Skip to main content

Home/ Hospitality Technology/ Group items tagged leaks

Rss Feed Group items tagged

kpony001

Cloud security: The reason hackers have it so easy will infuriate you - 0 views

  • hackers time and again have outwitted the cyberguardians.
  • HashiCorp offers an open-source tool called Vault that stores sensitive credentials, encrypted themselves, and strictly limits what people, servers and programs can access them
  • The mass movement of company and personal data to the cloud has only complicated things.
  • ...15 more annotations...
  • Companies have uploaded VPN and cloud access credentials to cloud storage systems that are easily accessible.
  • security breaches are routinely made worse when hackers who enter one system are then finding the keys to another lying around unencrypted.
  • developers are still regularly storing the digital keys to company assets and even user data in source code, configuration files, and other miscellaneous, unencrypted locations.
  • Unlike typical users who can memorize their passwords or store them with a secure password manager, developers and IT workers often need to keep security credentials in places where automated software can find them.
  • Cloud managers are playing catchup to close the door on the critical data left out in the open.
  • Sophisticated new cybersecurity tools designed to securely store these kinds of credentials in a way that legitimate, automated processes can access, and intruders can’t
  • hackers time and again have outwitted the cyberguardians.
  • cloud industry leader Amazon launched AWS Secrets Manager, its own credential management tool. And Microsoft offers what it calls Azure Key Vault to securely store and monitor and control access to this kind of data.
  • The main problem is that companies really don’t have policies for it or they don’t follow up and make sure those policies are followed
  • Until recent hacks made it clear that few organizations can hope to keep their networks entirely free from intrusion, many companies paid less attention to the security of data within their firewalls
  • UpGuard, known for its frequent role in detecting leaks tied to data stored on insecure cloud machines, has released BreachSight, which scours the internet for its clients’ exposed code, credentials, personally identifiable information, and other sensitive data.
  • Since last year, Amazon has also offered a service called Amazon Macie, which uses machine learning to detect unusual access patterns to cloud storage and uploads of potentially sensitive data like access keys.
  • Amazon also released open source software to help prevent accidentally storing passwords and keys to source code repositories
  • other developers have offered similar tools to scrub credentials from existing code.
  • it’s possible that those types of tools will automatically be provided as part of cloud computing contracts, as standard as seatbelts in new cars.
  •  
    Cloud computing has created a very hacking prone storage system because companies have not been paying as much attention to security as they should. Thus, by not taking the logical measures such as not uploading credentials to cloud storage systems, they are becoming prone to hacker raids. However, with the turning of the tide, new methods of security have presented themselves in the form of online tools such as HashiCorp's Vault Microsoft's Azure Key Vault, and Amazon's AWS Secrets Manager, which stores sensitive credentials in very limited access windows, as well as UpGaurd's BreachSight which detects online data leaks containing exposed and volatile client data, and Amazon's Amazon Macie, which learns the access patterns of your cloud storage,
anonymous

POS System in Cannabis Industry Leaks 85,000 Files | 2020-01-22 | Security Magazine - 0 views

  • Led by internet privacy researchers Noam Rotem and Ran Locar, vpnMentor’s research team discovered a data breach in THSuite, a point-of-sale system in the cannabis industry. 
  • an unsecured Amazon S3 bucket owned by THSuite that exposed 85,000 files of sensitive data from multiple marijuana dispensaries around the U.S. and their customers.
  • leaked data included scanned government and employee IDs, exposing personally identifiable information (PII) for over 30,000 individuals.
  • ...7 more annotations...
  • US. Cannabis dispensaries have to collect large quantities of sensitive information in order to comply with state laws,
  • the THSuite platform is designed to simplify this process for dispensary operators by automatically integrating with each state’s API traceability system.
  • The vpnMentor team says that the breach affected many more dispensaries, and that it’s possible that all THSuite clients and their customers were involved.
  • The researchers also found photographs of government-issued photo IDs and corresponding signatures of dispensary visitors and patients alike.
  • Under HIPAA regulations, it’s a federal crime in the U.S. for any health services provider to expose protected health information (PHI) that could be used to identify an individual.
  • the researchers say that THSuite could be subject to HIPAA violations, which can result in fines of up to $50,000 for every exposed record, or even in jail time.
  • hackers and scammers can take advantage of personal details exposed in the data breach about dispensary customers and employees to create highly effective personalized phishing attacks.
  •  
    There was a huge data breach at THSuite which exposed 85,000 files, some of those files being personal identification information. Dispensaries usually collect a lot of information to comply with U.S State laws. The files that were retrieved by the hackers means they can take advantage of those profiles. THSuite is looking at fines of up to $50,000 PER record or jail time.
Endrich Reveil

IBM Security Tool Can Flag 'Disgruntled Employees' - The CIO Report - WSJ - 0 views

  • A new International Business Machines Corp.IBM -0.15% security tool uses Big Data to help CIOs detect internal and external security threats in new ways—and can even scan email and social media to flag apparently “disgruntled” employees who might be inclined to reveal company secrets
  • The new tool, called IBM Security Intelligence with Big Data, is designed to crunch decades worth of emails, financial transactions and website traffic, to detect patterns of security threats and fraud.
  • the new platform, based on Hadoop, a framework that processes data-intensive queries across clusters of computers, will allow CIOs to conduct sentiment analysis on employee emails to determine which employees are likely to leak company data,
  • ...3 more annotations...
  • flagging workers who may be nursing grudges and are more likely to divulge company information.
  • The platform also helps companies protect against hacker attacks and fraud by allowing security personnel to look for patterns in past attacks
  • More and more companies are using Big Data to discover the pattern of security lapses as they struggle to keep up with emerging threats.
  •  
    I believe every business, especially if it is a huge corporation, should protect and control their company's data. A company's data falling into the wrong hands can be a huge drawback for the company, especially if it comes into contact with a competitor. This article explains how IBM have introduced a new security tool with Big Data to identify any suspicious internal and external security threats as well as flag any company secrets from displease employee's emails and their social medias. The new system can alert any frauds and risks from decade worth of emails, financial transactions, and websites. CIOs will be able to conduct a sentiment analysis on employees to see which worker is the most likely to expose company's information. Some can argue that employees have the right to post anything on their social media's accounts but if an employee still is employed by the company then it should be all bets off. The company should have all rights in making sure their information does not get leaked out by an employee who is simply having a bad day.
snesbeth

Technological Advancement and the Effect on the Ecosystem - 0 views

  • New technological goods are often burdensome to the environment.
  • consist of environmentally harmful waste produced by the technology itself, or the castoff remains of obsolete technology.
  • require resources that are difficult to acquire without harming the environment
  • ...12 more annotations...
  • advanced batteries in hybrid cars are composed of nickel and rare-earth metals.
  • Mining these materials is a significant source of harmful emissions, including solvent vapors, sulfuric acid and coal dust.
  • Acid-laden water discharges kill all plant
  • animal life around nearby waterways
  • sickened and killed nearby rural residents.
  • rare-earths cheaply because it sacrifices environmental safety standards in the mining process.
  • improve production, such as pesticides, herbicides and chemical fertilizers, can also harm the environment.
  • damaging soil and groundwater and creating dead zones in lakes and oceans.
  • greenhouse gases and other toxic emissions from transportation technology.
  • clothes washer create microplastic-laden wastewater that winds up in the ocean,
  • compact fluorescent light bulbs contain mercury,
  • Discarded vehicles left in place for long periods eventually leak toxic fluids into the ground, where they kill plants, animals and soil microbes.
  •  
    The article expands on the topic from this week because it discusses how there are other technology throughout the world that adds to the pollution on the planet. For example, cars contribute to the poison getting leaked into the atmosphere because when they are discarded and not used they tend to melt from the sun and then rain water washes it into the ocean and lakes where it gets consumed by animals. Also adding technology to farming has made life useful but also added to the pollution on the planet because of the toxic chemicals being used to repel insects from the plants and China has deliberately decided to ignore health standards just to mine and sell rare-earths cheaply.
taurus1313

Credit Card Protection and Credit Safety Tips - 0 views

  • You’re probably already practicing basic online and mobile safety, but consider taking these credit card-specific measures as well: Know your merchant. When shopping online, look for sites with “https” in their web addresses (the “s” stands for “secured”) and the green lock icon; make sure the URL includes the correct company’s name, rather than a close-but-not-correct version; and, even on a secured site, share your information only if you know how it will be used. Type for each transaction. Never allow your credit card number to be stored on an online shopping site. Add a layer. Consider using an online payment system or mobile payment service like PayPal, Apple Pay, Samsung Pay or Android Pay to keep your credit card number out of the hands of merchants, so that if a merchant is hacked, it can’t leak your account number. Watch out for public Wi-Fi. Don’t shop or conduct financial transactions, including checking your accounts, using public Wi-Fi. Because it’s a public network, your information can easily be viewed by anyone.
  •  
    "You're probably already practicing basic online and mobile safety, but consider taking these credit card-specific measures as well: Know your merchant. When shopping online, look for sites with "https" in their web addresses (the "s" stands for "secured") and the green lock icon; make sure the URL includes the correct company's name, rather than a close-but-not-correct version; and, even on a secured site, share your information only if you know how it will be used. Type for each transaction. Never allow your credit card number to be stored on an online shopping site. Add a layer. Consider using an online payment system or mobile payment service like PayPal, Apple Pay, Samsung Pay or Android Pay to keep your credit card number out of the hands of merchants, so that if a merchant is hacked, it can't leak your account number. Watch out for public Wi-Fi. Don't shop or conduct financial transactions, including checking your accounts, using public Wi-Fi. Because it's a public network, your information can easily be viewed by anyone."
khadija2050

MGM Resorts falls victim to data breach | PhocusWire - 1 views

  • MGM Resorts International is the latest travel brand to suffer a security attack involving customer details, in an incident that took place last summer.
  • Details of the incident were uncovered last week by ZDNet, which says the personal details of more than 10 million customers were shared on a hacking forum.
  • “unauthorized access to a cloud server.”
  • ...6 more annotations...
  • He adds that companies should also monitor for leaks of the data.
  • a dark web monitoring specialist, says this kind of incident can be avoided by regularly checking who has access to cloud-based servers:
  • “confident that no financial, payment card or password data was involved in this matter."
  • “This incident also highlights the importance of speed when mitigating digital risk; watermarking data with unique synthetic identities can enable organizations to detect these threats immediately and be the first to find out if their data is available online, before someone else does. Setting up email listeners for these watermark identities can detect a breach before the data is shared online, if the hacker is testing for valid addresses.”
  • advises that the same security levels for data on premise need to be in place for what is stored in the cloud.
  • It’s a near-universal challenge for enterprises: the move to hybrid environments and more complex, fragmented networks makes it even harder to keep control. Without consistent policies you can pretty soon have a tangle of security gaps and compliance violation
  •  
    MGM Resorts falls victim to data breach last summer, more than 10 million customers' information were leaked out. It was took place through "unauthorized access to a cloud server." However, specialist said this breach can be avoided by regularly checking and monitoring. Also, specialist advised that MGM also need to take same security levels for data on premise in their could.
  •  
    It was reported that MGM Resorts fell victim to a data breach on a cloud server but not much critical guest information was leaked out. Experts said that this kind of breach can be avoided by checking who was able to access the server regularly. Also, the company needs to monitor data to find out the leakage earlier than anyone else. Monitoring the data stored on the cloud should also be as important as those stored on-site.
  •  
    the article gives details about a data security breach that the company was a victim of and how information of 10 million customers were shared .
kjeewan

Data Security in the Hospitality Industry: Post-COVID Era | LoginRadius Blog - 0 views

  • The frequency of cyberattacks against business databases can be attributed to the fact that the hospitality industry largely depends on credit cards as a medium of payment. This may increase the chances of a hacker receiving access to sensitive information. Investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  • databases in the hospitality industry also happen to be the most vulnerable to data breaches.
  • The aforementioned reliance on payment cards can greatly increase the chances of information leaking. However, other virtual methods of payment like online payment and more can create the potential for cyber attacks.
  • ...6 more annotations...
  • The data collected and the people who can access it differ from country to country.
  • Staff training is restricted to the service aspect of the business. However, training employees to carry out processes in maintaining data security in hospitality like data collection and storage in the right manner is overlooked.
  • This process can involve the addition of two-factor authentication that will protect the data from being accessible to non-employees. This encryption can prevent identity theft.
  • : Employees will require thorough vetting regarding the importance of proper data storage. This training can also work towards reducing the chances of insider attacks as only a few employees will have access to the databases.
  • This includes the addition of firewalls, traffic filters, and network monitors to guard against malware present online.
  • , investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  •  
    Personal information collected can range from generic data like names and phone numbers to sensitive data like bank accounts. Databases in the hospitality industry are the most vulnerable to data breaches. Reliance on payment cards or virtual payments can increase the chances of information leaking or potential for cyber attacks. Staff training in maintaining data security is overlooked. two-factor authentication, Employees training to reduce insider attacks, and cyber security measures such as adding of firewalls, traffic filters, and network monitors to guard against malware present online can ensure data security for consumers and the business.
yuzhu li

New Point of Sales Technology for Your Business | Family Money Values - 0 views

  • Chip based credit cards.
  • is closely intertwined with NFC and smartphones.
  • New payment services players.
  • ...4 more annotations...
  • field offering lower entry costs to small merchants
  • With the ability to pair small mobile card readers with smartphones, businesses can ensure that their employees can take payment anywhere, anytime, which has tremendous potential for never missing a sale.
  • Enhanced security.
  • the natural evolution of a technology key to day-to-day business transactions, they are also a response to fraud and identity theft
  •  
    For family run business, according to Ms. Bekiroglu, to know its business' better way is to keep up all like payment kiosks, self-check out stations, touchscreen interfaces, etc. and the most important 3 parts are the "chip based credit cards", "new payment services players" and the "enhanced security". Chip based cards is more secure and the data is single used in the transaction, and it can crack down on fraud and identity theft. New payment services players mostly means the apps. From my opinion, the important thing for the whole business world is the security part. One of my friend used the credit card for gas, however, in days, the card had been used over 4 thousands. Finding out the reason is because the leaking information at the gas station. Only the security part has been enhanced, POS systems would be more effective.
jrodr1102

A sustainable water future for the hospitality industry - British Hospitality Association - 0 views

  • Sustainable water management begins with measurement and transparency; it’s about knowing how much water is being used, where and when, and then prioritising where water reductions can occur.
  •  
    Due to the increase in water usage around the world, the hospitality industry will be force to integrate responsible water usage policies. As mentioned in the article, technology plays an important role in supporting hotels in their water sustainable water management initiatives by integrating devices and systems that respond to a property water usage patterns. By having systems generate usage reports, property manager could react timely to leaks and faults and act proactively by calculating lifespan depending on usage. Depending on property location, those predictable and recurrent drought conditions would not benefit of rainwater recycling and those that experience rain often could incorporate rainwater harvesting an integrate it with greywater recycling.
anonymous

Cloud PMS - A Safe Bet for Security, Liability and Payments - By Jos Schaap - 0 views

  • As cloud usage continues to soar, we can rest assured that these percentages will increase.
  •  
    A hotel's PMS is at the core of all functions, but outside threats are becoming more common. "In a report researched by Sky High Networks, the percentage of organizations that experience at least one threat per month from data exfiltration (hackers) is 49.8%." Keeping guest information private is critical and when information is leaked it is hard for the company to gain back guest trust. It is clear that society is becoming more and more comfortable with e-commerce. This article points out that reliance on cloud based PMS systems may be the next best thing. These systems use hi-tech encryption which make it near impossible for hackers to breach. However the article says properties must choose a PMS that makes the most sense. Technology is constantly changing and jumping on the bandwagon of cloud computing may not be the best decision. Who knows what new technology will be implemented next.
irinadolgopolova

How to Prevent Malware Attacks and Promote Cybersecurity at Your Hotel - 0 views

  • Each time a hotel’s guest records get breached, the property is burdened with financial strain and faces broken trust with guests. As a hotelier, you don’t need to be an expert in cybersecurity, but you absolutely need to understand the basics to protect your business and your guests.
  • hotels process lots of transactions and store tons of guest data. A hacker can simultaneously target a property’s point-of-sale and property management system to capture payment card information as well as personal data, like passport numbers and email addresses.
  • Research from Symantec, a cybersecurity firm, found that more than 65% of hotels are routinely leaking booking reference codes through third-party sites. Why is this important? Because the information shared through these codes would allow a bad actor to login to a reservation, view personal details, and even cancel a booking altogether. When this happens, your guest information is vulnerable and you risk destroying the guest relationship.
  • ...3 more annotations...
  • Compliance with the Payment Card Industry Data Security Standard (PCI-DSS) not only helps to ensure that data security software, hardware, and practices are safer, but also helps to protect against fines and penalties when a breach occurs,
  • The right technology is only half the equation; over the years, security experts have also identified employees as part of the problem. Hotels must train their staff to handle personal information security, comply with privacy policies, and change user access credentials regularly.
  • Even with a great PMS/POS system and the right training, it’s important to perform routine penetration testing and risk assessments. There’s no straightforward answer as to how often you should pen test your network, but experts warn once a year probably isn’t frequently enough
  •  
    The article is about the reasons why the hotels are attractive for hackers, the author also explains the key concepts in the cyber security. Then, the biggest cyber attacks in hotel industry are described in the article. At the end, the author tells us how hoteliers can improve the security measures.
katvillaverde

Cybersecurity: A modern hospitality challenge - 2 views

  • These examples show that cybersecurity is an essential concern for both our private and our professional lives, as it can avert potentially disastrous information leaks.
  • The hotel Wi-Fi, for example, could be used to access guest’s private devices, such as mobile phones and laptops, or personal guest information could be leaked from hotel servers and databases if their protection is lacking
  • hey are a specially weak spot for hotels, as every process, be it online bookings, drinks at the bar or treatments at the spa, requires payment by credit card.
  • ...4 more annotations...
  • T
  • The hotel’s problems start with a loss of trust and therefore business by the guests who were affected, and go on to legal issues which could potentially lead to time and money consuming lawsuits.
  • his could include staff training and awareness, regular system checks, as well as the conducting of regular risk assessments.
  • By being ready and equipped to deal with such incidents, the impacts of cyberattacks can be managed and therefore lessened.
  •  
    This article explains how hotels are very prone to cyber attacks since they store personal information of millions of travelers every day. They need to win over the trust of the guests.
emilywest5

Big data and analytics in tourism and hospitality: opportunities and risks - ProQuest - 0 views

  • The purpose of this paper is to examine and provide insights into one of the most influential technologies impacting the tourism and hospitality industry over the next five years, i.e. big data and analytics. It reflects on both opportunities and risks that such technological advances create for both consumers and tourism organisations, highlighting the importance of data governance and processes for effective and ethical data management in both tourism and hospitality
  • This paper identifies and examines key opportunities and risks posed by the rising technological trend of big data and analytics in tourism and hospitality. While big data is generally regarded as beneficial to tourism and hospitality organisations, there are extensively held ethical, privacy and security concerns about it. Therefore, the paper is making the case for more research on data governance and data ethics in tourism and hospitality and posits that to successfully use data for competitive advantage, tourism and hospitality organisations need to solely expand compliance-based data governance frameworks to frameworks that include more effective privacy and ethics data solutions.
  • Technology (and its rapid development) is one of the key megatrends and driving forces that are seen to shape the future of tourism (Yeoman, 2012, 2018; Yeoman and McMahon-Beattie, 2018) via changes that will impact the way tourism and hospitality providers interact with travellers.
  • ...15 more annotations...
  • A recent business report on key megatrends and market disruptors suggests that technology and new ways of engaging and interacting with customers are fuelling the rate of disruption as currently businesses are able to reach new customers in new ways and can reinvent customer engagement around service and convenience (Boumphrey, 2019).
  • One of the most important uses of data is to improve personalisation, travel companies using the information they gather to make specific adjustments to their offerings.
  • Currently, considerable amount of structured and unstructured data are produced globally (Nunan and Di Domenico, 2013; Verdino, 2013), a so-called “digital exhaust” (Wang, 2013; Barocas and Nissenbaum, 2014) that is passively generated by users of products and services using mobile devices (Shilton, 2009), an abundance of publicly available data shared on social networking platforms (Nov et al., 2010) and customer data and information purposely collected by tourism organisations’ booking systems or customer relations management (CRM) systems
  • This abundance of data and the act of processing data on a large scale has led to the concept of “Big Data,” which Mayer-Schönberger and Cukier (2013) define as “things one can do at a large scale that cannot be done at a smaller one, to extract new insights or create new forms of value, in ways that change markets, organisations, the relationship between citizens and governments, and more” (p. 6
  • ndeed, one of the latest Euromonitor International travel industry reports confirms that big data and analytics is expected to be the most influential technology impacting the industry in the next five years (Bremmer, 2019), followed by artificial intelligence and the Internet of Things.
  • The use of data is viewed as a disruptive innovation in the tourism and hospitality industry, although it allows organisations in the industry to facilitate personalisation, offer convenience, save costs and overall gain competitive advantage (Evans, 2020).
  • These technological advances provide significant opportunities for businesses to harness the wealth of data to support their activities and gain competitive advantage. The efficient uses of data and analytics drive process and cost efficiencies and strategy and change (MicroStrategy, 2018).
  • In particular, in the tourism and hospitality sector, the effective use of big data is associated with revenue management (e.g. using and combining internal data, such as occupancy rates and current bookings, with external data such as information about local events, school holidays and flight information to forecast demand and maximise revenues); market research and strategic marketing purposes (e.g. identifying customer trends to best cater marketing opportunities); customer experience and reputation management (e.g. social media conversations and online reviews, service usage data and internal feedback via customer surveys). A good example of an organisation that successfully uses big data to gain competitive advantage is AirBnB (Evans, 2020; Guttentag, 2019).
  • These concerns have been intensified by recent global cyber-attacks and more specifically by significant data breaches in a wide range of industries and sectors, including the tourism and hospitality industry (Armerding, 2018; PwC, 2016, 2017). The hospitality industry is now in the media spotlight because of high profile breaches (PwC, 2016, 2017).
  • One of the biggest data breaches of the 21st century has affected one of the largest hospitality companies, Marriott International. Starting in 2014, the data breach occurred on systems supporting Starwood hotel brands, which were acquired by Marriott in 2016 and affected ∼500 million customers worldwide, with the breach only being discovered in September 2018. Data and information on names, contact information, passport numbers, travel information and other personal information were compromised, and information on credit card numbers and expiration dates of more than 100 million customers was stolen (Armerding, 2018).
  • Indeed, the 2018 Global State of Enterprise Analytics survey found that globally 49 per cent of companies surveyed believed that the primary challenges organisations most commonly face are data privacy and security concerns (MicroStrategy, 2018). Similarly, another recent industry report shows that over 40 per cent of tourism industry professionals claimed that data privacy and cybersecurity are one of the most influential factors impacting digital commerce in this sector (Bremmer, 2019).
  • Not surprisingly, privacy is now the top data issue and concern for organisations
  • When selecting analytics solutions, tourism and hospitality organisations are required to address the growing concerns around privacy and security of customer data by putting in place well-designed data governance frameworks capable of providing quality data and be able to provide effective frameworks of data security and protection for all stakeholders
  • Potential frameworks for ethical data management and digital privacy specific to tourism and hospitality would need to identify, in addition to the protections afforded under the recent General Data Protection Regulation (GDPR) (ICO, 2018), how data is collected, what it is used for and who has access to it and why
  • Big data and analytics are playing a crucial role in digital transformation efforts of organisations in general and in the tourism and hospitality industry, thus driving greater effectiveness and efficiency and the strategy to define new business models and bring about successful change (Evans, 2020; MicroStrategy, 2018)
  •  
    This was about the risks in the hospitality and tourism industry when it comes to big data and analytics. Big data is so important in the hospitality industry because it's how companies know who to cater to and with what and how. In addition to the importance of big data, there are risks that come with it. A few risks are data leaks, hackers, etc. Companies invest money in their systems so these things are avoided.
Yawen Zheng

Aeroseal´s Director to Speak at Green Hospitality & Tourism Conference on Env... - 0 views

  • Bobby leads the commercial sales and marketing initiatives for Aeroseal, LLC, sole owner and licensee of aeroseal technology, the world’s only patented process of sealing HVAC ductwork from the inside out. Through this unique approach to duct sealing, aeroseal technology allows users to 1) save money by sealing old ducts instead of investing in new ducts, (2) perform sealing that is impossible or inefficient from the outside, (3) significantly lower energy costs and meet aggressive energy-savings goals, (4) address serious indoor air quality issues associated with airborne contaminants that spread through leaky ducts and (5) remedy airflow/comfort issues associated with ductwork.
  • Studies indicate that on average, 15-40% of all heating and cooling energy is lost through leaky ducts. Unfortunately, this problem was seldom addressed due to the difficulty associated with accessing ducts and finding leaks, the majority of which are hidden behind walls, under ceilings or beneath insulation. Aeroseal addresses these issues by automatically sealing ducts from the inside. The solution is obvious and easy, addresses serious issues, and delivers energy savings, with a 2-7 year payback.
  •  
    This article shows a new way to make green hospitality. Compare the tradition way, the new technology will save the energy cost and provide the comfortable environment at the same time.
Jenan Williams

http://www.todaysfacilitymanager.com/2012/09/services-maintenance-proactive-energy-mana... - 0 views

This article is quite interesting when analyzing how important your facilities management team is to your business. The article highlight great cost saving by using smart technology such as intelli...

started by Jenan Williams on 06 Oct 12 no follow-up yet
Kai Zhang

Hotel Network Security: A Study of Computer Networks in U.S. Hotels - Cornell School of... - 3 views

  • Since many business travelers connect remotely to continue working while on the road, the potential for theft of corporate information exists.
  • not prevent malicious users from intercepting guests’ transmission
  • virtual local area networks (VLANs)
  • ...3 more annotations...
  • hotel could potentially be considered at fault for not taking the necessary precautions to protect their guests from hackers.
  • The VLAN inhibits attackers from using their computer to imitate the hotel’s main server, which is the mechanism most would use to intercept other people’s data
  • Given that the technology exists to increase a hotel network’s security, a hotel could potentially be considered at fault for not taking the necessary precautions to protect their guests from hackers.
    • TIANJIAN ZHANG
       
      The security of guests' connections to the hotels' network seems to be an essential issue in hospitality industry, especially in those commercial hotels. Based on the leaks of the network technology in the hotels, some companies may hire hackers to steal or snoop the secret data of other companies for achieving some business goals during the business people from the victimized companies staying in the hotels. Therefore, if hotels can not make sure their network system can prevent malicious users from intercepting guests' transmissions, they must admit their weaknesses of network technology and warm guests to be cautious when they access the network system of the hotels if they need to view some secret data. Anyway, hotels should keep taking the necessary precautions to protect their guests from malicious users.
  •  
    From what I research from the article, VLAN as a local area network itself actually is quite secure cause the fake IP address means a private one.  And it is already encrypted. But the hackers had imitate the hotel's main server. As for the technology developing, it seems like the more secure the system make, the smarter the hacker would be. 
  •  
    This article introduced how hotels improve their network to enhance security. To reduce the potential for stealing by theft and hacker, the W Dallas Hotel set up virtual local area networks. Compared with relatively rundimentary hub technology and encryption for Wi-Fi, the biggest advantage of this VLANs is to inhibit attackers from using computer to imitate the hotel'smain server. I think increaing a hotel network's security is very necessary, still, people should pay more attention to this and improve the techonology to make sure the security of all aspects.
Diana Sardina

Restaurants to go 'greener' in 2012 - NRA News Blog - 3 views

  • The report discovered that more operators will invest in green equipment and fixtures in order to attract the 41 percent of consumers who say they're likely to make their restaurant choices based on whether the establishments they frequent practice environmental conservation
  • , as more information becomes available to them through online and social-media channels, they're learning even more that much faster. Not only that, they're much savvier about how they spend their money and want to make purchases from those they feel are doing the right thing. Operators who understand that and cater to their desires will win that market share every time."
    • Diana Sardina
       
      There is trend into the "green initiative" and we customers are more inclined into purchasing good and services from companies that are eco-friendly. It is a win win situation, not only that you are cutting your expenses in the long run, you are also improving the company's image.
  •  
    More and more restaurants are following the "green move" to make sure they are staying in the loop of an eco-friendly customer.
  •  
    Nice article Diana. I also chose an article on restaurants going green. Customers really do like the idea of eating at a certified green restaurant because they care about the environment and want to help it stay healthy. There are some easy and quick fixes that restaurants can do to become green from using recycled paper products to making sure the turn any lights on when they are not needed to making sure there are no gaps in doors leading to and from coolers which would let the air leak out. I am glad that more restaurants are becoming green and from reading these articles since I work in a restaurant it makes me want to go to my bosses and see what we can do to help the environment in our restaurant.
  •  
    Diana I agree with your statistic. From a business point of view it makes more sense to try to attract the customers who are eco-friendly, because people who are not necessarily concerned about the environment are not gonna turn down a restaurant because it is eco-friendy, but on the other hand a green person will turn down a restaurant if it does not meet environmental standards.
wenzheng guo

The Rewards for Restaurants Going Green - 8 views

  • Research shows that going green is paying off for restaurants
  • Customers prefer dining green
  • Reduce your restaurants’ environmental footprint.
  • ...3 more annotations...
  • Immediate and long term savings
  • Attract employees.
  • A number-one reason people don’t return to a restaurant is a “perceived attitude of indifference on the part of the employee,” reports the Hospitality Times Group5
    • wenzheng guo
       
      1.The easiest and the most costless way for Green--by the local food. 2.It is critical that all employees hold support on Green ideas. It inflences customers and makes them accept the way of Green food
  •  
    Americans eat out at restaurants almost as much as they eat at their own houses. Customers would prefer to eat at a certified green restaurant than one that is not. Americans do care about the environment and want to do things that can help it survive longer. For restaurant the Green Restaurant Association has steps to help you make the changes necessary to become green certified. Some little things that can be changed immediately are using recycled paper products or purchasing locally grown foods. There are immediate and long term savings that are a positive to this as well. Some of these include: installing an energy efficient lighting system, and fixing gaps in any doorways to prevent air from leaking out making the system run harder to produce the air.
  •  
    The easiest and the most costless way for Green--by the local food.
aycasa

How Hotel Cybersecurity Keeps Guests and Data Secure - 1 views

  • Hotels need cybersecurity: Although they don’t have the volume of transactions that big box retail stores do, their transactions are generally larger, and their guests have more at stake than just their groceries.
  • But the personal information hotels store is only part of what’s at risk.
  • Hospitality organizations need to understand their vulnerabilities, as well as how to identify threats to their guests, property and data.
  • ...2 more annotations...
  • Hotels need to think about multiple endpoints and the remote connections they rely on to run the property’s operations.
  • Take advantage of cybersecurity professionals who can identify sources of intrusion, assess the extent of the breach and provide details of the compromised material.
  •  
    This article is talking about how the hotel cybersecurity keeps guest information data secure and why is very important. Most of the hotel has a really big database of the guest's personal information. Thus, it's easy to have security problems happen in the hotel. Hospitality organizations have to understand their vulnerabilities and always have to make a plan about how to protect hotel guest's data. This article also introduced 4 key areas cybersecurity teams need to focus on. First of all, instill security as a Cultural Norm. When the customer chooses the hotel to stay, which means they trust this hotel, they feel the environment is safe and they trust the digital assets as well. They will connect the Wi-Fi with their personal laptop or smartphone. Therefore, hotelier have to train their employee about provide the safety environment for their guests is necessary and everyone have to focus on it. Secondly, Think Beyond the Credit Card. Every billing system need to be protect customers personal and financial information, the hotel need to think about the multiple endpoints. Third, Be Smart About Responses. When the cybercrimes happen, they need to be reported responsibly and they have to know this thing at the first moment. Hotel have to keep training their security teams and be aware of some bad things happen. The last one, Don't sleep on Insider Threats. There is one thing that hotel have to focus on that the employee may steal data to sell it to other company.
  •  
    This article mentioned how hotels do not have as many transactions as popular stores have but their transactions are typically more than grocery transactions. Hotels have a lot of personal information for many people and that information should not be leaked, never. It was mentioned that hotels need security as it is a cultural norm, you have to think beyond the credit card, be smart about responses, and don't sleep on insider threats. "Hotels are vulnerable to cybercrimes through a variety of avenues that break with the traditional physical security measures deployed across the hospitality industry. Keeping guests and their assets - both physical and digital - safe is paramount to preserving both the image and financial security of hotels."
hannahamorton

Marriott Breach Exposes Far More Than Just Data - 0 views

  • for about 327 million victims, compromised data may include names, addresses and passport numbers
  • "they should have been able to isolate hackers back in 2015."
  • Currently many companies opt for inadequate data security because it's cheaper than the consequences of a data breach,"
  • ...5 more annotations...
  •  "The Consumer Privacy Act fixes that and would hold companies accountable."
  • The CCPA — which gives Californians the right to know what personal information is collected about them, whether and to whom it is sold or disclosed, as well as the power to prevent such sales — takes effect in 2020 and, while it may sound like reasonable legislation, has already faced a grueling uphill battle.
  • Fancy Bear, which has been tied to Moscow's military intelligence service GRU, was found to be using the leaked NSA hacking tool Eternal Blue to hack victims via their hotel WiFi connections.
  • This is much more than a consumer data breach. When you think of this from an intelligence gathering standpoint, it is illuminating the patterns of life of global political and business leaders, including who they traveled with, when and where. That is incredibly efficient reconnaissance gathering and elevates this breach to a national security problem.”
  • Hotels are easy targets, constituting 92% of all point-of-sale intrusions in 2017, and hotel mergers are only expected to accelerate.
  •  
    Marriott's data breach in 2018 exposed the information of over 500,000 guests including names, addresses, and passport numbers - leading to a class-action lawsuit and falling share values. The California Consumer Privacy Act, taking effect in 2020, gives Californians the right to know what information is collected about them and where this information goes. Amazon, Facebook, Google, Microsoft, Twitter, Uber, AT&T and Verizon are lobbying against the CCPA, but data-security regulations are being enacted regardless to protect customers against these breaches.
1 - 20 of 41 Next › Last »
Showing 20 items per page