Skip to main content

Home/ Hospitality Technology/ Group items tagged hacks

Rss Feed Group items tagged

tashaemunnings

Why the Adoption of Biometrics Will Rise - TheStreet - 0 views

  • Biometrics allows for automated check-in and re-check-in at any venue
  • The adoption of using consumer fingerprints or their faces instead of tickets comes with its risks.
  • "Biometrics is a double-edged sword when it comes to security," he said. "On the one hand, it’s a better and more reliable way to secure your identity or account, rather than having to remember a password and passwords get hacked all the time. Even two-factor authentication is proving to be much more vulnerable than many people thought."
  • ...7 more annotations...
  • Another concern is that biometrics could also contain information about your health and genetics.
  • "The good news is that biometric data theft still has only a limited real-world potential, since it’s not easy to spoof somebody’s biometrics, although it is possible
  • comes
  • Several hospitality venues have already started using facial recognition, including cruise ships
  • Some cruise ships take a photo of passengers at embarkation and that data is used from contact tracing to selling consumers photos they appear in and ensuring everyone disembarks at the end of the journey.
  • "Hotels likewise have experimented, with Marriott planning to eventually use facial recognition across all their properties."
  • "This is easier and more cost effective than other forms of authentication, it allows for greater efficiencies and it’s better at preventing fraud,
  •  
    Using biometrics to allow people access to events and keep track of their whereabouts is becoming more and more common across several industries including hospitality. Although seemingly helpful and more efficient that regular tickets or keys, there also seem to be concerns about the security. However, many believe that although these concerns exist, the use of biometrics is one of the safest verification routes currently.
shineal

What Brain-Computer Interfaces Could Mean for the Future of Work - 0 views

  • Brain computer interfaces (BCIs) are slowly moving into the mass market. In the next few years, we might be able to control our PowerPoint presentation or Excel files using only our brains. And companies may want to use BCI technology to monitor the attention levels and mental states of their employees
  • imagine if you could prepare your next presentation using only your thoughts. These scenarios might soon become a reality thanks to the development of brain-computer interfaces (BCIs).
  • I expect to see a growing number of professionals leveraging BCI tools to improve their performance at work. For example, your BCI could detect that your attention level is too low compared with the importance of a given meeting or task and trigger an alert. It could also adapt the lighting of your office based on how stressed you are, or prevent you from using your company car if drowsiness is detected.
  • ...6 more annotations...
  • A Toronto-based startup called “Muse” has developed a sensing headband that gives real-time information about what’s going on in your brain.
  • Despite these promising results, some experts, such as Theodore Zanto, a director of the UCSF neuroscience program, say that while BCIs based on EEG scans can determine a user’s attention levels, they are as of yet still incapable of differentiating what the user is actually focused on.
  • Experts believe that around “15-30% of individuals are inherently not able to produce brain signals robust enough to operate a BCI.” Obviously, this situation can lead to wrong results and ultimately bad decisions from companies. BCIs still have a long way to go, and much improvement is needed.
  • In the next few years, we might be able to control our PowerPoint presentation or Excel files using only our brains. Some prototypes can translate brain activity into text or instructions for a computer, and in theory, as the technology improves, we’ll see people using BCIs to write memos or reports at work.
  • Researchers are also experimenting with “passthoughts” as an alternative to passwords. Soon, we might log into our various devices and platforms using our thoughts. As described in this IEEE Spectrum article, “When we perform mental tasks like picturing a shape or singing a song in our heads, our brains generate unique neuronal electrical signals. A billion people could mentally hum the same song and no two brain-wave patterns generated by that task would be alike. An electroencephalograph (EEG) would read those brain waves using noninvasive electrodes that record the signals. The unique patterns can be used like a password or biometric identification.”
  • BCIs aren’t a perfect technology — there’s no telling what sort of mistakes or mishaps we’ll encounter as companies and individuals begin to use these devices in the real-world. What’s more, BCIs — like any technology — can be hacked. Hackers can access a BCI headband and create/send manipulated EEG data. A hacker could also intercept and alter all data transmitted by your BCI. It’s possible that a hacker could steal your “passthoughts” user credentials and interact with your devices (laptop, car, etc.). These risks can directly impact our physical integrity. Brain data could also be stolen to be used against you for extortion purposes. The potential for serious abuse is significant.
  •  
    This article is on Brain-Computer Interfaces (BCIs) and what the future of the work environment could be. Based on the information published, employers would have the ability to leverage brain activities to effect greater productivity in the workplace. However, since BCIs are capable of detecting the mental state and thoughts of employees, there are many privacy and ethical issues that will certainly be derived from the use of these types of technologies.
armanyleblanc767

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Reliance on Paying By Card
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • challenge to maintain teams of well-trained staff.
  • Compliance
  • Insider Threats
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
anaferia

The biggest cyber attacks of 2022 | BCS - 0 views

  • In a year of global inflation and massive rises in energy costs, it should come as no surprise that the cost of a data breach has also reached an all-time high.
  • average total cost of $4.5m
  • Amongst the 550 companies that IBM contacted that had experienced a data breach, a disappointing 83% had experienced more than one in the same period
  • ...9 more annotations...
  • common attack vector remains credential theft (19%) then phishing (16%), misconfigured cloud (15%) and vulnerabilities in third-party software (13%).
  • Russia has, for many years, attacked Ukrainian infrastructure such as power grids, internet infrastructure and banks. Since the outbreak of physical hostilities, this has extended to systems related to government administration and the military.
  • The Russia-linked cyber gang known as Conti managed to cause major disruption to financial operations throughout Costa Rica in April.
  • cripple Costa Rica’s import/export business.
  • A group known as Lapsus$ began 2022 with a string of high profile targets including Nvidia, Ubisoft, Samsung and Microsoft. In each case, data was stolen and in many cases leaked online. Their operating model is extortion where access is most often gained through phishing and then they seek out the most sensitive data they can find and steal it. Often, they do not deploy encrypting software at all.
  • Hacking back is where offensive security experts will attempt to compromise attacker’s machines. This can be legally murky as often the attacking machines are compromised third parties.
  • June this year, a former Amazon employee, Paige Thompson, was convicted for her role in the 2019 Capital One breach. While working for Amazon Web Services (AWS), she exploited her knowledge of cloud server vulnerabilities and stole personal information of over 100 million people.
  • Ransomware, while not the overwhelming headline grabber it was a year ago, is still a major and terrifying threat to many companies
  • The main attack vectors continue to be credential theft and phishing emails so it is vital to continue to raise awareness through corporate training and public ad campaigns. Finally, the conflict in Ukraine is showing how effective cyber weapons can be in disrupting command and control in a war.
  •  
    To summarize, this article states that, it should not come as a surprise that the cost of a data breach has also increased to an all-time high in a year marked by significant increases in energy prices and worldwide inflation. According to IBM's Cost of Data Breaches Report 2022, the average overall cost is $4.5 million. Additionally, even if ransomware isn't garnering as much attention as it did a year ago, it still poses a serious danger to many businesses. Credential theft and phishing emails are still the major threat vectors, therefore it's critical to keep spreading awareness through public awareness campaigns and business training. Finally, the situation in Ukraine is demonstrating the potency of cyber weapons in sabotaging command and control in a fight.
llibe010

This is personal: Cybersecurity and the hospitality industry | HLB - 1 views

  • The hospitality industry has been a prime target for cyberattacks in recent years. From ransomware to data breaches, hotel chains and other businesses in the hospitality industry have experienced a variety of attacks
  • First, hospitality businesses deal with large amounts of Personally Identifiable Information (PII), including credit card information and contact details of customers.
  • Second, the hospitality industry relies heavily on technology, creating additional attack surfaces for criminals to exploit. For example, many hotels use electronic key cards that can be easily hacked
  • ...6 more annotations...
  • Finally, the hospitality industry is often slow to adopt new security measures, leaving it behind the curve in protecting against emerging threats and scams.  
  • One type of attack is known as malware injection. This occurs when malicious software is injected into a hotel's or restaurant's computer system. The malware can then be used to steal customer data or take control of the system
  • Fortunately, there are steps that the hospitality industry can take to protect itself from these types of attacks, including investing in robust cybersecurity solutions, educating employees about cybersecurity risks and best practices, which can help reduce employee mistakes that could lead to an attack, and staying up-to-date on cybersecurity threats and trends
  • To protect themselves, these businesses need to follow GDPR guidelines (General Data Protection Regulation), a set of regulations that European Union member states must implement to protect digital data privacy
  • The most important thing you can do is to use a unique password for each account. This may seem like a lot of work, but it's the only way to ensure that your data is safe
  • This ensures that if an attack does occur, critical information can be recovered quickly. Additionally, it is important to keep software updated with the latest security patches. Many attacks exploit known vulnerabilities, so by staying up-to-date, businesses can make it more difficult for attackers to access their systems
  •  
    The article discusses the relevance of cybersecurity for hotels in light of more and more people working from home after the pandemic. Common risks and their safeguards have been described along with a set of best practices that hotels should adopt to prevent breaches.
earagon22

PCI and PSD2 Compliance: Why Are Hotels on the Hook? - 0 views

  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • Established in 2006, PCI stands for the Payment Card Industry Data Security Standard, which contains guidelines for accepting, storing, and processing credit card information
  • ...12 more annotations...
  • These days, cyber security and regulatory compliance aren’t just necessary skills for the IT team. Every hotel manager - even the “non-tech savvy” ones - must understand these crucial components of data protection in order to protect their businesses.
  • A few rules of thumb include using PCI-compliant POS and PMS providers, storing both digital and paper data securely, and limiting access to sensitive data to only the employees who truly need it.
  • Examples of these guidelines include using an online checkout/payment page controlled by a licensed 3rd-party service provider, storing credit card data via a 3rd-party “vault” provider rather than in your own system, and masking the full credit card number on receipts, showing only the last 4 digits instead.
    • earagon22
       
      As an example, if guests book through a 3rd-party like Expedia then I at the front desk see an Expedia card not the guest's card. The card I see is pre-loaded with the amount of the stay ONLY. Even then, I cannot see the 3rd party's full cc number. I only see the last 4 digits just like guest credit cards.
  • “The attack on Marriott was hapless and still has many gaps to fill on what actually happened. A popular entry point for adversaries is through email spoofing. This tactic is used in phishing in order to get malware onto a target network to then move laterally across all systems,” Ryan Cornateanu, Application Security Engineer @ CrowdStrike.
    • earagon22
       
      This attack mentioned compromised cc details, passport numbers, and dates of birth for 300 million guests in their database. This happened in 2014. https://hoteltechreport.com/news/marriott-data-breach#:~:text=And%2C%20the%20financial%20burden%20is,the%20largest%20data%20breaches%20ever.
  • because of increased payment security, the amount of chargebacks will likely become much lower, which is something all hoteliers can celebrate.
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should still comply, since regulations like these are often mirrored in the United States and other countries soon after.
  • PSD2 includes enhanced guidelines for online payments and the handling of sensitive data to reduce the risk of credit theft, fraud, and security breaches. One major change is the requirement of Strong Customer Authentication (SCA) for online transactions. With SCA, rather than simply typing in a credit card number and clicking “pay,” consumers will need to provide a second layer of authentication, which could be a PIN code or an SMS verification code, before the payment can go through.
  • Guests book nearly three-quarters of hotel reservations online, so PSD2 will likely impact every hotelier as Strong Customer Authentication (SCA) becomes a requirement for payment processing.
  • Are any charges processed after the guest has checked out, such as minibar chargers? To prevent any hiccups with payment after check-out, charge an authorization on the guest’s card for the full incidental amount and have the guest provide two-factor authentication in person, such as chip-and-pin, when the guest checks in.
    • earagon22
       
      A property rule where I work is that each guest must insert or tap their cc at check-in in order to follow this rule and we take an incidental hold each night. Guests that have not traveled for years are surprised by incidental holds which makes sense based on when this was implemented.
  • The key takeaway here is that transactions initiated by the hotel at a time when the guest isn’t present won’t comply with PSD2 requirements.
  • protect consumers’ sensitive data, and, as a result, every merchant that uses credit card information must follow these rules, from small businesses to large corporations.
  • By partnering with a trusted technology solution and investing in PCI and PSD2 compliance now, hoteliers can prevent the potential catastrophe that could come with the theft of sensitive data.
  •  
    PCI compliance is a crucial and necessary set of guidelines that all hotels must follow. The Payment Card Industry Security Standard was created in 2006 and outlines rules regarding accepting, storing, and/or processing card information. These rules were put into place to protect consumers sensitive information. For example, in 2014 Marriott hotels was attacked and 300 million guests information was compromised. This attack led to new regulations being put into place, the Payment Services Directive 2 (PSD2). These regulations take into account international customers and enhanced guidelines for sensitive data.
mmdmd99999

Google Glass: What Happened To The Futuristic Smart Glasses? - 0 views

  • Google Glass smart glasses were once slated as the next big thing in tech. While they no longer exist, the technology lives on in future products.
  • Google had been developing smart glasses for multiple years before a public retail version became available in 2014, following a limited-availability run in 2013.
  • Facebook
  • ...5 more annotations...
  • hand-free means of viewing content and performing tasks.
  • $1,500 asking price
  • Google Glass was ultimately a failure
  • here are two major reasons why the product failed from the consumer perspective, and the first was the design.
  • The second reason is the concerns consumers had about the product possibly collecting data from users or being vulnerable to hacking from outsiders.
  •  
    google failed at launching the google glass, but it might make a comeback in 2022
tvill22

Cybersecurity risks shaping hospitality in 2022 | Wipfli - 0 views

  • A breach could have enormous impact on consumer confidence and bookings. Hackers can takeover mechanical systems and shut down facilities.
  • The average cost of a data breach is $4 million on top of revenue losses due to long-term damage reputations.
  • Hotels also face risk from inaction; guests may perceive low-tech processes as a lack of amenities or as less safe.
  • ...8 more annotations...
  • Outsourcing can speed up development and deployment – but has huge security implications so vendor evaluations need to be thorough.  
  • Data compliance and cybersecurity training should occur annually, at least. “Secret shopper”-style testing can happen year-round.
  • Create a standard interrogation procedure to evaluate and measure the stability of each potential partner and solution
  • Nearly 90% of hacking incidents involved some sort of credential abuse. Hotels can activate multifactor authentication to improve security instantly.
  • For example, is the vendor in a secure financial situation? Does its geography or location create vulnerabilities? How does it secure its data and property?
  • Being prepared can minimize the impact of an attack or data breach.
  • As cyber threats increase, large groups and conventions may require cyber insurance as part of their booking contract.
  • A consistent and thorough evaluation process can lead hotels toward a solution that works for everyone – creating a secure and efficient work environment and a safe and inviting guest experience. 
  •  
    This article addresses the cybersecurity trends in hospitality for 2022. They talked about the risks for the hospitality industry and how much it can cost the company if there is a breach. It also talks about how bringing third party vendors in can be a risk to your company. It ends by talking about how to protect todays infrastructure by locking down logins, empowering staff, making a plan, and getting insured.
alo328

Electronic Waste Is Becoming a Global Environmental Problem | Time - 1 views

  • s a tech-hungry nation flush with cash gets ready to upgrade to the next generation of lightning-fast 5G devices, there is a surprising environmental cost to be reckoned with: a fresh mountain of obsolete gadgets. About 6 million lb
  • Workers with hammers hack at the bulkiest devices, while others remove dangerous components like lithium-ion batteries
  • That cycle of consumption has made electronics waste the world’s fastest-growing s
  • ...17 more annotations...
  • “In our society, we always have to have the new, best product,” said Aaron Blum, the co-founder and chief operating officer of ERI, on a tour of the facility
  • Even when e-waste rules exist, it’s left up to consumers to handle their old devices prop
  • But less than a quarter of all U.S. electronic waste is recycled, according to a United Nations estimate. The rest is incinerated or ends up in landfills
  • Environmental concerns aside, compacting flammable lithium-ion batteries with paper recycling can be dangerous; recycling centers have reported an uptick in fires
  • 5G promises faster speeds and other benefits. But experts say it will also result in a dramatic increase in e-waste, as millions of smartphones, modems and other gadgets incompatible with 5G networks are made obsolete
  • ly. But recycling them can be a
  • We don’t necessarily have the measures to make sure people aren’t throwing it away,” Walters said.
  • Even so, some companies are increasing their recycling efforts on their own, whether for the economic benefit or the public relations boost (mining fresh materials has financial, environmental and human costs of its own). For instance, Apple in 2018 introduced Daisy, a smartphone-recycling robot that can take apart 200 iPhones every hour, and says it diverted 48,000 metric tons of electronic waste from landfills that year
  • Our products today don’t last as long as they used to, and it’s a strategy by manufacturers to force us in
  • o shorter and shorter upgrade cycles,” said Kyle Wiens, the founder of iFixit
  • Some environmental groups say multibillion-dollar companies like Apple and Samsung should pick up the cost of recycling the devices they sell. Lawmakers in parts of Europe and Canada and in some U.S. states have passed so-called Extended Producer Responsibility (EPR) laws, which require manufacturers to establish and fund systems to recycle or collect obsolete products
  • One solution is to make electronics last as long as they once did. At ERI’s facility, Shegerian showed TIME dozens of televisions from the 1970s and 1980s that stopped working only recently
  • About 6 million lb. of discarded electronics are already processed monthly at recycling giant ERI’s Fresno plant.
  • Americans spent $71 billion on telephone and communication equipment in 2017, nearly five times what they spent in 2010 even when adjusted for inflation, according to the Bureau of Economic Analysis. (Apple alone sold 60 million iPhones domestically last year, according to Counterpoint Research.)
  • That stream is expected to turn into a torrent as the world upgrades to 5G, the next big step in wireless technology.
  • Part of the problem is regulatory. Only 19 states have laws banning electronics from the regular trash. In states without such rules, like Nevada, electronics often end up in garbage and recycling bins, said Jeremy Walters, a community-relations manager for waste collector Republic Services
  • Our products today don’t last as long as they used to, and it’s a strategy by manufacturers to force us into shorter and shorter upgrade cycles,”
  •  
    Advancement in technology every day has led to the dumping of electronic gadgets no longer wanted to the environment. Heaps of unwanted electronic waste, hazardous containing substances like lithium-ion batteries, are dumped into the ground with all their toxicology. As the world upgrades to 5G, it will end in a rapid surge in e-waste. According to John Shegerian thinks people are yet to see the magnitude of the transition to 5G, it is tremendous than changing from analog to digital (Samuels & Calif, 2019). However, it comes with many advantages; its outcome is a drastic rise in electronic waste. The ERI recycles less than a quarter of the United States' e-waste according to the estimate made by the United Nations, and the other dumped in landfills. This waste contains harmful metals such as beryllium and mercury, that have adverse environmental dangers. Among the 50 states in the United States, only 19 States have imposed a law to bun electronics from regular trash (Samuels & Calif, 2019); the rest of the states, like Nevada they are incorporated in recycling and trash bins, according to Jeremy Walters's manager for waste collection. The consumers are left to handle their e-waste even though there are e-waste rules. Multibillion companies should the responsibility and cater for the cost of recycling for the products they are manufacturing. Companies like Apple and Samsung, nonetheless the United States is repelling modifications to the prevailing laws, according to Scott Cassel Product Stewardship Institute found. However, some companies are improving through increasing their recycling efforts. For instance, Daisy, a recycling robot introduced by Apple, can collect more than 200 iPhones for recycling every hour. But this is not enough since e-waste generated annually globally is more than we can imagine, which almost 50 tons (Samuels & Calif, 2019). In a nutshell, technology can bring many benefits to society. Still, it can also harm both the environment and the p
  •  
    the article explores the dangers of elctronic waste and give suggestions on how to better monitor this issue and resolve.
  •  
    This article explains how the rapid advancement of technology has impulsed an increase in the use of technology, however has resulted in a rise in ewaste percentage. This happens because companies have opted for creating products that do not last for long periods of time, since they want to sell future products.
dvieg001

Hotels in hackers' sights as technology replaces personal touch | Financial Times - 1 views

  • Hotels and hospitality businesses are now the third most targeted by cyber attackers of all industry sectors.
  • they have become a rich mine of data for hackers with nefarious intentions.
  • Hackers see international hotel chains, which process a huge volume of transactions, as easy pickings
  • ...6 more annotations...
  • he increased use of technology to replace face-to-face services such as check-in and on-site payments has only raised this risk.
  • One of the most high-profile cyber incidents in recent times was the breach of Starwood’s database in 2014, before the group was bought by Marriott, the world’s largest hotel chain. That hack, which was only discovered after the deal, exposed the data of about half a billion customers, Marriott said, when it revealed the impact in 2018.
  • The company sped up planned investment into data security and improved technology, such as software that detects suspicious cyber behaviour in real time, Van der Walt adds.
  • As cloud computing services have expanded, hotels have pushed more data storage towards external holders such as Amazon Web Services or Oracle
  • Many hoteliers additionally employ third-party agencies to manage credit card details and keep different forms of data separate:
  • And with guests demanding an increasingly personalised and individually-tailored service, particularly from the well-known hotel brands, data is likely to remain a precious commodity in need of protection.
  •  
    This article explains how and why hotels went from being in the bottom 13% to the top 3 most targeted industry for cyber attacks. It talks about how the implementation of technology to handle customer date has made the industry vulnerable and also how corporations are battling the issue by using separate third party companies to store data and handle credit card information.
mattiebell

The Top 6 Cyberthreat Actors: Today's Most Active Groups - 1 views

  • ALPHV is a relatively new and rapidly growing cybercrime group. First observed near the end of 2021, the ALPHV group gained attention for innovative extortion tactics, and unconventional attack methods.
  • To date, BlackCat ransomware has struck retail, financial, manufacturing, government, technology, education, and transportation, across a range of countries that includes the U.S., Australia, Japan, Italy, Indonesia, India, and Germany.
  • Some of the ransomware it utilizes includes Cobalt Strike, Mimikatz, and AdFind. One of the most dangerous aspects of APT29 is that they have been known to develop their own set of custom tools for hacking campaigns.
  • ...1 more annotation...
  • TA505 is a significant player in the global cybercrime scene, and has been a driver of global trends in the cybercriminal underworld. The group targets education, finance, healthcare, hospitality, and retail worldwide. It is also known for its long-term cyberattack lifecycle, sometimes persisting in a target's network conducting reconnaissance for weeks — even months — successfully avoiding detection as it patiently identifies the highest-value targets in the victim’s environment.
  •  
    This article discusses the most active cyber threats that exist today. I chose this article because it highlights a topic many industry leaders aren't aware of. Many view cyber attacks as crimes of opportunity, which they often are. However, we have to remember that there are also dedicated groups who are committed to acquiring data they shouldn't have. Knowing these groups, their signs, and what industries they target can help create a stronger team and plan to protect against them. These are especially common in hospitality and retail.
avanzado

Hotel Safety: Security for Hospitality and Hotel Management Companies | By Kacey Bradley - 1 views

  • improved software allows hotel owners to match up specific transactions with the surveillance footage,
  • IT and security departments should work in conjunction
  • Offering employees profit-sharing, a stake in the hotel's future is an effective way to improve security.
  • ...8 more annotations...
  • Mobile keys, on the other hand, strengthen security and allow guests to bypass the front desk altogether.
  • Most commercial properties have some type of video surveillance system.
  • In today's technologically advanced world, guest and staff security are more critical than ever. Luckily, you can take plenty of steps to make improvements. From smart surveillance technology to secure Wi-Fi networks, read the advice below to improve your hotel's setup.
  • Your Wi-Fi should be a secure network users must log in to before using. Make the username and password easy to find. Also, alert guests about possible security risks, such as connecting to public Wi-Fi networks nearby that don't require a password.
  • A straightforward update is an in-room safe. It's easy to come up with relevant items to stash inside, especially when traveling. Guests can stow essential documents, passports, collectible coins, souvenir gifts and more.
  • A safe and secure environment all starts with knowledgeable staff. Set up regular meetings with all employees to talk about guest safety. Go over OSHA requirements and how the team can stay safe in the event of fire and evacuation. You should also provide training on compliance regulations and bloodborne pathogens.
  • Profit-sharing gives employees room to grow in a chaotic industry. Most profits come in the form of an end-of-year bonus people can use to their hearts' desire. Beyond increased loyalty, employees with profit-sharing options are more likely to take ownership of their role in the business and improve productivity.
  • In today's technologically advanced world, guest and staff security are more critical than ever. Luckily, you can take plenty of steps to make improvements. From smart surveillance technology to secure Wi-Fi networks, read the advice below to improve your hotel's setup.
  •  
    This article basically gives tips about how to create a safe hotel. There are many ways you can ensure that your staff and hotel guests are protected.
  • ...2 more comments...
  •  
    Among other ways that hotels in the modern are using to ensure safety and security, the article looks at cybersecurity. The author proposes that hotels' security and IT departments should work together to create a safe online environment that "prevents unwanted third parties, like hackers, from intercepting private guest data." This reiterates the significance of updating computer equipment to mitigate potential threats.
  •  
    This is a great article that explains the different ways hotels are trying to make staying at a hotel safer. They start by explaining how they have surveillance cameras placed around the hotel to help them see everything that is happening all at once. Cybersecurity protects the hotels computer systems from being hacked and having people steal all the hotels and customers information. Mobile room keys helps guests find their keys faster because they will now have it on their mobile devices. For hotels the guests safety are their top priority and they train their staff to believe in the same thing.
  •  
    This article is about steps a property can take in order to ensure the safety of their employees and guests. This includes: surveillance cameras, cybersecurity, mobile room keys, safes in rooms, among other things. - Be sure to invest in high-quality cameras that can pick up the little details, such as facial features and bill amounts. - Your Wi-Fi should be a secure network users must log in to before using. Make the username and password easy to find. - Mobile keys strengthen security and allow guests to bypass the front desk altogether. -Set up regular meetings with all employees to talk about guest safety. -In terms of profit-sharing, workers feel a sense of pride or ownership, they will keep their eyes and ears open for signs of waste, fraud or theft.
  •  
    This article talks about hotel's safety and the usage of surveillance cameras, cybersecruity, mobile room keys, guest safety, staff training, and profit sharing. Each section talks about the procedures that should be taken to keep guest and staff safe.
jsanc478

Why hotels need strong security for contactless check-in | Hotel Management - 2 views

  • Contactless check-ins have become an important option, allowing guests to bypass the usual check-in at the front desk and access their reserved room using their mobile device.
    • jsanc478
       
      This article talk about how the pandemic change the way hotels will operated now on for a better customer service with their guest as check ins and other updates. One ofd the principle changes will be, mobilize check in. Having the guest check in with the phone and how safe that can be for the guest. There is always fraud around that hack information on business likes this, but how hotels can protect this type of fraud, by linking digital room keys to theirs guest's mobile devices.
  • Some hotels are also allowing their guests to use their mobile devices as digital keys
  • Concerns about this type of fraud are legitimate. Yet, if hotel operators adopt a multilayered approach, it will be more difficult for fraudsters to ply their trade.
  • ...7 more annotations...
  • However, it is also an appealing avenue of potential fraud for hackers because mobile devices are one of the most common targets for identity theft
  • Limiting contactless check-in options only to certain guests,
  • Linking digital room keys to their guests’ mobile devices themselves, rather than to their guests’ phone numbers, ensures the hotel operators are communicating directly
  • Having a multifactor authentication process established for new guests or those guests who are showing a different behavior pattern than in the past
  • Implementing a notification system i
  • Developing rules around certain reservation dollar amounts
  • Every hotel operator will have to design these options based upon the needs of their hotels.
  •  
    More hotels are now using contactless check-ins by allowing the guest to be able to use their mobile devices as their digital room key. This is great for the pandemic to social distance but potentially risky due to hackers. As long as hotel operators adopt multilayer security strategies then they can provide a safe and secure environment for everyone.
« First ‹ Previous 141 - 153 of 153
Showing 20 items per page