Skip to main content

Home/ Hospitality Technology/ Group items tagged issues

Rss Feed Group items tagged

Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
Nelson Placa

Hackers to Open Hotel Rooms in Seconds. - 1 views

  • The company’s response to that epic security bug has two parts–a quick fix,  and a more rigorous one, both of which it plans to make available by the end of  August: First, it’s issuing caps that cover the data port Brocious’s hack  exploited, which can only be removed by opening the lock’s case. To further  stymie hackers who would try to open the locks and remove that cap, it’s also  sending customers new, more obscure Torx screws to replace those on the cases of  installed locks.  The second fix is more substantial: Onity will offer its customers new  circuit boards and firmware that ostensibly fix the problems Brocious  demonstrated–But Onity is asking owners of some models of its locks of some to  pay a “nominal fee” for the fix, while offering others “special pricing  programs” to cover the cost of replacing components. It’s also asking its  customers to cover the shipping and labor costs of making hardware changes to  the millions of locks worldwide.
  •  
    On August 17th, 2012 Forbes Magazine wrote about Onity's security breach with hotels room doors that affected over 4 million hotel rooms across the globe. During a security conference, Cody Brocious, a program developer showed how simply he could insert a device into the data port to access hotel rooms. The cost of this device cost him $50 to build. The company responded to the security issues with a two part resolution. To avoid hackers from accessing the data so easily, Onity will be issuing the hotels new caps that will cover the data case on the doors. Onity is also protecting the equipment with obscure torx screws that will enable the hackers from accessing the panel. The second fix is more costly and challenging for Onity. The company has created a new circuit board and firmware that allegedly fix the security issue. However, Onity is asking hotel owners to pay a nominal fee to help with the fix. Onity could face many financial hurtle through the recall of the 4 million door locks that need to be replaced. The security and safety of many travelers are at risk if this issue is not resolved. Companies such as Marriott International, Starwood Hotels and Hilton utilize Onity's key system across the globe (http://en.onity.com/companyprofile/Pages/Hotel-Resort-Worldwide-References.aspx). These companies won't be affected by the cost associated with the fix; however the small and independently owned and operated hotels will be affected. The question Brocious wrote on his blog and I also ask myself; how many hotels will refrain from properly fixing the issue? Are the major corporations such as Marriott and Starwood given each hotel a deadline to complete such project? Since neither company owns the properly, they simply operate the hotel, how much money and how quickly are owner willing to get this issue resolved?
Jing Huang

Hotel Lock Firm's Security Fix Requires Hardware Changes For Millions Of Keycard Locks ... - 4 views

  • Good news for the security of hotels and travelers: Onity, whose keycard locks can be found on at least four million rooms around the world, has a plan to fix a security flaw
  • Black Hat security conference by Cody Brocious, a Mozilla developer who showed that he was able to insert a device he built for less than $50 into the data port on the underside of Onity’s locks, read their memory to find a decryption key, and use it to gain access to the lock’s firmware and trigger its open command in a matter of seconds.
  • The company’s response to that epic security bug has two parts–a quick fix, and a more rigorous one, both of which it plans to make available by the end of August: First, it’s issuing caps that cover the data port Brocious’s hack exploited, which can only be removed by opening the lock’s case.
  • ...6 more annotations...
  • “If such a significant issue were to exist in a car, customers would likely expect a complete recall at the expense of the manufacturer,” Brocious adds. “I can’t help but feel that Onity has the same responsibility to their customers, and to customers staying in hotels protected by Onity locks.
  • But since then, two hackers who asked not to have their names revealed have claimed in emails to me that they independently replicated the exploit and refined it, so that it now works on any Onity hotel room lock. Brocious tells me he’s spoken with eight or nine hackers who have all been able to replicate his work to some degree.
  • “We want to assure you that Onity is working on providing you with a solution that will address any potential risks related to the alleged vulnerability of these locks,”
  • Onity isn’t the only one to come under fire in wake of its security flap: Brocious has also been criticized for failing to warn Onity ahead of his Black Hat demonstration and for selling a licence to use his Onity-hacking trick to a locksmith training firm for $20,000 long before he made his findings public.
  • Onity issued a statement responding to last month’s presentation at the Black Hat security conference by Cody Brocious, a Mozilla developer who showed that he was able to insert a device he built for less than $50 into the data port on the underside of Onity’s locks, read their memory to find a decryption key, and use it to gain access to the lock’s firmware and trigger its open command in a matter of seconds.
  • Onity will offer its customers new circuit boards and firmware that ostensibly fix the problems Brocious demonstrated–But Onity is asking owners of some models of its locks of some to pay a “nominal fee” for the fix, while offering others “special pricing programs” to cover the cost of replacing components.
  •  
    In the article, "Hotel Lock Firm's Security Fix Requires Hardware Changes For Millions Of Keycard Locks," it talks about how Onity has a plan to fix a security flaw that allows hackers to insert a homemade device into the lock and open the door in a matter of second. The only problem with this new plan is that it requires hardware changes to every affected lock and it even might require it customers to pay for it. "Black Hat security conference by Cody Brocious, a Mozilla developer who showed that he was able to insert a device he built for less than $50 into the data port on the underside of Onity's locks, read their memory to find a decryption key, and use it to gain access to the lock's firmware and trigger its open command in a matter of seconds." It seems crazy that hackers can break in so easily, so maybe this expensive security could be worth it in the long run. The company responded with two different parts, first, it's issuing caps that cover the data port Brocious's hack exploited and the second more substantial: Onity will offer its customers new circuit boards and firmware that ostensibly fix the problems. Before reading this article I had no idea that it was so easy for hackers to get into hotel rooms, this really makes you think twice before you decide which hotel you will be staying at!
  •  
    The hardware of hotel is the locker. This article showed us there is a new key card locker was discovered by Onity's. It is more security but it need to change all the affected lock. It is a lock built for less than $50 into the data port on the underside of the Onity's locks. The company's response to that epic security bug has two parts-a quick fix, and a more rigorous one, both of which it plans to make available by the end of August: First, it's issuing caps that cover the data port Brocious's hack exploited, which can only be removed by opening the lock's case. To further stymie hackers who would try to open the locks and remove that cap, it's also sending customers new, more obscure Torx screws to replace those on the cases of installed locks.The company's response to that epic security bug has two parts-a quick fix, and a more rigorous one, both of which it plans to make available by the end of August: First, it's issuing caps that cover the data port Brocious's hack exploited, which can only be removed by opening the lock's case. To further stymie hackers who would try to open the locks and remove that cap, it's also sending customers new, more obscure Torx screws to replace those on the cases of installed locks. The safe issue became the most important issue of the new products. It will cost more money of each hotel and it is really safe or not is still a question. 
yvenisem

Electronic Waste: A Growing Concern in Today's Environment - 0 views

shared by yvenisem on 28 Sep 20 - No Cached
  • Over the past two decades, the global market of electrical and electronic equipment (EEE) continues to grow exponentially, while the lifespan of those products becomes shorter and shorter. Therefore, business as well as waste management officials are facing a new challenge, and e-Waste or waste electrical and electronic equipment (WEEE) is receiving considerable amount of attention from policy makers.
    • yvenisem
       
      From this we see technology market is progressing to grow however the lifespan of these items lessesns. In turn, this creates a problem for those that work in the waste managemnent sector and calls for politics to get involved.
  • e-Waste has raised concerns because many components in these products are toxic and do not biodegrade easily if at all.
    • yvenisem
       
      Besides contributing to landfills e-waste can also contain many toxic chemicals. I know that mercury and other harmful chemicals can are common in electronics.
  • However, even with these regulations, all hazardous materials that are used in newly manufactured products cannot be fully controlled, and management of e-Waste within the supply chain cannot be fully addressed.
    • yvenisem
       
      From this we can see that even with additional policies enacted they are simply not enough to address the e-waste issue. In my opinion with a issue this severe more drastic measures should be taken considering the options that have been exacterbated.
  • ...2 more annotations...
  • Most developing countries lack the waste removal infrastructure and technical capacities necessary to ensure the safe disposal of hazardous waste. And e-Waste has been linked to a variety of health problems in these countries, including cancer, neurological and respiratory disorders, and birth defects
    • yvenisem
       
      One of the biggest issues is that developing countries do not have the resources or infastructure to properly dispose of e-waste. I know that economics play a huge roll in this issue as 3rd world countries are often used as dumping places for 1st world waste, and these problems are not being addressed because of sytematic limitations. The health concerns are also staggering, they include: cancer, birth defects etc...
  • For e-Waste management systems, some of the most successful examples can be found in countries such as Switzerland and the Netherlands [16 D. Sinha-Khetriwal, P. Kraeuchi, and R. Widmer, “Producer responsibility for e-waste management: key issues for consideration—learning from the Swiss experience,” Journal of Environmental Management, vol. 90, no. 1, pp. 153–165, 2009. View at: Publisher Site | Google Scholar See in References ]. Experience of the Swiss e-Waste management system is shown as an example in this paper. Generally, the Swiss e-Waste management system can be viewed as an ERP-based system, where each stakeholder has their own clear definition of role and responsibilities as shown in Table 4.
    • yvenisem
       
      Here we see that more sucessful applications have been implemented in Nordic countries. The author goes into further detail about the techniques used by these countries.
  •  
    The main point of this scientific report was to demonstrate how e-waste is becoming an issue and why the current structures in place today are simply not enough to overcome this issue. The author goes into detail the common issues with e-waste: hazardous materials being disposed of incorrectly, the side effects e-waste has on human and environmental life, how current infrastructures in 3rd world countries are not able to keep up with the waste load, why certain policies aren't enough and how new techniques such as the ones being applied in Nordic countries may be the answer to the issue. Ultimately the author makes the argument for why it is an issue, how the issue is growing, and presents alternatives on how to better tackle the e-waste issue.
Krystal Jost

Keycard hacker picks locks, exposes gap in hotel security - Travel Kit on NBCNews.com - 0 views

  • Last week, the self-described hacker/music aficionado demonstrated a homemade gadget that could conceivably unlock millions of hotel-room doors around the world.
  • Brocious followed up his demonstration by publishing a how-to paper that may inspire other hackers to try their hand at entering guests’ rooms without their knowledge or consent.
  • most hotel crimes are crimes of opportunity where crooks take advantage of guests’ inattention.
  •  
    Almost everyone has recently heard of Cody Brocious and his gadget that was implemented and utilized to unlock guest room doors in Onity locking systems. This issue has been recently broadcasted all over the news and has gained the awareness of millions of people, making travelers panic when staying in hotels, and questioning their safety and security. The truth is, behind the issue at hand, travelers have been utilizing hotels and other establishments without being concerned or conscious of their safety, and with some negligence, and lack of attention, they put themselves at risk in numerous different ways. Although Brocious' invention gained the attention of the public, and although he went out of his way to be sure that other hackers out there knew how to replicate the system and how to utilize it to their advantage, enabling hackers to enter guest rooms and steal their personal belongings without their permission, or potentially cause physical harm to a traveler as well. Stated in this article, according to Forbes, the gadget that Brocious invented has proven inconsistent in its effectiveness. That is not to say that it could not eventually be improved, but with the changing in technology, and now the gained awareness, hotels are focusing more intently on ensuring guest security through their technological outlets. Technology affects many aspects of a hotel guest's security - from internet access to credit card information, along with guest room locks and personal identity. The article also suggests numerous ideas for how guests can avoid a lot of problems with their safety in mind, including using secondary security systems on their door, ensuring closure of the room door when leaving he room, as well as never keeping your room number written down with your key. The article also focuses on how utilizing your energy to ensure that your belongings are safe in your room as you would in your own home, is energy more well spent than being concerned about someone
Katie Gallagher

5 pressing hotel security concerns for 2012 - 0 views

  •  
    This article was all about the hotel security concerns for 2012. The 5 things the article lists as issues are: IT, terrorism, skimmers, liability and insurance fraud, and finally security as taboo. IT in a concern for hotel security because mobile and cloud technology is becoming very popular. Companies that do not protect their information with passwords are even more at risk. Data protection needs to include end to end management so companies are not just patching the security. Terrorism is another issue that was a concern in 2012. Hotels need to keep staff and travelers knowledgeable about possible threats, but in a way that does not scare them. Campaigns were placed in airports to educate travelers about notifying security upon seeing something suspicious. Another thing that hotel security should be concerned about is skimming. Skimming is a device that catches credit card numbers. Usually there is a need for an inside man for this type of threat. These people usually aren't criminals, but opportunists. Prevention of this in your hotel could be to hire an investigative team man making that known to the employees. This will keep honest people honest. Insurance fraud is one of the greatest business risks and it's the most expensive. Claims could be as small as a guest seeking a free room for stubbing his toe to a drawn out worker's compensation case. Liability is the label that hoteliers are held liable for criminal acts of a third party. Hoteliers should properly educate themselves on these issues and consulting an attorney if necessary. The final issue is security as a taboo. Security should become a part of day to day operations and hoteliers will be better able to address it. Hotel executives should insist their GM's make security a priority. This article was written for the year 2012. I still think that all these issues are relevant in 2013.
Claire Conway

HTNG Announces Series Specifications to Improve Guest Satisfaction and Front-office Eff... - 0 views

  •  Guest room devices can now provide updates about their operational status.  If a device fails, or reports an issue within the guest room, the hotel PMS system can know immediately.  Hotel staff can then address the issue, ideally before the guest discovers the problem.
  • If a guest experiences a service issue, you can now easily share that status with other management and operational systems, so that personnel can respond appropriately.
  •  Point-of-Sale charges can now be seamlessly made to guest folios even when the connection to the property management system is unavailable.
  •  
    This article discusses the advancement in software technology for Hotel Technology Next Generation. HTNG is a self funded nonprofit organization that consist of members from hospitality companies and technology vendors. They have created a few programs that will help hotel management be more efficient when it comes to guest issues. The first program, Intelligent Guest Room Version 2.0, alerts the hotel staff when certain devices in guest rooms are malfunctioning. This will allow the device to be fixed prior to the customer noticing its malfunction which will result in better customer satisfaction, since everything will be operational in their room. They also created Customer Profile Specification Version 3.0 that helps generate guests' profiles. These profiles keep track of any issues the guest has experienced so the management team can assist them and follow up with the issues. Point of Sale 2.0 allows payments to be processed even if the PMS system is down. Being able to still process payments even though system is down will make it easier for the user to work. Hotel management should always be researching and aware of what technology is available for their company.  Incorporating systems that can help provide better customer service will always be a plus for management. The software that HTNG created seems to be well advanced and will definitely be an improvement. 
Qianlin Wang

Data Security Basics: Five Security Issues All Hotel Operators Need to Know | hospitali... - 0 views

  • This article looks at the top five issues facing hotel operators and what actionable steps can be taken to decrease the likelihood that your business will be stung by data thieves.
  • Franchise operators need to be aware, however, that an improperly configured RMA is vulnerable to data compromise attack by hackers. 
  • Transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. 
  • ...3 more annotations...
  • Hotel operators need to know that passwords, designed to keep criminals out, can also be a vulnerability in the absence of proper controls
  • Thanks to wireless networks, guests can speed though the check-in process, expedite valet parking and send room service orders directly to the kitchen.  At the same time, hotel operators should recognize that criminals can leverage improperly secured wireless networks to steal cardholder data and should implement strategies to thwart these efforts. 
  • Despite all best efforts, data compromise events can occur and every hotel operator should have a plan in place. Prompt action must be taken by hotels or restaurants that have experienced a suspected or confirmed security breach to help prevent additional exposure of cardholder data and ensure compliance with the data security requirements. 
  •  
    The article discusses five issues that hotel operations are facing, and how to decrease these issues in regards to data thieves. The first security issue discussed is "Remote Access", the article states "Many hotel operators and franchisors use remote management applications (RMAs)". This enable easy access to manage multiple locations downloads; conduct sales polls, and other systems within multiple companies. A advices to remote control issues are to change vendor default settings, in which you can create unique user IDs and complex passwords. Another advice is to "Configure the RMA", in which users are only allowed to connect to known MAC/IP. I personally don't think that creating a unique ID or account password may solve this issue, but allowing connection capability to a set IP/MAC is a wise intake. Although being able to just connect to a set MAC, will cause a limit on where and when you connect. The second security issue is "Network Security", many transaction volumes are being exposed, brand recognition as well; and that attract hackers. In order to reduce this problem, it is suggested that companies need to install and maintain a fire wall at all time. I agree with this other suggestion which is to Use outside resources to help identify new security vulnerabilities. This is great, because a company will be able to receive an outside outlook in regards to security. The last three issues that are on this list are: Password Management, Wireless Security, and Incident Response Plan. Overall it's evident that any system that has a password requirement is causing a major attraction towards security thieves. The suggestions within this article are great, but from my observation; many companies will have to put in time to track and monitor their systems. Systems can't allow to be left open without monitoring, and the internet is a lead way to all this, so any system that requires the internet must be monitored, and protected.
  •  
    Technology enables service. That's the idea, anyway. In the hotel industry, thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service. However, the hospitality industry continues to find itself targeted for damaging data compromise events by hackers. There are some good ways to decrease the attack of hackers. For example, Remote Access, many hotel operators and franchisors use remote management applications (RMAs).  Their ease of use in managing multiple locations makes them ideally suited to disseminate business downloads, conduct sales polls or survey inventory. RMAs are often packaged from vendors with default or blank passwords. Creating unique user IDs and complex passwords can reduce the risk of data compromise and help facilitate compliance with the Payment Card Industry Data Security Standards (PCI DSS). Another example is about Network Security, transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. The hotel can install and maintain a firewall at all times.  Disabling a firewall can put a business at heightened risk of Internet attacks and potential system compromise.
brianamfernandez10

Cutting Through Environmental Issues: Technology as a double-edged sword - 0 views

  • Between 1870 and 1910, per capita income in the United States rose almost 40 percent, and the value of manufacturing output increased sevenfold.
  • It took nearly three generations before the first concerted efforts were made to bring pollution under control, but once begun, progress has been real. The air quality index for the United States now shows a 42 percent improvement since 1980.
  • Technology, in other words, is a double-edged sword-one capable both of doing and undoing damage to environmental quality.
  • ...11 more annotations...
  • All the world’s economies continue to face big challenges in using energy-the lifeblood of the industrial age-while maintaining environmental quality.
  • Reductions in both by 70-80 percent since 1977 would not have been possible without substantial innovations in, most notably, electronics.
  • In the United States, the energy sector accounts for more than 85 percent of total greenhouse gas emissions, with energy-related carbon dioxide alone responsible for about 80 percent.
  • Local generation by smaller plants can not only reduce transmission losses, but also improve air quality since they can be fueled by hydrogen and natural gas-much cleaner than coal on a per kilowatt hour basis
  • Industrial and vehicular emissions, particularly of nitrogen oxides, are also detrimental to water quality.
  • Technology and policy are now beginning to address runoff pollution, but it is hard to measure, much less control, because it stems from widely scattered, “nonpoint” sources.
  • the tools of geographic information systems (GIS) using remotely sensed data have offered new ways to identify and observe these sources
  • The technologies raise some privacy concerns, for instance, that could lead polluters to cloak or hide their polluting activities, further inhibiting pollution monitoring and cleanup
  • Bioremediation treats about 5-10 percent of all toxic chemicals and other hazardous waste; has successfully treated oil, gasoline, toluene, naphthalene, pentachlorophenol (a fungicide and wood preservative), and agricultural waste; and is being used at more than 30 munitions test areas across the United States.
  • These benefits must be balanced against what some critics view as potentially large drawbacks. One concern is that bioremediation may largely immobilize rather than fully remediate contamination. Another is that instead of reverting to its original state, the site will be transformed in some unexpected way. A third concern is that the potential risks of adding genetically altered organisms to the environment, or even redistributing naturally occurring ones, may not be fully understood. The Information Revolution
  • The Information Revolution
  •  
    This article goes into depth explaining how technology affects the world that surrounds us. Although technology brings so many good things to our lives, and allows the world to constantly evolve, there are of course harmful things that come along with it. It can affect air quality, the quality of water, land, etc. Over all affecting the quality of life for those affected by this issue. As we evolve with technology, it becomes more of a issue to maintain and to properly dispose of systems no longer being used. This article describes different advancements that are being made in to help resolve this issue.
nashalsiddiqi

What are the three big technology issues for the hotel industry? | PhocusWire - 0 views

  • The fragmented nature and location of hotel systems means a guest’s credit card number could exist in multiple systems in formats of varying security in locations of varying security.
    • kmira026
       
      1st technology issue for hotel industry
  • HTNG has set up a workgroup that will a framework that will enable hotels to concentrate the storage of sensitive card data in a single system, managed securely by a vendor or the hotel company.
    • kmira026
       
      Solution for 1st technology issue
    • nashalsiddiqi
       
      is this enough?
  • it has become critical for hotels to appear correctly and accurately in search results, as search engine sites have essentially become the gateway to travel research and inspiration.
    • kmira026
       
      2nd technology issue is Unique Global Identification Numbers. Something as small as a incorrect address can cause a problem
  • ...18 more annotations...
  • In both Europe and the US, regulations are being released and revised to provide support to guests with disabilities.
  • With the increase in electronic distribution of hotel information and transactions, hotels are working to provide better information and service to guests with disabilities.
    • torte003
       
      The three main technology issues hotels are facing are PCI, ID numbers , and support for best with disabilities.
    • torte003
       
      PCI is a main security threat that they face. Having a hotels cc system hacked and all their guest information stolen is an extreme nightmare. They have tasks forces that help educate hotels on how to protect and learn more about the procedures to keep that secure.
  • I can hear some of you now – what good can possibly come from creating an ‘association of associations’? Aren’t we just creating more overhead, more cost and more bureaucracy? In a word, no.
  • From my own perspective
  • I hate wasting our scarce
  • resources, and worse, wasting the resources of our members who volunteer their time to work for us
  • Other council member organization initiatives include a white paper authored by AH&LA, a payment technologies committee established by HEDNA, and the support by OpenTravel of needed XML specification changes as required by the industry.
  • thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service.
  • three key technology issues that are having, and will continue to have, a direct strategic impact on the hospitality industry:
  • Search engine optimization is a great thin
  • PCI (payment card industry) complianceUnique identification numbers for hotelsSupport for guests with disabilities
  • ‘holy grail’
    • torte003
       
      Having wrong information about your hotel or business can be such a negative impact on business. With everyone now on google or yelp having the right information is crucial.
  • y company has become critically important for the financial stability and market credibility of the hospitality industry.Members of the HTSIC have addressed this issue in a coordinated
    • vanessavioli
       
      Cyber security is almost equal to climate change in the impact on the industry. As we move into being a cashless society, keeping guests information private is integral to the continued growth of the industry.
  • Initiatives specific to distribution include the creation of standard room definitions and descriptions, guaranteeing accessible guest rooms and removing the accessible guest room from inventory when booked. HEDNA has worked on creating this vocabulary, and OpenTravel has revised its hotel schema, annotations and code list to reflect these changes.
    • vanessavioli
       
      This is an extremely important issue for the industry. Creating an industry standard vocabulary to ensure that guests with disabilities receive the specific room and accommodations they need is a game-changer. The ease of mind that it would create for those customers is priceless.
  • And our biggest strength is our commitment to work together, to eliminate redundant work or conflicting positions, to be transparent and open in our dealings with each other, and to address the most important technological needs of the hospitality industry.
    • vanessavioli
       
      With the ease of current technology, concerns about many of the bureaucratic aspects of something like this can be quickly done or even potentially eliminated.
Krystal Jost

RG Bridge Solution Helps PMS, CRS Vendors, Hotel Chains and Internet Booking Engines (I... - 0 views

  • RG Bridge enables CRSs to look beyond their established direct connects by building a long tail of distribution, without compromising on the channel portfolio.
  • “As more and more systems emerge in the industry ecosystem, the ability to provide a single interface to update information across all systems is becoming the key differentiator between a smart technology partner and traditional vendors.”
  •  
    RateGain is a company that offers services that allow hospitality establishments to retain a "seamless" distribution with central reservations systems, global distribution systems, and property management systems. RateGain claims to enhance growth and offer support for revenue management decisions. Utilizing a central reservations system, a global distribution system, and the property management system, from a hotel standpoint, seems like you are gaining a ton of additional business and additional rooms sold. But what happens when the hotel sells out, and the inventory continues to flow in, overselling the hotel, upsetting the guests and creating an angry mob in front of the front desk, blaming the hotel for the issue instead of the lack of seamless communication between all of these systems providing this revenue? That is where a service such as RateGain comes in handy. This article focuses on the issues that have been identified regarding electronic distribution, including updating multiple system with rates and availability, manual entries, lack of synchronization between the systems, non-delivery complications with reservations and information, and lack of information provided by the source channel. Rate Gain notes these challenges and focuses on ways to improve and bridge the gaps between the services, to provide a seamless revenue gaining opportunity for an establishment. The article continues to explain how their RG Bridge implementation enhances these systems and eliminates these issues utilizing two way connectivity and allowing the hotel employee to work with channels to generate demand. It also states that they customize each connection to live up to the expectations and needs of the hotel, so that nothing will be lost or not understood. This service is a great investment for a company that continues to have these communication issues with their systems. Sometimes with the lack of communication between the global distribution system, the pr
ning sun

7 tech issues that keep your GM up at night - 1 views

  •  
    This article talks about 7 tech issues to keep your GM up at night which are convergence, reputation management and review tracking, bandwidth, PCI compliance, in-room technology, technology and ADA, in-room television. In my opinion, as a hotelier, he or she should stand both on manager and guest position to consider operate a hotel. From a manager view, they are trying to make maximum profit with minimum cost. The profit comes from comfortable environment, convenient electronic devices, considerate human interaction. Those 7 tech issue provide a detailed list about how to improve hardware in hotel to reach a cozy and speedy living environment goal. From a guest view, they are trying to gain more delight experience with less expenditure. The devices that hotel provided and service that they rendered lead guests into a homelike place. So those 7 tech issues are beneficial for both two sides.
Jennifer Koren

Automatic tipping: IRS rules change could be taxing for hospitality industry | Indianap... - 0 views

  • It could affect hiring if restaurants continue to be faced with additional costs and burdens to comply with government mandates and regulations,”
  • thanks to an IRS ruling, restaurants are being thrown into the debate — and are faced with a decision of their own: Should tipping for large parties be left solely to the customer or should the restaurant tack it on to the bill?
  • “When they spend $200 and leave $20, you’re losing out on about $16 or $17 when we already pay a tip out to a host, bartender and bussers. It really makes the income of a server go down.”
  • ...1 more annotation...
  • Restaurants account for 296,100 jobs in the state — 10 percent of the work force.
  •  
    According to this article, the IRS is considering changing the way Automatic gratuities are processed in restaurants. Often when gratuity is included, more than one issue arises. Parties tend to not leave additional tips and there is also an issue with what if a customer wants to leave less than the automatic 15 or 18 percent tip? Bennet Ackerman, owner of a Melting Pot in Indianapolis, says that "some servers tend to get a little lazy when they know they already have that automatic gratuity." If a large party is given a check of $200, some parties will tip $20. If gratuity was included, they would receive anywhere from 30-40. After tip out to the bartender, hosts and other support staff, the server is actually making about a 6% tip off of that table. I agree that with large parties, the reward sometimes does not pay off, no pun intended. More money can be made off of smaller parties, and the turn over rate is faster. Some restaurants are doing away with automatic gratuity, and instead, they are adding suggested tip amounts at the bottom of the check. This, will at the very least, give the guests dining, a reference guide. The issue at hand here is whether or not to consider the automatic gratuity as a tip for a server, or as a service charge. This will greatly affect taxes at the end of the year and budgeting for the employees. With the economy the way it is, servers and other tipped workers are seeing less tips. The issue is of great concern for restaurants and come January 1st, there may be some very unhappy employees as well as restaurant owners.
amichellemagluta

5 key issues in hotel cybersecurity - eHotelier - 0 views

  • Hoteliers have to address cybersecurity from a number of angles, including technical, legal, law enforcement, insurance and payment systems.
  •  
    This article explains the five key issues with hotel cybersecurity. Hotels have to address a lot of issues with cyber security but this article is able to narrow it down to the top five. The article mentions compliance, credit cards, informed responses to attacks and that credit cards are not the only risks that we have to worry about. Those who work in hotels must realize that it is their duty to protect not only the hotels information but also the information of the guests.
armanyleblanc767

5 Common Hospitality Security Issues | ROAR - 0 views

  • Unauthorized visitors pose a threat to hospitality security because they’re hard to track and because their intentions can be unclear
  • According to a study published in the Harvard Business Review, up to 90% of women and 70% of men working in the restaurant industry had experienced some form of sexual harassment.
  • A lot of people working in the sector simply don’t feel secure, especially when they’re required to work alone or in isolated areas.
  • ...3 more annotations...
  • Small businesses are often at increased risk, with around 36% of attacks aimed at enterprises with fewer than 250 employees.
  • Promoting credit card sales over cash transactions Carrying out background checks on prospective staff Reducing employee turnover Installing CCTV monitoring systems
  • One solution to improving employee safety and boosting security in the hospitality industry is a wearable panic button system.
  •  
    This article includes 5 security risks (including technology related and not) common in the hospitality industry, as well as some specific examples and ways to avoid those issues. It was written in July of 2022 and as a result is likely relevant today. Although not all of the security issues are technology related, I posted this article because I believe that all of them can at least be addressed by incorporating technology. For example, unauthorized visitors can be addressed through increased camera and scanning technology to identify visitors that may have poor intentions entering the premises.
  •  
    5 Common Security Issues in the Hospitality Industry
laura kaczkowski

Online-first event planning: Leave the bagels, keep the connectivity - 1 views

  • Best practices conferences are critical to the growth of any community. The sharing of ideas and capturing of collective lessons-learned allows for those both in attendance, and those reading any after-action report
  • No longer should we think only about planning offline events that “we webcast,” but rather about global conversations facilitated by online engagement that have an in-person conversation or presentation at its core.
  • In no community of practice is this more true than with Volunteer Technical Communities
  • ...5 more annotations...
  • depend on the goodwill, real-time information, and online cohesiveness
  • International Conference of Crisis Mappers exemplified the benefits of online integration, as mappers and technologist from around the globe gathered both online and in Washington, DC for four days of conversation.
  • By livestreaming the event, the ICCM’s webcast enabled the inclusion of over 950 additional attendees – almost doubling their audience!
  • . In many ways they are thought leaders in this field through their engagement with online learning communities. However, other international organizations that focus on issues such as open governance and transparency often fail to lead by example on these issues, holding conferences that are limited to small audiences, and comprised only of individuals who can afford the time and airfare necessary to be in attendance.
  • Today, the barriers to entry with this kind of online engagement are so low, that all takes is a bit of planning and a small amount of technical know-how to get up and running
  •  
    In the article, "Online-first event planning: Leave the bagels, keep the connectivity," it talked about global conversations facilitated by online engagement that have an in-person conversation or presentation at its core. When the company decided to live stream their events, their attendance nearly doubled just by using the ICCM's webcast. "International organizations that focus on issues such as open governance and transparency often fail to lead by example on these issues, holding conferences that are limited to small audiences, and comprised only of individuals who can afford the time and airfare necessary to be in attendance." Overall they believe that this tool is a great way for social change. This is an effective way to share information with others at a low cost way.
Krystal Jost

Buffalo hotel launches Verve Living System | Hotel Management - 0 views

  • When a guest enters the room, he or she places the room key into the slot on the KeyCard Switch which then transmits a wireless signal. When in place, guests have complete control over the lights, outlets and the HVAC unit in the room. When removed, the room is designated as unoccupied
  • it also can detect which in-room devices have low battery levels; which rooms have constant occupancy; which rooms have problems with network connectivity; and which are not communicating properly with the hotel PMS and other systems.
  •  
    This article focuses on sustainability and methods in which technology is utilized to conserve energy and waste, while also not hindering the guest experience. Hotels, similar to the Salvatore Grand Hotel, have began implementing systems such as the Verve Living System, by Zeno Controls, LLC, that provide wireless connections to the heating, ventilation, and air conditioning system, as well as the lighting in the guest room. It utilizes sensors to activate such amenities, and enables the guest to enter the room, place their key card into a slot, and it will begin to adjust to the preferred temperature and the preferred lighting levels. Once the key card is removed, such as when the guest is leaving the room, after a very short delay, it sends a signal that verifies the room is unoccupied, and turns off these energy-consuming items in the room. Many guests, when staying in hotels, do not consider turning off their lights or air conditioning when they leave the room, and simply leave everything running. They do not realize the impact this has not only on costs for the hotel itself, but also the impact that it has on energy consumption and sustainability. With the growing awareness of being "green", guests are focusing more and more on conservation, however, they may still be slacking in these areas, leaving things on, being absent minded. This system will allow guests to not have to worry about such tasks, and controls the system of turning these items off for them, adding convenience for the guest who is environmentally conscious. I have personally seen a similar system being used in a hotel room, and thought it was a great idea, and an amazing way to control costs and eliminate waste of resources. It is also very surprising to read that the Verve Living System detects low battery levels, constant occupancy, problems with room connectivity, and rooms that are not communicating with the hotel PMS or other systems. This enables the maintenance team of a hotel to fun
Diamond Williams

The Future of Hospitality Hangs in Balance of Mobile and Social Implementation | Top St... - 0 views

  • A study by Expedia presented at the conference pointed to the fact that more internet access occurs through mobile devices than by laptop or desktop. Moreover, two-thirds of Americans sleep with their mobile device in range, something we cannot say about desktops. Expedia anticipates that the current number of bookings via mobile device, currently about 16 million, will double by 2016.
  • So, besides sleeping with them, what are people doing with their mobile devices? Many of them are booking a hotel for tonight. Expedia has found that a substantial number of mobile bookings are for same-night stays.
  • Mobile makes this possible. That’s the present, but it’s also the future. Most of the people who are using their smartphones and tablets in this way are under 30.
  • ...4 more annotations...
  • Mobile writes a similar story for restaurants. People who are seeking a restaurant at the last moment tend to be your younger customers, and they simply expect the technology to be there.
  • A study by the National Restaurant Association confirms that these mobile guests are checking out customer review sites as they make their choices.
  • Customer reviews are also important to the hotel industry, but the jury is still out on exactly how hotels should interact with people who post reviews.
  • The hospitality industry and its allied businesses will continue to expand their interaction with mobile devices and social media. Things are moving fast, but we also can be sure that there are curves ahead.
  •  
    As mobile devices become more advanced, particularly cell phones and tablet devices, more pressure to keep up with mobile and social trends is placed on the hospitality industry. People are using their mobile devices more now than they have in the past. So much so, that "two thirds of Americans sleep with their mobile device in range, something we cannot say about desktops". A world of information is at your fingertips because of the capability of mobile devices. Information that can help us make decisions about anything. Even last-minute decisions about hotels and food. More people are using their mobile devices to book rooms and many of the people that do this, are booking a hotel for the same night. The fact most of the people who do this are under 30 means that it is very likely that this trend will increase. People are expecting the technology to be there so that they can pick a hotel and a restaurant to go to if they are unfamiliar with a city. They are expecting a hotel chain to have a mobile site or better yet an "app" that will not only allow them to book a room, but, one that will give them directions from where they are to the hotel. The same can be said for restaurants. Potential customers want to be able to look over the menu and determine if they want to come to the restaurant, all from their mobile device. Mobile guests are also using customer review sites to determine where they will lodge or dine. They are using sites like TripAdvisor which allows you to post comments about your stay. The sight even allows the guests to post pictures. "Customer reviews are also important to the hotel industry, but the jury is still out on exactly how hotels should react with people who post reviews." It is always great when a guest posts a positive review of the hotel, but imagine how one bad stay could tarnish a hotels reputation. And what if there are cleanliness issues that the guest can photograph and upload to the site? Exactly what to do in this type of e
Danelkis Serra

Proximity marketing: When worlds collide - Direct Marketing News - 0 views

  • rise of mobile technology
  • met with some trepidation
  • Proximity marketing merges the physical and digital domains by using mobile devices to reach consumers at the greatest point of influence, providing bargains for shoppers and increased sales and consumer insights for retailers
  • ...17 more annotations...
  • send messages to user smartphones when they come within range of a store
  • consumer provides permission, a wireless message is transmitted, at no cost
  • as simple as a discount coupon or as elaborate as an interactive gam
  • Consumer privacy is completely protected
  • customized
  • reaching consumers in that venue
  • quickly change messaging
  • precious data on consumer buying habits
  • generate much higher returns than traditional ads
  • more affordable
  • consumers
  • receive offers
  • they've shown interest
  • cut through the clutte
  • targeted
  • point of sale
  • agile ad strategy
  •  
    Earlier his week I learned about Proximity Marketing and I am not certain if I like the idea.  According to this article written by Romanov, Proximity Marketing "combines the digital and physical worlds in a new way, offers many advantages to both consumers and retailers. It's an agile ad strategy that allows merchants to make changes on the fly to improve message effectiveness and reach sales targets on specific items. It provides amazing consumer insights." Sounds like a great concept; it uses mobile devices, which most people have, to send an alert once shoppers are within range advising that bargains are available.  The consumer then has the choice to accept (or not) the message, which could be a simple discount or even an interactive game.  The consumer's privacy is protected as it is at no cost to them.  This can potentially increase retailer sales, at a lower costs, and produces data on consumer buying habits.  Win-Win. The issue I have with this is the overall multitude of alerts received from various retails.  I am not concerned about privacy issues; it is more of an annoyance issue. 
  •  
    I actually like this idea because I shop aimlessly. When I'm in the radius of a sale I get excited!!. It makes it easy to choose which store I will go into. It will be great if you can turn the alert on and off. On days I'm not shopping I don't want the alerts to go off. That can be distracting and annoying.
rebecca Bonet

Keeping hotel locks safe | Hotel Management - 1 views

  • Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • ...18 more annotations...
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate
    • TIANJIAN ZHANG
       
      Nowadays, locks security is an essential issue in hospitality industry. Actually, most hotels upgrate their locks systems with advanced technology. The role of technology in the security sector is fundamental, but despite the rapid technological progress, one thing has remained constant: the importance of trust. Whether hoteliers wising up to the fact that they've bought what could be called a flawed security system will be willing to trust the supplier of said equipment for a fix.
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues. 
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • , preventing
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security
  • “  Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software ,” Shea said. “  When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • For instance, a ‘wandering intruder alert’ warns hotel security personnel when a card is presented to a number of different doors.  Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues.  
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate ,”
  • As with any hotel upgrade, hoteliers understand that renovation and upgrades are a regular part of running their business
  • Looking past RFID solutions for instance, VingCard Elsafe has made our RFID locks compatible with next generation technologies, like Near Field Communications (NFC), providing our customers with an easy upgrade path at reasonable cost.”  
  •  
    This article discusses the security issues with room keys. These hotel locks will not open with cards that are read as duplicates or duplicatable. The locking mechanism has been specifically designed to alert the front desk and secuirty departments in the event these locks are tampered with. I'm sure at one point or another we have all experimented with our room key and tried to open other doors. A system like this will prevent activity like that.
  • ...2 more comments...
  •  
    VingCard Elsafe, the global leader in hospitality security and part of the ASSA ABLOY Group, announces that it has phased out the use of brass metal plating and painting in the manufacture of its locking systems, opting instead to use a more eco-friendly process to color stainless steel. VingCard Elsafe has adopted a new method of metal coloration called physical vapor deposition, or PVD, an environmentally friendly process that involves vaporizing an alloy onto stainless steel within a heated vacuum. PVD requires no chemicals and produces no waste or hazardous materials of any kind, resulting in no environmental impact whatsoever. The PVD process has other added benefits, as well. PVD-treated surfaces have high wear resistance for discoloration, and the stainless steel adds enhanced anti-corrosion properties. Besides eliminating the negative environmental effects of the brass plating process, the move by VingCard Elsafe to simplify its lock manufacturing process has had other related green benefits. By doing away with the need for secondary surface treatments of the locks, new product components are now supplied directly from metal stamping to the point of use in the assembly line. This means less shipping and transportation is required for product manufacture, resulting in a diminished carbon footprint.
  •  
    VingCard Elsafe is a new kind of lock system, which contains RFID technology and is compatible with the Near Field Communications. It has several advantages compared to traditional magstripe locks. First of all, it can add security to the RFID card and prevent cloning, which is much safer than the traditional key card. Another is that it can detect tampering and know when and where staffs use the lock. It can send alert to the front desk. Moreover, the front desk can know when the door is forced open. However, before using the lock system, training program should be provided. So this new kind of lock system brings safety to the guests and to the hotels.
  •  
    This article talk about the issue that hotel are having with their security system lock for guest room. These cards are easy to duplicate. The new system will alert front desk or security if the lock has been tampered with. Other alarms include detecting that a door is forced open 'mule tool' instruction when a door is open from the inside handle without an occupant in the room.
  •  
    This article discusses the current state of hotel lock safety. Monitoring safety has changed as these locks become more automated. The article states that, "Hotel Management corresponded with Tim Shea, president of ASSA ABLOY Hospitality, for ways in which vendors are keeping hotel locks secure." Through VingCard Elsafe's locks, hotel security and safety has increased. VingCard says, "Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software." This is just one of the ways the locks increase security. The article also states that the system is cost-effective for hoteliers.
1 - 20 of 768 Next › Last »
Showing 20 items per page