Skip to main content

Home/ Hospitality Technology/ Group items tagged fraud

Rss Feed Group items tagged

nellyvero71

Twitter accounts of Joe Biden, Barack Obama, Elon Musk, Bill Gates, and others apparent... - 0 views

  • Twitter (TWTR) accounts belonging to Joe Biden, Bill Gates, Elon Musk and Apple, among other prominent handles, were compromised on Wednesday and posted tweets that appeared to promote a cryptocurrency scam.
  • Twitter's support account said: "We are aware of a security incident impacting accounts on Twitter. We are investigating and taking steps to fix it. We will update everyone shortly."
  • A little more than an hour after the attack began, Twitter apparently moved to prevent holders of verified accounts from tweeting.
  • ...2 more annotations...
  • A hack like this is particularly concerning not just because of any financial scam that can be run, but because so many world leaders use Twitter -- and some, like President Donald Trump, use it to announce major policy decisions. A hack that took over an account belonging to one of those leaders could have devastating consequences.
  • "We are aware of today's security incident involving several Twitter accounts belonging to high profile individuals," the FBI's San Francisco field office said in a statement. "The accounts appear to have been compromised in order to perpetuate cryptocurrency fraud. We advise the public not to fall victim to this scam by sending cryptocurrency or money in relation to this incident."
  •  
    The article is about what was happening today with some Twitter accounts, such as Former President Barack Obama, Mike Bloomberg, Bill Gates, Kanye West, Kim Kardashian West, Warren Buffett, and Jeff Bezos. Apparently the accounts were hacked and were asking people for money. It is a clear example of cyber attack with Twitter's account.
abroo041

Must-Know Event Technology Trends for 2020 | Social Tables - 3 views

  • In addition to speeding up registration time, incorporating RFID technology into events will help with both qualitative and quantitative data analysis, thereby making it easier for planners to target what worked during their event and what didn’t.
  • Though event apps are admittedly helpful, they now have a new hurdle to face. Producing an application to be used for one event is costly, time consuming, and inefficient, as users must learn how to interact with the app for each new event attended. Phone storage space is very important to consumers. Many are hesitant to download an application that they will only use once. Thus, event apps that can continue to deliver value to customers beyond the date of the event itself, are going to become a huge trend.
  • RFID also has the potential to allow attendees to become more engaged with the event across various social platforms.
  • ...71 more annotations...
  • Menu options, travel directions, appointment updates, facial recognition software and contact information are just the beginning of the very real ways that event planners will soon be able to use wearable tech.
  • Event technology trends aside, the number one thing for any event professional to remember, is to let your tools work for you, rather than the other way around. The purpose of implementing advanced technology is to make your life, and the life of those whom you plan events for, as easy as possible.
  • 5G will also make it more feasible to incorporate the cutting-edge into event experiences.
  • Projection mapping is the act of creating an augmented reality experience with the help of projectors.
  • this visual technology proves to be an efficient and cost effective way to create optical illusions in nearly every location.
  • event technology adoption can increase attendance by 20%, increase productivity by 27%, and decrease costs by as much as 30%.
  • branded apps provide limitless opportunities to interact with consumers right on their own phones
  • Apps can be customized to appear as if they were created specifically for events or stays, while offering functionality that serves to enhance and personalize the attendee experience.
  • Planners can utilize branded multi-use apps to connect with attendees and engage them on a variety of levels before, during, and after the occasion.
  • Event spaces can create customized apps to enhance experiences and share things like helpful facts, historical tidbits, and even the personalities of their unique employees,
  • Because they’re often cloud-based, these programs also provide accurate, customizable, and collaborative project planning that’s accessible by all managing parties
  • With event diagramming software, both event planners and venues are able to map everything out visually
  • provides helpful tools like drag-and-drop diagramming, 3D walkthroughs, and seating software on a single platform.
  • Hotels especially can use apps in this way, allowing guests to control their rooms from their phones and even communicate with chatbots to find nearby attractions.
  • Projection mapping5GBranded multi-use appsEvent diagramming
  • It also opens up new possibilities for app developers to push the boundaries of current event tech trends
    • abroo041
       
      The world of technology is advancing every day. As technology grows and advances, so does its use in the events industry. This blog post discusses some of the technological advances that have made their debut in the events industry and how they can improve an event, how they help the event planner and venue, and even shows us examples of how they are used in real life. It gives statistics on how these technologies have benefit events. For example, when the blog post speaks about gamification, it mentions that "gamified events see a 44 percent increase in engagement". The post is not only suggesting to us that adding gamification is a good idea for future events, but it shows us how well gamification works.
  • Knowing event technology trends—and adopting the most valuable ones—gives planners and venues the competitive advantage
  • Studies show that using event technology can increase attendance by 20 percent and increase productivity by 27 percent. 
  • Each match automates personalized actions, such as printing a badge with the attendees name, sending an email with a scannable lunch voucher, and finalizing a swag bag for their ticket-tier (no sense creating swag bags for no-shows).
  • The technology speeds event check-ins, improves security, and helps businesses at tradeshows collect more valuable leads by tracking attendee visits to booths.
  • can also use facial recognition to watch for crowd flow bottlenecks and collect session attendance data so you know what worked—and what didn’t.
  • The ability to support advanced tech like facial recognition makes venues more attractive to corporate planners. The technology also allows automation at certain access points, which means lower manpower requirements and lower costs. 
  • Properly integrated apps add value to events, providing attendees with more opportunities for networking, interaction, and engagement with peers, speakers, and exhibitors.
  • Offering tech to support projection mapping provides bang for the buck. There’s no need to physically construct or deconstruct any part of your exhibit hall to add this fun, popular technology to your toolbox and draw more events. 
  • This visual technology is an efficient, cost-effective way to create optical illusions on anything—from cars to landmarks to stages.
  • With tradeshow or conference maps, speaker bios, and schedules in the event app, there’s no need for bulky information packets. Push notifications in the apps help keep attendees informed and on schedule. Planners can also use apps to personalize the event agenda through live polling and attract event sponsors with the option of targeted attendee surveys.  
  • Event spaces can create customized apps to share helpful info like maps, historical tidbits, and even the personalities of their unique employees
  • Easy-to-use 3D event diagramming software provides accurate, customizable, collaborative project planning regardless of venue design or size.
  • Give clients peace of mind and leave nothing to chance on the big dayUpload a floor plan to work with, so you know the diagram is to scaleTake clients and stakeholders on 3D ‘fly throughs’ to clarify your visionPlan seating charts and manage attendees’ meal choices or other preferencesHelp staff easily identify and accommodate VIPs and guests with special requests
  • Sales reps can collaborate with planners in real time, share variations on the event proposal, and visually portray upsells.
  • Attendees can use this tech to follow slide presentations, participate with quizzes and polls, take notes, and engage in text-based Q&A. They can also view graphs, tables, videos, and other content; and follow website and social media links. 
  • Any speaker can keep an audience attentive and engaged with this technology, leading to good reviews and a successful event.
  • Supporting second screen tech for presentations is much less expensive than making physical upgrades that aren’t in the budget. 
  • This data underscores the importance of social media sentiment analysis in monitoring your brand and messaging, keeping an eye on competitors, and making improvements to services during and after events.
  • Tracking attendee activity on social media during an event provides actionable data to help you make adjustments in real-time
  • Replenishing food and beveragesEasing show floor bottlenecksDriving session attendanceAddressing technology issues (mobile apps, Wi-Fi, or audio/visual)
  • Venues can social media sentiment to promote popular services and learn where there’s room for improvement:
  • Wristbands and smart badges using near-field communication (NFC) chips keep disruptions and lines to a minimum, thereby increasing attendee productivity and engagement.
  • Access different event areasExchange information with peersReceive exhibitor marketing materialMake cashless purchases
  • Wearable tech helps you speed-up check-in, control access, and monitor attendee behavior with less staffing. It also improves ROI for exhibitors, who can drive attendees wearing the tech to visit a booth of interest based on an individual’s profile.
  • On-site staff can use real-time data to learn when they need to offer overflow rooms or investigate security breaches, such as non-VIP guests in restricted areas. 
  • Indoor wayfinding helps attendees navigate exhibit halls with ease,
  • gather useful attendee behavioral data, send leads to sales team members in real-time, and build attendee profiles to send targeted messaging
  • You can also incorporate proximity advertising options as a value-add for exhibitors and sponsor
  • Post-event, you can utilize IPS data to see where attendees spent their time visiting booths and attending presentations.
  • Adding hotel bars, restaurants, spas, gift shops, and other amenities to the location map can help drive additional revenue during events while improving the attendee experience
  • store attendee admission information on their person, helping to detect fraud and streamline access
  • Attendees can review their travels throughout a tradeshow and see who they interacted with, while exhibitors are notified in real-time when sought-after prospects come into their booth.
  • Planners can generate pop-up directions for attendees based on their location at an event instead of investing in producing/shipping/replacing physical signage
  • validates your event and highlights improvement opportunities by tracking session popularity, length of attendee visits to exhibitor booths, and strong tradeshow traffic.  
  • RFID and beacon technology helps security and general event staff do their job better in real-time, which is essential for building trust and streamlining crowded events
  • event planners are turning to venue sourcing platforms to connect with the perfect site for their particular event.
  • discover detailed venue layouts, capacity ranges, and on-site services
  • Venue platforms offer exceptional ROI and generate more leads through improved discoverability.
  • Convey elements that make your venue uniqueShowcase your event spaces visually with accurate floor plans, 3D diagrams, quality photos, and videosLeverage the success of past events with testimonials and social media accolades
  • artificial intelligence (AI) tech is using badge scans, social media info, and other behavioral data to match attendees with people they should meet or seminars they may want to attend. 
  • Instead of taking-up significant time pre-event and on-site manually recommending seminars, exhibitors, and sponsors to attendees, AI can do it for you—even in real-time—based on their profiles and preferences captured during registration. 
  • it requires transparency and advance notice about how you may use data submitted by attendees. 
  • Attendees entering the geofenced area triggers predetermined actions, such as event check-in, push notifications, or advertising related to the event. 
  • Planners can sell geofencing to exhibitors and sponsors to reach attendees at events, or even promote their event on attendee devices at a competing event under a separate geofence. You can also provide attendees with a better experience via seamless registration and check-in, along with automatic app downloads as soon as they walk on-site.
  • provides analytics, both post-event and in real-time to help you better understand things like the duration of an attendee’s time at an event and overall peak attendance. 
  • Hotels can serve ads promoting their brand, facility, and services to attendees at events
  • once a prospect visits an event website, ads for that event will appear on any subsequent websites the prospect visits, in the form of website banner ads, search engine results, and pop-up or push ads on mobile apps. 
  • Event marketing teams should develop relevant and creative ads with clearly visible event dates to convince prospects who have visited an event website, but haven’t yet registered
  • venues can use it to generate return visits from event planners
  • retarget attendees during events with offers for in-house services like food and beverage, spa, and discounts on extending their stay.
  • Gameplay creates an immersive attendee experience, while generating leads and booth visits for exhibitors via quizzes, scavenger hunts, and trivia on mobile apps.
  • Gameplay fosters a sense of common purpose; creates an environment of collaboration and trust; facilitates easier communication; and boosts attendee confidence. You can also gather information about attendee engagement and interests via game choices.
  • Promoting the use of gameplay on-site showcases a venue to organizations looking for facilities supporting team building exercises as well as immersive attendee experiences.
  • Event technology is a term used to describe all of the digital tools and software used in the events industry. Everything from check in & registration, to diagramming, to social media tools, and more can be considered event technology.
  •  
    RFID, event applications, wearable technology, virtual reality, and social media are upcoming popular uses for event planners. With RFID event planners are able to keep better track of the guests attending the event as well as keeping them more involved. I first heard of this a few months ago when attending an event and it described that a chip with RFID was placed inside the wristband-type ticket. For me, the most interesting thing is the wearable technology! Imagine an event where you can have directions given to you or a layout of the event right on your wrist! Also, the watch can notify you of events happening within an event or you can see order your food or see the menu. To know that soon enough it will be a norm for everyone to have some type of wearable technology and that event planners can truly get the guests involved through this use is exciting.
  • ...2 more comments...
  •  
    This article discusses five major event technology trends. The first is RFID, which can assist in registration time but even more important is being used to gather both qualitative and quantitative data analysis. This kind of data acquisition is great because it allows for planners to analysis, study and understand what worked and didn't work for their events. The second is multi-use apps. These apps allow the event to incorporate important aspects like activities, scheduled break down, and speaker info all at once. Additionally these apps allow attendees to socialize with other participants, and expand their network. The other technologies are some that can definitely change the industry once they are fully integrated. These include: wearable technology, virtual reality, and social media.
  •  
    Nowadays the event planning becomes more and more popular. With the development of event planning, we have 5 event technology trends shaping the future of event planning. The first on is RFID-radio frequency identification. In addition to speeding up registration time, incorporating RFID technology into events will help with both qualitative and quantitative data analysis, thereby making it easier for planners to target what worked during their event and what didn't. In this way, it will be easier to foster repeat attendees. The second one is multi-use apps. It's easy to use apps to solve problems. event apps that can continue to deliver value to customers beyond the date of the event itself are going to become a huge trend. The third one is wearable technology. Like google glasses should be a trend in the future. Facial recognition and contact information make the event planning more easier. The fourth one is VR. VR is a great way to up attendee engagement during events. The last one is social media. Social media will be a really important trend. Social media is more than likely the way that investors and sponsors will advertise your event.
  •  
    This article introduces four new advances to technology that help ease the process of event planning. Projection mapping, 5G, Branded multi-use apps, and event diagramming.
  •  
    This article shares the technology innovation with meeting/convention operations and how these technology help offer better guest satisfaction.
qyang010

The Top 10 Technology Trends Of The 4th Industrial Revolution - 0 views

  • 1.   Artificial Intelligence & Machine Learning
  • 2.   The Internet of Things (IoT)
  • 3.   Big Data
  • ...7 more annotations...
  • 4.   Blockchains
  • 8.   The 5G Network
  • 5.   Cloud & Edge Computing
  • 7.   Autonomous Vehicles
  • 6.   Robots & Cobots
  • 9.   Genomics & Gene Editing
  • 10. Quantum Computing
  •  
    Top 10 Technology Trends
zihanwang

Data Security in the Hospitality Industry | CSU-Global Blog - 0 views

  • Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there’s a franchisor, an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. In fact, it was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • Well-trained staff also know how to recognize social engineering attempts, and they understand an organization’s compliance requirements. The risk is that the hospitality industry involves a great deal of of seasonal work in which people might move on after only a few months, or they might be transferred.
  • ...14 more annotations...
  • This type of data risk is more subtle, and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests’ data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data.
  • the job turnover rate in hospitality is as high as 90 percent
  • High Staff Turnover
  • From the perspective of cyber criminals, hospitality appears to offer an ideal target for conducting crimes, such as identity theft and credit card fraud, due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • Information security is a pivotal aspect of many industries
  • Complex Ownership Structures
  • Reliance on Paying By Card
  • Here are five of the biggest data security concerns in the hospitality industry:
  • Compliance
  • Insider Threats
  • Best data-protection practices for companies in the hospitality sector include… Always encrypting payment card information.Operating a continuous training program in cybersecurity to maintain a well-trained workforce.Always adhering to relevant regulations, such as PCI DSS.Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats.Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker.Know where your data is and enforce the principle of least privileges to limit acce
  • ss to sensitive information.
  • organizations in the hospitality sector are better placed to implement a comprehensive information security strategy that entails the necessary procedures, processes, and people to improve cybersecurity within the hospitality industry.
  •  
    The article talks about cyber security threats in the hospitality industry. Threats range from high staff turn over so staff isn't trained thoroughly, to insider threats where employees can sell information to third parties, to Cyber-criminals who infect POS systems with credit cards.
  •  
    Data information security is very important to a business development.In my opinion, I think the relationship is inversely proportional. In other words, the more effective cyber security budget is invested, the less potential impact there is of customer information being stolen (being hacked). Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
cmick006

Hackers Target WHO, COVID-19 Research Firm with Cyberattacks - 0 views

  • The Office for Civil Rights recently warned healthcare providers that hackers have increasingly impersonated health agencies tasked with the Coronavirus response, as well as the FBI and the Department of Justice.
  • , healthcare organizations need to be reviewing and discussing their data protection strategies as more work shifts into the remote environment to ensure they’re protected in the event of a compromise.
  • “It is a critical time to make sure all your data is backed up, especially as many of the company assets are moving out of the office,” he added. “If it’s critical to always have your systems running and you could not afford the downtime to rebuild your systems, you need more than just cloud backup and would need to implement a disaster recovery solution to continue your operations with minimal downtime.”
  •  
    Cyberattacks on health organizations. These organizations need to implement better data protection. Personal and medical data has been hacked and there is a continuous effort put forth to breach the systems that house this information. With more and more companies researching potential vaccines and remedies for Covid, now more than ever, organizations must have more than just cloud backups; disaster recovery plans should include offsite backups at a minimum.
cleon087

How technology is transforming hotel point-of-sale systems | Hotel Management - 3 views

  • Technology has transformed point of sale into point of experience
  • elf-ordering via their smartphone by the pool or wherever they happen to be and increased guest satisfaction with guest payment
  • Because the staff members have appropriate intelligence readily in their hands, personalization can happen
  • ...21 more annotations...
  • easy to summon service in “non-F&B” areas
  • The card data is processed only by the payment gateway to/from the acquiring bank and only the final transaction approval code is passed to the POS, without the card data
  • The hotel F&B space continues to show growth, with overall consumer spending increasing 4.9 percent in 2017 and showing a robust 5.5-percent annual growth since 2011
  • associated mobile apps have the potential to increase top-line [food-and-beverage] sales in hotels by 5 [percent] to 10 percent without significant costs
  • hotel food-and-beverage revenue per occupied room increased 1.6 percent during 2017. F&B RevPOR reached $105.56, up from $103.93 in 2016, according to STR.
  • POS vendors have moved away from storing card data on their application and network. Many vendors no longer pass through or process any card data on their POS systems. Rather, they link and integrate to certified payment gateways. Payment devices are encrypted and secured, and client card data is always encrypted and totally separated from the POS terminal.
  • Technology is allowing for an extreme and pronounced change in point-of-sale systems
  • Mobile POS provides several benefits for hotels and guests alike. With mobile POS, the speed of service is dramatically increased because the staff can bring mobile ordering directly to guests, anywhere on property
  • POS technology has been a great partner in these efforts by making POS systems easier than ever to use, and mobility plays a role in impacting the increase in consumer spending, Wisell said
  • Call-for-service technology, deployed tableside and in under-serviced areas such as lobbies, coupled with mobile ordering apps, offer hotels an opportunity to increase sales
  • Mobile POS also lays the groundwork for future integration with artificial intelligence or customer-relationship-management systems.
  • “Hotels can spend millions of dollars on a remodel but if they don’t have the right point of experience, it can still result in a one- or two-star rating,” he said.
    • cleon087
       
      This shows that importance of POS, and how it can transform a business for the good or bad.
  • Mobile is now
    • cleon087
       
      People are starting to expect this, they even want more of a variety of different ways to pay that can be determining if you get business or not.
  • Hinojosa said
    • cleon087
       
      Were always looking for a way to make the experience more personalized and this is one way.
  • with
    • cleon087
       
      When guest get their food quicker and accurately this helps the experience and revenue.
  • they are the face of the property
  • u recognize them and are honored they are here with you again.”
  • “Whenever a guest is seated in the lobby and wants a take-away coffee, they can order one and not only when a staff member notices the guest in a restaurant,
    • cleon087
       
      This is really good because it is hard as a front desk agent to give attention to the guest since the moment they step in but with this they can request their snack or drink that they want.
  • While there is interest in the potential of AI and chatbots for roomservice and self-service ordering, these are not yet ready for a widespread rollout at this time, Wisell said.  
  • “Data scientists can be used in the back of the house on the kitchen side, too—optimizing the production line,” he said. “Looking at the analytics behind the performance will reduce the wait times in the front of the house.”
    • cleon087
       
      This will optimize performance
  • hotels don’t want to cross the line into creepy.
  •  
    Mobile POS has boosted F&B growth due to the ability to complete sales much faster and from non-F&B serviced areas of the property. The mobility contributes greatly to the increase in customer spending. With this mobility, companies must ensure compliance with PCI standards, and ensure that no credit card information is stored directly on the POS terminal. The article also touches on the subject of tokenization, and the usage of technology to secure a "token" rather than actual card data aids in reducing security risks.
  • ...4 more comments...
  •  
    This article was about how technology has had a great influence on point of sale systems within the hospitality industry. According to a senior director of product manager at Agilysys, Mike Hinojosa, he states that technology has transformed point of sale into point of experience. I personally agree with this because lately I expect hotels to have the latest in technology when it comes to POS and when I encounter a poor POS I automatically think they lack in providing the best for their guests. This article talks a lot about how mobile POS provide benefits for both parties and how it has increased guest satisfaction. "With mobile POS, the speed of service is dramatically increased because the staff can bring mobile ordering directly to guests, anywhere on property." According to this article, POS systems help boost F&B spending growth and they have become more secure throughout the years. "The hotel F&B space continues to show growth, with overall consumer spending increasing 4.9 percent in 2017 and showing a robust 5.5-percent annual growth since 2011, according to Technomic". It's said that mobile POS has helped F&B growth because it gives users the ability to into quicker sales and in different areas throughout the properties. For example, a waiter walking around a pool taking orders instead of having the guests walk to the poolside bar to place an order. Collecting payment has also become safer and easier with POS systems because of the PCI standards.
  •  
    Technology is allowing for an extreme and pronounced change in point-of-sale systems. The speed of service for the guest in a hotel has dramatically went up because of point of scale systems. It is more convenient and quicker for guests to get things or to order things.
  •  
    This article is about the employment of technology in the hospitality industry.
  •  
    This article is about how technology is transforming the POS experience by providing a more advanced security solution and a mobile platform. The article highlights how this new technology supports both the client and staff experience. The technology also provides a financial benefit in increasing sales by 5% and reducing cost by 10%.
  •  
    POS Technology has developed majorly over the past years. Growing developing offering mobile devices that can help workers pace themselves and generate more sales. These programs also offer extra data security to protect the clients information against fraud. This device is perfect for sport arenas, bar, golf course and more open outdoor and large venues that cater to voluminous crowds.
  •  
    This article is about the benefits of technology in POS systems. It shows how the technology can personalize the experience of the guest by having them be able to order from the moment they step into the lobby. The article also discusses how all the technology is good but in the hospitality we are walking on a fine line that we don't want to cross to creepy with biometrics. Technology offers efficiency in speed and will give a better experience. Not only this but it talks about how POS is becoming more secure, and how people want to pay in different ways.
anonymous

E-Business: The New Management Challenge - A Peer-Reviewed Academic Articles | GBR - 2 views

  • The Internet is turning business upside down and inside out.
  • This article will examine the roots of this e-business movement and the key challenges it creates for managers who must move rapidly to adapt to the new competitive forces of the network era.
  • Fed-Ex was an early mover in implementing this concept when it initiated the service that allowed customers to track their packages on the Web.
  • ...23 more annotations...
  • E-business is an evolutionary step in the convergence of the business process redesign movement
  • “anytime, anywhere;”
    • anonymous
       
      Tis is defiantly the mentality of people raised around technology. If I can't get what I want , when I want, then I DO NOT WANT IT.
  • lowering inventory costs and eliminating the risk of stale products on the retailers’ shelves.
  • The Web now provides a new channel of distribution that allows producers who formerly had to go through retailers to reach the end user directly.
  • new online stores have, in turn, increased demand and the number of users, putting pressure on traditional retailers to create an e-commerce presence as well.
  • Management Issues
  • Developing a corporate climate for adapting to the network era.Understanding customer expectations.Analyzing the firm’s ability to manage information technology.Recognizing the time frame in which these changes must be made
  • By linking retail data directly to the manufacturing site
  • new pragmatic issues to address
  • Providing security for the customer is crucial,
  • benefits include the option of developing a number of applications concurrently instead of being limited to in-house resources
  • the Net is giving rise to numerous “infomediaries” – some of whom play the role of “information broker” or “market maker” and others who perform information-handling tasks.
  • eWallet acts as an information-handler by providing online purchasers a way to automatically provide their information to any vendor.
  • almost all E-business success stories are characterized by new ventures whose founders recognized the vulnerability of going concerns that were not adapting to these opportunities.
  • E-commerce continues to expand consumer choice by providing the tools for them to switch suppliers instantaneously, including the ability to quickly and easily make price comparisons.
  • Web technology is characterized by rapid breakthroughs in software and hardware.
  • application solution providers (ASPs) who offer an opportunity for firms to outsource their IT management.
  • Fraud is higher in cyberspace than in traditional retail and harder to detect.
  • experience with Internet initiatives has been the urgency to develop and implement competitive Web strategies.
  • Similarly, Barnes and Noble took a “wait and see attitude” toward Amazon and now finds itself having great difficulty in increasing its market share of Web sales.
  • the cost barrier to entry in the web market is virtually zero
  • small new companies do not have a formal infrastructure through which strategic ideas get squandered.
  • The management task is to leverage these opportunities quickly to sustain or enhance competitive advantage.
  •  
    This article talks about the importance of having an online presence. It is imperative that businesses leverage their business opportunities online before they are gone. It talks about key issues managers deal with during this network era. Such as "understanding customer expectations", "analyzing a firm's ability to manage information technology" and moving quickly enough to implement the changes necessary to actually benefit the company. In 2020, if businesses do not have an online presence they might as well not exist. Especially when customers have a "right now" mentality. This article helped me understand the issues that are arising with companies not being involved in e-business.
marble_bird

Modern information technologies in the hotel business: development trends and implement... - 0 views

shared by marble_bird on 08 Jun 20 - No Cached
  • Today, the process of digitalization of the Russian economy has a significant impact on hospitality industry.
  • Digitalization is becoming a major trend, which is evident in the distribution models of hotel services, and also actively comes to the sphere of automation of internal business processes
  • Digital innovations are gradually becoming the new standard of hotel service
  • ...34 more annotations...
  • digitalization of hotels also includes introduction of advanced solutions for analytics and security.
  • Digital security systems can not only track the slightest disturbance of the public peace, but also provide additional information.
  • At present day, it is too early to assess the effectiveness of some recent innovations, that are related mostly to the hotel's image and attract customers.
  • The main trends in the use of modern technologies in hospitality industry in the conditions of digitalization of the economy are presented in figure 1.
  • The main disadvantages of traditional technologies include the following: local server requires regular maintenance from the system administrator; access to database is restricted by local network facilities; connection speed is limited by the speed of a local provider and divided among all who are drawn to the sever database
  • Artificial intelligence plays an equally important role in improving the efficiency of public catering enterprises.
  • Use of artificial intelligence also allows to analyze the work of the restaurant, and to detect violations of rules by the staff via control of bills, number of the discount card uses, as well as the number of cancellations and deletions of checks.
  • The issue of privacy that characterizes traditional tourism industry is also addressed through blockchain technology, minimizing exposure to sensitive data in the face of existing problems with cyber attacks and fraud in traditional financial services.
  • if the concept of hospitality industry enterprise changes, it is possible to change the composition of paid licenses.
  • Almost all companies in hospitality industry have started to think about using chatbots to solve specific business problems [9].
  • One of the ways to get competitive advantages for accommodation facilities is to invest and use new technologies. In this regard, augmented reality is the most promising technology for the modern tourism industry. its development and application can increase the competitiveness of destinations.
  • Augmented reality can be used to interact with guests before, during, and after their stay.
  • Augmented reality technologies can be used to stimulate travel purchases (the effect of being present in a hotel room, as well as demonstrating the environment and local services using a virtual reality headset). Also, virtual and augmented reality, including those with tactile sensations, can be implemented by digital concierges to issue recommendations to the client on various issues and types of recreation
  • The API allows one hotel technology system to automatically (i.e., without the participation of hotel employees) interact with another technology system and gain access to its functionality.
  • The largest companies develop APIs for clients or internal use at some stage.
  • The result of the analysis of cash transactions is a regular analysis and detailing of violations, categorization of violations, development of measures to counter violations, training of personnel [13].
  • With the help of speech Analytics tools, specialists can work with 100% of requests. To do this, all dialogues are translated into text and analyzed using a special system.
  • Based on this analysis, you can develop a change program for existing procedures and processes and optimize self-service systems (personal account, website).
  • The result of the introduction of innovative speech analytics technologies will be an increase in sales efficiency, an increase in loyalty and customer satisfaction, a reduction in service costs without loss of quality, and behavioral analytics.
  • Currently, biometrics can already be used to identify and confirm the client's identity. Face scanning technologies when registering with the service.
  • Analysts predict that the international market for biometric solutions for the hotel sector will grow exponentially in the coming years. Biometrics, as the most reliable and accurate authentication system, can provide real-time information about employees and their use of their working time.
  • The result of using this technology is payment without wallets and Bank cards, increasing the speed of customer service, and a high level of security.
  • In 2018, Amazon presented a special version of the voice assistant for hotels — Alexa for Hospitality, which is currently being tested in Marriott hotels.
  • At the same time, the use of Echo speakers in hotels raises concerns about the privacy of personal data. Amazon claims that audio recordings of the guest's voice commands will be deleted every day, and the hotel administration will not have access to both request records and response records.
  • IT outsourcing is the transfer to a third-party contractor (outsourcer) of all or part of the functions for servicing the organization's information needs. Currently, this technology is becoming increasingly common in the hospitality industry.
  • The main point of switching to outsourcing is to optimize the company's costs while significantly improving the quality of services provided. The main criteria for outsourcing are the lack of competitive advantages and not the strategic position of this operation or function for the company
  • The main problems of implementing information technologies in the hospitality and tourism industry include the high cost of these developments, the duration of staff training processes, and the adaptation of the built system of business processes of enterprises.
  • The problem is also the difficulty of attracting investment in the hotel business
  • Another problem with the introduction of information technology in the hotel business is the lack of relevance of regulatory documents and legal barriers to the introduction of innovations
  • In addition, the introduction of modern information technologies in the hospitality industry is complicated by the level of technical and technological complexity of implementation projects.
  • nformation technologies are improving at a rapid pace
  • In the leading Russian hotels that are part of the global hotel chains, the work is fully automated, technological, and has its own computer and Internet services. Such hotels already have a successful experience in implementing modern information technologies.
  • Customers of the hospitality industry already have a lot of experience in using mobile devices.
  • Digital marketing is becoming a key channel of communication between the hotel and the network. At the same time, only the implementation of continuous data collection, processing, analysis and aggregation tasks will allow the management of hospitality enterprises to achieve one of their main goals - to better understand their customers and interact with them.
  •  
    This article describes trends in technology in the hotel industry and the applications of them in the Russian economy. The article discusses what the trends in IT are and how they may apply to the hotel sector of the hospitality industry, providing real-world examples and hypothetical scenarios. The information in this article is insightful to the relationship between hospitality and information technology and provides a perspective on this relationship from the viewpoint of the Russian hotel economy specifically.
tredunbar

7 POS Trends for 2020/2021: Latest Predictions You Should Be Thinking About - Financeso... - 2 views

  • global point of the sale terminals market is expected to reach USD 108.46[1] billion by 202
  • One of the biggest POS industry trends right now is mobile payment transactions which saw a 40.2% year on year growth[2]
  • it’s also important to have a reliable billing and invoicing program together with your POS sale
  • ...30 more annotations...
  • 54% of consumers[4] in the US preferred to use their debit cards to make payments
  • 46% of US consumers rarely use money[4] anymore
  • 45% have security as their top priority. Offering a secure payment method improves the trust your customers have with your business.
  • using mobile devices like tablets and mobile devices to make transactions faster
  • 53% of retailers and business owners are upgrading their POS[3] systems
  • Asia Pacific countries have fully embraced the use of mobile payment methods. eMarketer found that more than 45.2% of China’s population use mobile payment[8] for their everyday use. 
  • 61% of quick-service restaurants in the US have embraced cloud-based POS[5]. In fact, 60% of new merchants are asking for cloud POS[6] rather than legacy POS.
  • 61% of merchants[7] are looking into getting cloud-based POS
  • Cloud-based POS replaces all of that with a single app. Any update will come from the cloud to whatever device you are using.
  • you can make the transition to the cloud-based system slowly
  • Most cloud-based POS can integrate with the programs that your business is already using
  • Accepting mobile payments for your business is easy. It mostly consists of scanning codes or tapping the smartphone on the terminal and authenticating the transaction
  • Mobile POS offers convenience as it takes the point of sale system to the customer, rather than the other way around
  • Accepting mobile payment methods allows lines to move faster and gives your customers a sense of satisfaction
  • Mobile payments are safe to use. A lot of these systems are EMV compatible and use the latest secure credit card processing technology to protect you and your customers
  • 15% of businesses in the US are already using AI-enabled POS
  • Prevent fraud and ensure customer information is secure through an AI
  • AI can personalize a customer’s behavior and offer relevant product displays based on their past purchases
  • AI lets you know your customer’s buying habits. That way, you can order more of what’s being bought, increasing profits
  • 83% of shoppers are willing to provide their information[11] in exchange for a personalized experience
  • Get insights on what your customers are purchasing more of. This gives you an idea of what they are going to buy next based on their most recent purchase from your store
  • create a comprehensive marketing strategy that can help promote your brand and products
  • present real-time data in an easy to understand format like a graph
  • payment options include smartphone payment options that support RFID like Apple Pay, Samsung Pay, and Google Pay
  • instead of waving the device over the POS terminal, customers will need cellular data to complete the transaction
  • A mobile POS system often consists of a tablet that accepts card, cash, and mobile payment options. Additionally, these systems can also be used as a standalone register for a self-checkout kiosk
  • a reliable POS system, you can easily keep track of everything in your store
  • It can also serve as a digital menu, where customers can input their orders. The orders will be sent directly to the kitchen, encouraging customers to order more
  • Rather than giving the card to a server and letting them run the transaction at the counter, customers can pay from the table
  • retail shops that offer self-checkouts, you can make your mobile POS into a static till
  •  
    The article focuses on trends that companies utilizing a POS system should look at deploying. Bolstered by figures supporting the success of the emergent trends, the article seeks to encourage operators to make the move sooner rather than later. The most prominent trends revolve around more efficient payment access. Customers appreciate the speed and available payment options. Companies are also able to manage customer data effectively and securely while also managing inventory and marketing. AI integration is also a forward trend that is allowing businesses to tailor their tactics to each customer individually. Perhaps the most important trend that is affecting other transaction systems as well is cloud based POS.
khadija2050

What is an Human Resources Information System (HRIS)? A Full Guide - 1 views

  • used to collect and store data on an organization’s employees.
  • be cloud-based
  • . This means that the software is running outside of the company’s premises, making it much easier to update.
  • ...35 more annotations...
  • these systems are also called Human Capital Management systems, or HCM. In this article, we will use the terms HRIS and HRIS systems interchangeably.
  • keeps track of changes to anything related to employees
  • ability to offer self-service HR to employees and managers.
  • This includes material for the identification for employees in case of theft, fraud, or other misbehaviors, first contact information in case of accidents, citizens identification information for the tax
  • one plac
  • the tracking of data required to advance the HR and business strategy. Depending on the priorities of the organization, different data will be essential to track. This is where the HRIS comes in.
  • Record-keeping
  • time and attendance data from employees
  • Payroll automates the pay process of employee
  • is benefits management
  • This software handles all the company’s recruiting needs. It tracks candidate information and resumes,
  • allows HR to track qualification, certification, and skills of the employees, as well as an outline of available courses for company employees. This module is often referred to as an LMS, or Learning Management System, when it’s a stand-alone
  • talent pipeline and having replacements available
  • having employees and their direct supervisors manage their own data
  • involves the analysis of this data for better-informed decision making. We’ll explain more about this in the section below.
  • databases that record a company’s transactions. An example of a transaction is when an employee joins the company.
  • It includes modules on talent management, workforce rewards, workforce management, and work-life solutions.
  • They simply haven’t been designed for this. In addition, not all HRIS systems have all the above functionalities build-in.
  • as it means that data is dispersed into multiple systems. In order to report data, a new layer needs to be added on top of all HR systems to report and analyze the HR data.
  • These include Workday, Oracle, SAP, ADP, Ceridian, Kronos, and more. Listing all the HRIS suppliers would be impossible, so we decided to explicitly mention the four HCMs that are considered to be leaders.
  • they offer different suites including recruiting, learning, performance management, and an e-learning LMS.
  • Workday is arguably one of the best-known HRIS out there
  • These are systems that keep track of a company’s resources, which include among other things financial assets, orders, and people. In 2011, SAP acquired SuccessFactors,
  • . They are
  • HR, payroll, and talent management. Systems include time and attendance, onboarding, performance management, compensation, succession
  • on-the-job training to HR professionals in the use of the system. This function is usually in the IT arm of the HR department.
  • provides support for the HRIS. This includes researching and resolving HRIS problems and being a liaison with other parts of the business, like finance/payroll.
  • This means improving the employee experience in using the systems, coming up with user-friendly innovations, and implementing new policies to be reflected in the system.
  • IT is useful to understand the intricacies of the system while HRM helps to understand the processes that the HRIS is supporting.
  • the specific demands of the different stakeholders inside the company are inquired about.
  • you choose an implementation partner,
  • Here the functional and technical requirements for infrastructure,
  • a core test team is created.
  • communication plans need to be created, and Frequently Asked Question and other support documents created to benefit the software implementation and uptake.
  • the system can Go-Live. Feedback needs to be constantly collected and training material updated with the evolving systems. Cons
  •  
    the articles gives a detailed definition of the HRIS and the benefits it presents to companies . it also touches on different platforms that companies decide to choose to work on the HRIS.
liz649

Bed & Breakfast Management Software | Little Hotelier - 0 views

  • higher expectations when it comes to service and accommodation standards.
  • more convenient to analyse performance and determine important business decisions.
  • ‘self-start’
  • ...25 more annotations...
  • channel manage
  • booking engine
  • arn more bookings and revenue.
  • support available 24/7,
  • designs their software with small accommodation businesses
  • issues you have can be solved as quickly as possible
  • understand your goals
  • stay PCI-DSS and PSD2 SCA compliant to protect your small property from fraud and avoid online risks.
  • Make sure you’re free to cancel anytime.
  • Stay connected to your guests throughout their stay
  • Manage important daily tasks straight from your smartphone or tablet
  • enables you to manage your property online. It can include many different features such as a front desk system, booking engine, channel manager, payments solution, and more.
  • payment information is in one place
  • command centre where you can see all your bookings from every booking source in one central calendar.
  • ed and
  • breakfast software is a tool that
  • centralising all the crucial aspects of your property’s operations
  • n keep everything all in one place and make changes at the click of a button
  • nformation you need to view or analyse
  • generated automatically and is easily accessible.
  • simplifying the day-to-day operations of your business
  • more control over your business, leading to better decisions and greater profits.
  • easily control all the vital parts of reservation management
  • add more value to your business.
  • increase upsell opportunities and further enhance guest experience
  •  
    The article discusses what a bed and breakfast system is and how it is beneficial for the bed and breakfast to have a PMS system. If the owner would like to live their life and not be behind the desk they need the bed and breakfast system. The owner is able to have all the functions of their bed and breakfast at their finger tips and make any changed from their phone or tablet.
tashaemunnings

Why the Adoption of Biometrics Will Rise - TheStreet - 0 views

  • Biometrics allows for automated check-in and re-check-in at any venue
  • The adoption of using consumer fingerprints or their faces instead of tickets comes with its risks.
  • "Biometrics is a double-edged sword when it comes to security," he said. "On the one hand, it’s a better and more reliable way to secure your identity or account, rather than having to remember a password and passwords get hacked all the time. Even two-factor authentication is proving to be much more vulnerable than many people thought."
  • ...7 more annotations...
  • Another concern is that biometrics could also contain information about your health and genetics.
  • "The good news is that biometric data theft still has only a limited real-world potential, since it’s not easy to spoof somebody’s biometrics, although it is possible
  • comes
  • Several hospitality venues have already started using facial recognition, including cruise ships
  • Some cruise ships take a photo of passengers at embarkation and that data is used from contact tracing to selling consumers photos they appear in and ensuring everyone disembarks at the end of the journey.
  • "Hotels likewise have experimented, with Marriott planning to eventually use facial recognition across all their properties."
  • "This is easier and more cost effective than other forms of authentication, it allows for greater efficiencies and it’s better at preventing fraud,
  •  
    Using biometrics to allow people access to events and keep track of their whereabouts is becoming more and more common across several industries including hospitality. Although seemingly helpful and more efficient that regular tickets or keys, there also seem to be concerns about the security. However, many believe that although these concerns exist, the use of biometrics is one of the safest verification routes currently.
asanc036

Reinventing Restaurant Experiences Through Facial Recognition - 0 views

  • Biometric technology
  • offers enhanced health and safety
  • personalizes the dining experience, offers a more efficient bill payment system, and increases patron loyalty
  • ...36 more annotations...
  • 1. Contactless payments
  • facial recognition technology reduces physical contact
  • makes the experience more efficient by instantly scanning a guest
  • 's face for verification and payment.
  • safest technology in identity verification, dramatically reducing the risk of payment fraud.
  • 2. Social distancing and capacity requirements
  • Facial recognition technology helps with social distancing and capacity measures by identifying the proximity between individuals
  • keeps track of the number of people in the store
  • 3. Customer loyalty programs and personalized dining experiences
  • allows restaurants to create personalized experiences for loyal customers, and encourage first-time guests to return.
  • recognized as VIPs,
  • weekly regular who likes his burger rare with no lettuce or tomato, thus increasing customer satisfaction
  • 4. Fast-food restaurant transformations
  • with facial recognition
  • customers
  • don’t need to remember a password or log into an app
  • FaceMe Health
  • turns these kiosks into interactive experiences by recognizing loyalty program members and presenting pe
  • ased on
  • Facial recognition
  • past orders
  • also being employed in drive-through lines
  • saving time
  • 5. Employee systems: access control, time and attendance clocks, and ordering terminals
  • Advanced technologies like FaceMe® can be installed at staff entrances to check body temperature and mask-wearing while accurately identifying employees
  • simplifies clocking-in/out
  • accurate login capabilities without the need for keys or cards.
  • FaceMe SDK
  • FaceMe
  • facial recognition engine
  • to create personalized and efficient customer experiences
  • FaceMe Security
  • It can also display body temperature (when connected to a thermal camera), identify opted-in VIP customers, clock-in/out employees, flag block-listed individuals, and send real-time alerts to security personne
  • software solution that performs facial recognition even if users are wearing a mask.
  • Facial recognition t
  • installed on a PC connected to a camera with thermal imaging capabilities.
  •  
    Biometric Technology is being implemented in restaurants offering better health and safety, personalised dining experiences and efficient payment methods. Restaurants are using facial recognition for the following: 1. Contactless payments - scanning customers' faces for safe payment verification. 2. Social distancing and capacity measures - helps identify proximity between individuals and tracks number of people inside a store. 3. Loyalty programs and personalized dining - opted-in diners are recognized as VIPs giving them personalized service and suggesting past preferences. 4. Fast-food restaurants - customers don't need to remember a password or long into an app. Facial recognition is being implemented in drive-through lines to save time. 5. Employee systems - technologies can check body temperature and accuracy of mask wearing, it also simplifies cocking in and out and gives them login access to the POS terminals.
kjeewan

Data Security in the Hospitality Industry: Post-COVID Era | LoginRadius Blog - 0 views

  • The frequency of cyberattacks against business databases can be attributed to the fact that the hospitality industry largely depends on credit cards as a medium of payment. This may increase the chances of a hacker receiving access to sensitive information. Investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  • databases in the hospitality industry also happen to be the most vulnerable to data breaches.
  • The aforementioned reliance on payment cards can greatly increase the chances of information leaking. However, other virtual methods of payment like online payment and more can create the potential for cyber attacks.
  • ...6 more annotations...
  • The data collected and the people who can access it differ from country to country.
  • Staff training is restricted to the service aspect of the business. However, training employees to carry out processes in maintaining data security in hospitality like data collection and storage in the right manner is overlooked.
  • This process can involve the addition of two-factor authentication that will protect the data from being accessible to non-employees. This encryption can prevent identity theft.
  • : Employees will require thorough vetting regarding the importance of proper data storage. This training can also work towards reducing the chances of insider attacks as only a few employees will have access to the databases.
  • This includes the addition of firewalls, traffic filters, and network monitors to guard against malware present online.
  • , investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  •  
    Personal information collected can range from generic data like names and phone numbers to sensitive data like bank accounts. Databases in the hospitality industry are the most vulnerable to data breaches. Reliance on payment cards or virtual payments can increase the chances of information leaking or potential for cyber attacks. Staff training in maintaining data security is overlooked. two-factor authentication, Employees training to reduce insider attacks, and cyber security measures such as adding of firewalls, traffic filters, and network monitors to guard against malware present online can ensure data security for consumers and the business.
ryanbonifas

Video surveillance helps secure World Poker Tour tournament | Security Magazine - 0 views

  • Video surveillance helps secure World Poker Tour tournament
  • The casino needed to have comprehensive coverage to enhance both event security and the safety of VIP guests; secure premises and protect against fraud and theft; and fulfill legal requirements set by local regulators.
  • To improve video coverage of gaming tables and the casino floor, security engineers from Volga Elektronik installed IDIS 5MP dome cameras and the IDIS Solution Suite (ISS) video management system (VMS). The expanded surveillance system helps operators detect, verify, analyze and rapidly respond to security and safety events and meet the requirements of regulatory gaming integrity.
  • ...1 more annotation...
  • "Our security team can quickly and efficiently respond to incidents and resolve disputes to reduce table stoppages. The result is an enhanced patron experience that builds on our reputation as one of Europe's top gaming destinations."
  •  
    Poker and casino type events are a great target for crime. As the need to secure not only the safety of guests grow, but the protection of a venue and its assets, venues like the Merit Royal Hotel and Casino are constantly upping their game to ensure venue and life safety.
carine_elie

How Much Should You Spend on Cybersecurity in 2022? by Lynn Goodendorf Spring 2022 - 0 views

  • Many hospitality companies are struggling with the question of how much to spend on cybersecurity especially in the context of revenue losses related to the pandemic.  The challenge is that the risk of cyberattacks is rapidly escalating.  There are several drivers of this alarming trend.  First, ransomware is growing in severity both in the scope and the scale of attacks as well as the amount of the ransom demand. Next is the increase in remote work during the global pandemic and the rush to facilitate at home working. And finally, small companies are increasingly targeted because they are “easy” victims and typically more vulnerable. As you might expect, the cost of cybercrime increased more than 50% from 2019 through 2020. According to a report by McAfee¹, the global cost is estimated to be more than $1 trillion and monetary losses are estimated at $945 billion.  Examples of hidden or intangible costs that are difficult to measure include system downtime, reduced efficiency, brand damage and loss of trust.  Expenses that are direct and easier to measure are consultant services, legal fees and cyber risk insurance premiums. Below is a chart published in the McAfee report that illustrates this trend.
  • Ransomware - a Denial of Service/Operations and often includes a data breach Business Email Compromise (BEC) - often involves Funds Transfer Fraud Computer Data Breach - theft of personal data such as cardholder data, social security numbers, driver’s license numbers, passport numbers and details, etc.   What is the best way to go about budgeting for cyber security risk?  As a starting point, be sure that you have a qualified information security professional managing your program of work. Regardless of the amount you spend, a knowledgeable and experienced cybersecurity professional can make well informed judgments about priorities in expenditures.   There are three well established strategies that can work together in combination.   Each strategy has advantages and drawbacks and it is not recommended to rely on a single approach. Below is a description of each way to go forward.
  • STRATEGY A:  Key Ratios of Spend
  • ...2 more annotations...
  • STRATEGY B:  Gap assessment
  • STRATEGY C:  Focus on Compliance
  •  
    The writer of this article is Hospitality Upgrade. It includes the expanding worries of the hotel sector.  The key ratio of spend, gap analysis, and a focus on compliance are the top three main strategies being used by the hotel sector. In addition, the other measures are made by businesses to aid in preventing such breaches and the financial repercussions that result from them.
earagon22

PCI and PSD2 Compliance: Why Are Hotels on the Hook? - 0 views

  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • Established in 2006, PCI stands for the Payment Card Industry Data Security Standard, which contains guidelines for accepting, storing, and processing credit card information
  • ...12 more annotations...
  • These days, cyber security and regulatory compliance aren’t just necessary skills for the IT team. Every hotel manager - even the “non-tech savvy” ones - must understand these crucial components of data protection in order to protect their businesses.
  • A few rules of thumb include using PCI-compliant POS and PMS providers, storing both digital and paper data securely, and limiting access to sensitive data to only the employees who truly need it.
  • Examples of these guidelines include using an online checkout/payment page controlled by a licensed 3rd-party service provider, storing credit card data via a 3rd-party “vault” provider rather than in your own system, and masking the full credit card number on receipts, showing only the last 4 digits instead.
    • earagon22
       
      As an example, if guests book through a 3rd-party like Expedia then I at the front desk see an Expedia card not the guest's card. The card I see is pre-loaded with the amount of the stay ONLY. Even then, I cannot see the 3rd party's full cc number. I only see the last 4 digits just like guest credit cards.
  • “The attack on Marriott was hapless and still has many gaps to fill on what actually happened. A popular entry point for adversaries is through email spoofing. This tactic is used in phishing in order to get malware onto a target network to then move laterally across all systems,” Ryan Cornateanu, Application Security Engineer @ CrowdStrike.
    • earagon22
       
      This attack mentioned compromised cc details, passport numbers, and dates of birth for 300 million guests in their database. This happened in 2014. https://hoteltechreport.com/news/marriott-data-breach#:~:text=And%2C%20the%20financial%20burden%20is,the%20largest%20data%20breaches%20ever.
  • because of increased payment security, the amount of chargebacks will likely become much lower, which is something all hoteliers can celebrate.
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should still comply, since regulations like these are often mirrored in the United States and other countries soon after.
  • PSD2 includes enhanced guidelines for online payments and the handling of sensitive data to reduce the risk of credit theft, fraud, and security breaches. One major change is the requirement of Strong Customer Authentication (SCA) for online transactions. With SCA, rather than simply typing in a credit card number and clicking “pay,” consumers will need to provide a second layer of authentication, which could be a PIN code or an SMS verification code, before the payment can go through.
  • Guests book nearly three-quarters of hotel reservations online, so PSD2 will likely impact every hotelier as Strong Customer Authentication (SCA) becomes a requirement for payment processing.
  • Are any charges processed after the guest has checked out, such as minibar chargers? To prevent any hiccups with payment after check-out, charge an authorization on the guest’s card for the full incidental amount and have the guest provide two-factor authentication in person, such as chip-and-pin, when the guest checks in.
    • earagon22
       
      A property rule where I work is that each guest must insert or tap their cc at check-in in order to follow this rule and we take an incidental hold each night. Guests that have not traveled for years are surprised by incidental holds which makes sense based on when this was implemented.
  • The key takeaway here is that transactions initiated by the hotel at a time when the guest isn’t present won’t comply with PSD2 requirements.
  • protect consumers’ sensitive data, and, as a result, every merchant that uses credit card information must follow these rules, from small businesses to large corporations.
  • By partnering with a trusted technology solution and investing in PCI and PSD2 compliance now, hoteliers can prevent the potential catastrophe that could come with the theft of sensitive data.
  •  
    PCI compliance is a crucial and necessary set of guidelines that all hotels must follow. The Payment Card Industry Security Standard was created in 2006 and outlines rules regarding accepting, storing, and/or processing card information. These rules were put into place to protect consumers sensitive information. For example, in 2014 Marriott hotels was attacked and 300 million guests information was compromised. This attack led to new regulations being put into place, the Payment Services Directive 2 (PSD2). These regulations take into account international customers and enhanced guidelines for sensitive data.
pjohn091

Hospitality security adjusts to COVID-19 constraints | 2021-02-08 | Security Magazine - 0 views

  • While COVID-19 has slowed the hospitality industry, security plays a more pivotal role than ever and the ongoing pandemic is challenging security professionals to adjust and adapt to new rules and procedures.
  • “The things people do in hotel rooms are things they would never do at home: prostitution, drug abuse. Suicide is huge, people kill themselves in hotel rooms because they don’t want to do it at home,”
  • The hotel industry came to a halt in the early months of the COVID-19 pandemic and things are only slowly starting to pick back up. Yet the burden on security is no less than it was before, and in many ways, the job has gotten harder.
  • ...12 more annotations...
  • Occupancy levels dropped 90% for several months and have only recently returned to a consistent 40%, with many hotels still closed,
  • “Despite the low occupancy levels, we continue to have a significant number of incidents resulting in a much higher incident-to-occupied-room ratio than we have historically seen. We have seen a dramatic increase in heart attacks and suicides over the past few months, and continue to have increased numbers of fraud and guest-on-guest type incidents.”
  • Even as the need for security persists, many hospitality chains have pared back their security budgets.
  • Eventually COVID-19 will recede, but new risk categories will likely continue to unfold in hospitality. Security professionals can help to steer a course by reminding upper management that risk is more than just a monetary calculation.
  • In some cases, entire corporate departments are being eliminated, so there is no centralized security department. There is no one providing corporate guidance, no one providing policies and procedures.”
  • Even if there’s only one person working the front desk, “they still need to be making the rounds,” Perman says. “They need to be knocking on doors and making contact, making conversation. You need them to keep up that level of human intervention.”
  • “A passive infrared detector can also be used to detect temperature in human beings, so a video camera that is infrared capable can detect fever in a human, and that is being done in a lot of places,”
  • Through COVID-19, though, technology can be a double-edged sword. For example, some hotels have turned to mobile-phone-based check-in to provide a touchless experience. “From a security perspective there are unintended consequences there,” Danson says. “Now you never have to go to the front desk, you never have to encounter a person.”
  • Under these emerging policies, security is striving to put more active eyes on guest rooms — right at a time when COVID-related staff reductions are making it harder for security even to sustain normal operations.
  • With the onset of COVID-19, things have gotten even more challenging, as hotel security is increasingly tasked to do more with less. 
  • Even in this strained environment, other common risks persist in the hospitality world. Prostitution is a perennially complex issue for hotel security, for example, while human trafficking is an increasing area of concern.
  • When allocating resources in support of operational safety and security, “the chief of security needs to be informing corporate leadership of the potential risks, so that it becomes a risk-based decision and not just a budget decision,” Slotnick says. “Security has to make the case for risk, whether it’s a risk to brand reputation or other forms of risk.”
  •  
    This article goes into great detail about how Covid-19 is affecting hotel security. With budget cuts, security personnel are being limited, but the need for security is more important than ever. The article talks about how suicides in hotels are higher than ever as well, making it all the more important to have a solid security presence.
  •  
    In this article, it discusses the decline of the hotel industry following the COVID-19 pandemic, and how things have only slowly begun picking up again. However, the security burden is as great as it has ever been, and in many ways, it is even harder. Despite hotels closing their doors amid the pandemic, occupancy levels have only recently recovered to a consistently high 40%, with many still closed for months.
mmdmd99999

JOSHUA BERGEN - ProQuest - 0 views

  • From PCI DSS compliance to privacy, the company's president stresses the importance of education in ensuring data security
  • "It's very ironic now being that what we do, data security and privacy and protection in the credit card environment because what led me to the accounting world was finding credit-card fraud in my reservation department and reporting it," Bergen said.
  • Bergen divided Venza's business into three areas: privacy regulation compliance, data protection and Payment Card Industry Data Security Standard compliance. Between the three groups, Venza's services include antivirus, backup recovery, data-breach notification, firewall management, information risk assessment, penetration and segmentation checks, privacy management and remote monitoring. Outside of these central services, the company also provides an educational human-resources suite consisting of modules in sexual-harassment prevention, diversity and guest relations, antibribery and acceptable use of a company's network, website and equipment.
  • ...2 more annotations...
  • Called Project Basecamp, the program will reach out to 500 students at 10 universities with hospitality programs and educate them about technological and financial security. "I've jokingly said if I do agood enoughjob, they should actually need less service from us," he said.
  • Companies may have incredibly advanced equipment, firewalls and encryption, he said, but all it takes is one accidental mistake from someone within the system and all of that technology becomes moot. "So that's why we focus on what we call the human firewall," he said. "They are the most valuable asset in all of this." Sidebar
  •  
    PCI DSS compliance to privacy to data security
anonymous

How Can the Hospitality Industry Protect its Customers? | Hotel Business - 1 views

  • Fraud doesn’t only happen online, and it’s important to also consider the physical data risks within hospitality companies.
  • Personal guest information such as credit card data, addresses, passport and driver’s license copies are a gold mine for hackers and, therefore, make hospitality companies, specifically hotel brands, a prime target,”
  • “When there’s little concern for the repercussions associated with data breaches, it may lead to lack of action in protecting guest information,”
  • ...2 more annotations...
  • Nearly one in five (19%) hospitality companies don’t have a policy for storing and disposing of confidential paper documents,
  • (47%) of C-suite employees say human error or accidental loss by an employee/insider was the cause of their last data breach.
  •  
    The article discusses what practices should hotels adopt to protect their guests, in a world where lodging accommodations are a primary target for criminals and where customers see security as an important factor in decision making. Data breaches can happen online and in the physical world, hospitality companies have to look beyond security software and put into place policies for data storage and disposal of sensitive information, as well as, properly training for employees in information security practices, like proper information handling, and the ability to phishing scams or suspicious emails. In order to ensure that physical or digital sensitive information won't fall on the wrong hands.
  •  
    This article discusses the importance of data security in hotels and what makes it so attractive to hackers/thieves. The article mentions that about 36% of hospitality businesses don't deem data breaches a big deal. If this mentality continues, more and more data breaches will occur for the company that doesn't take data privacy seriously. The hospitality industry has tons of sensitive data about guests stored online and offline, making it a goldmine for data thieves. Organizations need to take precautions like adequately training employees in order to avoid costly security breaches.
« First ‹ Previous 101 - 120 of 123 Next ›
Showing 20 items per page