Skip to main content

Home/ Hospitality Technology/ Group items tagged guard

Rss Feed Group items tagged

Xin Jing

Envysion Implements its Managed Video as a Service Platform with Aloha Restaurant Guard... - 1 views

  • The integration of these solutions enables restaurant owners to monitor cash handling and exception reports, identify trends and validate suspicious transactions identified by Restaurant Guard by viewing the video taken at the time of the transaction.
  •  
    The Aloha restaurant managed video as a service platform which is the leading exception reporting and theft deterrence tool for the restaurant owners. By utilizing Enysion's video, restaurant owners can monitor cash handling easier, identifiy potential suspicious activity faster and monitor the exception report effectively. Moreover, Aloha Restaurant Guard which invented by NCR corporation can identified the common scams through analyzes POS data and transactions. I think that combine Aloha Restaurant Guard to Envysion's video, the owner of the resturant may have a whole picture of the restaurant in their mind through easy used video web interface and secure video clip sharing, data from the two platform and intelligence reports. This is a good model for restaurants to reduce the profit losses from fraudulent activities. It smooth restaurants' daily operation meanwhile employees will regular their own behavior during the work period.
Krystal Jost

Keycard hacker picks locks, exposes gap in hotel security - Travel Kit on NBCNews.com - 0 views

  • Last week, the self-described hacker/music aficionado demonstrated a homemade gadget that could conceivably unlock millions of hotel-room doors around the world.
  • Brocious followed up his demonstration by publishing a how-to paper that may inspire other hackers to try their hand at entering guests’ rooms without their knowledge or consent.
  • most hotel crimes are crimes of opportunity where crooks take advantage of guests’ inattention.
  •  
    Almost everyone has recently heard of Cody Brocious and his gadget that was implemented and utilized to unlock guest room doors in Onity locking systems. This issue has been recently broadcasted all over the news and has gained the awareness of millions of people, making travelers panic when staying in hotels, and questioning their safety and security. The truth is, behind the issue at hand, travelers have been utilizing hotels and other establishments without being concerned or conscious of their safety, and with some negligence, and lack of attention, they put themselves at risk in numerous different ways. Although Brocious' invention gained the attention of the public, and although he went out of his way to be sure that other hackers out there knew how to replicate the system and how to utilize it to their advantage, enabling hackers to enter guest rooms and steal their personal belongings without their permission, or potentially cause physical harm to a traveler as well. Stated in this article, according to Forbes, the gadget that Brocious invented has proven inconsistent in its effectiveness. That is not to say that it could not eventually be improved, but with the changing in technology, and now the gained awareness, hotels are focusing more intently on ensuring guest security through their technological outlets. Technology affects many aspects of a hotel guest's security - from internet access to credit card information, along with guest room locks and personal identity. The article also suggests numerous ideas for how guests can avoid a lot of problems with their safety in mind, including using secondary security systems on their door, ensuring closure of the room door when leaving he room, as well as never keeping your room number written down with your key. The article also focuses on how utilizing your energy to ensure that your belongings are safe in your room as you would in your own home, is energy more well spent than being concerned about someone
Ruoxi Wang

Facility Management ERP software for hospitality management, hotel and Restaurant Manag... - 0 views

  • Whether you are into hospitality & housekeeping, guarding & security or maintenance & engineering services, you actually put the smile back on customers’ faces. However, this is no easy task. You need to manage major roadblocks like attrition, disconnect between operations and payroll, service continuity, on-time and accurate billing, compliance, etc., which hamper your day-to-day operations and strategic growth. Allow Abaris to transform your business process, to accelerate your success.
  • We cater to different segments in this industry, namely: Hospitality/ Housekeeping Services – Hospitality/ Housekeeping Service Providers can manage all aspects of their business including lead management, sales, operations scheduling and billing, to contract termination. They can benefit from special features such as zone-based deployment to sites, and Rostering to improve employee-wise plans.
  • Security/Guarding Services – Security and Guarding Service Providers can use Abaris ERP on Cloud to mount hurdles specific to their industry, often characterized by unorganized departments spanning multiple sites & customers, and complex processes. Apart from a complete view and integrated management of their business, they can also improve resource deployment and timely billing.
  • ...1 more annotation...
  • Maintenance & Engineering Services – Maintenance and Engineering Service Providers can benefit from the end-to-end process management capabilities of Abaris ERP on Cloud to improve service to customers, maximize resource utilization, reduce downtime disruptions, and issue prompt and accurate bills.
  •  
    Good facility management of a hotel can make the service indispensable and delight the customers. But it's not a easy work. It is related to almost every department of a hotel. Abaris came up with a facility management solution on cloud. The solution mainly focus on three parts, which are housekeeping service, security services and maintenance & engineering services. With its help, a hotel can change its way to operate the business and ensure integration between operations and back-office departments. As a result, it can provide perfect service to meet customer requirements.
kristenagosto21

Nine High-tech Solutions to Explore in the COVID-19 Era - Event Marketer - 0 views

  • In fact, in a survey of our audience, 96 percent of respondents said their agencies shifted products and services due to the impact of COVID-19.
  • 67 percent said they are focused on new virtual event services, 24 percent said they’re developing new medical-grade products, four percent said they’re specifically exploring on-site tracing technology (more on that in a bit), while the remaining 50 percent said they were exploring “other” new areas such as touchless modifications to on-site technologies and appointment-based experiences. Overall, 35 percent of respondents reported that COVID-focused products and services currently account for 50 to 75 percent of the overall business.
  • That live-guide component came into play recently for a program in the Faroe Islands tourism arm’s “Remote Tourism” campaign, which in June allowed travelers with itchy feet to control live people on the ground in various parts of the region by using their phone or computer keypad.
  • ...9 more annotations...
  • That live-guide component came into play recently for a program in the Faroe Islands tourism arm’s “Remote Tourism” campaign, which in June allowed travelers with itchy feet to control live people on the ground in various parts of the region by using their phone or computer keypad.
  • That live-guide component came into play recently for a program in the Faroe Islands tourism arm’s “Remote Tourism” campaign, which in June allowed travelers with itchy feet to control live people on the ground in various parts of the region by using their phone or computer keypad.
  • In addition to shifting into virtual events and building custom digital platform solutions for clients, Sparks opened a  shoppable Social Distancing Store online, complete with directional graphics, touchless utility tools, sanitizing stations, sneeze guards and partitions, and other customizable options.
  • ting events and helping offices and other businesses reopen and maintain key social distancing protocols.
  • supporting
  • In addition to shifting into virtual events and building custom digital platform solutions for clients, Sparks opened a  shoppable Social Distancing Store online, complete with directional graphics, touchless utility tools, sanitizing stations, sneeze guards and partitions, and other customizable options.
  • n addition to shifting into virtual events and building custom digital platform solutions for clients, Sparks opened a  shoppable Social Distancing Store online, complete with directional graphics, touchless utility tools, sanitizing stations, sneeze guards and partitions, and other customizable options.
  • players
  • social
kjeewan

Data Security in the Hospitality Industry: Post-COVID Era | LoginRadius Blog - 0 views

  • The frequency of cyberattacks against business databases can be attributed to the fact that the hospitality industry largely depends on credit cards as a medium of payment. This may increase the chances of a hacker receiving access to sensitive information. Investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  • databases in the hospitality industry also happen to be the most vulnerable to data breaches.
  • The aforementioned reliance on payment cards can greatly increase the chances of information leaking. However, other virtual methods of payment like online payment and more can create the potential for cyber attacks.
  • ...6 more annotations...
  • The data collected and the people who can access it differ from country to country.
  • Staff training is restricted to the service aspect of the business. However, training employees to carry out processes in maintaining data security in hospitality like data collection and storage in the right manner is overlooked.
  • This process can involve the addition of two-factor authentication that will protect the data from being accessible to non-employees. This encryption can prevent identity theft.
  • : Employees will require thorough vetting regarding the importance of proper data storage. This training can also work towards reducing the chances of insider attacks as only a few employees will have access to the databases.
  • This includes the addition of firewalls, traffic filters, and network monitors to guard against malware present online.
  • , investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  •  
    Personal information collected can range from generic data like names and phone numbers to sensitive data like bank accounts. Databases in the hospitality industry are the most vulnerable to data breaches. Reliance on payment cards or virtual payments can increase the chances of information leaking or potential for cyber attacks. Staff training in maintaining data security is overlooked. two-factor authentication, Employees training to reduce insider attacks, and cyber security measures such as adding of firewalls, traffic filters, and network monitors to guard against malware present online can ensure data security for consumers and the business.
Lu Zhang

Hotel Security in an Insecure World | Past Issues | Past Issues - 0 views

  • For the last nine years, the concept of heightened security has guided our nation ever since we witnessed the terrorist attacks of 9/11.
  • With the violent November 2008 hotel attacks in Mumbai, India, the September 2008 attacks in Islamabad, Pakistan, and the July 2009 Jakarta, Indonesia, bombings of American-branded hotels, the need for a new security awareness is now finding widespread acceptance across the U.S. lodging industry.
  •  
    The cases of terrorist attacks of hotels increasing. To reflect this situation, the American Hotel & Lodging Association (AH&LA) cooperate with Department of Homeland Security to classify the security situation and work on security environment of lodging. To improve the security environment, the AH&LA had meetings discussing about attacks alert, security apparatus, and practical and logistical aspects to hotel security. For many years, AH&LA provided e-mail notices to its members alerting hoteliers improve the immediate security environment. With more and more terrorism and tremendous risks, AH&LA coordinated media and government, and produced security training to help hoteliers to protect and guard the hospitality industry.
jingyaoxie

Technology and Security--Too Much of a Good Thing? : Hospitality Law Check-In - 0 views

  • Hi-tech key cards, hidden cameras, metal detectors, secure and limited entrance and elevator access, and even the simplicity of the vigilance of employees and guests are many of the best practices employed at hotels today to protect its employees, guests and customers.
  • In today’s world, larger properties have command centers where all video and audio is often under constant watch and review.  In an instant, video can be pulled, reviewed and sent to the appropriate authorities. 
  • With terrorism seemingly a real and growing threat, hotels must find a balance between allowing guests their privacy and having the ability to monitor who is on the property and what actions they may be taking.
  • ...2 more annotations...
  • Perimeter security often includes cement, metal or steel barricades that keep unwanted and unscreened traffic from entering the secured area.
  • It can also include security gates, intelligence-enabled camera networks, armed guards, car checks, guard dogs, lighting, height detectors and various other methods to keep the unwelcomed out of the hotel or resort area.
  •  
    In this article, the author pays attention to the balance between security technology and customers' privacy. Even though we all know that security becomes a big issue nowadays and technology is updating so fast, does it mean too much of them will also be  a good thing for hotels. In today's hotel, you can find monitors everywhere, which makes me feel bad because I feel like being in a jail. Obviously, with the growing treats and terrorism, it is necessary to put those monitors in hotels or even any other public places in order to make people safe. However, compared to being 100% safe, guests in hotels today much prefer privacy. They don't want to be monitored and feel inconvenient. 
  •  
    Now, many security devices and technologies are widely used in the hospitality industry. Perimeter security is a set of physical security and programmatic security policies that provide levels of protection against remote malicious activity. It can be both noticeable and seemingly invisible and is utilized to keep employees and guests safe. Larger properties like casino, have security system and command center that monitor guests' actions in every corner. However, in the situation of economic depression, hotels have to consider the cost of security measures.
  •  
    In today's world, larger properties have command centers where all video and audio is often under constant watch and review. In an instant, video can be pulled, reviewed and sent to the appropriate authorities. All of this might bring back memories of your most recent visit to a casino, where the "eye in the sky" is watching your every move. While initially you may be conscious of your every move being monitored, eventually you forget there is a camera right above you. With terrorism seemingly a real and growing threat, hotels must find a balance between allowing guests their privacy and having the ability to monitor who is on the property and what actions they may be taking. Today,
ysuarez123

New TripAdvisor feature aims to flag sexual assault concerns - Nov. 9, 2017 - 0 views

  • The badges are meant to flag all health, safety and discrimination issues, including theft, sexual assault and rape, TripAdvisor spokesman Brian Hoyt told CNNMoney.
  • Businesses will be "badged for a minimum period of three months, and we hope it will be a catalyst ... to change their ways,"
  • The new approach to warning guests about safety concerns comes after The Milwaukee Journal Sentinel reported last week that TripAdvisor had removed forum posts and reviews warning about rape and injuries at several resorts in Mexico.
  • ...3 more annotations...
  • TripAdvisor's new badge appears as a warning in a red box at the top of the page that users see after they click to view a resort's details. It says: "TripAdvisor has been made aware of recent media reports or events concerning this property which may not be reflected in reviews found on this listing. Accordingly, you may wish to perform additional research for information about this property when making your travel plans."
  • hat language may change in the future, but for now the badge is meant to be a warning sign to customers to encourage them to do additional research, Hoyt said.
  • A TripAdvisor committee will be reviewing badges to determine if they need to be kept attached to a business beyond the initial three months.
  •  
    I chose this article as I am an avid user of Trip Advisor! After watching the E-Commerce lecture, I actually started researching more on facial recognition used in the hospitality industry, both in marketing and to keep guests safe. Using facial recognition for safety actually came up quite a bit; specifically as Professor Cilli mentioned on cruise ships to help track and potentially stop a predator or threatening guest. This article is on Trip Advisor's new badge system, that intends to flag hotels if reports or media comes out including sexual assault, crime, and other potential threats to travelers. The idea started from a case filed against Trip Advisor for taking down comments claiming a security guard at a Mexican resort had sexually assaulted a guest who had stayed there. Trip Adivisor claims that at the time, the comment was removed due to explicit material. Not only has Trip Advisor promised to keep comments like this published on their pages, but if taken down they will tell users what exactly flagged their system to take it down. Users will easily be able to adjust their wording and repost. While the exact wording of the badge does not specifically detail why the hotel was flagged (see wording annotated above), as a traveler it would definitely make me think twice. From a management standpoint, getting flagged like this on one of the most used travel websites could completely halt business and create financial strain for months. The badge will last for at least three months and in that time could be seen by thousands of visitors. I hope this small step for Trip Advisors forces hotels to take big step in terms of safety and security with who they are hiring and tracking who is on property.
anonymous

How Can Hoteliers Solve Labor Shortages Through Technology | By Max Starkov - Hospitali... - 1 views

  • In my view there are two ways for dealing with the acute labor shortages and unsustainable labor cost: Pay up: Continue to offer sign-up bonuses, higher wages and interview cash payments, making profitability even more elusive, or Invest in technology to solve the current labor shortages through technology innovations, automation, mobility, robotization and next gen technology applications. The goal here is to do more with fewer employees by using technology and reduce your staffing needs by a significant percentage compared to 2019 levels.
  • Chatbot: An AI-powered chatbot on the property website like Asksuite or Umni.bg engages users, answers all of their questions and steer them toward making a booking.
  • Security Robots: Large hotels with conference facilities, resorts with large pool areas and casinos can benefit greatly from security robots, diligently working 24/7. Fully autonomous security robots by Knightscope are already being used as security guards at resorts, large hotels and casinos, airports, theme parks and outdoors perimeters. The rental of a security robot goes for $7-$10 per hour vs $25-$30/hour for a human guard.
  • ...3 more annotations...
  • Housekeeping: Robots like Rosie by Maidbot, 2,000 of which have already been deployed at various hotels, clean guest rooms 20 percent faster and public areas up to 80 percent faster than human housekeepers. Robot-housekeepers mean 24/7 cleanliness programs, no health risks when handling toxic disinfectants, electrostatic sprayers, UV-C light devices, and all of this at 6 times lower cost per hour.
  • Hotel porters: Porter and delivery robots have been in use at hotels ever since the Aloft Cupertino debuted a Relay delivery robot by Savioke back in 2014. Relay robots and Tug robots by Aethon are increasingly used at hotels to deliver in-room items to guests, like their luggage, room service meals and fresh linens.
  • Using AI, automation, robotization, IoT and other next gen technologies the hotel can still keep a “human facade” but automate all of the back-end operations, enable smart guest communications, and automate and personalize every touch point with the customer. Yes, and add a few humans with a warm smile into the mix.
  •  
    This article goes over ways that technology could essentially replace jobs. It gives points for how a hotel can reduce staffing needs & includes a case study of Hilton's new room selection capability
kjeewan

Biometric Identification in Hotels and Casinos - 0 views

  • Biometric applications are particularly useful at the places where a lot of customers, members or visitors enters or exits a facility, or require identification or verification.
  • A hotel guard may not force guests to prove their identity, but what when there is a no guard and just a fingerprint scanner, where you need to put your finger to open the door?
  • Since hospitality employees are not expected to be too rigid, this part can be shouldered on biometric technology. Customer issues at hospitality outfits may sometimes be ego-driven, but showing ego to a machine is of no use and customers understand that.
  • ...9 more annotations...
  • On the other hand, hotel room access based on guest biometrics provides an integrated solution that is connected with the hotel management systems. Since there is no need to card, keys or any other form of possession, there is no fear of losing them or getting them stolen. Biometrically logged entry exit presents strong proof that only guest entered the room and no one else.
  • They can also be provided with access to assigned hotel facility in the package like pool or casino, which are also secured with a biometric access method like fingerprint recognition. The underlying system also keeps record of guest’s whereabouts and generate reports when needs, e.g. at the time of billing, checkout or audit.
  • Managing preferences of returning guests beforehand give them an idyllic experience and more business to the hotel in long run. This can be efficiently achieved with a hotel management system equipped with biometric ability. Preferences of a guest can be associated with their biometric identifiers, which are instantly fetched when they scan their biometrics in future check-ins and hotel staff can surprise them every time they visit.
  • A biometric powered check-in can give guest the experience they want and deserve. Registering their biometrics (for example, fingerprints) and enabling access to the room in the hotel management software will give them frictionless access to their room and concentrate on the next thing they want to do.
  • Biometrically secured entry / exit to a service / facility area will require guests or members to scan their fingerprint or face to enter the facility and will log the time spent in the facility area.
  • It also prevents any outsiders from using hotel facilities such as pool or casino that are reserved only for guests.
  • At the time of billing, a guest may insist on not availing a service that has actually been availed and forgotten. Biometric based entry and exit records present authentic proof of services availed.
  • biometrics is not just about customer convenience or security, it can be deployed for in-house applications like employee attendance, time tracking and to improve payroll efficiency. Keeping track of employee in and out timings brings in payroll transparency and managers can make sure that employees are being paid for the hours worked and not for breaks. It also curbs time theft and timesheet manipulation within an organization. Time theft and timesheet manipulation is a disastrous activity, in which an employee misinterprets amount of time she has put to complete an assignment or a project. When done on purpose, the time is spent in personal or other activities unrelated to the work and logged in payroll system, putting burden on company funds. A biometric based clock-in and out system can eliminate the possibility of timesheet fraud as employees have to be present to clock in or out time, they ask someone else to do it for them.
  • The biometric guest ID and preference tracking system facilitates keyless entry for guest rooms, eliminating the need for cards or keys. It facilitates automated check in fingerprints kiosks, whereby guests can check in with a simple touch of their finger. Billing becomes dramatically easy and reliable and customers can be reliably charged with biometrically authenticated logs of their entry and exit to facility area.
  •  
    I decided to do further research on Biometrics software in hospitality because we use it at the Four Seasons where I work in the Residences department. Biometrics is a technology that scans your fingerprint and grants you access to areas designated by management. This is useful in residences and hotels because as an owner or guests, only you will have access to your apartment or room. The article mentioned how as technology evolves, there is a debate as to whether guests will want to give their fingerprint. Too much security could be seen as a nuisance but too little security puts guests at risk. Having a Biometrics system in place at a hotel ensures that only hotel guests are patrolling the property or floors with rooms. Another interesting aspect is using Biometrics to remember returning guest preferences such as floor height, food choices, allergies, etc. This system could be put into place at check-in so that right away the front desk knows the guest is returning and can be made aware of their past preferences. Benefits of Biometrics mentioned in the article is not having to deal with room key cards, added security on property, seamless check-ins as well as even paying for items on property. A guest might not even need to take their credit card around because they can just use their fingerprint to pay at the pool, gift shop, etc. Behind the scenes, Biometrics is important as well. A hotel can use Biometrics to track employee attendance, clocking out for meals and to ensure only employees are accessing closed off areas of the property.
  •  
    Biometrics can be used by companies for employees to clock in and clock out to ensure timesheet accuracy. It can be used by companies as a security measure so that guests are where they are permitted to be. It can be used for easy check in and billing and payment verification if there are issues. Biometrics can also be used as a way to collect guest information for example their preferences.
elena zhebrun

The Software Behind the Final Four - 0 views

  •  
    As Klein explains, he has 63 different schedules saved in an online event management system. One schedule covers all the transportation of the buses; another covers the signs and décor; another keeps track of the officials; and so on, and so on. The same system lets security guards know if they should let someone into an arena, and lets the people managing the court know which equipment must be in place for the halftime show. Folks like Dropbox, Box, Asana, Yammer/SharePoint from Microsoft, and Basecamp all solve parts of the project management equation. Still, Frei contends that using a spreadsheet as the basis of task management is the company's edge since it gives people a familiar tool and interface. He's moved customers away from using Word and Excel documents to manage their projects and onto Smartsheet with ease.
Zhe Chen

Travelocity Boosts Green Hotel Offerings in Asia-Pacific - 1 views

  • In this era of eco-confusion, Travelocity works hard to highlight green hotels across its site and guards against green-washing with its rigorous program. Unlike some travel sites, Travelocity does not accept "self-certified" hotels for the Green Hotel Directory
  •  
    This article talks about third-party professional who checks the effectiveness of sustainable practices applied and these properties have been audited by a qualified to help to build a Green Hotel Directory.
Yue Li (3011472)

Keeping Guests Safe: Hospitality, Political Unrest and Terrorism - HFTP Connect - 0 views

  • Installing bullet proof glass in secure areas, lower level windows, and in some cases, hotel shuttles. Installing riot shutters in areas where civil and political demonstrations occur, or are likely to occur. Installing reinforced doors. Building panic rooms or highly secure suites for high risk guests, such as politicians and celebrities.
  • Adding additional wiring for back up phone
  • systems and having satellite communications available. Hiring only law enforcement trained guards and engaging government
  • ...1 more annotation...
  • response systems. Using Explosive Detection Animals to monitor public areas, sleeping floor hallways, etc. Building secure mailrooms with small X-ray machines Adding access control systems and next generation CCTV to monitor “back of the house areas.”  In some cases, these feature motion controls, facial recognition and more. Increasing the amount of staff training to respond to suspicious situations and guest concerns. Installing crash rated fencing and pop up barriers.
  •  
    Because of the global terrorism and political unrest, hospitality as a vulnerable target must take action to prevent terrorism. One big problem is how to keep customers and employees safe without ruin customer's experience. This is said because customers in the United States pay less attention to security while enjoying their vacation. Therefore, it is the responsibility of the hospitality industry to make sure that their customers are safe. There is a couple of ways to protect customers under terrorism. For example, using biometric technology to recognize and monitor suspicious person. Using explosive detection animals to monitor public areas, and installing crash rated fencing and pop up barriers, etc.
  •  
    Yes, I like this article very much. It would certainly protect guest from not only hurricanes but thrown objects, or any other intruder coming through the window. The problem is statiscally speaking, most break inns occur through the front door or forced entry..
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
Alejandra Kravets

International Cruise Ship Security Issues | Travel Tips - USAToday.com - 0 views

  • The International Ship and Port Safety Code, implemented in 2004, requires all cruise ships to engage in strict screening measures. This means that all passengers must pass through metal detectors before they enter the ship, and that their clothes and baggage are X-rayed as well .
  • Cruise ships also rate ports for incidents such as smuggled goods, contraband and stowaways; such statistics allow them to find the most tourist-friendly ports to visit.
  •  
    After 9/11 incident hotels, airlines, cruises are planning and implementing more security measurements to ensure customers' safety. Particularly, in this article security is the biggest concern while traveling. Any terrorist or criminal can book a cruise as a regular passenger and put passengers in danger. That is why in 2004 The International Ship and Port Safety Code requires that all passengers must pass by metal detectors and their baggage has to be X-rayed as well. Cruise ships also work very closely with the FBI, U.S. Coast Guard, and the Department of Homeland security to stay aware of possible pirate activity or terrorist attack. Ports of call are heavily reviewed and compared to ensure traveler's safety since they are in another country and other laws may apply. They check with local security and police forces, and monitor incidents that other cruise ships experience at a given port.
Caroline Hardenbergh

Tightening cruise ships' security: State of access control solutions onboard passenger ... - 2 views

  •  
    This article gives an overview of security considerations of a cruise liner. Initially it cites a comparison between cruise security concerns and that of a hotel, which are basically the same, such as secure doors to cabins (rooms), having an exact record of all passengers and onboard staff, as well as having surveillance such as cameras taking constant video recordings. Whereas hotels are mostly open to outside traffic, cruise ships are limited only to those who have purchased passage, are working there, or are conducting business onboard. This has led to boarding procedures which are as stringent and detailed as those conducted when passengers board a commercial airline. Safety concerns for cruise ships have been a forefront concern since the 1985 hijacking of the MS Achille Lauro (See next comment) which led to minimal security standards issued by the International Maritime Organization (IMO). The tragic events of 9/11 compelled US issuance of an International Ship and Port Facility Security (ISPS) to strengthen security protocols. This includes requirements that any "ship over 500 tons…not (be) allowed into the United States unless their last ports of call conformed to ISPS code." The ISPS code, however, involves minimal adjustment for cruise lines currently in compliance with IMO rules. Newer ships are being constructed to include the infrastructure for video fibre optics and metal detection equipment. State of the art equipment will have crew member's photo and data available to be checked with each swipe of their ID card. Biometric fingerprint detection equipment is another safety layer that is available, but is not currently in use, although it will certainly be put into place promptly if a major incident occurs. The odds of such a major incident are high when considering the volume of cruise passengers in the last decade. Since other commercial ships have witnessed attacks, cruise lines are strongly advised to progressively
  •  
    Additional information regarding the 1985 MS Achillies Lauro hijacking: http://www.britannica.com/blogs/2010/10/remembering-the-achille-lauro-hijacking-picture-of-the-day/
marilyn diaz

Thieves Won't Wait. Neither Should You. | hospitalityupgrade.com - 3 views

  • data is under attack
  • the most afflicted industry was accommodation/foodservice
  • use a combination of hacking and malware (61 percent).
  • ...11 more annotations...
  • success stealing data “in transit” (62.5 percent) versus stored data (28 percent)
  • What this tells us is hotels and restaurants need to do more to protect sensitive payment data and be proactive in keeping up with the hackers and thieves. We also need to pay particular attention to properly securing data as it moves through the merchant IT environment.
  • Point-to-point encryption (P2PE) is a technology
  • has only recently gained momentum in the hospitality sector.
  • P2PE places “data in motion” in a wrapper that can only be decrypted by an endpoint that has the requisite key.
  • The goal of point-to-point encryption technologies is to encrypt as close to the point of entry as possible and guard against thieves who attempt to install sniffing/hacking software on a merchant’s network.
  • P2PE solutions can significantly reduce a merchant’s card data environment, mitigate potential breaches and simplify PCI DSS validation efforts.”
  • You should also understand the types of cards and transactions that can be encrypted. Does the solution encrypt both swiped cards and manually entered cards? Does it encrypt online transactions, as well as on-site or card-present transactions? Is the solution tamper resistant and, what happens if an attempted breach occurs? Where is the HSM (hardware security module) located? Even if data were to be intercepted, is it rendered unusable to cyber thieves?
  • A hosted solution will shift much of the burden of responsibility to the third-party provider and free you from having decrypted data in your environment.
  • Keep in mind, there is no single silver bullet when it comes to payment security. Even with EMV, stolen cardholder data could be used for a fraudulent online transaction. Merchants should implement a variety of technologies and techniques as part of a multi-layered approach to security that ultimately includes EMV to protect against counterfeit card fraud, tokenization to protect data at rest, and P2PE to protect data in-flight.
  • Thieves won’t wait for a unified approach and specification, and are looking to access your valuable data now. By taking a proactive approach to security that includes point-to-point encryption, asking the right questions, choosing trusted partners and keeping yourself updated, you can protect your customers’ data and your reputation.
  •  
    This article deals with the theft that happens on a daily basis in the hospitality field. It happens when credit cards are used to pay for something, like a reservation, and thieves want the information, so they can use your credit card number for whatever intentions they may have. As the article states, "our data is under attack". I can relate to those people that have had credit card numbers stolen, because it has happened to my husband and me, and it is a horrible feeling trying to get your life back on track and recover your money.  I think it would be a great idea, with some research, to get the point to point encryption technology in a field where credit cards are used so often, not only to cover the business (hotel), but also to protect the guest, so they feel at easy when they travel on vacation or business.  The overall point of this technology is to encrypt the information as close to the point of entry, i.e. the swiping of the credit card, as possible. This would in turn "significantly reduce a merchant's card data environment", as the program would encrypt the information so that hackers cannot access the customer's information. As I mentioned earlier, questions should be asked before buying this technology, as there is always something new on the market that may be better. Credit cards are not always swiped, but can also be manually placed in the system, so you want to make sure, that both transactions are protected. Overall, the establishment should always be concerned about the customer and their safety, whether physical or mental and always be prepared for the worse.
  • ...1 more comment...
  •  
    Marilyn, This is a great article and I wish this type of technology was everywhere because like yourself I have credit card numbers stolen before and it is a long process to end that. Working in the hospitality industry we would need to make sure that it is everywhere that a credit card is entered whether that being swiped in house, typed in the system manually, or even processed via the internet. In the hospitality industry we should be very aware of our guests safety and like you mention it is not only just physical safety that is a concern it is the mental state as well making sure the guests credit cards are safe and do not have a chance of being stolen by a hacker. This is a great article, keep up the good work!
  •  
    Great article! Personally after being a victim of credit card fraud, I'm very apprehensive of where I shop, who handles my card and how long it takes them to return it. I recently cancelled a large purchased after the cashier insisted on rubbing my card number on the reciept after the transactions had be approved. In my mind, I was thinking "If I let you do that, then I've open the door for anyone to charge thousand of dollars. I don't think so." As a manager, who hands credit card numbers for manual input, I'm very cautious of them and want to insure that they don't get into the wrong hand. Aftern each transactions is approved, that number is shredded and the credit card machine is batched out. Companies don't realize how important it is to PCI compliant. The risk in exposing sensitive information of our clients and customers can cost thousand of dolllars in fines and fee, in addition to the lost of that customer/client.
  •  
    Marilyn, Great Article...as a Front Desk Manager, it is my responsibility to randomly check our computers to ensure employees are not placing USB driver to collect data from our system. Our company has taking this a step further by putting metal locked case around the PC to avoid possible fraudulent activity. If we have to open a PC, we must log it to show proof why a PC became unlock. Companies should adopt similar procedures to protect the consumers/guests. Nelson
Cecilia Lucas

The Pros and Cons of Cloud Computing for Hotels - 2 views

  • Believe it or not, most hoteliers don’t fully understand what the cloud is
  • There is the natural inability of the hotelier withstand outages or hacker attacks in the cloud
  • The problem is most of these organizations aren’t sure of how much to rely upon the cloud and even in some cases what makes up cloud services.
  • ...18 more annotations...
  • Redundancy
  • There are many pros and cons associated with cloud computing and hosted solutions for the hotelier
  • The Pros:There are much lower start-up costs and not much equipment to purchase. Less staff is needed to maintain the equipment. There should be no need for future hardware upgrades.
  • Cloud computing is very fast to implement to a number of workstations.
  • Then there is the fixed-cost advantage: Software provided online is upgraded and maintained by the provider
  • The fixed cost allows business owners to plan rather than be caught off-guard when a costly software or hardware upgrade must be purchased.
  • Making false promises
  • Redundancy.
  • Cloud hosting resides in a single data center.
  • For starters, automatic scaling can make people extremely lazy. If you’re not paying attention to your usage, you just might get a huge surprise on your next bill.
  • So if you’re using cloud hosting, make sure to pay daily attention to your usage.
  • App performance could suffer. Your data might not be cloud-worthy
  • Service level availability agreements. Since these agreements are very detailed, it’s essential to verify all the services being defined in the contract.
  • Service level availability agreements.
  • So, what is the “cloud”?  Believe it or not, most hoteliers don’t fully understand what the cloud is . Yet the cloud is in the news daily. It touches all of our lives, but in its present form is the cloud and the security measures to protect users ready for prime time? The consensus is ”cloudy”.
  • cloud computing service provider
  • provide different levels of quality and services when it comes to actually installing them. Thus, finding a reliable service provider is a tiring and time-consuming job.
  • The future looks great down the road, but in the meantime there will be a great shakeout and much angst getting there. If Amazon and Sony can’t get it right yet, what chance do you stand?
  •  
    This article pretty much outlines the advantages and disadvantages of cloud computers in general, but it speaks of how hoteliers don't fully understand what a cloud is, much less trust to use one. It goes on to explain how cost effective the start up for a cloud network is in terms of hardware, software and time. But, in long term, the monthly payments for web hosting, software hosting, storage, etc are never ending. Although at least these costs are such that you can plan ahead for. There is also a greater vulnerability to hacker attacks in the cloud. Redundancy is an issue as well, since clouds are hosted in a single data center. The article ends with a warning on service providers and the importance of finding the right one for you and your needs.
  •  
    This is a very informative article and a good source that gives me basic understanding of cloud computing. Some of the aspects of the cloud are same as I expected and some are not. As companies or people using cloud computing don't have to purchase software and equipment to store or manage data, and to upgrade servers frequently, the cloud is a cost effective and efficient alternative. However, it will increase companies operating expenses as it requires monthly bills which might be costly depending on usage.
Mary White

The Rise of Cyber Theft - Subway Loses Millions - 8 views

  •  
    A relatively unsophisticated group of hackers stole millions from Subway by hacking through their poorly secured POS systems. These franchise businesses possibly failed to adhere to the standard required by Subway Corporation and failed to establish two points of entry for remote access into the POS system, making it easy for hackers to steal credit card information. These types of crimes are likely to increase in the future as hackers from around the world take advantage of sub-par security systems. Businesses can no longer concern themselves only with the sale of an item, they also need to offer a sense of security to their customers and accept the reality that cyber theft is a rising problem.
  • ...2 more comments...
  •  
    I definitely agree that businesses need to accept the fact that cyber theft is a rising problem. Cyber theft is so common, we now have to guard and protect our computers with various anti-virus protection; which serves no purpose to a very professional hacker. The fact that a company like Subway experience losses through poorly secured systems, say a lot about their management in regards to protecting their brand and their customers. It's very mind blowing to think that the Subway corporation was just focusing their attention in what they view as important. This is just another wake up call and alert to everyone, who seems to layout their information carelessly. I also hope that Subway refocus themselves in regards to this matter.
  •  
    I have seen a few restaurants more so lately place messaging on the registers or pos system stating that their wireless networks are in fact secure by outside firms or services. With the rise of cyber theft and the increasing awareness about its effect, especially at the small business level, I thought it was a saavy move by this restaurant to assure its customers that at the very least they take the issue seriously. I personally know that no system is 100% safe, but as a consumer it means alot to me knowing they have that proactive approach.
  •  
    It seems everybody should check their online accounts frequently=_=
  •  
    Jeremy, I can appreciate the transparency of those restaurants. I wish more businesses would be open about their security. People are wound pretty tight about money right now and need to feel that the business world does care enough to protect their information.
Alyssa Westmeyer

Using technology to stop restaurant theft | FastCasual.com - 0 views

  • losing money at the POS can be a serious problem for restaurant operators
  • internal employee theft is responsible for 75 percent of inventory shortages and about 4 percent of restaurant sales
  • restaurants using NCR Restaurant Guard to monitor employee interactions with the POS systems not only reversed theft losses, but also led to more profit: From minus-3 percent in losses to plus-7 in gains.
    • Jouvens Jean
       
      This is a tool more restaurant operators should look into.
  • ...5 more annotations...
  • The cloud-based system, which now has a real-time mobile app to alert managers when suspicious activity occurs, gives managers hard data on their employees
  • The system, Kittle said, not only flags mistakes and suspicious activity, it also ranks employees based on things they do well. For example, it tracks when employees sell add-on items like desserts or sides, so managers often use it to motivate employees with contests or calling out who is selling the most.
  • The platform features the ability to integrate digital video with the POS system as well.
  • Nine months after rolling it out in 900 stores, Subway franchisees have seen savings above $1.6 million.
  • "This integration saves time and energy in researching problematic and profit draining activity. It's a 'game changer' in reducing losses, increasing profitability, and providing an advantage in the marketplace.
  •  
    Theft is a huge challenge in the restaurant industry and it's an expensive one. Now the POS system can assist with security by flagging suspicious transactions and identifying theft behaviors and flagging on video. This is an enormous help to the industry. The greatest area of impact is that having a system with this capability deters theft. The second area is that managers do not have to be present in order to catch theft and can do so at any time through device notifications and internet-based cameras. Video is flagged so there is now no need to watch hours of tape in order to find suspicious activity. Simply by the fact that Subway is now recovering $1.6 million in less than 1 year, it is clear that this system has huge value and will continue to positively affect finances in the restaurant industry as technology advances.
  •  
    Very good post...and interesting one.
1 - 20 of 38 Next ›
Showing 20 items per page