increased. VingCard says, "Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software." This is just one of the ways the locks increase security. The article also states that the system is cost-effective for hoteliers.
agrie013

Hospitality Upgrade | Online Skimming Threatens Hospitality E-Commerce Sites - 0 views

  • Attacks against the hospitality industry to gain payment information continue. There is a growing threat to all e-commerce websites called Web-based or Online Skimming. These attacks infect e-commerce websites with malicious code, known as sniffers or JavaScript (JS) sniffers and are very difficult to detect. Once a website is infected, payment card information is “skimmed” during a transaction without the merchant or consumer being aware that the information has been compromised.
  • Today two industry cybersecurity organizations, PCI Security Standards Council (PCI SSC) and the Retail and Hospitality ISAC, joined forces to highlight this growing threat.
  • By exploiting vulnerable plugins, brute force login attempts (credential stuffing), phishing and other social engineering techniques, the hackers attempt to gain access and inject malicious code.  “These attacks are either directly into e-commerce websites or often into a third-party’s software libraries that merchants rely upon.  These service providers may not be aware of the risk they create for their customers if they are not focused on security and the potential threats targeting them
  • ...1 more annotation...
  • The ability to detect these threats before they can cause damage is significantly important. Examples of PCI DSS Requirements providing ”detection” controls include: Reviewing code in order to identify potential coding vulnerabilities (Req. 6) Use of vulnerability security assessment tools to test web applications for vulnerabilities (Req. 6) Audit logging and reviewing logs and security events for all system components to identify anomalies or suspicious activity (Req. 10) Use of file-integrity monitoring or change-detection software (Req. 11) Performing internal and external network vulnerability scans (Req. 11) Performing period penetration testing to identify security weaknesses (Req. 11) Alerting on posts to newly observed domains in proxy logs can further provide additional avenues of detection for future phishing attacks as well as the initial reconnaissance phases of an attack on a thirdparty JavaScript library. 
  •  
    This article goes in to detail that attackers have targeted information that is acquired on websites such as credit card and other personal information. This writing does tell how PCI and Retail and Hospitality ISAC joined forces to help prevent such attacks from happening on these websites. Now PCI and ISAC are the standard when it comes to protecting information. These attacks are easily undetectable by these websites because they are only skimming for the information. this article does give tips for prevention and detection. PCI is the industry standard and by them teaming with ISAC it will make these websites and your information more safe.
Krystal Jost

Buffalo hotel launches Verve Living System | Hotel Management - 0 views

  • When a guest enters the room, he or she places the room key into the slot on the KeyCard Switch which then transmits a wireless signal. When in place, guests have complete control over the lights, outlets and the HVAC unit in the room. When removed, the room is designated as unoccupied
  • it also can detect which in-room devices have low battery levels; which rooms have constant occupancy; which rooms have problems with network connectivity; and which are not communicating properly with the hotel PMS and other systems.
  •  
    This article focuses on sustainability and methods in which technology is utilized to conserve energy and waste, while also not hindering the guest experience. Hotels, similar to the Salvatore Grand Hotel, have began implementing systems such as the Verve Living System, by Zeno Controls, LLC, that provide wireless connections to the heating, ventilation, and air conditioning system, as well as the lighting in the guest room. It utilizes sensors to activate such amenities, and enables the guest to enter the room, place their key card into a slot, and it will begin to adjust to the preferred temperature and the preferred lighting levels. Once the key card is removed, such as when the guest is leaving the room, after a very short delay, it sends a signal that verifies the room is unoccupied, and turns off these energy-consuming items in the room. Many guests, when staying in hotels, do not consider turning off their lights or air conditioning when they leave the room, and simply leave everything running. They do not realize the impact this has not only on costs for the hotel itself, but also the impact that it has on energy consumption and sustainability. With the growing awareness of being "green", guests are focusing more and more on conservation, however, they may still be slacking in these areas, leaving things on, being absent minded. This system will allow guests to not have to worry about such tasks, and controls the system of turning these items off for them, adding convenience for the guest who is environmentally conscious. I have personally seen a similar system being used in a hotel room, and thought it was a great idea, and an amazing way to control costs and eliminate waste of resources. It is also very surprising to read that the Verve Living System detects low battery levels, constant occupancy, problems with room connectivity, and rooms that are not communicating with the hotel PMS or other systems. This enables the maintenance team of a hotel to fun
Charlesque Moses

Malware that steals from point-of-sale systems detected - SC Magazine - 0 views

  • A data stealer designed to collect users' personally identifiable information from point-of-sale (POS) systems has been detected.
  • "Given the wealth of data found on these payment hubs, it's expected that these are the next targets of cyber criminal activities.”
  •  
    This article contains information about the detection of data stealing malware by researchers in an Israel-based company (Seculert). Follow up research discovered that malware was found in POS systems in hotels and other businesses as well. It is believed that the payment hubs are the next cybercriminal targets. In the article, it explains what the malware was and how to identify it. Researchers agree that it doesn't directly infect the systems, but was created to make analysis difficult. Though it is relieving that this malware had been detected, it shows the importance of higher security for POS systems. So many payments are made through these systems. Any attacks can jeopardize the privacy of customers' payment information and company information. This could lead to a distrust issue and could end badly for companies. So, the security definitely needs improving. However, it should be remembered that hackers get smarter daily. So, information will not always be safe. This leads to the need of companies to constantly improve their security. It would be a good start.
laura kaczkowski

Restaurants, Beware: Hackers Want Your Customer Data - 1 views

  • The simple fact is that cyber criminals today want information that they can use to make money
  • We found that nearly 90 percent of attacks were designed to steal customer information including cardholder data, e-mail addresses and account information.
  • many restaurants and franchise businesses, unsecure and public WiFi networks are conveniently (for the criminal) connected to point of sale systems.
  • ...14 more annotations...
  • but the number one is that they all process credit cards.
  • assets targeted by criminals were point-of-sale software systems
  • Think of the scenario of a hotel that maintains a restaurant, a spa, as well as other services all connected to one POS system
  • The risk is even greater when hotels are part of a hotel chain with interconnected systems.
  • Franchise businesses are particularly at risk primarily because franchises tend to have the same POS system duplicated at all locations
  • Most of the time these business don’t have trained security professionals on staff; instead most assume their IT personnel are taking care of all of their security needs.
  • 76 percent of environments we investigated had a third party introduce a security flaw within the environment that contributed to criminals being able to compromise data.
  • Another alarming trend we found in our investigations was that self-detection of breaches decreased in 2011, and only 16 percent of victimized organizations actually detected the breach themselves.
  • The best intrusion detection systems are neither security experts nor expensive technology, but employees.
  • Very often businesses ignore that fact that while their employees might not be security experts,
  • the POS screen looked differently than it had the day before.
  • The cashier reported it to the company’s security hotline and sure enough there was a cybercriminal on the system.
  • When working with third parties, always build in security requirements into the contract and impose policies and procedures such as good password policies to ensure tight control and better security.
  • The quicker an organization can identify an issue and respond to a breach, the less likely they will experience the deep penalties, both financial and to their brand.
  •  
    The article I read was called, "Restaurants, Beware: Hackers Want Your Customer Data." In the article it talked about how cyber criminals want credit card information from people so that they can make money off of them. Criminals find new ways everyday to breach systems and steal information from guests staying at hotels or eating in restaurants. It states that many restaurants and franchise businesses use unsecure and public WiFi networks are connected to the point of sale system. "Franchise businesses are particularly at risk primarily because franchises tend to have the same POS system duplicated at all locations." A lot of times businesses don't have trained security on staff, they just assume that their IT person will be talking care of the security. According to the article the best detection systems are neither the technology nor the security but it's the employees who work there. The employees can tell when something has changed in the system and as soon as they realize that, they need to report it to their manager. I never even considered people breaking into the systems and stealing credit card information but it does happen and it's important to know what to do in these kinds of situations.
Yuri Kim

AirTight Rated "Strong Positive" in Wireless LAN IPS Marketscope Report by Leading Indu... - 1 views

  • Gartner has rated AirTight "Strong Positive" in its 2012 Marketscope for Wireless LAN Intrusion Prevention Systems.
  • "Just like wired networks, wireless networks need to be monitored to both proactively detect vulnerabilities to accelerate mitigation and to quickly detect security incidents to support rapid incident response."
  • organizations will continue to struggle to embrace Wi-Fi access and various smartphones and tablets while tackling the security challenges of these unmanaged devices.
  • ...1 more annotation...
  • to automatically detect and classify all wireless devices on the network in order to apply appropriate security policies to prevent any unauthorized device access to the network regardless of authentication credentials.
  •  
    AirTight that is the provider of wireless intrusion prevention (WIPS) rated very positively in 2012 Marketscope for its prevention systems. In today's developed Internet based society, wireless networks are getting significant and using universally with the people's demand for convenience. Wireless networks are, of course, more convenience networks than wired networks, but they are obviously less secure. Because of this fact, the wireless networks users need to consider the security vulnerabilities, and take a proactive approach to detecting the vulnerabilities and responding security incidents quickly. This is AirTight who provides the tools called WLAN IPS for the users in order to help them solve these growing concerns. To be specific, AirTight systems provide both on-premise and cloud WIPS and secure WIFI access to detect and classify all wireless device on the network automatically. By doing so, they can forbid unauthorized devices from accessing the network. I feel that sometimes, the companies or people try to overlook the significant risks because of the conveniences. The wireless networks security might be also one of these kinds of risks. Therefore, I think the systems offered by AirTight are helpful for the companies or people to keep their sensitive information safely.
Marisa Chauvet

Analogic - Checkpoint and Baggage-Screening Security Imaging Systems - 1 views

This article talks about Analogic that is a growth-oriented, high-technology signal and image-processing company that provides products and services to the aviation security industry and growing me...

started by Marisa Chauvet on 14 Jul 13 no follow-up yet
Jeremy Fairley

Electrical Contractor: Hotel Automation Goes Wireless - 1 views

  • “We have wireless and hardwired versions, making it easy for both new construction and retrofitting existing hotels,” Sobieski said. The intelligent thermostats can communicate over a ZigBee wireless network, giving the hotel’s engineering team full control and monitoring of every room in the hotel. “With our EcoCentral remote management platform, shutting down a wing for maintenance is as simple as a mouse click. Built-in alerting also gives them the ability to catch problem HVAC systems before a guest call comes in.”
  •  
    Article speaks about hotel automation systems by vendors, that allow hotels to reduce energy and utility costs that impact the bottom line. The EPA estimated that in 2004 the hotel industry spent more than $5 billion on energy and that the number was likely to increase. Items such as occupancy based thermostats communicate over wireless networks and allow hotel staff to perform maintenance tasks such as detect issues with in-room HVAC systems before guests call in to report the items. Other systems use energy monitoring systems that allow for the hotel to detect room temperatures. This is significant as those rooms temperature and lighting systems can know whether the occupant is in the room and adjust lighting and temperature settings accordingly. Energy waste in hotels is an issue that affects the bottom line so the potential for ROI is great. Implementation of many of these systems is flexible as many are built on wireless networks that do not require heavy physical installation of wiring. Interested in the groups thoughts on this?
Yunfan Wu

Reduce Energy Costs and Drive Up Profits at Your Hotel With an Energy Management Solution - 0 views

  • Energy cost is witnessing a sharp rise year-on-year in India. Like every other industry, the hotel industry is also deeply concerned and taking measures to introduce energy management solutions to keep energy cost under control.
  • :Like every business establishment, hotel properties also need to keep a check on all expenses so that they can minimize costs and maximize profits. In a hotel, the energy cost can be high enough to be the second highest expense and heating ventilation and air-conditioning (HVAC) can make up to 50% of the total energy consumption. So, this is where the hotel needs to look in order to minimize energy consumption which would ultimately help them reduce energy bills. In simple words, when a hotel is able to control energy costs, they actually add to their bottom line. 
  • the Energex system is based on passive infra-red technology. Once installed, the sensor in the solution detects the presence of the guest in the room as it captures the thermo radiation emitted by the human body. When our system determines that there is a guest in the room, it gives him/herfull control over the HVAC system. This means, they can set the temperature as per their requirements. But, once the guest steps out of the room, our smart sensor detects the room as unoccupied and automatically sets-back the temperature in the room to a preset energy efficient mode. The solution also has a quick recovery method where-in the temperature returns to that set by the guest when they return to the room and this ensures guest comfort. 
  • ...1 more annotation...
  • When they enter their room, guests need a comfortable room. Our sensor is capable of detecting the presence of the guest in the room and automatically switching on. The sensor is also able to detect a guest sleeping and stays on. When the guest is not in the room the air conditioning comes on intermittently to ensure the temperature in the rooms stays pleasant when the guest returns. Energex also offers a web based interface which allows hotels to control the temperature in a room.
  •  
    Energy management is a important part of physical plant of hospitality management. The most significant meaning of energy management is to reduce costs and drive up profits. Energex system is a kind of energy management software introduced in this article. It can adjust the using of the HVAC system automatically and save energy costs. It also can ensure the guests' comforts. The system can be used in both old and upcoming hotels. What the hotel need to do is to install a sensor along side the thermostat. I believe this is a good technology for this industry because it can not only benefit the hotels but also be environment-friendly.
Marcos Oliveira

America's Most Hi-Tech Hotels - Articles - Executive Travel - 1 views

  • the hottest high-tech hotels feature an intricate network of intelligent systems working to make every aspect of your stay more comfortable, more convenient and more secure—both for you and for the hotel staff
  • Instead of swiping your card through the lock and waiting for the green light, you can simply approach the door with card in hand and walk in, thanks to smart technologies that unlock the door for you as you approach
  • radio-frequency ID (RFID) cards replace the conventional swipe card, allowing various systems throughout the hotel to detect your presence automatically and respond appropriately
  • ...9 more annotations...
  • Hyatt is also experimenting with a version of this approach, building RFID into customer loyalty cards to let regular guests bypass the front desk and head straight for the comfort of their rooms.
  • The technology also allows the hotel to maintain better security by knowing more clearly who’s coming and going throughout the hotel, since each RFID card can be detected by multiple sensors in the lobby, elevators and rooms.
  • Hilton and InterContinental are working with a company called OpenWays to deploy a new key technology that plays a specially encoded sound from your phone. Give your cell phone number to the hotel at the time of booking, and you’ll receive a text message with a special phone number to call. When you arrive at the door of your suite, just call the number and hold the phone up to the door lock. As the garbled noise plays from your phone’s speaker, the lock will “hear” it and open on command.
  • Soon you’ll be able to use your own cell phone as your room key at a number of top hotels
  • OpenWays
  • audio key system
  • One of the most advanced high-tech security technologies, facial recognition, is starting to make its way from the government sector to the hospitality industry
  • 3VR Security
  • From the moment you step into the lobby to the time you check out, high- tech hotels of the future will be tracking your moves, identifying you to hotel staff and opening doors to luxurious amenities. This sophisticated tracking will help ensure your security and may even enhance the guest experience by personalizing your interactions with hotel staff in much the same way that Google and Facebook personalize your web browsing experience by showing you relevant content
  •  
    As hotels make every attempt to come up with new and innovative techniques to conduct business, technology companies are looking for ways to being the first on scene with new technological tools. Many hotels now have instead of swiping ones card through the lock and waiting for the green light to enter, the guest can simply approach the door with a card in their hands and walk right into their rooms. This is possible through radio frequency identification (RFID). RFID are also being used to track customer loyalty to ones brand. RFID Technology also allows the hotel to maintain better security by knowing more clearly who's coming in and going throughout the hotel, since each RFID card be detected by multiple sensors in the lobby, elevators and rooms. There is even the possibility to access ones room by simply utilizing their cell phones and having the phone unlock the door. This is done by simply dialing a phone number and when prompted placing the cell phone next to the door lock. An audio key will play and the door will be unlocked. The audio is unique to each and every reservation.
kpony001

Cloud security: The reason hackers have it so easy will infuriate you - 0 views

  • hackers time and again have outwitted the cyberguardians.
  • HashiCorp offers an open-source tool called Vault that stores sensitive credentials, encrypted themselves, and strictly limits what people, servers and programs can access them
  • The mass movement of company and personal data to the cloud has only complicated things.
  • ...15 more annotations...
  • Companies have uploaded VPN and cloud access credentials to cloud storage systems that are easily accessible.
  • security breaches are routinely made worse when hackers who enter one system are then finding the keys to another lying around unencrypted.
  • developers are still regularly storing the digital keys to company assets and even user data in source code, configuration files, and other miscellaneous, unencrypted locations.
  • Unlike typical users who can memorize their passwords or store them with a secure password manager, developers and IT workers often need to keep security credentials in places where automated software can find them.
  • Cloud managers are playing catchup to close the door on the critical data left out in the open.
  • Sophisticated new cybersecurity tools designed to securely store these kinds of credentials in a way that legitimate, automated processes can access, and intruders can’t
  • hackers time and again have outwitted the cyberguardians.
  • cloud industry leader Amazon launched AWS Secrets Manager, its own credential management tool. And Microsoft offers what it calls Azure Key Vault to securely store and monitor and control access to this kind of data.
  • The main problem is that companies really don’t have policies for it or they don’t follow up and make sure those policies are followed
  • Until recent hacks made it clear that few organizations can hope to keep their networks entirely free from intrusion, many companies paid less attention to the security of data within their firewalls
  • UpGuard, known for its frequent role in detecting leaks tied to data stored on insecure cloud machines, has released BreachSight, which scours the internet for its clients’ exposed code, credentials, personally identifiable information, and other sensitive data.
  • Since last year, Amazon has also offered a service called Amazon Macie, which uses machine learning to detect unusual access patterns to cloud storage and uploads of potentially sensitive data like access keys.
  • Amazon also released open source software to help prevent accidentally storing passwords and keys to source code repositories
  • other developers have offered similar tools to scrub credentials from existing code.
  • it’s possible that those types of tools will automatically be provided as part of cloud computing contracts, as standard as seatbelts in new cars.
  •  
    Cloud computing has created a very hacking prone storage system because companies have not been paying as much attention to security as they should. Thus, by not taking the logical measures such as not uploading credentials to cloud storage systems, they are becoming prone to hacker raids. However, with the turning of the tide, new methods of security have presented themselves in the form of online tools such as HashiCorp's Vault Microsoft's Azure Key Vault, and Amazon's AWS Secrets Manager, which stores sensitive credentials in very limited access windows, as well as UpGaurd's BreachSight which detects online data leaks containing exposed and volatile client data, and Amazon's Amazon Macie, which learns the access patterns of your cloud storage,
irinatroitskaya

Hospitality's Hidden Threat: POS | News | Hospitality Magazine (HT) - 0 views

  • POS breaches remain one of the most difficult to protect against based on historic vulnerabilities at the device end-points
  • In a POS attack, the attacker spends the vast majority of time inside the network in the “post infection” phase, which occurs after the system has been compromised.
  • once the attacker is inside the network, he can move “low and slow” to mount his attack and remain undetected.
  •  
    In contrary to most of the articles that state the advantages of POS in the hospitality industry, this article is focused on the cybersecurity threats that the usage of POS imposes to the hotels and restaurants. It is said that hospitality became the attractive target for the hackers and accounted for 14% of all breaches. Most of the attacks happen through the POS's. Additional security measures such as encryption to transaction data are usually difficult to apply to POS systems making it easier for the breacher to enter the system. Moreover, once they are inside they act slowly to get access to the key asset, the payment processing center, but traditional prevention security solutions are not designed for post-infection detection. Also, many POS are still operating on Windows XP or even DOS meaning that new vulnerabilities can be easily exploited. This all should be taken into consideration by the hospitality organizations while building their security systems. Deception-based detection that sets traps that make the attacker reveal himself becomes a popular solution. So in my opinion, the security issues of using POS should be the priority for the hospitality industry. Creating of effective mechanisms of customers' personal data protection is crucial for maintaining their trust and loyalty.
shanegmark

Princeton Professors Launch AI COVID Screening Tool | Hotel Business - 1 views

  • The CovidDeep app is 90%-plus accurate in predicting whether a person is virus-free or virus-positive, and is twice as effective as current triage tools, such as temperature checks and questionnaires, according to the developers.
  • “CovidDeep has been developed as a rapid screening tool to help businesses such as hospitality venues maintain a COVID-19 safe environment,” said Dr. Adel Laoui, CEO/founder, NeuTigers. “Currently, venues rely on screening tools such as temperature checks, which are only used to detect symptomatic cases and are less than 50% accurate in detecting whether a person has COVID-19.
  • Proven rigorous clinical studies show it to be 90% accurate in detecting if a person is SARS-CoV-2 virus positive, even if they have no symptoms (asymptomatic). It is able to do this at scale, in real-time and cost-effectively.”
  •  
    New app uses AI and readily available body sensors to detect, with 90% accuracy claim the developers, whether a person is COVID-19 positive/negative. This is done within 2 minutes and compared with current temperature only checks done by many locations, which are only 50% accurate and don't capture asymptomatic persons, is a potential game changer for organizations. All staff could potentially be tested every day before their shift starts.
  •  
    I think this is a great tool for all businesses especially the hospitality industry. The fact that it is adaptable to work with many health products already owned by consumers the cost to the business is low. I also like the high percentage rate of accuracy and what little time it takes to gather this data.
agrie013

Cloud Storage Security: How Secure is Your Data in The Cloud? - 0 views

  • Hybrid Cloud: Many companies choose to keep high-volume files on the public cloud and sensitive data on a private cloud. This hybrid approach strikes a balance between affordability and customization.
  • Intrusion Detection: Online secure storage can serve many users at the same time. Successful cloud security systems rely on identifying when someone tries to break into the system. Multiple levels of detection ensure cloud vendors can even stop intruders who break past the network’s initial defenses.
  • Internal Firewalls: Not all accounts should have complete access to data stored in the cloud. Limiting secure cloud access through internal firewalls boosts security. This ensures that even a compromised account cannot gain full access.
  • ...5 more annotations...
  • Encryption: Encryption keeps data safe from unauthorized users. If an attacker steals an encrypted file, access is denied without finding a secret key. The data is worthless to anyone who does not have the key.
  • Authentication: Weak passwords are the most common enterprise security vulnerability. Many employees write their passwords down on paper. This defeats the purpose. Multi-factor authentication can solve this problem.
  • Breach Drills: Simulating data breaches can help employees identify and prevent phishing attacks. Users can also improve response times when real breaches occur. This establishes protocols for handling suspicious activity and gives feedback to users.Measurement: The results of data breach drills must inform future performance. Practice only makes perfect if analysts measure the results and find ways to improve upon them. Quantify the results of simulation drills and employee training to maximize the security of cloud storage.
  • Is the Cloud Secure and Private?Professional cloud storage comes with state-of-the-art security. Users must follow the vendor’s security guidelines. Negligent use can compromise even the best protection.
  • Redundancy makes cloud storage security platforms failure-proof. On-site data storage is far riskier. Large cloud vendors use economies of scale to guarantee user data is intact. These vendors measure hard drive failure and compensate for them through redundancy.Even without redundant files, only a small percentage of cloud vendor hard drives fail. These companies rely on storage for their entire income. These vendors take every precaution to ensure users’ data remains safe.
  •  
    This article goes into how secure is data that is stored in the cloud. There are three different types of cloud storage. one is public, two is private and three is hybrid. The article states that most companies go with hybrid because of its versatility. cloud storage does have built in security that includes intrusion detection, internal firewalls and file encryption. the article does list that there is security risk that come with cloud storage. week passwords are one of the main concerns when it comes to cloud security. Cloud companies do what's called breach drills to see if there are any weakness in the security and if there are how do they handle the situation if the system is compromised. this article does list the pros and cons of cloud services but in the end, it shows that the writer for this article is biased towards the use of cloud services.
  •  
    Breach drills sound like a great idea! It would be helpful in continually maximizing security efforts and determining weak points in the system, especially with technology advances and computer viruses becoming stronger.
tania morgan

Bedbug Early Detection System (BEDS) by Atlantic Paste and Glue Company - 0 views

  •  
    The Atlantic Paste and Glue Company (AP&G) has just release for consumer sale a new passive bed bug monitoring product. The product is called the Bedbug Early Detection System or BEDS for short and is a ingenious and inexpensive way for homeowners, apartment dwellers, hoteliers and property managers to monitor for bed bugs with a very unobtrusive footprint. This technology will help hotel avoid the embarrassment and potential lawsuit that would occur if bedbugs were discovered at their establishment.
Yue Li (3011472)

Keeping Guests Safe: Hospitality, Political Unrest and Terrorism - HFTP Connect - 0 views

  • Installing bullet proof glass in secure areas, lower level windows, and in some cases, hotel shuttles. Installing riot shutters in areas where civil and political demonstrations occur, or are likely to occur. Installing reinforced doors. Building panic rooms or highly secure suites for high risk guests, such as politicians and celebrities.
  • Adding additional wiring for back up phone
  • systems and having satellite communications available. Hiring only law enforcement trained guards and engaging government
  • ...1 more annotation...
  • response systems. Using Explosive Detection Animals to monitor public areas, sleeping floor hallways, etc. Building secure mailrooms with small X-ray machines Adding access control systems and next generation CCTV to monitor “back of the house areas.”  In some cases, these feature motion controls, facial recognition and more. Increasing the amount of staff training to respond to suspicious situations and guest concerns. Installing crash rated fencing and pop up barriers.
  •  
    Because of the global terrorism and political unrest, hospitality as a vulnerable target must take action to prevent terrorism. One big problem is how to keep customers and employees safe without ruin customer's experience. This is said because customers in the United States pay less attention to security while enjoying their vacation. Therefore, it is the responsibility of the hospitality industry to make sure that their customers are safe. There is a couple of ways to protect customers under terrorism. For example, using biometric technology to recognize and monitor suspicious person. Using explosive detection animals to monitor public areas, and installing crash rated fencing and pop up barriers, etc.
  •  
    Yes, I like this article very much. It would certainly protect guest from not only hurricanes but thrown objects, or any other intruder coming through the window. The problem is statiscally speaking, most break inns occur through the front door or forced entry..
YU CHEN

Airport Introduces New Security Technology For Less Invasive Screening | Home - Home - 0 views

  • Going through airport security can be frustrating, embarrassing and even invasive
  • The Advanced Imaging Technology machine isn't an x-ray, but uses waves.
  • "The technology is designed to detect an item, it doesn't tell us what that item is, and that's where our officers come in and they would then go to that area of the body: the wrist, the leg, wherever the item has shown up on the monitor and do a follow up pat-down of that area," Dankers said
  •  
    This article introduces a new security tech at airport checkpoint. As the article mentioned, security check can be sad and embarrassing experience when before get onto a flight. The new imaging technology uses waves instead of x-ray to detect metallic item or other potential dangerous material on passenger without showing privacy image. And less scanning time gives a faster and more comfort experience rather than traditional invasive check. The new checkpoint machine will implement in more airports in recent future.
Carolina Villa

New airport security system could end disruptive body, shoe scans - 0 views

  • TraceGuard, a system that could detect substances used in explosives
  • TraceGuard has been developed by Israel's Trace-Safe as well as the American firm Raptor. The system was designed to ignore benign substances and prevent against false alarms.
  • or chemical weapons without opening luggage. The system, which could be integrated into scanners, magnetometers and hand-held devices, was designed to rapidly inspect both passengers and luggage without the use of full body scan and has been deployed at about 20 airports in the United States.
  • ...1 more annotation...
  • Companies from Israel and the United States have been working on joint development of non-intrusive systems to inspect airline passengers.
  •  
    Israel and the United States are developing new security systems ti inspect airline passengers. This joint effort its creating a system that could detect substances used in explosives, or chemical weapons without having to open the passengers luggage. And it could be integrated into scanners, magnetometers and hand-held devices. Its purpose is to inspect both passengers and luggage, without the use of full body scan.
Ted Rood

FTC Sues Wyndham Hotels Over Data Security Failures - Security - Privacy - Informationweek - 0 views

  • The Federal Trade Commission Tuesday announced that it had filed a suit against global hospitality company Wyndham Worldwide Corporation, as well as three of its subsidiaries
  • failing to institute a robust information security program, even in the wake of a major exploit.
  • exposure of over 600,000 credit card accounts and $10.6 million in fraudulent credit card charges, the FTC alleged.
  • ...5 more annotations...
  • More Security Insights Webcasts Malware from B to Z: Inside the threat from Blackhole to ZeroAccess Remove Administrator Rights Without Disrupting End User Productivity More >>White Papers
  • Valentino said the company overhauled its information security practices in the wake of the attacks, and also dismissed claims that anyone had been harmed by the breaches. "At the time of these incidents, we made prompt efforts to notify the hotel customers whose information may have been compromised, and offered them credit monitoring services," he said. "To date, we have not received any indication that any hotel customer experienced a financial loss as a result of these attacks."
  • "unfair and deceptive
  • The FTC accused Wyndham of failing to address the security vulnerabilities highlighted by the first breach, as well as failing to implement technology that could have detected unauthorized access to its networks. As a result, the agency said, in March 2009 attackers--"using similar techniques as in the first breach"--again
  • gained access to the Wyndham Hotels and Resorts network.
  •  
    This article describes one of the worst situations that could occur when operating a hotel. According to the text, Wyndham Hotel Group failed to implement a strong enough security system, resulting in hackers breaching the network and stealing over 600,000 credit card numbers and over 10 million dollars in fraudulent charges. The FTC is suing Wyndham Corporation for failing to take the proper security measures to guarantee the security of the most important customer information. The FTC also states that Wyndham used improper software configurations that presented credit card information in a manner that was clear and easy to read. Michael Valentino, spokesman for Wyndham Worldwide, the company made prompt efforts to notify those whose information had been compromised and according to Valentino, no hotel customer had experienced a financial loss as a result of the attacks.  Despite Valentino's claims, the FTC is suing Wyndham for unfair and deceptive practices in failing to protect the privacy and personally identifiable information about guests. The FTC claims that Wyndham failed to address the security failures that occurred after the first breach in 2008 and did not implement technology that could have detected unauthorized access to networks. In 2009, hackers used similar techniques to break into the network again as steal as much personal information as they could. 
gulsevim

Tech Innovations That Are Changing The Hospitality Industry - Social Hospitality - 1 views

  • Technology has come a long way.
  • the hospitality industry now looks for other ways to appeal to an increasingly “been there, done that, got the t-shirt,” not-so-easy-to-impress clientele. And cutting-edge technology seems to be the answer.
  • Durham, North Carolina’s Sheraton Imperial Hotel and Convention Center, for instance, has introduced high-def, flat-screen LG televisions to its rooms.
  • ...10 more annotations...
  • since providing guests with the same high-quality viewing experience they would enjoy in their homes, the hotel has improved its customer satisfaction rating by eight percent.
  • seems that every generation enjoys top-notch television viewing.
  • Seattle Hotspot boasts rooms “with heat-detecting body sensors that indicate to housekeeping staff when a room is occupied…a 21st- century ‘do not disturb’ notice.”
  • the Hotel 1000 in Seattle has found a new way to determine if your room is, indeed, occupied.
  • the biggest drain on hotel utilities is unnecessary heating and air conditioning and that the installation of energy controls throughout a property could “shed utilities costs without compromising quality.”
  • A new initiative by the Four Seasons, however, involves an innovative new bed that enables guests to customize their sleep experience.
  • hese beds include three mattress toppers that can be switched in mere minutes, offering a Signature, Signature Firm, or Signature Plush sleeping experience, and a Gel Touch Foam Center that absorbs extra heat in order to ensure maximum comfort.
  • the Aloft Cupertino Hotel in Silicon Valley recently introduced its first robotic staff member, a butler named “Botlr.
  • Botlr can be found delivering amenities to guests throughout the property donning his custom-fit butler uniform.
  • Thanks to new innovations and advancements in current technology, hoteliers can provide guests with modern conveniences that surpass even their wildest dreams
  •  
    Nowadays, there is an abundance in advanced in-room features making their way into the world's most modern hotel rooms. Some of those inventions, integrated recently in some hotels in the U.S., are explained below. Sheraton Imperial Hotel Raleigh-Durham Airport at Research Triangle Park, in North Carolina, offer its guests a better hotel experience through a TV with fast reboot time. This TV provides a top-notch television content and delivery, and has the latest high-resolution options and features. Due to its level of delivery that guests are accustomed to have in their own homes, it is expected for guests to feel more comfortable and homey during their stay. Hotel rooms in Loews Hotel 1000 in Downtown Seattle are equipped with heat-detecting sensors, which scans the room for body heat so that housekeepers don't accidentally enter the room. This high-end technology with an infrared signal scans the room to detect body heat and notes 'do not disturb' when occupied. It is particularly useful when guests forget to leave a sign when entering the rooms at night. Seems like the world's most advanced hotels are getting very creative with their in-room technology. Another example for that is the beds of Four Seasons Hotels which are customizable to guests' preferences, designed to support better sleep. Recently, numerous Aloft Hotels and Element Hotels across the United States feature their own robot butlers. With help of Botir, items can be easily delivered to the guests rooms within minutes. The purpose of using robotic assistants is to send a robot to deliver shampoo, toothbrush, toothpaste or so by the front desk. This way, the human hotel staff can serve customers personally when necessary. In my view, in the customer-driven hospitality industry, the use of in-room technology can make guests feel more comfortable and feel "at home". These new technologies have been helping the hospitality industry grow in innovative and tech-enhanced ways to deliv
1 - 20 of 151 Next › Last »
Showing 20 items per page