Skip to main content

Home/ Hospitality Technology/ Group items tagged hacks

Rss Feed Group items tagged

npate083

5 Ways POS Is Changing (And Why It Matters) - 0 views

  • Businesses have moved from traditional cash registers and stationary credit card readers to iPads and even mobile- or cloud-based POS systems.
  • Breadcrumb, a restaurant cloud-based POS system
  • Square allows businesses to transform iPads and smartphones into a POS system
  • ...22 more annotations...
  • One e-commerce solution is Shopify's POS system
  • the Shopify POS synchronizes and streamlines your financial and product information in a centralized dashboard.
    • npate083
       
      Shared commerce streamlines financial and product information in a centralized dashboard. It provides the user with real-time data and customer insight without having to run reports on multiple systems.
  • real-time data and customer insights
  • without the hassle of running reports on multiple systems.
  • Businesses should consider allowing mobile payments, as customers are shifting away from cash. 
  • businesses don't need any heavy equipment overhauls
  • Mobile credit card processing services (Square, PayPal Here, Flagship ROAMpay) simply require a credit card reader attached to a smartphone or tablet with the necessary mobile app, while mobile wallet providers (Google Wallet, Visa Checkout, Apple Pay) and loyalty mobile apps (Starbucks, Daily Deals) allow customers to pay directly from their smartphones or by using a POS scanner to read barcodes or QR codes on their screens.
    • npate083
       
      Mostly everyone is switching to mobile payment. It is much easier and convenient. As a business, it is vital to have mobile POS system so customers can pay directly from their phone.
  • New POS systems integrate real-time transactions with CRM solutions to help businesses increase sales and boost revenue
  • POS integration lets businesses create client records, CRM tasks and email marketing lists
  • enable businesses to collect all types of customer data from POS transactions,
  • to improve customer experience and acquisition
  • ability to extract valuable information from POS transactions to help business owners make smarter business decisions.
  • POS software tool
  • data-gathering and reporting features
  • Detailed reports include inventory and volume analysis, top-selling items, revenue and profit margin optimization, and staffing needs
  • Toast is a POS system
  • "restaurant operations by combining POS, front of house, back of house, and guest-facing technology on a single platform"
  • "monitor restaurant sales, labor costs, food costs, and more in real time, at home, and on the go with powerful reporting capabilities."
  • , POS systems need more security as the technology advances.
  • (IoT) – the interconnectivity and communication of devices, networks and physical objects over the internet
  • POS systems are more vulnerable than ever to hacks and data breaches
  • US-CERT recommends protecting POS systems by using strong passwords, ensuring you have the latest POS software updates, installing a firewall, using antivirus programs, restricting unauthorized internet access (such as for purposes other than POS transactions) and disabling remote access to POS systems.
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
anonymous

Three Basic Steps to Security | Hospitality Technology - 0 views

  • mind the three Ps: patches, people and passwords
  • A lot of breaches occur because software is not up to date
    • anonymous
       
      Patches It is always important to keep systems up to date that way you can keep tabs on everything and know exactly what is going accurately. It also makes it more efficient.
  • It is good policy to change a passcode every 30 days, but it gets confusing. People revert to things easily hacked and guessable
    • anonymous
       
      Pass-codes Although people want to keep their passwords easy and simple sometimes this isn't the best strategy. It works best if you think of something that most people wouldn't be able to guess so easily. Pass codes should definitely contain numbers and words, but most importantly they should be something that YOU will always remember that way you won't forget it.
  • ...4 more annotations...
  • using a pass phrase that is from something easy to remember, such as a line from a favorite song or nursery rhyme plus some numbers
  • More than half of users reuse the same password on different systems
  • How do you off board someone properly? You go through and change all things to make sure they’re locked out and to make sure they can’t do anything tricky” such as copy files or create a backdoor
    • anonymous
       
      People Making sure those who leave leave properly is equally as important as making sure those who enter enter the business the right way. You have to make sure that the people who leave are not gonna be planning anything against your business. Take the proper precautions and be aware of anything and everything.
  • These basics are a good starting point and can help deter hackers
  •  
    The article discusses three key points to keep in mind for a better security within a hotel according to Russ Schrader from NCSA.
tgood006

How Hotels Can Spring Clean Their Information Security Policies Ahead of the Summer Tra... - 8 views

  • Shockingly, nearly a third of hotels (32%) admitted they currently have no known policy for storing and disposing of documents
  •  
    Memorial Day weekend will soon be upon everyone and with summer officially kicks off. This article talks about how hotels can clean up and do better to protect their guest personal information. A few years ago, all major corporation were required to adopt General Data Protection Regulation (GDPR) regulations which helped some hospitality companies. In my current capacity with Marriott International as a Workforce Administrator we were required to schedule all customer facing associates for training on GDPR. Prior to Marriott acquiring Starwood hotel company they had their own data hacking which caused an increased expense for Marriott to let customer know they were doing all they can to stop the data breach and protect their personal information. They also created a dedicated call center for this effort to let guest know that they will continue to put protecting their personal information as a high priority. This article outlines how hotels can prepare for increased guest traffic and protect their guest personal identical information. One of my responsibilities as a Workforce admin is to handle staffing for all of Marriott International Customer Engagement Centers. Employee training on GDPR is required every year for Marriott associates. Training employees on how to better protect guest personal information is more cost effective than dealing with a data breach due to negligence of an absent-minded employee. Guest expect to know their personal information is going to be protected. This allows them to have piece of mind. Leaving a clear and clean area allows for guest to feel that their information is being protected. Imagine walking up to the front desk and finding the previous guest personal information cluttered in view. This will make the current feel their personal information will left unattended and viewable to the guest to walk up causing nothing but anxiety attacks. Unable to enjoy their summer vacation. Guest expect that the overall security of the hotel
  • ...1 more comment...
  •  
    32% of companies not having a known policy is startling considering that 77% of Americans find it to be important to them. Yet another IT issue the states finds itself behind the curve on.
  •  
    Another point as for the "clean desk" policy goes, it also needs to include stricter policies on securing credit card information. It should not be written down or repeated on the telephone. In an open environment sound can carry and unwanted parties can hear. Cell phones should be stored away from the desk, because cell phones are in itself a potential security breach.
  •  
    Our hotel as well has reinforced the clean desk policy. I remembered the data breach for Marriott it was in most major news channel and at work for several months we had the same questions from our guest requesting more information. As you stated a hotline was created and of of course the most surprising for me was the acceptance from our guest. Main responses were, with the new technology advance world we've coming and going into that is something we all have to face.
tgood006

Is the Future of Hotel Property Management Systems in the Cloud? | By Dean Minett - Hos... - 1 views

  • The internal server has been a standard fixture of hotels for a few decades now
  • The majority of hotels continue to operate internal servers today. Why? Convenience, security and economy are the main reasons. In many cases, these systems continue to perform reliably and the case for adopting a new way of doing things is simply not compelling enough..
  • Cloud-based property management systems know that a major security breach would be fatal to their business, so they have to invest constantly in security upgrades. Overall, their servers are better equipped to protect against viruses and security breaches.
  • ...2 more annotations...
  • given all the other benefits of cloud computing, it's difficult to argue that in-house software is a better solution.
  • Internet is a must for any cloud-based PMS. If your connection goes, so will your ability to use the PMS. Investing in a PMS before you invest in rock solid data infrastructure is therefore not the best decision.
  •  
    Cloud computing is ever-evolving and I wonder if it's just today's hype and a trend. As this article shows, cloud computing has a huge impact on PMS. Imagine this: If your hotel is using a cloud-based PMS and you lose your internet connection. What do you do? Hoteliers need a strong case indeed before they entrust their valuable operations and data into these cloud computing providers. In the perspective of a hotelier, I'd be worried.
  •  
    I found this article interesting for this week because it is about Property Management Systems being on the cloud. The author states that many hotels chose to use internal servers because of the convenience, security and the economy. "Cloud-based property management systems know that a major security breach would be fatal to their business, so they have to invest constantly in security upgrades." As a future manager, this is comforting to know because at least these companies know the amount of hackers out there and how important security is for hotels. Another important concern mentioned on the article, is the maintenance and updates. Whenever, the internet goes away and you are on a cloud system, there goes your system. "Investing in a PMS before you invest in rock solid data infrastructure is therefore not the best decision." In conclusion, the cloud based systems are slowly increasing but they have a lot of pros and cons, especially due to the hacking and chaos it may cause a hotel if the internet goes down.
  •  
    Having the property management system in the cloud might be a useful concept but it does bring up a lot of security concerns. Maybe the change should be implemented once a security software has been created that can withstand a breach. But then we know that is not something most companies would wait for. Especially when using the cloud would save them money in the long run.
lethannelson268

FBI Warns of Cyber Security Risk for Workers on Hotel WI-Fi | The National Interest - 0 views

  • The FBI has now issued a warning that those working in that manner may face extra risk of being hacked, and that they should be vigilant about protecting their devices and information while working on hotel Wi-Fi
  • The Federal Bureau of Investigation is issuing this announcement to encourage Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework
  • accessing sensitive information from hotel Wi-Fi poses an increased security risk over home Wi-Fi networks
  • ...2 more annotations...
  • The report states that hotel Wi-Fi often has more lax security than other types of common Wi-Fi networks, and that attacks are frequently interested in obtaining guests’ information, including credit-card numbers, as well as business data
  • “Evil twin” attacks, in which hackers create fake Wi-Fi networks similar to those of the actual hotel, can also happen
  •  
    This article highlights the need for hotel guests to be weary of the fact that the use of a hotel's Wi-Fi is not always secure. With more hotels opening up for guests to use their rooms and spaces as work offices, the FBI has stated that with the limited cyber security that hotel Wi-Fi has, it is possible for hackers to create fake Wi-Fi networks and steal or damage guest data. The article makes it known that it is much safer to use the network at home, that that at a hotel.
qyang010

Top 10 most notorious cyber attacks in history - Slideshow - ARN - 0 views

  • Robert Tappan Morris and the Morris Worm (1988):
  • MafiaBoy causes $1 billion dollars in damages (2000):
  • Google China hit by cyber attack (2009):
  • ...5 more annotations...
  • Teen hacks NASA and US Defense Department:
  • Hacker targets Scientology (2008):
  • Solar Sunrise (1998):
  • The Melissa virus (1999)
  • Hacker steals tens of million of credit card details (2009):
  •  
    Top 10 most notorious cyber attacks in history
tredunbar

Cybersecurity Best Practices for Restaurants | QSR magazine - 0 views

  • In the case of a restaurant, a cyber attack would likely be seeking;Employee details stored by the restaurantCustomer bank details obtained by the restaurantThe restaurant’s business bank account details
  • A restaurant’s POS system could see hundreds of different bank account details every day
  • Internal software used by restaurant staff is likely to contain sensitive information such as employee details (on an HR system), as well as accounting information for the restaurant
  • ...8 more annotations...
  • Restaurant owners and/or accountants who use online banking facilities must be aware of the possibility of this being targeted
  • Shoulder-surfing is a very real security concern, and hackers have been known to place recording devices in computer rooms, enabling them to physically see passwords being entered
  • Restaurants that use a website on which customers can order food need to consider its security. If cybercriminals manage to hack into the site, they will be able to obtain customers’ personal information such as addresses and bank details
  • Create a human firewall by educating your staff
  • Use reputable, recommended providers and suppliers
  • Keep computers away from the front of house
  • Carry out background checks on employees
  • Introduce unique identification numbers for staff
  •  
    The focus of this article is to point out why restaurants are targets for cyber attacks, what information hackers are looking to obtain and to identify what steps can be taken to protect consumer information. Hackers target a restaurant's POS system for the large amount of bank data it may record as well as any online banking occuring in the restaurant. The personal information from employees as well as any app or website utilized by guests, is prone to cyber attacks. The most important solutions rely on conducting background checks on employees and making sure that they are trained on what to look for. Restaurants can also put practices in place that involve using unique employee numbers, keeping computers out of guests' view, and using vendors with a stellar reputation.
sharline86

What the Marriott Breach Can Teach Us About Cybersecurity in the Tourism & Hospitality ... - 0 views

  • Marriott breach that compromised the records of up to 500 million customers. The data breach occurred through the IT company, a third party, that managed the Starwood reservation database.
  • Marriott took too long to disclose this breach.  Even though the breach was found in September, disclosure did not occur until nearly three months later — and ultimately, the company failed to protect valuable customer information. The company is already the subject of class action lawsuits that could have a severe impact on the organization.
  • Over the last 3+ years, the Tourism & Hospitality sector has been very average (if even just a bit below) when it comes to cybersecurity performance as compared to other industries.
  • ...5 more annotations...
  • Since 2016, nearly 5% of the tourism & hospitality entities that BitSight tracks (out of a total of almost 2,000) have experienced a publicly disclosed data breach. This is the 4th highest percentage of breach out of the 23 key sectors BitSight monitors, trailing only healthcare, education, and government.
  • For all companies, tourism & hospitality has the 2nd highest percentage of companies with an Open Port grade of D or lower (Education is 1st).
  • For example, Fortune 1000 tourism & hospitality companies are performing poorly compared to the sector as a whole when it comes to reducing unnecessary Internet exposures (“Open Ports”).
  • Though it is often assumed that larger organizations perform better in cybersecurity, the data on Fortune 1000 companies in this industry suggests otherwis
  • Ultimately, cyber incidents like the Marriott breach confirm that companies in this industry need to be much more about proactively mitigating the risk posed by their supply chain given the sensitive consumer information they contain in their databases.
  •  
    Bitsight examines the 2018 Marriott reservation management database breach. Using the breach as an example, this article shows how poorly the hospitality and tourism industry performs in cybersecurity versus other sectors.
guanhuahao

Top Cybersecurity Tools for Business - 0 views

  • All cyber threats are not equal. Some may hold your data for ransom, while others may destroy your information for good.
  • Digital tech analysis firm Juniper Research predict that the cost of data breaches will rise from $3 trillion annually to over $5 trillion in 2024.
  • organizations should look to Next Generation Anti-Virus solutions (NGAV) to protect their assets. NGAV takes traditional AV and then adds advanced analytics, behavioral analysis powered in real-time by large scale cloud back-ends to thwart known and unknown attacks. Leading NGAV solutions include Sentinel One, Carbon Black, and CrowdStrike.
  • ...16 more annotations...
  • The National Institute of Standards and Technology (NIST) offers cybersecurity guidelines for best practices to manage cyber risk. These include identify, protect, detect, respond and recover. Another resource is the NCSA’s national program, CyberSecure My Business.
  • Firewall Often referred to as a company's "first line of defense," a firewall is a security control that filters and screens network traffic entering and exiting your corporate network.
  • People can rely on the password manager to create and store dozens of passwords in an encrypted database without having to remember them.
  • Password managers are quite helpful, and some are even free.
  • store the first part of sensitive site passwords
  • but keep the last few digits memorized and fill them manually.
  • This way, if there is ever a compromise of the password database, hackers don't have those full passwords.
  • You should also consider implementing multi-factor authentication (MFA). MFA authentication uses more than one thing or "factor" to log you in
  • , biometrics is part of this last category
  • SPAM & Malware filters screen email for unwanted and dangerous elements, blocking them before they ever reach your users.
  • In the world of cybersecurity, there's a phrase, "humans are the weakest link." An employee who accidentally clicks on the wrong link or email attachment can put in motion a chain of events that results in a cyber breach. Security awareness training is an anti-phishing tactic all organizations should employ.
  • RDP access must be protected by a VPN connection.
  • reduce the risk of getting hacked is to ensure your systems and software are updated regularly, or "patched.
  • patching shouldn't end with the operating system. Your patch program should also look to patch all other applications running on your systems
  • regardless of the security tools implemented to prevent a data breach, you should plan for a compromise occurring.  
  • That's where 24/7/365 network and endpoint monitoring comes in
  •  
    Cyber attacks open more and more often and varied since cybercriminals are becoming more cunning and their methods more challenging to detect. This article introduces some types of strategies implemented to protect companies' businesses from cyber threats and cybercriminals. Including using Anti-virus software, firewalls, password managers (very useful while some even free), VPN, patch management program which not only for operating program but also for other applications running on your system, consider the email SPAM/Malware filters and security awareness training for the employee since "humans are the weakest link." An employee who accidentally clicks on the wrong link can put in motion a chain of events that results in a cyber breach. Finally, plan a 24/7/365 network and endpoint monitoring.
jlewinsky

Hotels: Are Your Cyber Defenses Ready for 2021? | Hospitality Technology - 0 views

  • Two of the top five biggest data breaches made public in 2020 were at hotel chains. Attackers stole personal information including names, emails and addresses from 5.2 million guests at Marriott and 10.6 million guests of MGM Resorts.
  • To ensure a swift recovery from COVID-19, the hospitality industry must shore up its cybersecurity protections — or risk more headline-making breaches in the future.
  • Risk is especially high at hotels because attackers have multiple points of entry.
  • ...14 more annotations...
  • Breaches undermine hospitality brands’ reputations and erode customer trust. Eighty-one percent of consumers will stop engaging with a brand after a breach, according to a 2019 study.
  • When it comes to cybersecurity, companies today have two options: Defend the fort or devalue the data. The former is the more traditional approach. By strengthening the digital “walls” around your data — via firewalls, intrusion detection, 24/7 monitoring and other security protections — the defend-the-fort approach works to keep attackers from accessing your systems at all.
  • However, one of the biggest vulnerabilities may be on the hotel grounds themselves.
  • hotels have multiple point of sale (POS) terminals across different locations, from the front desk to restaurants, all of which are connected to each other. If a POS device is not properly secured, attackers can use malware or other attack vectors to steal clear-text credit card numbers and other data.
  • POS attacks remain one of the most common causes of data breaches in accommodations and food services.
  • Guests may share their credit card numbers with the hotel in advance via a booking app or website, opening up the possibility of web-based attacks. Loyalty programs are another source of online vulnerability, with an estimated $1 billion a year lost to account fraud and related crimes.
  • One important and underutilized aspect of cyberdefense is employee training.
  • Make sure your employees use strong passwords and know how to spot fraud and spear phishing attacks. You may also want to limit employee access to confidential data, so if an account gets hacked, private guest information doesn’t go with it
  • You should also make sure your software is up to date with all security patches, as attackers often exploit known weaknesses in programs. Isolating POS devices from the rest of the network can also limit the damage from malware infections at that entry point.
  • it’s unlikely that even the strongest digital “walls'' will prevent all incursions. Defenses are important, but the ever-changing nature of technology means that new, hard-to-catch vulnerabilities will pop up all the time.
  • important to devalue your data, rendering it unusable to attackers who gain access to your systems. One way to do this is to implement point-to-point encryption (P2PE) by encrypting payment information from the moment it enters your network at the POS
  • Encrypted data is unintelligible to anyone who doesn’t have the right digital key. Implementing P2PE is the only way to ensure that clear-text payment data doesn’t fall into the hands of attackers targeting POS systems with malware.
  • Data that’s stored for the long term, like passport information or credit card numbers saved to a loyalty program, can also be devalued through tokenization. Data that’s tokenized gets replaced with an alphanumeric pseudonym, so the actual sensitive information isn’t stored on your servers. This method helps secure guest information beyond the initial transaction at the POS.
  • Hotels that reckon with their security vulnerabilities now will protect themselves from fines and other fallout from data breaches as business rebounds. They’ll also build deeper, more trusting relationships with customers by keeping their personal information secure. By strengthening security protections and devaluing their data, hotels can set themselves up for a brighter future. 
  •  
    This article describes the vulnerabilities in the security systems of the hotel Industry. The POS system was recognized as one of the most vulnerable areas that are more targeted by hackers. This is due to the multiple stations where the POS systems are located on the premises of the hotel. Likewise having POS systems independent of the hotels security system left the system open to hackers. Two options to defending the cyber-defense, are digital walls and employee training. Digital walls works by keeping hackers from accessing the systems. Although even with a strong firewall it is recommended to implement point-to-point encryption (P2PE), this encrypts payment information of guest. the other is tokenization. This uses alphanumeric pseudonym to protect data stored for long periods of time. Another way to prevent cyberattacks is employee training, encourage the use of strong passwords an dhow to detect fraud and phishing attacks.
cjdearmas

How hotel chains are tackling the cybersecurity challenge - 1 views

  • With customers getting increasingly tech-savvy and looking for better deals, smarter platforms, and intelligent options when traveling, the hospitality industry is struggling to protect margins.
  • As a result, the industry is undergoing a period of consolidation.
  • This is exactly how Marriott International became the world’s largest hotel chain — it acquired Starwood Hotels & Resorts Worldwide for US$13.6 billion.
  • ...8 more annotations...
  • However, at the time, due diligence failed to discover that Starwood had fallen victim to a data breach prior to the deal which exposed customer data of 500 million guests and subjected the hotel to penalties from regulatory authorities.
  • For those in the hospitality industry, looking to acquire properties or not, cybersecurity should be something to pay attention to — after all, the risks of not defending against cyberattacks could be catastrophic with regulators tightening the noose on those that fail.
  • Given Marriott’s size and cash reserves, it was able to weather the hit it took in the stock market, compensate (loyal) customers, and cough up the fines levied on it. Others might not.
  • “The hotel industry is at risk of attacks, such as malware and ransomware, where criminals try to either steal data or exploit organizations for a pay-off. The majority of these threats come through over email, often in malicious links.
  • The incident, of course, hasn’t dampened spirits at Marriott.
    • tcale003
       
      When Mariott bought other smaller hotels and added them to their inventory, they were not careful about their cyber-security and there was a data breach. The hotel industry is at risk of being attacked by things such as malware and ransomeware. Hotels need to pay attention to Cyber-security or risk having criminals steal valuable information.
  • Hotels house banks of sensitive
  • Hotels house banks of sensitive
  •  
    email security is a good defense against cyberthreats in the hospitality space because it not only helps fend off attacks but also sensitizes staff to risks in cyberspace and provides them with basic awareness and education.
  •  
    Mariott learned the hard way about the importance of cyber security! By inquiring a hotel for their boutique hotel line, it wasn't until after the fact that they realized that the hotel had been hit by a huge data breach in their system. Luckily, Marriott has the resources and reputation to deal with the issue. But a lot of these smaller hotels do not, so the damage to them could be catastrophic.
  •  
    "The hotel industry is at risk of attacks, such as malware and ransomware, where criminals try to either steal data or exploit organizations" Majority of threats come through over email, often in malicious links. deploying email security is a good defense against cyberthreats in the hospitality space because it helps fend off attacks.
tcale003

This $20 USB Cable Is A Dead Man's Switch For Your Laptop - 0 views

    • tcale003
       
      This article is about a new inexpensive technology called a Buzz Kill Cord. It has been recently created by Michael Altfield, a Software Engineer to prevent hacking across the globe for anti-theft protection if someone steals one of your computer or phone devices. This USB cable will destroy any and all information on your device.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • ...10 more annotations...
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated. There are many different technologies across multiple machines from the trains mentioned above right through to chainsaws. Unsurprisingly, laptop computers haven't been on the list until now. Software engineer and sysadmin, Michael Altfield, has created a cheap "kill cord" that can trigger a laptop to self-destruct if stolen by a snatch and grab thief. What's more, you can make your own for just $20 (£15) but there's an important caveat: this is for Linux laptops, not those running macOS or Windows.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • Most people are familiar with the concept of a dead man's switch that, for example, activates the emergency brake should a London Underground train driver become incapacitated.
  • le, ac
  • There are many different technologies across multiple machines from the trains mentioned above right through to chainsaws. Unsurprisingly, laptop computers haven't been on the list until now. Software engineer and sysadmin, Michael Altfield, has created a cheap "kill cord" that can trigger a laptop to self-destruct if stolen by a snatch and grab thief. What's more, you can make your own for just $20 (£15) but there's an important caveat: this is for Linux laptops, not those running macOS or Windows.
  • Although laptops can crash, the consequences will likely not be as devastating as a runaway train incident. So why would anyone want a "kill cord" for their laptop? Good question, and one answered by software engineer Michael Altfield in his blog posting that describes how he made one.
  • if you were doing some online banking or accessing your work network via a VPN, the opportunity to monetize the theft becomes apparent. That scenario isn't far-fetched either.
  • Stand up if you use your laptop in a coffee shop or some other public place like an airport.
  • I'm guessing nobody is sitting down at this point. Yet by using either distraction tactics or a more straightforward and violent strategy, a thief could steal your fired up and authenticated laptop in seconds. Encryption won't help much if you have authenticated and are accessing that data, or service, at the time of the snatch and grab.
  • Altfield wanted an anti-theft solution that could trigger the laptop to shut down, lock, or even wipe all data in such a physical separation scenario. "I couldn’t find a low-tech solution that implements a laptop kill cord," he said, "so I decided to build one myself." The result is what Altfield calls a "BusKill" cable.
jchac014

Highly connected hotel industry continues to be vulnerable to cyber attacks | PhocusWire - 0 views

  • cyber threats in hospitality, which claims there have been 13 “notable data breaches” in the industry in the past three years.
  • PwC’s Hotels Outlook report 2018 to 2022 which says hospitality has the second-largest number of cybersecurity breaches after the retail sector.
  • factors which make them attractive to fraudsters such as the volume of financial transactions that hotels carry out, the sensitive and valuable personal data collected, use of loyalty programs and their national and international spread.
  • ...5 more annotations...
  • dark web “chatter’ breakdown reveals Hilton had a 31% share of mentions on hacker forums followed by Marriott at 28% and IHG at 19%
  • Marriot recently revealed that its data security breach had cost the company $28 million.
  • It’s unsurprising that as the aviation industry grows and airlines look to adapt their distribution models, cyber attacks and other fraudulent activity also increases.
  • Air Europa says that as it went through its digital transformation, it needed to handle fraud more efficiently.
  • the airline industry saw a 29% decrease in fraud attacks in 2018, but the company attributes that the large data hacks involving passport details have not yet “been reused to commit air travel fraud.” 
  •  
    This article talks about how the hospitality industry has become more susceptible to cyber-attacks. Hotel companies like the Marriott have faced costly fraudulent cases online and have implemented new programs to ensure safety and security.
biancafavilli

How Cloud-based Hotel Software is Changing the Industry - 8 views

  • Couple that with the fact that in the next two to three years hoteliers are expected to invest seven to eight percent more on cloud technology
  • Additionally, increased accessibility, greater profitability, and user-friendly dashboards make cloud-based software enticing for hoteliers
  • For starters, cloud-based hotel software has the ability to host a property management system (PMS) from a remote location, allowing hoteliers to access their property data from anywhere in the world with an internet connection. This feature is unique to cloud-based software and eliminates the need for hoteliers to be physically present at their property to be able to check in on daily management operations.
  • ...22 more annotations...
  • Cloud-based hotel software has been shown to boost productivity, efficiency, and cost-effectiveness
  • Additionally, through the centralization of operations, hoteliers can eliminate the need for on-premise servers at each property
  • In fact, the hotel group, Triple C Hotels and Resorts, reported a 60% savings on software costs when they switched to Cloudbeds’ cloud-based hospitality software
  • Unlike locally installed software, one of the more attractive elements of using a cloud-based hotel software system is the ability to adapt, grow, and integrate with future trends
  • The high-level security standards followed by cloud-based hotel software is due in part to its rigid compliance with PCI requirements.
  • For example, Cloudbeds hospitality software implements periodic auto-logoff features that require users to re-enter their password, two-factor authentication for an added level of user verification, and automatic removal of guest credit card data after 14 days
  • Unlike conventional hotel software models that require hoteliers to purchase licenses and hardware, cloud-based hotel software is sold as a service that enables clients to add on as many or as few tools and features as needed.
  • In fact, a study by Frost and Sullivan showed that businesses can cut IT costs in half by implementing cloud-based computing solutions to customer support.
  • ability to host a property management system (PMS) from a remote location, allowing hoteliers to access property data from anywhere in the world with an internet connection. This feature is unique to cloud-based software and eliminates the need for hoteliers to be physically present at their property to be able to check in on daily management operations.
  • Give staff more mobility and accessibility around the property
  • Eliminate the need for manual data sharing and processing
  • next two to three years hoteliers are expected to invest 7-8% more on cloud technology
    • cleon087
       
      This could be a determination if a hotel succeeds. It is important to not lag and instead adapt to the times.
  • an spend more time attending to guests
  • ransitioning to a cloud-based hotel software solution can seem like a daunting task at first
    • cleon087
       
      Not all bosses are even comfortable with technology to begin with so it would be difficult for them to spend the money to transition.
  • Accelerate hotel check-in / out
    • cleon087
       
      People value fast check in, especially someone that came to the hotel on a business trip and just wants to get to their room.
  • Eliminate the need for manual data sharing and processing
    • cleon087
       
      This saves a lot of time because you wont have to manually record data.
  • frequent security updates t
  • In an industry that is always changing, this kind of flexibility is priceless.
  • across multiple properties simultaneously
  • faster for operations, online booking and customer service.  
  • customizable
  • Cyber attacks and tighter regulations on privacy policies have made the need to protect guest information more important than ever. This topic is a main concern for those considering switching to a cloud-based PMS system since data servers are hosted off premises.
  •  
    Cloud-based hotel software is able to host a property management system from a remote location which therefore allows hotel staff to access data from wherever they are in the world. It is showing positive signs of increased efficiency and overall cost-effectiveness.
  • ...4 more comments...
  •  
    Cloud-based software is the future of the entire hospitality industry. The benefits of having this software heavily outweigh the cons. It would allow employees to better assist guests with check-in/out processes and it would also give them increased mobility throughout the system, accelerating the services we can offer to our guests. In addition, cloud-based systems allow for better data storage, giving us the tools we need to be prepared for returning guests and their accomodations.
  •  
    Providing the best customer service is the goal of any hotel. It is what attracts your guests to return and suggest your hotel to others. Imagine a software that eliminates the need for hoteliers to be physically present to check on daily management operations or even automate mundane daily tasks, allowing staff to spend more time attending to guests and improving the customer service experience. This software is known as cloud-based hotel software. This software is not sold as a product; it is sold as a service that allows hoteliers to add on as many or few features as needed, making it completely customizable. Cloud-based software is hosted by a vendor's server and gives hoteliers a scalable system that is flexible and easily updated across multiple properties simultaneously. A great key feature to this software is that the system is able to adapt, grow, and integrate with future trends. Flexibility is so important in this generation because new technologies are constantly being innovated and staying up with trends is a great way to satisfy your guests. Cloud-based software has shown to boost productivity, efficiency, and cost-effectiveness. What more could you ask for?
  •  
    The cloud based hotel software is a great addition to he hospitality industry because it gives the hoteliers a chance to be flexible with their stay. It gives the staff member a more relief on updates of property housekeeping status. Cloud based technology gives advantages of moreover frequent updates and enhancements for hoteliers inquiring.
  •  
    This article highlights the benefits of switching to Cloud-based hotel software. One of the highlights is the reduction in cost, by switching it allows employees to focus more on service then repetitive tasks. This is also an attractive deal for hoteliers because they're allowed to check on important data from their house. This software makes it more efficient and soon all hoteliers will have to invest in a innovative software.
  •  
    A general trend is that hoteliers are considering to use cloud-based systems more. Data have proved that hoteliers will invest more in cloud technology. Cloud-based hotel software can provide its users with many benefits like cost-efficiency, increased accessibility, and user-friendly dashboards. Furthermore, it makes remote/offsite information sharing and real-time offsite management possible. With a cloud-based system, staff can spend more time on guests and improving service. For security issues, cloud-based systems upgrades often and therefore reduce the risk of being hacked. Cloud-based systems are also enough flexible to meet the future needs of users. In sum, cloud-based technologies can help the hospitality businesses to deal with the changes better.
  •  
    Hotels are beginning to transition to cloud-based software because they are realizing the great impact it has caused on their business. The article mentioned, "in the next two to three years hoteliers are expected to invest 7-8% on cloud technology". This percentage exhibits how hotels are going to be ran in the future. Cloud-based software has brought positive impact to a hotel business such as "increased accessibility, greater profitability, and user-friendly dashboards". All of these benefits have caused hotels to run their business smoothly bringing back satisfied guests. This software allows check ins/out to be more quick and gives easy access to areas in the hotel for employees. Another gain received by using this software is that its cost-effective. It has been disclosed that a hotel has saved "60% on software costs". Using this software has saved a hotel a lot of money that can be used to satisfied guest more. Security on data is more secured using cloud-based software because the vendors take it seriously making it harder for hackers to retrieve information. Some hotels may halt to install new technology such as cloud-based software but with all the benefits it has given to other hotels, this is going to be the future for the hospitality industry.
nbakir

Hospitality industry more prone to cyber attacks | TravelDailyNews International - 1 views

  •  
    The article by, a financial policy author, explains in detail the extent of cyber-attacks in the hospitality industry. The article explains that the hospitality industry is more prone to cyber-attacks, given the nature of information most of the organizations generate daily in their operations. The article explains that most organizations in the hospitality industry may not be aware that they have already been hacked. The article emphasizes the importance of internal audits and the critical evaluation of cyber footprints in hospitality organizations to minimize cyber-attacks. The author of the article delves into the cybersecurity risk factors in the hospitality industry and reports about the UAE IAA members' seminar which was aimed at sharing information and networking with a focus on building cyber-resilience against cyber-attacks. The article shows the prevalence of cyber-attacks in the hospitality industry noting that each stolen data record costs an average of $148 with the average cost of a cyber-attack being valued at over 3 million dollars (Karantzavelou, 2020). The article quotes a statement by the Jumeirah group chief internal audit officer who asserts that protection against cyber threats should be the DNA of every organization, and they should be continuously on the lookout for potential threats and ensure adequate protection. Members in the seminar advised on the importance of having internal auditors to provide assurance, suitable frameworks, and to set up controls to mitigate key cybersecurity risks. The article explains that hotels are prone to Cyber-attacks since they collect varied, valuable and sensitive customer information. The article also cites a cyber-breach in 2018 where up to 500 million customer details and passport information was compromised in an international hotel chain for up to four years continuously without detection (Karantzavelou, 2020). At the bottom line, contributors in the seminar explain the importance of cybe
biancafavilli

Tourism security in an age of cyber threats | NTA Courier - 0 views

shared by biancafavilli on 13 Feb 20 - No Cached
kmert005 liked it
  • the safety of clients and staff has to be the No. 1 priority.
  • hat means contingency plans must be updated on a regular basis and security plans must show adequate flexibility to incorporate good customer service and proper protection.
  • it is essential to dispel the idea that tourism security is static.
  • ...4 more annotations...
  • leisure travel is an expendable industry, and there is nothing that can destroy the industry’s reputation more effectively than a lack of security or safety.
  • the latest threat to the industry was underlined by the hacking of Marriott International’s Starwood database, potentially exposing the personal information of approximately half a billion people.
  • This cyberbreach serves as an example that the world of tourism security is fast-changing.
  •  It is essential that every tourism entity assume that, at some point, it will suffer some form of attack, whether physical or cyber. Do not wait for an attack to occur to begin to figure out how to mitigate the damage. Remember that an attack not only damages the client, but it also harms the entire industry.
  •  
    In this article, the author emphasizes that security in the tourism industry should be number one. With the advent of technology, cyber contingency plans must be a part of the overall security plans of tourism businesses. The author also admonishes hospitality businesses to be proactive when dealing with cyber security breaches to withstand malware and infections as well as to be honest with customers when security breaches occur to maintain the customer's trust.
nashalsiddiqi

Why is it important to keep my IT systems up to date? - 0 views

  • software upgrades are essential for continued operation. On the technical side of things, these upgrades provide fixes for known issues, provide new enhanced features, and often resolve and fix major security flaws or other types of flaws inside of software that could put your company and your company’s data at risk.
  • very important to keep track of updates and test them whenever possible before deploying them to a production environment. On some complicated infrastructures, applying something as small as a small security fix could bring down multiple integrated Line of Business applications. In an event like this it could cause huge problems!
  • ignoring security updates could leave a huge security hole that could be exploited by a virus, or malicious piece of software and infect many of your systems.
  • ...7 more annotations...
  • is when it comes time to do larger upgrades, or migrate systems to new servers, the migration/implementation time could be multiplied 2-10 times just because you haven’t kept your systems up to date.
  • In situations where you do have a valid good warranty from a recommended vendor, you can often have hardware replaced under warranty by the next business day, minimizing downtime.
  • Equipment Age – They need to purchase new equipment, since replacement parts aren’t available anymore, and the equipment’s warranty has expired.
  • Consumer Grade Equipment – Some IT Solution providers, and/or IT staff feel they can build their own servers, or purchase off-the-shelf consumer grade equipment for business use.
  • Vendor Warranty – We are called in to resolve an issue on a new server environment, but it turns out the equipment just came off warranty after 3 months.
  • Security and critical updates need to be applied urgently when possible. Upgrades or updates that increase features, functionalities, and correct software flaws are also important, but not as important as security/critical updates.
  • Hardware should be upgraded when either the equipment is coming off warranty, or when you need to upgrade for performance/capacity reasons.
  •  
    the article emphasizes the importance of conducting constant updates and upgrades on software and hardware, as it will help to protect the company data and systems from any possible hacks or viruses or data loses.
teresastas

Railroads say they don't need cybersecurity mandates - The Washington Post - 0 views

  • The Biden administration plans to impose new cybersecurity mandates on railroad and rail transit systems.But a leading railroad association insists it's already voluntarily following the practices that are now going to be required by the federal government.
    • teresastas
       
      Biden administration is planning on imposing new cybersecurity mandates on railroad and rail transit systems. This includes passenger rail systems like Amtrak and large subway systems like those in New York. Homeland Security Secretary announced the new proposed regulations under TSA eelier this week. The new regulations came as a surprise to the rail industy who feel that they are already taking cyber security seriously and don't need the government's heavy hand involved. They have three day's to submit feedback.
  • Our freight rail system is essential not only to our economic well-being, but also to the ability of our military to move equipment from ‘fort to port’ when needed,” the secretary said at the virtual Billington Cybersecurity Summit, where he announced the intended new regulations.
    • teresastas
       
      We often forget about Rail when we think about Transportation but it is essential for our military and for our major cities like New York. As well as the transport of goods across country.
  • In fall 2020, ransomware hit the Southeastern Pennsylvania Transportation Authority, which operates Philadelphia’s transit network. And in April, a hacker group believed to be linked to the Chinese government breached the computers of the Metropolitan Transportation Authority (MTA), which operates New York City’s subway system — the country’s largest.
    • teresastas
       
      We often don't hear about the hacks that aren't successful but how awful would it have been if hackers would have breached into MTA and taken over NYC's subway system!
nashalsiddiqi

What are the three big technology issues for the hotel industry? | PhocusWire - 0 views

  • The fragmented nature and location of hotel systems means a guest’s credit card number could exist in multiple systems in formats of varying security in locations of varying security.
    • kmira026
       
      1st technology issue for hotel industry
  • HTNG has set up a workgroup that will a framework that will enable hotels to concentrate the storage of sensitive card data in a single system, managed securely by a vendor or the hotel company.
    • kmira026
       
      Solution for 1st technology issue
    • nashalsiddiqi
       
      is this enough?
  • it has become critical for hotels to appear correctly and accurately in search results, as search engine sites have essentially become the gateway to travel research and inspiration.
    • kmira026
       
      2nd technology issue is Unique Global Identification Numbers. Something as small as a incorrect address can cause a problem
  • ...18 more annotations...
  • In both Europe and the US, regulations are being released and revised to provide support to guests with disabilities.
  • With the increase in electronic distribution of hotel information and transactions, hotels are working to provide better information and service to guests with disabilities.
    • torte003
       
      The three main technology issues hotels are facing are PCI, ID numbers , and support for best with disabilities.
    • torte003
       
      PCI is a main security threat that they face. Having a hotels cc system hacked and all their guest information stolen is an extreme nightmare. They have tasks forces that help educate hotels on how to protect and learn more about the procedures to keep that secure.
  • I can hear some of you now – what good can possibly come from creating an ‘association of associations’? Aren’t we just creating more overhead, more cost and more bureaucracy? In a word, no.
  • From my own perspective
  • I hate wasting our scarce
  • resources, and worse, wasting the resources of our members who volunteer their time to work for us
  • Other council member organization initiatives include a white paper authored by AH&LA, a payment technologies committee established by HEDNA, and the support by OpenTravel of needed XML specification changes as required by the industry.
  • thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service.
  • three key technology issues that are having, and will continue to have, a direct strategic impact on the hospitality industry:
  • Search engine optimization is a great thin
  • PCI (payment card industry) complianceUnique identification numbers for hotelsSupport for guests with disabilities
    • torte003
       
      Having wrong information about your hotel or business can be such a negative impact on business. With everyone now on google or yelp having the right information is crucial.
  • ‘holy grail’
  • y company has become critically important for the financial stability and market credibility of the hospitality industry.Members of the HTSIC have addressed this issue in a coordinated
    • vanessavioli
       
      Cyber security is almost equal to climate change in the impact on the industry. As we move into being a cashless society, keeping guests information private is integral to the continued growth of the industry.
  • Initiatives specific to distribution include the creation of standard room definitions and descriptions, guaranteeing accessible guest rooms and removing the accessible guest room from inventory when booked. HEDNA has worked on creating this vocabulary, and OpenTravel has revised its hotel schema, annotations and code list to reflect these changes.
    • vanessavioli
       
      This is an extremely important issue for the industry. Creating an industry standard vocabulary to ensure that guests with disabilities receive the specific room and accommodations they need is a game-changer. The ease of mind that it would create for those customers is priceless.
  • And our biggest strength is our commitment to work together, to eliminate redundant work or conflicting positions, to be transparent and open in our dealings with each other, and to address the most important technological needs of the hospitality industry.
    • vanessavioli
       
      With the ease of current technology, concerns about many of the bureaucratic aspects of something like this can be quickly done or even potentially eliminated.
nbrac002

Could wristbands turn festivals into games? - BBC News - 0 views

  • Wristbands have long been synonymous with music festivals, but what was once a simple, colourful loop of material now increasingly contains contactless technology. This allows music fans to pay for food, drinks or merchandise but festival directors are now taking the technology further, into the realm of "gameification".
  • Festival director Ben Robinson says it will allow visitors to check-in at stages, talks and stalls, creating a "mission log" they will be sent after the event, listing what they saw and giving further information.
  • Ultimately, he hopes to turn festivals into immersive gaming sites - something akin to Pokemon Go - where, alongside enjoying the festival site, visitors can unlock exclusive rewards. This might include entry to a restricted area for visiting a number of check-in points or free dishes if enough food is purchased.
  • ...11 more annotations...
  • linking the wristbands to interactive apps and existing technologies, such as augmented reality, to give attendees something beyond the usual festival experience.
  • which is also used in contactless bank card payments,
  • The danger is that you get analysis that tells you 80% of your audience went to see Band X so you should book loads of bands that sound like Band X," he says
  • data can stop exposing you to that thrill of hearing something new and different."
  • "That is where people load money on that they never end up redeeming. Most retailers view this as an excellent stream of effectively free money... but it is scamming the punters who are already paying an on-site premium."
  • and experts also question the security of the system.
  • so somebody could duplicate it - and as it's contactless, you only need to be within a certain proximity.
  • "Also, the visitors are potentially being profiled and this is viewed by the security community as an invasion of privacy."
  • The system they are using provides only "blind data", he says, which means there is "no GPRS [and] no tracking"
  • "It's simply a device that will tell us how many people bought how many beers and at what time and such like [which is] data that a standard EPOS (electronic point of sale) system would track."
  • He says they use "a global encryption standard used by the military... that has only ever been hacked or cloned in a theoretical situation, never in real life" and only use any data collected for "assisting visitors with customer service enquiries".
  •  
    This article explains how music festivals are innovating their use of the RFID bracelets to create a more immersive guest experience. These bands, on top of being used as a cashless payment system, entry pass, and VIP entrance, festivals are now looking to use these bands to in creative ways including linking them to apps and augmented realty technologies to "gameify" the experience. Possibilities include having check- in sites to collect points for real- life prizes, allowing entrance to specialized areas, and creating mission logs so guests can remember their experience.
« First ‹ Previous 121 - 140 of 153 Next ›
Showing 20 items per page