Skip to main content

Home/ Hospitality Technology/ Group items tagged lawsuits

Rss Feed Group items tagged

delaneyverger

New Point-Of-Sale ADA Lawsuits - Hospitality Business News - 2 views

  • For example, McDonalds was recently hit with a nationwide class action alleging that its new Coca-Cola Freestyle beverage dispensers violate the ADA because their touch-screen interfaces are inaccessible to the visually impaired.
  • The availability of hefty damages in many states increases the potential exposure businesses face. For example, in California, a single violation with respect to a POS device, entitles the plaintiff to a minimum of $4,000 in statutory damages, plus his attorney’s fees and litigation expenses. Potential liability can be overwhelming when these type of lawsuits are brought as class actions.
  •  
    This article discusses how self-service POS systems are now under fire from the ADA for not being accessible to people with disabilities. Most of the lawsuits have claimed that the problems with these systems are 1) they are mounted too high or at angles that are inaccessible for people in wheelchairs, 2) they do provide captions for those with hearing disabilities, and 3) they do not provide tactile feedback for those with visual disabilities. The ADA provides guidance for different types of technology, such as ATMs and vending machines, but has not provided such guidelines for these new POS systems. Because of this, the courts are having difficulty determining how to better enable these POS devices to work for those with disabilities, having to determine what to do for each individual device. Furthermore, these lawsuits pose a big risk to these companies. Businesses need to better evaluate their POS devices in order to make them more user-friendly for all individuals.
Paige Wuensch

Hotel chain lawsuit MUST BE a security wake-up call for the travel industry | Tnooz - 0 views

  •  authorities in the US filed a lawsuit against Wyndham Worldwide, claiming the company and three subsidiaries failed to protect sensitive customer credit card data.
  • almost 600,000 credit card numbers including expiry and security codes, were stolen over a three year period in three separate data breaches, resulting in over $10 million in fraudulent losses to cardholders, banks, and credit card companies.
  • Weak passwords and a laissez faire attitude towards property management system usernames and passwords should never be an excuse for a compromise.
  •  
    Last year a law suit was filed against Wyndham Worldwide because the company did not protect their customer credit card data efficiently on their PMS. The company caused over $10 million in fraudulent losses. In this case, Wyndham had be allegedly using weak login credentials in their property management systems. This is the key vector for data breaches. "According to the FTC, Wyndham Worldwide had many points of weakness in their security chain including; storing credit card information in plain text, storing sensitive security codes (aka CVV/CVS/CVC data), not using firewalls, not enforcing strong passwords, not using updated operating systems, and not having adequate logging.'
hannahamorton

Marriott Breach Exposes Far More Than Just Data - 0 views

  • for about 327 million victims, compromised data may include names, addresses and passport numbers
  • "they should have been able to isolate hackers back in 2015."
  • Currently many companies opt for inadequate data security because it's cheaper than the consequences of a data breach,"
  • ...5 more annotations...
  •  "The Consumer Privacy Act fixes that and would hold companies accountable."
  • The CCPA — which gives Californians the right to know what personal information is collected about them, whether and to whom it is sold or disclosed, as well as the power to prevent such sales — takes effect in 2020 and, while it may sound like reasonable legislation, has already faced a grueling uphill battle.
  • Fancy Bear, which has been tied to Moscow's military intelligence service GRU, was found to be using the leaked NSA hacking tool Eternal Blue to hack victims via their hotel WiFi connections.
  • This is much more than a consumer data breach. When you think of this from an intelligence gathering standpoint, it is illuminating the patterns of life of global political and business leaders, including who they traveled with, when and where. That is incredibly efficient reconnaissance gathering and elevates this breach to a national security problem.”
  • Hotels are easy targets, constituting 92% of all point-of-sale intrusions in 2017, and hotel mergers are only expected to accelerate.
  •  
    Marriott's data breach in 2018 exposed the information of over 500,000 guests including names, addresses, and passport numbers - leading to a class-action lawsuit and falling share values. The California Consumer Privacy Act, taking effect in 2020, gives Californians the right to know what information is collected about them and where this information goes. Amazon, Facebook, Google, Microsoft, Twitter, Uber, AT&T and Verizon are lobbying against the CCPA, but data-security regulations are being enacted regardless to protect customers against these breaches.
rderonville

Jury sides with US Airways against Sabre in GDS antitrust trial of the century - Tnooz - 0 views

  • The jury has returned its verdict in US Airways’s $134 million antitrust lawsuit against travel technology giant Sabre.
  • The airline’s lawyers successfully argued that Sabre had threatened it, saying that it had to accept a contract on Sabre’s terms or else be cut off from a network of thousands of travel agents worldwide who depend on the inventory that the tech giant provides via desktop software.
  • During contract negotiations, Sabre never offered a deal for less than full-content, the airline said. Full-content contracts typically require an airline to provide the same fares it offers via any other channel, such as its own website, to Sabre, too.
  • ...2 more annotations...
  • full-content contracts are widespread between major airlines and the three major global distribution systems (Sabre, Amadeus, and Travelport), who act as middlemen for plane ticket sales worldwide.
  • Sabre argued that its fees are justified relative to the cost an airline would incur to distribute its fares comparably by other methods. It said consumers benefited by agents having a full array of options for price comparison.
  •  
    The role of GDSs in the travel industry has a major impact on revenue, competition, and reservations. In this article, Sabre, one of the largest known GDSs was sued by US Airways for failing to provide a fair contract to the airline. The lawyers from US Airways claimed that Sabre threatened to "cut off the airlines from a network of thousands of travel agents worldwide who depend on inventory that the tech giant provides via desktop software". The jury concluded that Sabre indeed violated antitrust law. Sabre, apparently, charged US Airways increased fees though their cost per transaction decreased because of the advances in technology. According to the article, Sabre argued that the fees were justified relative to the cost that an airline would incur to distribute its fares by other methods. This helped the agents have access to a plethora of information regarding price comparison. In my opinion, this is just a messy situation. However, it goes to show how important and how much of an impact that GDSs have on airline companies. They determine what consumers or agents readily see on the site. They determine how much of a presence a company has. The GDSs provide company information to a worldwide network that markets to consumers. Having a GDS system hold back or increase fees has proved to be detrimental. Ethical issues have come into play. The fact cannot be ignored that the technology being used by Sabre is helping lower cost for transactions. This decrease in cost should have resulted in a decrease in fees for the airlines. Nevertheless, the key to this article is that GDSs have the power (though Sabre did illegally) to determine which avenue a company goes through in regards to apparent competition and markets. The advancement of GDSs is resulting in lower cost transactions and giving agents and consumers "more bang for their buck". So it is important that the relationship between GDSs and airline companies remain ethical in all ways, especially dealing with
rderonville

The Point-Of-Sale Problem - 0 views

  • To properly manage risk, start by applying the same security practices to the POS system that you use with other sensitive IT systems.
  • look for POS systems that have clear security design improvements over legacy ones.
  • Any system that's part of a payment process is a target of data thieves. Wise companies will assume that the devices, applications, and networks that house sensitive cardholder data are under siege and act accordingly.
  •  
    The POS is a great system that is used by many industries. It helps businesses run efficiently and transactions be done effectively. However, it comes with its problems. This article is in two parts so I will post the both on Diigo. This article states that POS systems are the most frequently used computing system and it is targeted by criminals. According to the article, "Today, attackers have only become more sophisticated, using advanced software techniques to avoid detection by antivirus. The attackers are attaching devices that are to collect information from the patrons who use the POS system. The solution to this issue from the article, is that managers apply the same security practices to the POS systems that are used for other sensitive IT systems. These systems should not be the same system used for internet browsing or email. Using a third party security is system is fine however, they should ensure that security controls are part of regular maintenance. The article states that businesses should look for POS systems that have design improvements rather than those who have been in the industry for a long time. There needs to be upgraded design, security, and software to minimize the threats that are posed on the POS system. This article highlights the issues that POS systems attract and also gives solutions. It is up to the businesses to give as much attention as possible to this system the same way they do for systems with sensitive information. Ultimately credit card transactions do hold sensitive information so the upgraded POS systems should be the number one choice for a business. Along with what is stated in the articles, this minimizes the risk of customer loss and a damaged reputation. This also helps minimize the possibility of revenue loss due to lawsuits because of breaches.
sharline86

What the Marriott Breach Can Teach Us About Cybersecurity in the Tourism & Hospitality ... - 0 views

  • Marriott breach that compromised the records of up to 500 million customers. The data breach occurred through the IT company, a third party, that managed the Starwood reservation database.
  • Marriott took too long to disclose this breach.  Even though the breach was found in September, disclosure did not occur until nearly three months later — and ultimately, the company failed to protect valuable customer information. The company is already the subject of class action lawsuits that could have a severe impact on the organization.
  • Over the last 3+ years, the Tourism & Hospitality sector has been very average (if even just a bit below) when it comes to cybersecurity performance as compared to other industries.
  • ...5 more annotations...
  • Since 2016, nearly 5% of the tourism & hospitality entities that BitSight tracks (out of a total of almost 2,000) have experienced a publicly disclosed data breach. This is the 4th highest percentage of breach out of the 23 key sectors BitSight monitors, trailing only healthcare, education, and government.
  • Though it is often assumed that larger organizations perform better in cybersecurity, the data on Fortune 1000 companies in this industry suggests otherwis
  • For example, Fortune 1000 tourism & hospitality companies are performing poorly compared to the sector as a whole when it comes to reducing unnecessary Internet exposures (“Open Ports”).
  • For all companies, tourism & hospitality has the 2nd highest percentage of companies with an Open Port grade of D or lower (Education is 1st).
  • Ultimately, cyber incidents like the Marriott breach confirm that companies in this industry need to be much more about proactively mitigating the risk posed by their supply chain given the sensitive consumer information they contain in their databases.
  •  
    Bitsight examines the 2018 Marriott reservation management database breach. Using the breach as an example, this article shows how poorly the hospitality and tourism industry performs in cybersecurity versus other sectors.
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
mmdmd99999

PCI Compliance: What Every Hotelier Should Know and Do | hospitalityupgrade.com - 0 views

  • Payment Card Industry Data Security Standard (PCI DSS) compliance has become a very important consideration for hotels.  Some hotels are not in compliance and don’t even know it.  There are significant penalties associated with non compliance including lawsuits, audits, fines and even losing the ability to process credit card payments.
  • PCI compliance is about network and computer security
  • such as securing paper documents, proper shredding of documents and document retention
  • ...3 more annotations...
  • Network segmentation and the use of firewalls is very important.  No email or Web surfing should be done on the secure side of a network.
  • “How to be compliant,” that has additional links to each credit card brand.
  • There are levels of merchant compliance.  A level 1 merchant processes more than 6 million transactions annually.  This level requires an annual onsite security audit and quarterly network scans.Level 2 merchants process between 1 million and 6 million credit card transactions annually.  This level requires an annual self assessment and quarterly network scans.Level 3 merchants process between 20,000 and 1 million e-commerce transactions annually and have the same compliance requirements as level 2.Level 4 merchants process fewer than 20,000 e-commerce transactions a year and require annual self assessments and network scans.Data security breaches can cost a hotel an average of $182 per compromised record.  This does not include the cost of defending a lawsuit, if one is brought, or fines for non-compliance from individual credit card brands.
  •  
    PCI compliance, what is it, how to make sure you are compliant, why do we care?
tania morgan

Bedbug Early Detection System (BEDS) by Atlantic Paste and Glue Company - 0 views

  •  
    The Atlantic Paste and Glue Company (AP&G) has just release for consumer sale a new passive bed bug monitoring product. The product is called the Bedbug Early Detection System or BEDS for short and is a ingenious and inexpensive way for homeowners, apartment dwellers, hoteliers and property managers to monitor for bed bugs with a very unobtrusive footprint. This technology will help hotel avoid the embarrassment and potential lawsuit that would occur if bedbugs were discovered at their establishment.
Brittany K. Ward

The IT Department Needs to Be Involved in Employment Termination - 0 views

  •  
    This article discussed the need for the IT department to be involved whenever an employee is terminated. This practice should be in place because there can be security threats if former employees still have access to company records and data. The article gave three principles that companies should strictly adhere to when terminating employees: Prompt notification of termination, prudent revocation of access (both on-site and remote) and preemptive preservation of data. This article makes some very interesting points, because we don't often think of termination from an IT standpoint. But it is crucial that former employees no longer have access to company data, and that the company preserves certain data that will be useful if the employee seeks a lawsuit. I have a somewhat relevant example in that a former apartment complex I lived in never requested the barcode scanner for my vehicle when I moved. Just for fun one day, I tried to drive through the gate to see if my scanner still worked. It did! Good for me, but not so good for the complex, as hundreds of former tenants could still access the property with ease. This example reinforces the fact that IT must be involved even in employee terminations.
  •  
    Terminating an employee is not thought to include the IT department. However, this article points out the relevance the IT department has in the process. The HRIS is efficient for the HR department to collect data on all employees. And the IT department is responsible for taking the employee off the HRIS and stop data collection. They are also responsible for ceasing access from the terminated employee to any company related information. The author suggests that the company dismiss any online access to the employee to prevent theft, hacking or any other harm to the company. The IT department must also make sure the employees private information stored in the system must be preserved. If not taken care of considerately, there is a possibility for a legal issue to arise. This is why the IT department, amongst the HR department and executive staff, should be included in the termination of employees.
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
Raquel Martinez

Are hotel "energy" fees about to make a comeback? - 0 views

  •  
    The Oyster Bay Beach Resort is a highrise hotel in St. Martin that promises guests white-sand beaches, "breathtaking" views of the Caribbean and a "paradise found."But Jack Permadi says he found more than that when he stayed at the property recently.
luis capote

Apple, Samsung face off in court over patents to iPhones, iPads; opening arguments Tuesday - 0 views

  •  
    Apple filed a lawsuit against Samsung last year alleging smartphones and computer tablets made by the world's largest technology company are illegal knockoffs of Apple's popular iPhone and iPad products. Cupertino-based Apple is demanding $2.5 billion in damages, an award that would dwarf the largest patent-related verdict to date.
swhit133

Fighting Internet Crime: Protecting Your Small Business From Cyberattacks - 0 views

ata breaches at major corporations like Yahoo, Equifax, Target and Sony Pictures may capture the big headlines, but small businesses also face significant financial, operational and reputational ri...

https:__www.forbes.com_sites_dinahwisenberg_2017_12_20_fighting-internet-crime-protecting-your-small-business-from-cyberattacks_#e288baf30ee1

started by swhit133 on 24 Oct 18 no follow-up yet
linanzhang

12 Ways to Increase Hotel Security - LODGING - 1 views

  • “When department managers and other employees think more about safety and security, you can prevent a lot of theft and minimize dangers.”
  • 1. Update locks. Locks that can track who goes in and out of rooms can serve as a deterrent to theft.
  • 2. Make time for safety meetings. Perhaps as part of a regular meeting, schedule time to talk about guest safety
  • ...3 more annotations...
  • 3. Monitor activity with software. Having closed-circuit television to monitor the property doesn’t matter too much if no one is looking at the monitors.
  • 4. Evaluate and improve—quickly.
  • 5. Meet and greet. One of simplest, but most effective, ways of securing a property is to provide excellent customer service.
  •  
    This article talks about ways to increase hotel security. Although hotels may have proper security and policies in place to protect the property, they are often subject to cyber cyber-attacks, break- ins, theft, fraud, and other crimes. Lack of proper security in hotels may lead to increased guests losing belongings to theft. As vice president of global safety, Callaghan spent 35 years with Marriott International. He was responsible for properties throughout the United States, Latin America, and the Caribbean. During his career, he could manage everything from the integration of new technologies such as electronic locks and computer surveillance systems to implementing anti-terrorism procedures. The following list shares Callaghan tips on guest safety, internal theft, and cyber security that can help owners and operators avoid down time, reputation loss, liability, and lawsuits. This ensures property security and that information in up to date.
  •  
    Security is really important in the hospitality industry. It's vulnerable to cyber attacks, break-ins, theft, fraud, and other crimes. The security means a better, safer, guest experience. Since the Las Vegas shooting, we need to pay more attention to the safety and security. There are many ways to increase hotel security. Like the update locks. Locks that can track who goes in and out of rooms can serve as a deterrent to theft. Make time for safety meetings. Monitor activity with software. We also can use closed-circuit television to monitor the property doesn't matter too much if no one is looking at the monitors. We can evaluate and improve. For the Las Vegas shooting, hotel said that they should do something immediately to protect from another event happening. We also can use meet and greet to improve the security problem. It's the effective and simplest way. Employees should also look out for people who don't fit the profile of the hotel's typical guest.
angelopecorelli

Hilton Was Fined $700K for a Data Breach. Under GDPR It Would Be $420M | Digital Guardian - 0 views

  •  
    This article goes over the multiple lawsuits that Marriot had to face due to a massive cyberattack in 2015 where multiple credit card numbers were leaked. I think this is a perfect example of how cloud computing is not a bulletproof system at the moment and how it still has much room to grow. Similar cyberattacks happen all over the world some on a smaller scale and some on a larger one. I believe this is an article that everyone should read to truly understand the reproductions that a company can face if they don't have a strong cyber defense.
clonyr

Expedia Being Investigated for Conspiring With Hotels to Suppress Competition – S... - 0 views

  • Expedia Group Inc. is under investigation by the Utah attorney general for allegedly conspiring with the biggest U.S. hotel chains to suppress competition in online travel booking.
  • Beginning in 2014, the hotel companies agreed to stop bidding on one another’s brand names in Google searches in order to avoid price competition.
  • TravelPass claims searches for hotels used to generate an open bidding process where companies could bid on keywords that included their own brand, as well as those of their competitors.
  • ...1 more annotation...
  • “The conspiracy has left in its wake an online travel booking marketplace characterized by deliberately limited information and high transaction costs.”
  •  
    TravelPass Group LLC raised a lawsuit with the Utah attorney general to investigate Expedia conspiring with Marriott, Hilton and other hotel companies to manipulate search advertising on Google. Under federal law it is illegal for companies to work together to harm competition. In 2014, hotel companies agreed to stop bidding but Expedia continued to coordinate and act as a go between for the companies and providing reports on compliance with the agreement.
lethannelson268

Eventbrite sued over Ticketfly data breach | IQ Magazine - 0 views

  • Eventbrite is facing a class-action lawsuit over allegations Ticketfly’s “lax cybersecurity procedures” allowed hackers to gain access to 27 million customers’ personal data in May’s cyberattack
  • names, addresses, email addresses and phone numbers was stolen
  • uding
  • ...5 more annotations...
  • Personal information incl
  • hich led to a week-long shutdown of all Ticketfly services, as well as a number of Ticketfly.com-based venue websites, and forced several promoter partners to push back onsales or migrate to parent company Eventbrite’s platfor
  • in the data breach, w
  • consumer fraud, deceptive practices, breach of contract and negligence for its supposedly poor web security
  • Ticketfly failed to notify her that her data had been compromised, instead limiting its immediate response to a “passive support page” on the Ticketfly website and a “single tweet on social media”. Consequently, she says, she did not learn about the hack until September, months after her personal data was accessed
  •  
    This article discusses a data breach that Ticketfly, a ticket booking online service, suffered due to hackers breaking in. Ticketfly is owned by major event booking company Eventbrite, and according to the article, Eventbrite failed to have adequate cybersecurity to prevent the breach, causing over 27 million customer information to be disclosed to the hackers. This just highlights the horrors that can happen when booking through a event registration software.
laurenperdomo

What Is Cybersecurity? - Cisco - 1 views

  • A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe.
  • a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos.
  •  
    This article talks about what cybersecurity is and shows you how a cyberattack can unfold. Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber-attacks. Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud. In today's connected world, everyone benefits from advanced cyber defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of essential data like family photos. Everyone relies on critical infrastructures like power plants, hospitals, and financial service companies. Securing these and other organizations is vital to keeping our society functioning
  •  
    This article explains what is cyber security and why it is essential. Not securing our important data can have negative outcomes such as loss of identity, financial damage, and potential lawsuits.
mrodr1442

CARNIVAL IS LATEST TRAVEL BRAND HIT WITH RANSOMWARE ATTACK - 0 views

http://sco.lt/5LcodM As discussed within Hospitality and Tourism Technology Innovations this week, It is crucial to have better protection for businesses. In this article, it shows how a couple wee...

http:__sco.lt_5LcodM

started by mrodr1442 on 31 Aug 21 no follow-up yet
1 - 20 of 22 Next ›
Showing 20 items per page