Skip to main content

Home/ Hospitality Technology/ Group items tagged fraud

Rss Feed Group items tagged

Endrich Reveil

IBM Security Tool Can Flag 'Disgruntled Employees' - The CIO Report - WSJ - 0 views

  • A new International Business Machines Corp.IBM -0.15% security tool uses Big Data to help CIOs detect internal and external security threats in new ways—and can even scan email and social media to flag apparently “disgruntled” employees who might be inclined to reveal company secrets
  • The new tool, called IBM Security Intelligence with Big Data, is designed to crunch decades worth of emails, financial transactions and website traffic, to detect patterns of security threats and fraud.
  • the new platform, based on Hadoop, a framework that processes data-intensive queries across clusters of computers, will allow CIOs to conduct sentiment analysis on employee emails to determine which employees are likely to leak company data,
  • ...3 more annotations...
  • flagging workers who may be nursing grudges and are more likely to divulge company information.
  • The platform also helps companies protect against hacker attacks and fraud by allowing security personnel to look for patterns in past attacks
  • More and more companies are using Big Data to discover the pattern of security lapses as they struggle to keep up with emerging threats.
  •  
    I believe every business, especially if it is a huge corporation, should protect and control their company's data. A company's data falling into the wrong hands can be a huge drawback for the company, especially if it comes into contact with a competitor. This article explains how IBM have introduced a new security tool with Big Data to identify any suspicious internal and external security threats as well as flag any company secrets from displease employee's emails and their social medias. The new system can alert any frauds and risks from decade worth of emails, financial transactions, and websites. CIOs will be able to conduct a sentiment analysis on employees to see which worker is the most likely to expose company's information. Some can argue that employees have the right to post anything on their social media's accounts but if an employee still is employed by the company then it should be all bets off. The company should have all rights in making sure their information does not get leaked out by an employee who is simply having a bad day.
imontenegro

Forget Fake News -- It's Fake Traffic You Need to Worry About - 0 views

  •  
    Fake news, fake marketing claims, fake influencers, fake customer service. So much of this fakery is funded through advertising, and biggest thing they sell is fake traffic.
  • ...4 more comments...
  •  
    This fake traffic does more damage than just wasting the marketing team's time; the financial impact can be significant and lead to a major budget hit. According to AdAge, $1 out of every $3 spent on advertising is lost because it has been unknowingly spent on ad fraud. Just in 2017, there was $16.4 billion in ad fraud loss.
  •  
    When it comes to fake Internet traffic, the main culprit seems to involve bots. However, not every bot should be viewed as bad or harmful to marketing campaigns. In Imperva's 2016 Bot Traffic Report, research indicated that nearly 52 percent of online traffic involved good bots (22.9 percent) and bad bots (28.9 percent). That means Internet traffic is only 48.2 percent human.
  •  
    Marketers and other departments have realized time and money savings by using these good bots. Those interacting with these good bots also are aware that they may be talking to a chatbot for a service request or technical question.
  •  
    The same report named four types of these harmful bots. First, there are impersonators, which are made to mimic human behavior, including propaganda bots recently used on social media sites to sway public opinion.
  •  
    Second, there are scrapers that take original content from one site and put it on others as well as take customer lists, contact information, and other valuable data. Third, spammer bots are used to drive Internet traffic to spammer websites. Finally, marketers are most concerned with click bots. This is a relatively new type of ad fraud and that click on performance-based and PPC ads that drive up the cost of this type of advertising.
  •  
    SUMMARY: With the rise of Aritiial Intelligence and computer algorithms/programs it becomes more apparent that emarketing is under constant threat of fake traffic and analytics. Over half the internet traffic is being used by bots. Marketers must invest in tools to fight fraudulent traffic. Anti fraud and tracking platforms can be utilized to combat fradulent traffic. If there is money in fake traffic, the bad bots will constantly create problems creating fradulent traffic. Marketers have to stay vigilant and informed about new threats to their emarketing campaigns so money isn't being spent on bad bots/fradulent traffic.
kmert005

4 Ways Point of Sale Systems Can Help Eliminate Restaurant Fraud | FSR magazine - 0 views

  • There are so many crucial aspects to consider when establishing a strong cybersecurity plan.
  • Cybersecurity plans have many aspects that range from simple password protection all the way to complicated IT infrastructure strategies.
  • 1. Restrict Remote Access
  • ...3 more annotations...
  • 2. Upgrade to EMV
  • 3. Secure the Network
  • 4. Adhere to PCI Compliance
  •  
    In modern restaurants, it is necessary to use technology to manage restaurant revenue. With issues such as network security becoming increasingly prominent, it is also necessary to establish a sgood electronic operating system.
  •  
    This article goes over four ways that the point of sale systems can help elevate restaurant fraud. The first is to restrict remote access. It is only necessary to allow a limited number of known IP addresses access. Remote connectivity should only be enabled during hours of business and when updates are needed for the system. Using firewalls is highly recommended as another added layer of protection. Keep Wi-Fi and security cameras separate, if they are also connected. Next is to upgrade to EMV, which is chip technology is undoubtedly the most significant way to reduce fraud and criminality. All of the security in the world is essentially rendered useless if POS devices have not been upgraded to support EMV payments. A business also must have a secure network, which includes having firewalls because they are of the utmost importance in a proper security plan. To secure the system, firewalls must be activated, and the number of IP addresses for outbound firewalls must be limited. Lastly, the company must adhere to PCI compliance. Complying with PCI standards provides another layer of security. The Payment Card Industry (PCI) Standards call for merchants that accept, store, process, and transmit card information to do so within a safe environment.
natashacastro

5 Restaurant Technology Trends of 2017 - 0 views

  • Giving guests the ability to view, split and pay their bills at the table using their smartphones saves them time and improves table turns and productivity. Additional features can be on-the-spot satisfaction surveys, text messaging and more. Mobile platform app developer Split offers a great example.
  •  
    This article provides a summary of the technology trends in the restaurant industry. One major point that I thought was related to this weeks topics was the 5th trend. Technology that is allowing guest to split the bill using their smart phones is an amazing way to keep track of income/bills/receipts and a great away to avoid fraud. In our discussion, if guests had used this technology, then the fraud would have been spotted almost immediately. The article also goes on to explain Eruza, which is a cloud-based system that will eliminated waste and improve profits by predicting demands for products.
mserr078

12 Ways To Increase Hotel Security - LODGING Magazine - 0 views

  • Even when hotels have strong security policies and procedures in place, they are still vulnerable to cyber attacks, break-ins, theft, fraud, and other crimes
  • American Hotel & Lodging
  • Association (AHLA) security consultant
  • ...17 more annotations...
  • Hotels can be held liable for the criminal acts of third parties
  • Guest Safety: Ensuring Return Stays and a Good Reputation
  • Update locks.
  • Provide a sense of ownership.
  • Monitor activity with software.
  • Evaluate and improve—quickly.
  • Meet and greet.
  • Make time for safety meetings.
  • Theft and Fraud: Monitoring Employee Activities It’s a disappointing reality that hoteliers have to contend with employee theft and fraud. B
  • Boost employee empowerment.
  • Staff smart.
  • Add active monitoring to video surveillance.
  • Cybersecurity: Protecting Electronic Borders
  • As technology has advanced, so has criminals’ ability to exploit those new technologies. The hotel industry has seen several such examples lately
  • Connect IT and security departments.
  • Upgrade to VLAN.
  • Beware of social engineering.
  •  
    This article highlights all the necessities to make sure your hotel is safe and secure for all your guests. It specified for cyber security, however, that switching to a VLAN server would be massively beneficial for the hotel as it becomes a private server that has multiple stages of security to bypass. In addition, it advises the modification of passwords every few months because apart from cyber breaches, people also try to con others out of their passwords by word of mouth and manipulation.
  •  
    In this article it talks about the 12 different ways to increase security in our hotels and how to make thing more safe for our guest.
jchac014

Highly connected hotel industry continues to be vulnerable to cyber attacks | PhocusWire - 0 views

  • cyber threats in hospitality, which claims there have been 13 “notable data breaches” in the industry in the past three years.
  • PwC’s Hotels Outlook report 2018 to 2022 which says hospitality has the second-largest number of cybersecurity breaches after the retail sector.
  • factors which make them attractive to fraudsters such as the volume of financial transactions that hotels carry out, the sensitive and valuable personal data collected, use of loyalty programs and their national and international spread.
  • ...5 more annotations...
  • dark web “chatter’ breakdown reveals Hilton had a 31% share of mentions on hacker forums followed by Marriott at 28% and IHG at 19%
  • Marriot recently revealed that its data security breach had cost the company $28 million.
  • It’s unsurprising that as the aviation industry grows and airlines look to adapt their distribution models, cyber attacks and other fraudulent activity also increases.
  • Air Europa says that as it went through its digital transformation, it needed to handle fraud more efficiently.
  • the airline industry saw a 29% decrease in fraud attacks in 2018, but the company attributes that the large data hacks involving passport details have not yet “been reused to commit air travel fraud.” 
  •  
    This article talks about how the hospitality industry has become more susceptible to cyber-attacks. Hotel companies like the Marriott have faced costly fraudulent cases online and have implemented new programs to ensure safety and security.
ryanbonifas

Sacred Rose Festival Attendees Report Thousands in Overcharges - 1 views

  • Many music fans who attended the Chicagoland area's inaugural Sacred Rose Festival this past weekend and used their credit cards while there subsequently reported thousands in surprise overcharges.
  • The fest has responded saying it was a glitch with an onsite vendor.
  • the four-digit charges curiously appeared on the customers' cards after they visited a merchant on the festival grounds.
  • ...4 more annotations...
  • Various Redditors reported that they each received surprise charges amounting to $1,190, $1,300, $1,500, $1,700, $3,200 or more. One charge of nearly $5,000 was reportedly declined by a customer's bank.
  • the glitch in venue payment processing resulted in the charges, and that they were being reversed.
  • Here is their statement: 'You may have accidentally been charged a large amount from F&B at SeatGeek Stadium when using a credit card. Our payment processing is secure but had a configuration error. There was no exposure and/or fraud; we are PCI compliant. We are reversing all of these charges and you should see the amount credited to your card in 3-5 business days.'
  • There was a technical glitch with the point of sales system regarding the tips inaccurately processed.
  •  
    The overcharge nightmare of an establishment and their quick response to guests has led Sacred Rose Festival to scramble in response to outraged customers. The festival has shared the error came with the systems configuration and are PCI compliant with no exposure to breaches or fraud, but one would venture a guess there is more to this story.
jsanc478

Why hotels need strong security for contactless check-in | Hotel Management - 2 views

  • Contactless check-ins have become an important option, allowing guests to bypass the usual check-in at the front desk and access their reserved room using their mobile device.
    • jsanc478
       
      This article talk about how the pandemic change the way hotels will operated now on for a better customer service with their guest as check ins and other updates. One ofd the principle changes will be, mobilize check in. Having the guest check in with the phone and how safe that can be for the guest. There is always fraud around that hack information on business likes this, but how hotels can protect this type of fraud, by linking digital room keys to theirs guest's mobile devices.
  • Some hotels are also allowing their guests to use their mobile devices as digital keys
  • Concerns about this type of fraud are legitimate. Yet, if hotel operators adopt a multilayered approach, it will be more difficult for fraudsters to ply their trade.
  • ...7 more annotations...
  • However, it is also an appealing avenue of potential fraud for hackers because mobile devices are one of the most common targets for identity theft
  • Limiting contactless check-in options only to certain guests,
  • Linking digital room keys to their guests’ mobile devices themselves, rather than to their guests’ phone numbers, ensures the hotel operators are communicating directly
  • Having a multifactor authentication process established for new guests or those guests who are showing a different behavior pattern than in the past
  • Implementing a notification system i
  • Developing rules around certain reservation dollar amounts
  • Every hotel operator will have to design these options based upon the needs of their hotels.
  •  
    More hotels are now using contactless check-ins by allowing the guest to be able to use their mobile devices as their digital room key. This is great for the pandemic to social distance but potentially risky due to hackers. As long as hotel operators adopt multilayer security strategies then they can provide a safe and secure environment for everyone.
Allen Lok

New Retail Credit Card Standards Affect Quick Service Restaurants | QSR magazine - 0 views

  • By October 2015, all restaurants and other merchants will be subjected to new Europay, Mastercard, and Visa (EMV) standards, which reflect a shift from magnetic-stripe credit cards to chip-and-pin cards.
  • , the chip-based cards require insertion of the card into a terminal throughout the entire transaction.
  • chip-based cards are less susceptible to fraud.
  • ...1 more annotation...
  • It’s a rather slow conversion over to EMV. But it’s definitely coming.” View the discussion thread. Subscribe Subscribe to QSR Renew Update Address eLetters Advertising Contact &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Articles Food &amp; BeverageMenu Innovations Marc Halperin: Resident F&amp;B Expert Food Safety Health Ingredients &amp; Dayparts ExpansionQSR 50 Franchising Growth Fast Casual George Green: Fast-Casual Expert Emerging Concepts TechnologyOrdering Social Media Promotions Sustainability Denise Lee Yohn: QSR’s Marketing Guru OperationsExecutive Insights Competition In the Store Consumer Trends Charitable Giving Outside Insights Women in Foodservice Human Resources Alan Philips: Trends to Watch Research QSR 50 OneSource Drive-Thru Study Growth 40 Smart Chain Franchise Opportunities Find a Supplier Find a Job Restaurant Management Events NRA Show <a h
  •  
    A new set of standards is coming up for credit card transactions. EMV or Europay, Mastercard, Visa, standards include a chip-and-pin device on the card that requires the card to be inserted into the card processing terminal. While this does not prevent all fraud, it's important that this standard is mandatory by 2015 and business operators should be preparing for changes.
yuzhu li

New Point of Sales Technology for Your Business | Family Money Values - 0 views

  • Chip based credit cards.
  • is closely intertwined with NFC and smartphones.
  • New payment services players.
  • ...4 more annotations...
  • field offering lower entry costs to small merchants
  • With the ability to pair small mobile card readers with smartphones, businesses can ensure that their employees can take payment anywhere, anytime, which has tremendous potential for never missing a sale.
  • Enhanced security.
  • the natural evolution of a technology key to day-to-day business transactions, they are also a response to fraud and identity theft
  •  
    For family run business, according to Ms. Bekiroglu, to know its business' better way is to keep up all like payment kiosks, self-check out stations, touchscreen interfaces, etc. and the most important 3 parts are the "chip based credit cards", "new payment services players" and the "enhanced security". Chip based cards is more secure and the data is single used in the transaction, and it can crack down on fraud and identity theft. New payment services players mostly means the apps. From my opinion, the important thing for the whole business world is the security part. One of my friend used the credit card for gas, however, in days, the card had been used over 4 thousands. Finding out the reason is because the leaking information at the gas station. Only the security part has been enhanced, POS systems would be more effective.
Scott Kane

FTC Files Complaint Against Wyndham Hotels For Failure to Protect Consumers' Personal I... - 0 views

  • The FTC alleges that these failures led to fraudulent charges on consumers’ accounts, millions of dollars in fraud loss, and the export of hundreds of thousands of consumers’ payment card account information to an Internet domain address registered in Russia.
  • According to the FTC, in the first breach in April 2008, intruders gained access to a Phoenix, Arizona Wyndham-branded hotel's local computer network that was connected to the Internet and the corporate network of Wyndham Hotels and Resorts.
  •  
    The FTC filed suit against Wyndham Hotels for millions of dollars worth of fraud in June of this year. Wyndham hotels manages over 7,00 hotels worldwide. Incidents occurred a numerous amount of times over the past three years. The company was hacked into and stole credit card numbers from over 500,000 clients. In the first occurrence the money was wired into an account in Russia. Even after the first incident Wyndham hotels did not fix the security breach allowing the hackers to get in.
imontenegro

Fyre Festival Organier Seneneced to Six Years in Federal Prison - 0 views

  •  
    The organizer, Billy McFarland, 26, was also sentenced for running a sham ticket-selling business - but that fraud was run-of-the-mill compared with the Fyre Festival, which had been promoted by A-list social media influencers but imploded just as publicly on Instagram and Twitter. Mr. McFarland had promised an event with luxury accommodations and performances by bands like Blink-182. But the festival never took place, leaving attendees wandering unfinished sites on the island of Great Exuma in the Bahamas.
  • ...2 more comments...
  •  
    Then in July, Mr. McFarland pleaded guilty to two more counts of fraud related to another company that he ran while out on bail that sold fake tickets to fashion, music and sports events and was said to have cost at least 30 victims a minimum of about $150,000.
  •  
    Prosecutors said that the music festival, which was to have taken place in 2017, was the product of an elaborate scheme. The festival's website identified its location as Fyre Cay, a fictional place that was described as a private island that had once belonged to the drug lord Pablo Escobar.
  •  
    In a sentencing memorandum, prosecutors had asked for a prison term of at least 11 years. They called Mr. McFarland "the consummate con artist," adding: "He betrayed and deceived his investors, customers, and employees while he was living the high life at his luxury apartment, traveling to exclusive locales, staying at luxury hotels, being chauffeured in his Maserati, and entertaining himself and his friends at restaurants, bars, and casinos."
  •  
    Summary: Billy McFarland utilized all of the tools available to hype up an event that had no validity or credibility by solely relying on social media influence to promote a lie.
mellakygg

Cloud Computing Is Crucial To The Future Of Our Societies -- Here's Why - 0 views

  • Cloud will provide the digital infrastructure of tomorrow’s cities, where an estimated&nbsp;6 billion of the world’s population will live by 2045.&nbsp;Smart elevators and parking lots, driverless cars and drone taxis, trains and subways, farms and power plants -- all will be safer and&nbsp;better managed,&nbsp;thanks to the cloud’s ability to store and analyze data.
  • The cloud will also be transformative for companies, especially small and mid-sized businesses, as data analytics, artificial intelligence&nbsp;and&nbsp;other capabilities become available as services.
  • A&nbsp;utilities&nbsp;cloud will automatically repair faults in the power grid to ensure that homes and businesses get the electricity they need.
  • ...6 more annotations...
  • A commercial aviation cloud will help airlines manage ground operations such as maintenance, fueling, baggage handling, and cabin cleaning, thereby increasing efficiency and helping flights take off on time.
  • A banking cloud will let financial institutions scan thousands of transactions per second to prevent fraud.
  • The cloud will also help society cope with&nbsp;growing volumes of data. This includes applications like high-definition video, which Huawei estimates will account for 89% of individual user traffic by 2025.
  • The&nbsp;cloud&nbsp;will support emerging technologies such as artificial intelligence and help them to adapt to new platforms such as mobile. When&nbsp;smartphone sales overtook sales of PCs&nbsp;in 2011,&nbsp;mobile became the world’s largest computing platform. Naturally, AI has&nbsp;made its way into phones.
  • Because inference needs to process data in real time, all the time, even tomorrow’s super-advanced smartphones won’t be able to meet the computing demands imposed by AI. They’ll have to rely on the processing power of the cloud.
  • In particular, video will feature prominently in tomorrow’s vehicles, providing in-car entertainment, enhancing road safety by allowing drivers to “see through” other vehicles, and making cars more secure. To thwart burglars, vandals and car thieves, many cars now have multiple security cameras. Video footage can be stored on a secure digital card inside the car or beamed up to the cloud.
  •  
    The cloud will provide the digital infrastructure for the cities of tomorrow, where an estimated 6 billion of the world's population will live by 2045. A commercial aviation cloud will help airlines. A utilities cloud will automatically repair faults in the power grid to ensure a smooth supply of power to homes and businesses. A banking cloud will scan thousands of transactions per second to prevent fraud. The cloud will help society cope with growing volumes of data. High definition video will account for 89% of individual user traffic by 2025, of which image and video content will be for non-entertainment purposes. The cloud will support the emerging artificial intelligence technologies which will be adapted to mobile use, notably the cell phones which overlook PC sales in 2011. Although driverless cars are still a ways off, it will be realized soon, thanks to the power of the cloud.
aquaholic1371

Restaurants catching on to biometrics benefits | Fast Casual - 2 views

  • The days of buddy punching time cards may be numbered for sneaky employees trying to work the system. Advances in technology and lower prices have allowed more quick-service and fast casual&nbsp;operators to adopt biometrics as part of their loss prevention plans.
  • Biometrics technology, which uniquely recognizes humans based on intrinsic physical traits such as a fingerprint, handprint or eye iris, has been around since the 1990s.
  • It replaces the keys and codes and provides optimal control in access authorization;It could eliminate or mitigate thefts by someone with unauthorized access to keys or to stock areas/back door and can track operations on the safe if the technology is used there as well;To keep up with personnel changes, controls can be implemented remotely and changes can be made quickly, saving costs of travel and changing hardware, locks, combinations, etc.
  • ...1 more annotation...
  • "First and foremost, this acts as a deterrent. It gives operators peace of mind and lets their employees know they're serious about holding people accountable when they have access to the cash drawer," he said. "If someone's drawer comes up short and only one person accessed it via fingerprint, there is no deniability there. It changes the entire atmosphere and forces people to do their jobs. It's very powerful."
  •  
    As the world becomes more dependent on technology, the opportunities to exploit or steal one's personal information becomes easier and easier. Passwords and pins can be stolen. Manager cards can be handed out or duplicated. Bio metric information is the one thing that remains a secure way to ensure proper protocols are being followed. Short of cutting off someone's finger, it is impossible to duplicate an individuals bio metric information. This is proving to be a very cost effective means of ensuring compliance to company procedures. The savings in time card fraud, or improper void protocol outweigh the expense of implementing the system. I believe that this is a sign of things to come, as our world transitions to a more electronic state; Bio metric information is the only secure means of insuring the actual "user" is the one performing the specific task.
  •  
    This concept is very interesting as I deal with timecard fraud often. However, without the option of over riding or using a paper time correction, I wonder if it would actually waste some time waiting for a manager to come and fix the problem.
  •  
    As a manager, I prefer the biometric option for punching in and out of employees. The only problem I have seen with this technology for employees is for those that work in laundry or dish washing areas. The constant exposure to heat and water on their fingers causes their fingerprints to distort temporarily. I find that I have to utillize less dominant fingers to make it work for these associates. I have made it mandatory for any associate to speak with a manager if they do not punch in or out correctly.
asant318

Skift Tech Forum Preview: Affirm's CEO on Travel Industry's Oncoming Payments Revolutio... - 0 views

  • change how travelers pay for trips by letting them use installments for flights, hotels, and other purchases
  • new forms of payment could be revolutionary in the travel industry as unbundling has expanded options for leisure travel to people at all price points.
  • The marriage of travel and e-commerce means OTAs, airlines, and hotels have had to worry about interchange, processing fees, and increased fraud risk.
  • ...8 more annotations...
  • Affirm provides honest financial products that improve lives,
  • Affirm can help travel brands capture early planners by allowing them to lock in prices when they are low as they are still far out from the travel date,
  • We’ve found that anything that costs over $250 can be beneficial when it’s broken up into payments over time
  • advanced booking windows increase significantly when paying with Affirm
  • But there are a lot of travel brands that prefer to partner with Affirm, where we can take on the repayment risk.
  • We’re seeing other OTAs, including Expedia, move towards an advance-payment model because it helps increase stickiness and reduce cancellations. Affirm complements that strategy nicely because we pay the merchant up front at booking and take on all repayment responsibilities.
  • offering Affirm as a payment option actually acts as a customer acquisition tool and helps drive conversion
  • Data security is our number one priority,
  •  
    This article contains an interview with the CEO of the payments technology company Affirm, Max Levchin. Affirm, established in 2012, is a payment technology firm that allows for travelers to pay for trips via a monthly payment plan. The company fully pays the travel provider and then is responsible for collecting the funds from the traveler. The payment does not need to be paid in full prior to travel. Levchin says that this product is attractive to companies because airline and hotels don't have to worry about interchange, processing fees and fraud. It benefits consumers because they are able to book early when prices are lower instead of "saving up" to book closer to the date of travel, when the trip is more expensive. They have seen an increase in advance bookings with Affirm for trips over $250. He suggests that this will disrupt traditional travel industry e-commerce and make travel more accessible.
cwilliamsiona

Data Security in Hospitality - Why Is It So Important? - 0 views

  • The hospitality industry has one of the highest numbers of security breaches.
  • As a result, the hospitality sector seems to be an ideal target for cybercriminals looking to carry out credit card fraud and identity theft crimes.
  • Such complex ownership structures could result in breaches as in the case of the Wyndham Worldwide breaches which occurred back in 2008 and 2010
  • ...8 more annotations...
  • These criminals infect point-of-sale systems with malware that scrapes card information. 20 out of the top 21 high-profile breaches that have occurred since 2010 have been a result of this strategy.
  • One of the more recent data breaches in 2019 - the Earl Enterprises data breach involved the theft of over 2 million credit card numbers. It is believed that the breach was the result of malware installed on POS systems at the popular restaurants run by the company.
  • Having well-trained staff is invaluable for ensuring the secure collection and storage of sensitive data. However, the hospitality industry has a very high turnover rate due to the fact that it largely involves seasonal work.
  • Just one untrained individual can give cybercriminals easy loopholes to gain access to sensitive customer data.
  • It involves employees selling customer data to third parties unknown to the management of their organization
  • High profile breaches such as the recent Marriott International data breach which resulted in the leakage of the personal data of over 500 million guests continue to drive up awareness levels.
  • Failure to provide adequate data protection can have catastrophic consequences for hospitality companies
  • Organizations in the hospitality sector can protect the data of their customers by implementing a number of best practices for mitigating the risks associated with data collection.
  •  
    According to this article, the hospitality industry has one of the highest numbers of security breaches. Due to the nature of the business, credit card fraud and identity theft crimes seem to be an ideal target for cybercriminals. Humor error, high turnover rate, and insider threats are just a few primary factors for security breaches within the hospitality sector. The consequences of data breaches can have a long lasting impact on the company, including, customer trust, tarnished brand reputation and legal and financial problems. As we all know, hotel owners and operators do not want anything to impact their revenue. Encryption of credit card information, operating a continuous training program in cybersecurity, adhering to relevant regulations, using firewalls, and a detailed response plan in the event that a data breach should occur are a few practices the hotel sector can implement to mitigate a cyber attacks.
da7327

Thomson ReutersVoice: How Technology Is Disrupting Accounting -- And Why The Industry M... - 1 views

  • It’s hard to believe the impact that technology has had on all of us, including the accounting profession.
  • Over the years, accounting firms got on board with websites, which allowed them to market differently and far more effectively. Personal client portals were introduced by Thomson Reuters in 2001, effectively eliminating geographic constraints for firms. With portals, they could serve clients 24x7, regardless of location, and communicate and collaborate far better than they could previously. The Web, mobile and social media have had an enormous impact on how firms can operate today. Social marketing has proven to be very effective in many firms. Audits have changed radically. Now they can be done online, with content also accessed online. We can research anywhere, anytime as well.
  • The next 20 years will see even more dramatic change for the profession. Artificial Intelligence (AI), cognitive computing/machine learning, natural language processing and blockchain are the hot topics today – of course, converging with big data.
  • ...2 more annotations...
  • True business analytics will come into play – given the amount of data we’ll be able to collect and the machine assistance we’ll have – to put real meaning around the data and guidance for our business clients.
  • The concept of the continuous, real-time audit will come into play, and we’ll be assisted in our judgments – although the human element won’t entirely disappear. Fraud detection will be easier and far faster. Blockchain will move the auditor’s role away from having to check transaction data, and it will be used to test audit assertions as well.
  •  
    This article describes how technology will affect accounting system, and the reason to adapt new technology. The world has been dramatically changed over 20years. Paper was dominant back in 1990' but now most jobs are done by computer and Internet, and furthermore, the monthly fee for the Internet has been going down a lot. Everyone in the world enjoys the advantages of the Internet, and job efficiency increases. Especially, this article said technology will impact accounting profession a lot in the future. When we consider the current technology development in accounting area, the Web, mobile and social media have had a huge impact on company's operation. This article introduces that artificial intelligence(AI), cognitive computing/machine learning, natural language processing and blockchain will be adapted highly in next 20 years. For example, tax systems will guide us through the calculations and highlighting review section, and provide advice. A Huge amount of data will be collected and generate real meaning about the data and guide the business. Furthermore, continuous and real-time audit will be available. Fraud detection also will be faster and easier. As can be seen here, the profession will evolve very rapidly in next 20 years, which means it will be completely different from what we see today. This disruption challenges us to catch up with the fast pace of change but the potential of new technology provides opportunity, so adjustment for new pace is needed.
atutt002

Restaurant Theft: Close the LOOP for a more complete deterrence program - 0 views

  • 2016 was the first year ever that 100% of retailers said they were victims of organized retail theft.
  • 75% of employees steal from the workplace at least once, and half will steal repeatedly
  • Internal employee theft is responsible for 75% of inventory shortages
  • ...10 more annotations...
  • stand out from their peer group for one reason (too many discounts, voids, cancels, overrings, etc.)
  • Many systems today, like Mirus, are good at Monitoring events
  • to either support (RESOLVE) or deny whether the reported exception has meri
  • Training Required / Scheduled, Terminated, Warning
  • This added visibility raises the level of accountability and ensures that action is being taken in a timely manner to follow up on any / all reported fraudulent activity.
  • Measurement
  • Fraud graphs and charts help spot trends
  • Increased Accountability
  • Minimize Fraudulent Activity
  • Improved Customer Service
  •  
    This article features an automated data gathering system that measures patterns in employee/personnel returns, refunds, etc. that can help identify misbehavior. As discussed in our discussion board about Restaurant Fraud, this type of software could absolutely assist with monitoring and accountability for employees of any level, including management. An added bonus is customer data to increase and improve service
yijingyang

Another POS breach at White Lodging - will EMV save the day? | PhocusWire - 0 views

  • White Lodging has been hit by another POS breach which has affected travelers who made purchases at its restaurant and bar operations within 10 hotels.
  • The company is clearly trying to reduce its continued vulnerability,
  • we took various actions to prevent a recurrence, including engaging a third party security firm to provide security technology and managed services. These security measures were unable to stop the current malware occurrence on point of sale systems at food and beverage outlets in 10 hotels that we manage.&nbsp; We continue to remain committed to investing in the measures necessary to protect the personal information entrusted to us by our valuable guests.&nbsp;
  • ...8 more annotations...
  • The vulnerability remained even after hiring a third-party security firm, which is something of concern to any hotel brands seeking to deploy additional security measures and analysis by third parties.
  • The thieves pretty much had everything they needed to make fraudulent purchases off guests' cards, and were able to access this for over 7 months.
  • The key to successfully managing the risks is to regularly monitor systems for any breaches and updating to the latest software.
  • But the Washington Post did some research that shows a rapid recent increase in fraud across the European continent.
  • White Lodging has been transitioning its POS to tokenization, which replaces sensitive information such as the card number with a non-meaningful token for transmission.
  • Even so, tokenization is an effective means of protecting sensitive transaction data.
  • EMV is the technology that is supposed to make credit card fraud more difficult.
  • Beyond that, insurance is available to protect against costs for data breaches — a solid measure of last resort that reduces the financial burden of a data intrusion.
  •  
    POS breach at White Lodging, huge important personal information was stolen and was able to access for over 7 months. White Lodging hire third party security firm to protect customers.The key to managing the risks are keeping monitoring systems and updating software. Besides, insurance is available to protect against costs for data breaches.
rhoff019

Pandemic relief fraud suspect, owner of Berlin restaurant, has disappeared - News - tel... - 0 views

  • The owner of a Berlin restaurant charged in April with fraudulently seeking hundreds of thousands of dollars in forgivable loans designed for businesses struggling because of the coronavirus pandemic has apparently cut off his GPS monitoring device and disappeared, federal authorities say.
  • Staveley, of Andover, and another man are accused of claiming they needed to pay employees at businesses affected by the virus crisis, when in reality their businesses, including On the Trax, 263 West St., Berlin, were not operating before the pandemic began and had no employees on the payroll.
  • They were the first people in the U.S. to be charged with making phony applications for loans
  • ...2 more annotations...
  • sought nearly $440,000 in loans claiming that he needed to pay dozens of employees at three restaurants he owned
  • two of the restaurants weren’t open before the pandemic began, and he didn’t have any connection to the third
  •  
    A so called restaurant owner applied for $440,000 in forgivable loans to keep employees paid through the Paycheck Protection Program. The man claimed to own 3 restaurants, but 2 of the restaurants were not open before the coronavirus pandemic and he had no connection to the third. The "owner" disappeared after receiving the $440,000.
‹ Previous 21 - 40 of 123 Next › Last »
Showing 20 items per page