Skip to main content

Home/ Hospitality Technology/ Group items tagged files

Rss Feed Group items tagged

5More

New Retail Credit Card Standards Affect Quick Service Restaurants | QSR magazine - 0 views

  • By October 2015, all restaurants and other merchants will be subjected to new Europay, Mastercard, and Visa (EMV) standards, which reflect a shift from magnetic-stripe credit cards to chip-and-pin cards.
  • , the chip-based cards require insertion of the card into a terminal throughout the entire transaction.
  • chip-based cards are less susceptible to fraud.
  • ...1 more annotation...
  • It’s a rather slow conversion over to EMV. But it’s definitely coming.” View the discussion thread. Subscribe Subscribe to QSR Renew Update Address eLetters Advertising Contact &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Articles Food &amp; BeverageMenu Innovations Marc Halperin: Resident F&amp;B Expert Food Safety Health Ingredients &amp; Dayparts ExpansionQSR 50 Franchising Growth Fast Casual George Green: Fast-Casual Expert Emerging Concepts TechnologyOrdering Social Media Promotions Sustainability Denise Lee Yohn: QSR’s Marketing Guru OperationsExecutive Insights Competition In the Store Consumer Trends Charitable Giving Outside Insights Women in Foodservice Human Resources Alan Philips: Trends to Watch Research QSR 50 OneSource Drive-Thru Study Growth 40 Smart Chain Franchise Opportunities Find a Supplier Find a Job Restaurant Management Events NRA Show <a h
  •  
    A new set of standards is coming up for credit card transactions. EMV or Europay, Mastercard, Visa, standards include a chip-and-pin device on the card that requires the card to be inserted into the card processing terminal. While this does not prevent all fraud, it's important that this standard is mandatory by 2015 and business operators should be preparing for changes.
11More

POS System in Cannabis Industry Leaks 85,000 Files | 2020-01-22 | Security Magazine - 0 views

  • Led by internet privacy researchers Noam Rotem and Ran Locar, vpnMentor’s research team discovered a&nbsp;data breach in THSuite, a point-of-sale system in the cannabis industry.&nbsp;
  • an unsecured Amazon S3 bucket owned by THSuite that exposed 85,000 files of sensitive data from multiple marijuana dispensaries around the U.S. and their customers.
  • leaked data included scanned government and employee IDs, exposing personally identifiable information (PII) for over 30,000 individuals.
  • ...7 more annotations...
  • US. Cannabis dispensaries have to collect&nbsp;large quantities of sensitive information in order to comply with state laws,
  • the THSuite platform is designed to simplify this process for dispensary operators by automatically integrating with each state’s API traceability system.
  • The vpnMentor team says that the breach&nbsp;affected many more dispensaries, and that it’s possible that all THSuite clients and their customers were involved.
  • The researchers also found photographs of&nbsp;government-issued photo IDs&nbsp;and corresponding signatures of dispensary visitors and patients alike.
  • Under HIPAA regulations,&nbsp;it’s a federal crime in the U.S. for any health services provider to expose protected health information&nbsp;(PHI) that could be used to identify an individual.
  • the researchers say that THSuite could be subject to&nbsp;HIPAA violations, which&nbsp;can result in fines of up to $50,000 for every exposed record, or even in jail time.
  • hackers and scammers can take advantage of personal details exposed in the data breach about dispensary customers and employees to create&nbsp;highly effective personalized phishing attacks.
  •  
    There was a huge data breach at THSuite which exposed 85,000 files, some of those files being personal identification information. Dispensaries usually collect a lot of information to comply with U.S State laws. The files that were retrieved by the hackers means they can take advantage of those profiles. THSuite is looking at fines of up to $50,000 PER record or jail time.
5More

Keep your data safe when connecting to public wireless hotspots | Gadling.com - 0 views

  • Any time you connect to a public Wi-Fi hotspot, almost every single piece of data you transmit can be picked up by anyone within range of the same network.
  • Create your own secure connection with a VPN
  • Don't share files on your computer
  • ...1 more annotation...
  • Firewall your computer
  •  
    Like the tittle said, this article introduced some basic methods to keep data safe when connecting to public wireless hotspots. The author pointed out that whenever we connect to public Wi-Fi hotspots, most single piece of data can be picked up by anyone within range of the same network. It is very important to keep our data safety especially in the public place. The author introduced ten methods to protect data safety. It included turn off "auto connect", don't share files on computer, get a 3G or 4G adapter, create your own secure connection with a VPN, connect securely to your home PC, then connect to sites you need, firewall your computer and so on. During introducing the methods to protect the data, the author also told basic knowledge about how the data will be picked up by others.  In the part of don't share files on computer, the author pointed out that many people choose home network when they are connecting into public Wi-Fi which can let other people stole the sharing files. Also the firewall for the computer is really necessary to protect the data in the computer. Finally, the author told an easiest implementation which is restrict what you do on Wi-Fi. People should not do anything on Wi-Fi that you wouldn't want to share with anyone else like bill payments. It can let other people know your account and password when you make payments through public Wi-Fi.
36More

Cloud Computing: Explained for the Hotel Industry - 7 views

  • if you want a more efficient, streamlined back office and happier guests, then “the cloud” can help you meet your goals
  • cloud-based applications are usually a lot cheaper than traditional systems.
  • cloud computing is when you use programs, store files, or access data via the internet rather than on your hard drive.
  • ...25 more annotations...
  • When an application is “cloud based” it means that it lives on third party servers.
  • Avoids costly and painful installations
  • Eliminates negative depreciation (in fact, the software gets better with age, since updates can be made at any time)&nbsp;
  • Pushes software companies to consistently earn customer loyalty with innovation and great service
  • Hotels that use Cloudbeds log into it directly in a web browser like Internet Explorer or Chrome. This is a big advantage for hotels because you can access the application on any device.
  • No discussion of cloud computing in the hotel industry would be complete without mentioning Cloudbeds, the first property management system startup in years to serve 1 million beds with its software.
  • When a system is cloud-based, it can innovate faster because changes can take effect immediately.
  • Implementing cloud-based software can make your operations more efficient, save time for your employees, and create more positive guest experiences.
  • Another reason for Cloudbeds’ rapid growth is that their software can easily integrate with other tools. Cloudbeds has an extensive marketplace of integration partners, including Whistle, TrustYou, and Oaky, that it can connect to via an API. Because everything is located in the cloud, a hotel doesn’t need to download any programs or plug-ins to add a new integration. These add-ons can offer upgrades and analyze reviews, among other things, so you can improve guest service and even earn incremental revenue.
  • if you want a more efficient, streamlined back office and happier guests, then “the cloud” can help you meet your goals
  • if you want a more efficient, streamlined back office and happier guests, then “the cloud” can help you meet your goals
  • Implementing cloud-based software can make your operations more efficient, save time for your employees, and create more positive guest experiences.
  • “The cloud” wasn’t created overnight; instead, decades of technological evolution led to cloud computing.
  • a cloud based hotel software company like Cloudbeds might choose to rent space with a company like Rackspace to host their application (and yours) or alternatively they might use a service like AWS.&nbsp;
  • Requires minimal upfront investment
  • One of the biggest misconceptions about cloud computing is that files and applications don’t live on physical storage servers.
  • AWS tends to be more scalable for fast growing applications but as end users your guests won’t notice the difference so it’s really a matter of preference.
  • If you use Microsoft Office, you might create a PowerPoint on your laptop (local storage), but when you save the file, it gets uploaded to your Microsoft OneDrive, which is housed in the cloud.
  • If you’ve ever edited a Google Doc or uploaded files to Dropbox, then you’ve leveraged cloud computing.
  • Benefits of Cloud Computing
  • lower switching costs for buyer
  • you can sign on securely via any web browser - even if you’re off-site.
  • t the same time, users can submit feedback to Cloudbeds about any bugs or glitches, which the Cloudbeds team can resolve quickly.
  • you may even save some money in your IT budget
  • your hotel can implement a new system seamlessly
  •  
    Cloud computing offers a more efficient way for hotels to keep up with data and programs for their company. When a hotel uses cloud computing, they are able to create more of a positive experience for their guests. It also is extremely helpful to use a cloud-based system because hotels could access their cloud-based application on any device. Cloud-based software also gets better with age because the updates can be made at any time so this will get rid of negative depreciation.
  • ...5 more comments...
  •  
    cloud computing is when you use programs, store files, or access data via the internet rather than on your hard drive One of the biggest misconceptions about cloud computing is that files and applications don't live on physical storage servers. When an application is "cloud based" it means that it lives on third party servers. Cloud computing provides several advantages over traditional computing: Avoids costly and painful installations Requires minimal upfront investment Allows software companies to focus resources on R&D/innovation Eliminates negative depreciation (in fact, the software gets better with age, since updates can be made at any time) Offers the ability to cancel at any time (plus has lower switching costs for buyers) Pushes software companies to consistently earn customer loyalty with innovation and great service integrate with other tools...These add-ons can offer upgrades and analyze reviews,PIE revenue management tool, a channel manager, a booking engine, and more operations more efficient, save time for your employees, and create more positive guest experiences
  •  
    This article explains what cloud computing is, the evolution behind the technology, and how the hotel industry uses cloud computing. Cloud computing can benefit hotels because they can use any device to log into cloudbeds on web browsers.This type of technology can make everyday operations more efficient, save employee time, and create an overall positive guest experience.
  •  
    This article explains what we've learned of Cloud Computing. The evolution to its upcoming may have taken a while but now it is here to stay. The use of Cloudbeds in the hotel industry has made operations more efficient, save time and money on employees and improves guest experiences. Cloudbeds has expanded its property management system to include: PIE revenue management tool, a channel manager, and more. The use of Cloudbeds is accessible through any web browser, this makes it efficient if you were working at home. Cloud computing is the next innovation we will see more of in the hospitality industry.
  •  
    This article introduces you to cloud computing and its evolution. It also explains how the hotel industry can benefit from using cloud services. "Implementing cloud-based software can make your operations more efficient, save time for your employees, and create more positive guest experiences." Through the use of CloudBeds, a hotel employee can sign on and use property management software securely from any web browser.
  •  
    This article talks about the use and benefits of cloud based software for the hotel industry. It gives a simple explanation of how the cloud works. The major point that I found interesting is the usage of this software and how it is easier for hotels to stay up to date because any update in the system happens in real life at the moment without having to update individually every terminal
  •  
    The article discusses the hotel industry's adoption of cloud computing. By using cloud computing, you can use programs, upload files, and access data over the internet instead of storing them locally. Cloud computing and local storage are used together in some applications. In addition to hardware, software, training, and maintenance, IBM offered an extensive range of services. Due to Cloudbeds' ability to integrate with other tools, they have experienced rapid growth. Integrations can offer upgrades and analyze reviews, among other things, so you can provide better service and increase revenue. By implementing cloud-based software, hotels can stay ahead of the competition, save time for employees, and give their guests a better experience.
  •  
    This article describes what cloud computing is, and what it isn't, so people understand how it can be seen in the industry. The storing of data on the internet has been a huge innovation as it expanded storage beyond the typical storage offered on a device. By switching to this new technology, businesses may minimize future investments as the technology tends to work for many years and only requires quick updates. By researching what your business and customers need, you can make the right choices on whether this investment is worth it or not for your property.
7More

Hardware and software tools you need for web design- (ts) Articles - 0 views

  • A computer to be used for web design should have a large hard disk and Random Access Memory, high processing speed and large storage capacity to be able to process the large video files.
  • Two servers are needed, the hardware and software servers which are important for web hosting. The relevant software for instance Dreamweaver and Microsoft front page need to be available before any progress can be made in construction of the site.
  • It is important to have a good antivirus or software that prevents the website from external threats.
  • ...3 more annotations...
  • If you are considering hosting videos in your site, it would be important to take the videos yourself.
  • You can also have mobile web design and editing software to edit and modify the website from any location.
  • Depending on the content you will put in the website, you may also need databases. Dynamic websites are examples of sites that require the use of database.
  •  
    To design a website hardware and software tools are needed. A computer with a large hard disk, Random Access Memory to store data, high processing speed and large storage capacity is necessary to be able to process large video files that you would need to put on these websites. with videos, its best to take them yourself so as to lessen the cost of production. Two servers are needed both hardware and software. Microsoft front page is a software needed before constructing the site because it is a website design and management tool that is used to add, rename, delete or move around files. It also contains web pages, graphics, documents and multimedia. A good anti-virus or software is important to have for web design to prevent external threats. Backing up the website should be done through emails, where it can be restored if any problems occur. With mobile web design and editing software you can edit your site from any location and it can be viewed on smart phones, PDAs etc. Some website require databases, for example Dynamic websites. This is prepared with fresh information and is easier to update with new contents for the webpage.
5More

Impact of Human Resources Information... (PDF Download Available) - 0 views

  • Organizations do have a filing system.
  • The concept of HRM is quite new in the country and the concept of HRIS (Human Resources Information System) as well.
  • Filing system &amp; indexes are often used by many of the organizations but the problem often occurs with retrieving or finding the files when necessary.
  • ...1 more annotation...
  • RIS –its knowledge, adoption, usefulness &amp; process needs to be conveyed to people so that they utilize the benefits of HRIS to the optimum level.
  •  
    Todays world is highly competitive, which means there is constantly a need for change. This is especially true regarding the technology available in the hospitality industry. For instance, the filing systems of each company…everyone has one, disorganized or not. The problem arises when you need a piece of information and are unable to locate it. Systems like HRIS can help eliminate this problem. It can reduce the amount of paperwork involved in each employee and act as a central place for information to be located.
10More

Cloud Storage Security: How Secure is Your Data in The Cloud? - 0 views

  • Hybrid Cloud: Many companies choose to keep high-volume files on the public cloud and sensitive data on a private cloud. This hybrid approach strikes a balance between affordability and customization.
  • Intrusion Detection: Online secure storage can serve many users at the same time. Successful cloud security systems rely on identifying when someone tries to break into the system. Multiple levels of detection ensure cloud vendors can even stop intruders who break past the network’s initial defenses.
  • Internal Firewalls: Not all accounts should have complete access to data stored in the cloud. Limiting secure cloud access through internal firewalls boosts security. This ensures that even a compromised account cannot gain full access.
  • ...5 more annotations...
  • Encryption: Encryption keeps data safe from unauthorized users. If an attacker steals an encrypted file, access is denied without finding a secret key. The data is worthless to anyone who does not have the key.
  • Authentication: Weak passwords are the most common enterprise security vulnerability. Many employees write their passwords down on paper. This defeats the purpose. Multi-factor authentication can solve this problem.
  • Breach Drills: Simulating data breaches can help employees identify and prevent phishing attacks. Users can also improve response times when real breaches occur. This establishes protocols for handling suspicious activity and gives feedback to users.Measurement: The results of data breach drills must inform future performance. Practice only makes perfect if analysts measure the results and find ways to improve upon them. Quantify the results of simulation drills and employee training to maximize&nbsp;the security of cloud storage.
  • Is the Cloud Secure and Private?Professional cloud storage comes with state-of-the-art security. Users must follow the vendor’s security guidelines. Negligent use can compromise even the best protection.
  • Redundancy makes cloud storage security platforms failure-proof. On-site data storage is far riskier. Large cloud vendors use economies of scale to guarantee user data is intact. These vendors measure hard drive failure and compensate for them through redundancy.Even without redundant files, only a small percentage of cloud vendor hard drives fail. These companies rely on storage for their entire income. These vendors take every precaution to ensure users’ data remains safe.
  •  
    This article goes into how secure is data that is stored in the cloud. There are three different types of cloud storage. one is public, two is private and three is hybrid. The article states that most companies go with hybrid because of its versatility. cloud storage does have built in security that includes intrusion detection, internal firewalls and file encryption. the article does list that there is security risk that come with cloud storage. week passwords are one of the main concerns when it comes to cloud security. Cloud companies do what's called breach drills to see if there are any weakness in the security and if there are how do they handle the situation if the system is compromised. this article does list the pros and cons of cloud services but in the end, it shows that the writer for this article is biased towards the use of cloud services.
  •  
    Breach drills sound like a great idea! It would be helpful in continually maximizing security efforts and determining weak points in the system, especially with technology advances and computer viruses becoming stronger.
25More

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries&nbsp;in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method.&nbsp;
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security.&nbsp;
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records,&nbsp;including&nbsp;credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst.&nbsp;
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option.&nbsp;
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
2More

7 Reasons Why You Should Move from On-Premise to Cloud Computing - IBIS Technology - 1 views

  •  
    Cloud computing allows you to store and access files via the internet rather than the computer's hard drive. Switching to this system saves on costs, extra security measures, and connection and access issues you may be experiencing when working remotely. Data loss is always a risk when your files are stored in a place with only one access point, with cloud computing the files are stored on the internet making it more secure. Cloud computing also allows you to easily work with others in different departments or offices altogether since the files can be shared and accessed from anywhere with an internet connection.
  •  
    There is a lot more to the cloud than I thought. As an owner of a macbook i do store lots of things on the "cloud" but I can't help to feel like not being able to physically touch something that has my files, like a hard drive..is real. I know it is but maybe I'm just real old school. I think I need to start trusting the cloud more, especially this day in age.
9More

Computer Network - 0 views

  • Computer network security should be a concern for all
  • A computer network can simplify one's technical capabilities if they own multiple computers and the various technical equipment used to enhance computer functioning. When computers talk to each other through a network, tasks can be more efficient and people can save time and money, streamlining systems. Computer networks are great for home or small businesses, and can also be wide area networks (WAN) reaching across the world to bring shared technology to large corporations or global industries. Another important facet is computer network security which operators should be aware of when looking at networking through a WAN.
  • Computer networks are great for home or small businesses, and can also be wide area networks (WAN) reaching across the world to bring shared technology to large corporations or global industries. Another important facet is
  • ...3 more annotations...
  • a network will allow the system operator to share a single Internet connection for all of home computers.
  • Networking will also allow a family or business to share various files. Windows allows for easy entry to another computer's files, making it possible to access information from one desktop to another.
  • A firewall may be implemented to filter the information coming through the Internet connection into the private system in the home or business.
  •  
    This article gives a brife introduction of the functions and advantages of computer networks. There are also discussions about the computer network security issues.
  •  
    This article gives a brife introduction of the functions and advantages of computer networks. There are also discussions about the computer network security issues.
  •  
    Computer networks are great for home or small businesses, and can also be wide area networks (WAN) reaching across the world to bring shared technology to large corporations or global industries. Another important facet is computer network security which operators should be aware of when looking at networking through a WAN. Networking will also allow a family or business to share various files. Windows allows for easy entry to another computer's files, making it possible to access information from one desktop to another. Other computer network activities include: sharing a printer, playing games that allow multiple users on different desktops, and sending output devices to other computers in the home. There are different levels of security, and the reason for use of computer networking will determine how much security should be installed. The highest levels of security will block out everything coming into the desktop, even email, with the lowest levels of computer network security allowing in email spam and undetected viruses.
4More

7 technologies that are transforming the hospitality industry | Hospitality Magazine - 4 views

  • Despite the many changes that are being brought on by these technologies, the truth is that they are there to enhance, not to replace, the core offerings of a hospitality business.
  •  
    The hospitality industry is experiencing a technological transformation. Current technology is improving and being put to better or new uses. According to this article in Hospitality Magazine, there are seven technologies that are taking the industry by storm. 1. Online Booking Systems I agree with the many industry insiders that now consider an online booking system essential. Penetrating the online marketplace is an absolutely mandatory part of the formula for success. However, opinions differ when it comes to how to accomplish this aspiration. As expressed in the article "Taking back control of the direct channel for hotels" posted on the class ScoopIt!, using online travel agents as a properties online booking system has easy setup and maintenance but lacks true customization and can put a sizable dent in profit margins, but building and utilizing a 100 percent customized system does not necessarily grant instant access to hundreds of travels sites on the web. Over all, I am of the opinion that online travel agents are still the best option-for now-because the pros out way the cons. 2. Electronic Point of Sale (EPOS) Primarily used for mobile or self-ordering, EPOS systems can replace waitresses' use of paper orders and remote/hidden POS systems. In my opinion, this streamlines the look of the restaurant floor and provides better and more instantaneous service. Panera Bread uses self-order tablets as some of their locations that allow customers who know what they want to order traditional menu items quickly and independently. Having used this system, I find it more of a novelty than a convenience because the system isn't exactly self-explanatory. Currently, the technology is much more enjoyable as an aid to waitresses where the restaurant can experience increased efficiency and a higher standard of service while guests can experience the "that's cool" factor without the frustration of having to navigate the service themselves.
  •  
    3. Customer Relationship Management (CRM) CRM technology provides efficient electronic storage and management of contracts and customer information and many versions also feature cloud-based applications that provide easy access to frontline employees. Electronic storage and online back-up are not totally new ideas (i.e. the floppy disc) and despite the long way these technologies have come is, in my opinion, not enough to do away completely with paper back ups. Even with electronic files, my previous property kept basic papers for 1 year and more sensitive files for much longer. Basically, CRM technology is something we should utilize more, but I doubt many will do away with a paperback up system anytime soon. 4. Marketing Automation Automatic email and text communications have been made possible by the development and improvement of marketing automation technology. Having worked with this type of technology, there is not an overabundance of companies/technologies from which to chose; however, the technology available various greatly in effectiveness and quality. In my opinion, Constant Contact is the best marriage of quality and ease of use for marketing automation technology available. This type of marketing can really step us a properties game, but beware of poor performing products. 5. Social Media According to the article, photos are the most popular posts by social media users, but the arena has become a bonafide space for reviews. While sites such as TripAdvisor and Expedia provide a niche arena for travel/tourism/hospitality related communication, general social media sites also invite open, unfiltered discussion. Whole social media is BIG, it is important for companies to assess and utilize only the social media outlets that their demographic are actively using.
  •  
    6. Smartphones Smartphones are already super convenient. They are constantly being integrated and synced with our daily lives. Applications such as Apple Pay, in combination with CapitalOne, have provided another level of integration. Currently, there is talk and work on guests being able to use their cell phones as hotel room keys but I wouldn't be surprised if in the future we will have QR Code or RFID storage for our driver licenses, insurance policies and other important information. 7. Smart Appliances A part of American households for sometime, smart appliances are beginning to make their way into the hospitality industry. Luxuries such as electronically controlled blinds, thermostats, lights and more are something we can expect to see in hotels sometime in the future. My biggest concern is the time between now and implementation because while these products are available for purchase by consumers directly, they have not taken off nor seemed to gain any ground in the typical household. Could the hospitality industry be just as slow to adopt these technologies? I believe that it is likely so-mainly due to the high cost of implementation. In conclusion, technology is still advancing and most industries are feeling the pressure to update existing technology and adopt new technology. In the hospitality industry this is especially true.
14More

Cybersecurity Tactics for a Hotel Industry that's Under Siege - 0 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar. Just ask Starwood Hotels &amp; Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel Collection, all of which were victims of highly publicized, major breaches in the hospitality industry last year.&nbsp;
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • In the breaches mentioned above, point-of-sale (POS) systems were attacked and malware launched to acquire cardholder names, credit card numbers and expiration dates.
  • ...7 more annotations...
  • It can be difficult and expensive to hire and retain an IT security team
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required.
  • personal details for hotel guests are frequently stored in a variety of locations, including billing, facilities, restaurants, etc.
  • otels are made even more vulnerable thanks to POS system provider breaches
  • &nbsp; Phishing remains a particularly popular tactic used by hackers everywhere, including those that are targeting the hotel industry to trick both prospective guests, who give up credit card and personal details, and insiders, who then give up valuable login credentials.
  • File Integrity Monitoring (FIM), Unified Threat Management (UTM), and Security Information and Event Management (SIEM) should also be considered
  •  
    This article talks about how there is a serious concern in the hotel industry when it comes to credit card and identity theft. They talk about how all the major brands in the hotel industry were all victims of highly publicized, major breaches in the last year alone. Also, including airline and banks, hotels maintain a wealthy amount of database of personal and financial data. For example, with new technology systems being created, POS systems are a weak security point for many networks because they are constantly in use and are not always updated or even protected from vulnerabilities. The article talks about personal details for hotel guests are frequently stored in a variety of locations including restaurants, facilities, and government buildings, so hackers have a greater possibility to access your personal information. The bigger hotels are in more danger because of the volume of guests that come in and out of the location. Smaller hotels should be concerned not just about their security but also by ransomware, an increasingly favorable tactic to extort hoteliers by hackers who encrypt the hotels data making it inaccessible until ransom is paid for. I believe hotels need a toolbelt of various securtiy technologies that can be used to prevent future malicious attacks. I think by managing and implementing a firewall is essential which helps get rid of dangerous traffic from coming onto the network and preventing sensitive data from being hacked.
  • ...1 more comment...
  •  
    This article talks about the weakness and vulnerability of POS systems involving safety. It mentions the security breach that few companies, such as Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel, faced last year (2016) involving credit card fraud and identity theft through their POS systems. It mentions how point-of-sale (POS) systems are not complete safe and how vulnerable they are because they are constantly in use and aren't always patched, updated, or protected from vulnerabilities as frequently as required. It suggests that enterprises should outsource their cyber security management to minimize costs, considering that is extremely expensive to hire and retain IT security team.
  •  
    MOD 10: This article discusses the main tactics of cyber hackers that target hotels. Point of sale (POS) systems are easy targets for hackers due to their constant use during operation hours and because of that their security measures aren't always up to date. Hotels have large data banks since they're storing consumer profile information such as home addresses, phone numbers and credit card numbers. There's a large risk when it comes to security breaches within franchises because they have access to their parent company's regional, national and global systems. If their systems are hacked and breached, then that puts the whole system of the brand at risk. Security breaches within a system can also damage a brands reputation with the public. According to the article, "Recent major breaches at Fortune 500 companies and household names across the retail, restaurant and hotel sectors demonstrate that anti-virus, anti-malware and firewalls alone are not enough to secure businesses from the ever-evolving threat landscape." Smaller properties are even at a greater risk because not only do they have to monitor their compliance with PCI but also monitoring their security systems for their database and PMS system. Some of the recommended software's that should be used by hotels looking to be proactive with their company's cyber security is File Integrity Monitoring(FIM), Unified Threat Management(UTM), and Security Information and Event Management(SIEM).
  •  
    This article explores the different tactics hotels should use after a cyber attack. The article mentions several different type of attacks such as Phishing when hackers trick customers into giving up their login credentials. Ransomware, when hackers encrypt data making it unusable and inaccessible for the hotel. Not one solution but rather companies should be equipped with a series of technologies from firewalls to file monitoring programs. Some of these technologies, like SIEM requires an intelligent IT team to have the capabilities of analyzing and monitoring the reports produced. This may be more difficult for smaller businesses to implement and maintain.
1More

The Tourism and Hospitality Industry Goes Green - 1 views

  •  
    I found this pdf file, titled 'The Tourism and Hospitality Industry Goes Green' online from the Commonwealth of Pennsylvania - Department of Environmental Protection. It mentions why going green is good, and mentions areas such as cost savings, health, liability, environment, as well as public image. Further, it talks about what tourism and hospitality related companies can do to go green where it gives examples for employees in the (back) office, what one can do in restaurants/lounges/dining areas, as well as in the guest rooms. The pdf file also mentioned, which was new to me, that the American Hotel and Motel Association publishes material for the logging industry - which can also be accessed online - on what one can do to go green.
1More

5 Ways Technology is Transforming Accounting - 1 views

  •  
    Although this article is not specific to the hospitality industry it discusses how new technology has changed accounting and how the role of an accountant has evolved. The author mentions five ways that technology is transforming accounting. I found the following very interesting and believe they relate to the hospitality industry. These include: cloud computing, innovations in tax software, mobile accounting, and OCR technology. We have already covered cloud computing and its benefits in previous modules. Cloud computing allows accounting professionals to perform tasks remotely by accessing the cloud. Advancements in technology has allowed tax software to be much more powerful and useful to accounting. In the past when tax laws would change accountants would spend months learning the new laws. It is now much easier with modern technology and software. OCR technology in my opinion helps all industries that require any soft of bookkeeping/ file keeping. With OCR technology you can convert scanned docs, PDF files, and even images into editable data. The best benefit of this technology is that it allows you to organize all data and make it searchable.
17More

HRIS | HR Software for Hotels | Hospitality IT | Software for Hospitality| Immerauf - 1 views

  • HRIS has emerged as among the most crucial aspects of hospitality IT. No hos
  • . No hospitality management system can be considered complete without an effective HRIS system.
  • Greytip Software is a focused HR &amp; Payroll software solutions company.
  • ...8 more annotations...
  • An efficient HRIS system manages the recruitment, staff-shifts, time &amp; attendance, and many other aspects of your hospitality HR requirements. It should be able to drill down to history files and provide e-leave application &amp; training management.
  • Developing a product that caters to small and big customers, across industry verticals, needs a lot more experience, mature processes, and superior engineering.
  • Folklore HCM
  • Folklore Payroll
  • Folklore Attendance Software
  • Folklore Training
  • Benefits
  • Benefits
  •  
        This website is a homepage of the company called Immerauf. This company is to provide network service and sell the technology products that are related to the hotels. Human Resources Information System is also a product of theirs.     As everybody know, without an effective HRIS, the hospitality management system could not be considered completely. The functions of the HRIS are managing the recruitment, shift, attendance, requirement and so on. They highly recommend their HRIS technology product. And they mentioned their partner Greytip Software. The partner is a focused HR & Payroll software solutions company.     They introduced a few basic own and partner's history and stated they had groups of customers, more experience, and superior engineering.     They list some products overview, such as Folklore HCM, Payroll, Attendance Software and Training. All of the products could help hotels to reduce the transaction costs, improve employee morale, communicate better, eliminate the fussy processing, increase productivity, save time and effort.
  • ...3 more comments...
  •  
    HRIS has emerged as among the most crucial aspects of hospitality IT. No hospitality management system can be considered complete without an effective HRIS system.An efficient HRIS system manages the recruitment, staff-shifts, time & attendance, and many other aspects of your hospitality HR requirements. It should be able to drill down to history files and provide e-leave application & training management. And this article introduce us a HRIS product that is a software solutions for HR and Payroll departments that that span the entire spectrum of HR & payroll functions covering employee information management, training management, compensation, benefits, attendance management, etc.
  •  
    The Hospitality industry is known to have very high attrition rates. This makes it all the more critical to have a robust HR information system (HRIS) in place. HRIS has emerged as among the most crucial aspects of hospitality IT. No hospitality management system can be considered complete without an effective HRIS system. The products are backed up with high quality customer support and service. Our support is timely and relevant, ensuring a high degree of usability for our products. It can track record which is caters to small and big customers, across industry verticals, needs a lot more experience, mature processes, and superior engineering. The benefit are: * Lets you focus on strategic HR instead of routine admin tasks * Reduce transaction costs * Improve employee morale * Communicate better * Get business intelligence with MIS reports * Modular design that lets you pick and choose
  •  
    As hospitality industry has a high attrition rates, a HRIS software is important for hospitality management system. A good HRIS system usually has the functions of recruitment, staff-shifts, time & attendance, etc. Folklore HCM is a web-based software with the employee self service. It is usually used with other products such as Folklore Payroll, Folklore Training, and Folklore Attendance. Folklore HCM lets the HR manager pay attention to strategic issue instead of routine tasks. It also decrease costs and increase employee morale. Folklore Payroll software makes the payroll accurate, increases the productivity and reduce transaction costs. It can also motivates employees and examines different aspects of income tax. Besides, Folklore Attendance Software Folklore Training are all web based software and have many benefits.
  •  
    HRIS technology plays a very important role in hospitality industry. There is no hospitality management system can be considered complete without an effective HRIS system. This technology manages the recruitment, staff-shifts, time&attendance, and many other aspects of the HR requirements in hotel. It is very useful especially for Human Resources. This tech is also backed up with high quality customer support and service. Some of the support is timely and relevant, ensuring a high degree of usability for our products. It can help us do track record, products overview, folklore attendance software and so on. It can not only drill down to history files, but also provide e-leave application& training management.
  •  
    this article is talking about the Greytip Software. this software has many solutions. it can help the manager monitor the HR activities and payroll activity. using this system, the managers can analyse their hotel attrition rate and make measures in time.managers can easily promote the employee information management, develop training management, create compensation,share benefits, supervise attendance management. this way can save money and time. managers do not need to set up sheets of attendance, employee behavior, punishment or rewards,etc. depended on the computer, the process of management goes more smoothly.
2More

LGR - Computer network development - 1 views

  •  
    In this paper a computer network is defined to be a set of autonomous, independent computer systems, interconnected so as to permit interactive resource sharing between any pair of systems. An overview of the need for a computer network, the requirements of a computer communication system, a description of the properties of the communication system chosen, and the potential uses of such a network are described in this paper.
  •  
    The goal of the computer network is for each computer to make every local resource available to any computer in the net in such a way that any program available to local users can be used remotely without degradation. That is, any program should be able to call on the resources of other computers much as it would call a subroutine. The resources which can be shared in this way include software and data, as well as hardware. Within a local community, time-sharing systems already permit the sharing of software resources. An effective network would eliminate the size and distance limitations on such communities. Currently, each computer center in the country is forced to recreate all of the software and data files it wishes to utilize. In many cases this involves complete reprogramming of software or reformatting the data files. This duplication is extremely costly and has led to considerable pressure for both very restrictive language standards and the use of identical hardware systems. With a successful network, the core problem of sharing resources would be severely reduced, thus eliminating the need for stifling language standards. The basic technology necessary to construct a resource sharing computer network has been available since the advent of time-sharing. For example, a time-sharing system makes all its resources available to a number of users at remote consoles. By splicing two systems together as remote users of each other and permitting user programs to interact with two consoles (the human user and the remote computer), the basic characteristics of a network connection arc obtained. Such an experiment was made between the TX-2 computer at Lincoln Lab and the Q-32 computer at SDC in 1966 in order to test the philosophy.' Logically, such an interconnection is quite powerful and one can tap all the resource of the other system. Practically, however, the interconnection of pairs of computers with console grade communication service is virtually useless. Firs
3More

FTC Files Complaint Against Wyndham Hotels For Failure to Protect Consumers' Personal I... - 0 views

  • The FTC alleges that these failures led to fraudulent charges on consumers’ accounts, millions of dollars in fraud loss, and the export of hundreds of thousands of consumers’ payment card account information to an Internet domain address registered in Russia.
  • According to the FTC, in the first breach in April 2008, intruders gained access to a Phoenix, Arizona Wyndham-branded hotel's local computer network that was connected to the Internet and the corporate network of Wyndham Hotels and Resorts.
  •  
    The FTC filed suit against Wyndham Hotels for millions of dollars worth of fraud in June of this year. Wyndham hotels manages over 7,00 hotels worldwide. Incidents occurred a numerous amount of times over the past three years. The company was hacked into and stole credit card numbers from over 500,000 clients. In the first occurrence the money was wired into an account in Russia. Even after the first incident Wyndham hotels did not fix the security breach allowing the hackers to get in.
7More

Hospitality Industry Hit Hardest By Hacks - Dark Reading - 1 views

  • Trustwave report on data breach investigations shows hotels were breached more than financial institutions last year, and nearly all attacks were after payment-card data
  • not surprisingly, a whopping 98 percent of targeted data was payment card information
  • Nicholas Percoco, senior vice president of Trustwave's SpiderLabs, announced at Black Hat DC this week these and other findings the company compiled in 218 data breach investigations in organizations across 24 countries. Financial services companies accounted for about 19 percent of the breaches, but that was far fewer than in the hospitality industry, where 38 percent of all breaches took place
  • ...1 more annotation...
  • Percoco outlined the three main steps in a typical data breach and how attackers mostly operate at each level: initial entry, data harvesting, and exfiltration.
  •  
    The hotel is a perfect place for hackers to attack because they have easy access to retrieve thousands of guest information including credit card information, billing addresses, and much more personal information. Nicholas Percoco, senior vice president of Trustwave's SpiderLabs, mentioned that the credit card and debit card information is the most in demand by hackers because it is easiest to turn into cash quickly. There are three main steps in a typical data breach and how attackers mostly operate at each level: initial entry, data harvesting, and exfiltration. Close to half of these attacks occur via remote access applications, of which 90 percent exploit default or weak passwords. Around 42 percent of attacks occurred via third-party connections; 6 percent via SQL injection; 4 percent via exposed services; and 2 percent via remote file inclusion attacks. Interestingly, less than 1 percent began with an email Trojan. As an IT manager of the hotel, it is crucial to recognize how serious the consequences are for the hotel should the data not be protected well. 
  •  
    Hey all, here is an article I found that talks about hackers taking over the hospitality industry. It mentions how hackers main objective is to gain access to debit accounts and gain access to customer cash. Also, hackers are also able to infiltrate POS systems along with other valuable technology with in the hospitality industry. Nearly half of these attacks occur via remote access applications, of which 90 percent exploit default or weak passwords, according to the report. Around 42 percent of attacks occurred via third-party connections; 6 percent, SQL injection; 4 percent, exposed services; and 2 percent, remote file inclusion attacks. Interestingly, less than 1 percent began with an email Trojan.
  •  
    hackers are EVERYWHERE!
4More

AHA NSW launches new HR system - The Shout, Hotel News, Liquor News, Bar + Club News - 0 views

  • allow hoteliers to immediately commence any employee action in a compliant and efficient way – from recruiting new employees to recording their training and qualifications and beyond
  • each employee has their own online employment file and every piece of correspondence, meeting notes, shift notes etc in the one place,
  • allows effective and efficient decisions regarding performance and behaviour at any tim
  •  
    Through a partnership between a tech company and a hotel association, a new HRIS specific to the needs of hospitality has been born. The system is cloud-based, providing full accessibility in a 24/7 industry. Not only does the system house compliance, training and employment files but it also provides templates for letters, contracts and policies. The system promises to enhance efficiency and streamline processes.
4More

Hotel chain lawsuit MUST BE a security wake-up call for the travel industry | Tnooz - 0 views

  • &nbsp;authorities in the US filed a lawsuit against Wyndham Worldwide,&nbsp;claiming the company and three subsidiaries failed to protect sensitive customer credit card data.
  • almost 600,000 credit card numbers including expiry and security codes, were stolen over a three year period in three separate data breaches, resulting in over $10 million in fraudulent losses to cardholders, banks, and credit card companies.
  • Weak passwords and a laissez faire attitude towards property management system usernames and passwords should never be an excuse for a compromise.
  •  
    Last year a law suit was filed against Wyndham Worldwide because the company did not protect their customer credit card data efficiently on their PMS. The company caused over $10 million in fraudulent losses. In this case, Wyndham had be allegedly using weak login credentials in their property management systems. This is the key vector for data breaches. "According to the FTC, Wyndham Worldwide had many points of weakness in their security chain including; storing credit card information in plain text, storing sensitive security codes (aka CVV/CVS/CVC data), not using firewalls, not enforcing strong passwords, not using updated operating systems, and not having adequate logging.'
1 - 20 of 152 Next › Last »
Showing 20 items per page