Skip to main content

Home/ Hospitality Technology/ Group items tagged malware

Rss Feed Group items tagged

biancafavilli

Tourism security in an age of cyber threats | NTA Courier - 0 views

shared by biancafavilli on 13 Feb 20 - No Cached
kmert005 liked it
  • the safety of clients and staff has to be the No. 1 priority.
  • leisure travel is an expendable industry, and there is nothing that can destroy the industry’s reputation more effectively than a lack of security or safety.
  • it is essential to dispel the idea that tourism security is static.
  • ...4 more annotations...
  • hat means contingency plans must be updated on a regular basis and security plans must show adequate flexibility to incorporate good customer service and proper protection.
  • the latest threat to the industry was underlined by the hacking of Marriott International’s Starwood database, potentially exposing the personal information of approximately half a billion people.
  • This cyberbreach serves as an example that the world of tourism security is fast-changing.
  •  It is essential that every tourism entity assume that, at some point, it will suffer some form of attack, whether physical or cyber. Do not wait for an attack to occur to begin to figure out how to mitigate the damage. Remember that an attack not only damages the client, but it also harms the entire industry.
  •  
    In this article, the author emphasizes that security in the tourism industry should be number one. With the advent of technology, cyber contingency plans must be a part of the overall security plans of tourism businesses. The author also admonishes hospitality businesses to be proactive when dealing with cyber security breaches to withstand malware and infections as well as to be honest with customers when security breaches occur to maintain the customer's trust.
erinkieltyka

Suspected Ransomware Attack on InterContinental Hotels Affected Over 4,000 Guests | Spi... - 0 views

  • Ransomware generally entails infiltration and compromise, exfiltration of data, and the encryption of data/systems/networks. Hospitality was the eighth most targeted sector by ransomware groups between March 2021 and April 2022.
  • 4,053 ICH users and 15 of its 325,000 employees were compromised in the attack whose perpetrator remains unknown.
  • The company was unable to accept online bookings
  • ...7 more annotations...
  • determine whether the latest cyberattack is more significant than the 2016 breach of the ICH systems. Initially thought to have been a minor breach that affected 12
  • Between September 29 to December 29, 2016, 1,175 properties were infected by malware designed to steal credit card data
  • Marriott International has been breached thrice, resulting in the compromise of the personally identifiable information of up to 338 million guests
  • Marriott was also fined £18.4 million ($23.8 million) by the U.K’s data regulator Information Commissioner’s Office for failing to protect the data of the 338 million guests
  • This is yet another reminder of the damaging impacts of cybercrime. Not only is IHG potentially getting held to ransom for its data access, but it is also losing out on customer bookings
  • Organizations should use this as a warning to never gamble with their cyber defenses. After all, the cost of preparing and preventing an attack is far less than the cost of recovering from one
  • Data breaches, on average, cost organizations $4.25 million in 2022, according to IBM’s 2022 Cost of Data Breach report.
  •  
    This article discusses a recent cyber-attack on ICH that is believed to have been a ransomware attack. It's stated that hospitality is the 8th most targeted sector for ransomware as of recently. The recent attack on ICH 4,053 users and 15 employees were compromised, which is actually far less than their last attack in 2016 that effected 1,175 properties. Hotels must take as much precaution as possible against cyber attacks because not only does it decrease their bookings, but they can also be charged millions in fines for information breaches.
j1abao

8 Disruptive Hotel Technology Trends to Watch in 2022 - 3 views

  • Venture capitalists are finally starting to recognize the opportunity to invest in tools and platforms that allow hotels to capture new levels of hotel operations efficiency and revenue growth.
  • penetration of cloud-based technologies in the segment remains incredibly low
  • hotels that invest in technology drive higher revenue, better guest reviews, and a higher star-rating.
  • ...44 more annotations...
  • 20,000 properties.
  • hospitality property owners look to address the challenge of competition from peer-to-peer platforms like Airbnb
  • focus on improving guest experience and helping travelers have the trip of a lifetime
  • guest-messaging software
  • messaging tools to deliver five-star service at scale
  • provide frictionless guest service and streamline time-consuming interactions, such as check-in.
  • White labeling has already begun in the hotel industry without hoteliers even knowing it. Property management systems that offer channel management integrations are usually white labelling their channel managers from other vendors
  • The many tech innovations we see penetrating the market require constant vigilance of cybersecurity best practices, regular updates to security software, and dedication to routine testing and threat assessment.
  • Most revenue management systems focus on reporting and data visualization; the addition of white label software to the backend of an RMS can improve price optimization, letting hoteliers spend their time on higher value tasks and strategic revenue management.
  • APIs allow your various hotel technology tools and programs to work together, conne
  • streaming, voice activation, guest-room tablets, and food ordering tech.
  • 2nd Kitchen is a godsend for hotels without a kitchen on-site: guests can order room service from restaurants near your hotel,
  • Numerous high-profile malware attacks on the hotel industry have led to hundreds of millions of guests’ data being compromised and millions of dollars in damage.
  • forced to get smart about security
  • do their research in selecting tech tools
  • regularly host training to their staff
  • all-in-one suite of tools, including a property management system, channel manager, booking engine, and revenue manager, growing revenue and automating workflows at more than
  • There are two factors outside Coronavirus that are impacting OTAs. First, hotels are getting better at capturing direct bookings.
  • Secondly, Google has entered the travel market in a big way.
  • for property owners, WiFi 6 is much more relevant
  • beyond the guest experience, hotels can take advantage of faster WiFi
  • Smart thermostats, smart speakers, and smart locks
  • data has become the world’s most valuable resource.
  • Data can fuel smarter marketing campaigns, inform your pricing, and help you capture a higher market share
  • Hoteliers are just starting to realize the potential of its guest data.
  • put a dollar figure on just how much hotel industry data is worth. The Group purchased STR for $450 million in cas
  • New competitors are challenging old management companies that haven’t innovated enough
  • These next-gen properties are sometimes called hometels (home+hotel), or more generally, alternative lodging
  • Technology in hotels goes far beyond guestroom TVs and phone
  • smart locks
  • ast WiF
  • NFC technology for contactless payments
  • kiosks or mobile apps for digital check-in,
  • robots that deliver room service.
  • Smart hotel rooms use technology to allow guests to personalize their stay experiences.
  • The most important software in the hotel industry is the property management system
  • hoteliers must focus on data security and continued training
    • jtarr003
       
      I really enjoyed this article about 8 disruptive Hotel Technology trends to watch in 2022. What I found most interesting about this article is how guest room technology is changing. Guest now want there hotel room to have voice enabled devices in there hotel room to help them control the room that they are staying in. Also guest would rather use on-demand conveniences like uber eats and door dash to eat food to there rooms.
    • jtarr003
       
      8 disruptive hotel technology trends to watch in 2022
  • White labeling is a practice in which a product – in this case, hotel software – is manufactured by a third party and uses branding by the purchaser, or marketer, so that the end product appears to have been produced by the purchaser. “The advantage is that a single company does not need to do it all: one firm can concentrate on producing the product; another on marketing it; and another can focus on selling it, each according to its expertise and preference,”
  • Interest in investing in hotel technology has slowly ramped up in recent years.
  • Hotels that are comfortable using APIs can automate tasks that take up much of their employee’s time with manual data entry.
  • Why is data so valuable? “Data are now part of every sector and function of the global economy and, like other essential factors of production such as hard assets and human capital, much of modern economic activity simply could not take place without them
  • Hotels use technology to provide better service, streamline communication, allow guests to personalize their experiences, and offer more convenient processes, like checking in or ordering room service.
  • deliver increasingly high value for hoteliers and guests. For hotel managers, technology specifically designed to manage hotel operations, reservations, housekeeping, and more can enable greater efficiency and fewer human errors
  •  
    For this article I want to focus on the room technology aspect. We have become so dependent of our devices at home that sometimes going to hotels is not as pleasant as before. In this article, we can see how hotel chains are changing to cater to our needs so the daily routines are not affected. One example is how Hilton is partnering with Netflix allowing you to sync your Netflix Account with the Hilton Honors app so you can go and use the room tv to keep watching your favorite programs. So no more using your computer or ipad to keep binging on your series while you are in a hotel. The other interesting part is the use of tablets and apps that mimic our regular apps for food ordering within the hotel avoiding the need to call for room service or doing lines at restaurants.
  • ...2 more comments...
  •  
    This article reviews the top eight tech trends causing disruption in the hospitality industry: SaaS (software as a service), APIs (application programming interface), guest room tech, privacy & cybersecurity, OTAs (online travel agency) struggling, WiFi 6, big data and digital hotel companies/alternative lodging. The article dives into each of the eight with an overview/background on the tech, how it's advancing, and why and how it's being used. Some of main takeaways are that for many of the tech trends the industry is just starting to realize the full potential and that overall these tech advances should be able to allow companies to harness tech and data to drive customer experience and retention.
  •  
    I found this article rather interesting because I feel like this is very normal to me now. The fact that it has technology trends of 2022 on it is so interesting because I've been seeing these trends for a while already. I liked how the article called these technology trends a way for the customers to personalize their experience. At the end of the day, they truly are in charge because of these trends. Everything is accesible online and they even have options to add nearby tourist spots to their itinerary. Technological convenience is now a part of everyone's life. This is why hotels are implementing this convenience through streaming, guest tablets, food ordering kiosk, and much more. This is possible because hotels are also using API's which connect hotel technology by tech stacking and using tools to talk to one another. In my opinion, these technological advances could only get better to further improve the convenience hotels can provide.
  •  
    This article discusses not only the future of hospitality technology, but the impact it will have on the industry, All of the technology advancements mentioned will change how hospitality businesses operate. For example, cybersecurity is becoming a really important investment for these businesses to make because hackers have been stealing guest data and information. Tech advancements are being placed around privacy of consumer data, when that never used to be a major issue
  •  
    This article palms out 8 disruptive hotel technology trends to follow. The explosion of SaaS, APIs going mainstream, room technology innovation, privacy and cybersecurity, the struggles of OTAs, WiFi 6, big data and digital hotel companies. The article illustrates that technology is driving the hospitality industry by explaining new technology trends that enable hoteliers to operate more efficiently and offer guests the opportunity to personalize their experience. But it also means hoteliers must focus on data security and ongoing training when implementing the technology guests expect.
earagon22

PCI and PSD2 Compliance: Why Are Hotels on the Hook? - 0 views

  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • Established in 2006, PCI stands for the Payment Card Industry Data Security Standard, which contains guidelines for accepting, storing, and processing credit card information
  • ...12 more annotations...
  • These days, cyber security and regulatory compliance aren’t just necessary skills for the IT team. Every hotel manager - even the “non-tech savvy” ones - must understand these crucial components of data protection in order to protect their businesses.
  • A few rules of thumb include using PCI-compliant POS and PMS providers, storing both digital and paper data securely, and limiting access to sensitive data to only the employees who truly need it.
  • Examples of these guidelines include using an online checkout/payment page controlled by a licensed 3rd-party service provider, storing credit card data via a 3rd-party “vault” provider rather than in your own system, and masking the full credit card number on receipts, showing only the last 4 digits instead.
    • earagon22
       
      As an example, if guests book through a 3rd-party like Expedia then I at the front desk see an Expedia card not the guest's card. The card I see is pre-loaded with the amount of the stay ONLY. Even then, I cannot see the 3rd party's full cc number. I only see the last 4 digits just like guest credit cards.
  • “The attack on Marriott was hapless and still has many gaps to fill on what actually happened. A popular entry point for adversaries is through email spoofing. This tactic is used in phishing in order to get malware onto a target network to then move laterally across all systems,” Ryan Cornateanu, Application Security Engineer @ CrowdStrike.
    • earagon22
       
      This attack mentioned compromised cc details, passport numbers, and dates of birth for 300 million guests in their database. This happened in 2014. https://hoteltechreport.com/news/marriott-data-breach#:~:text=And%2C%20the%20financial%20burden%20is,the%20largest%20data%20breaches%20ever.
  • because of increased payment security, the amount of chargebacks will likely become much lower, which is something all hoteliers can celebrate.
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should still comply, since regulations like these are often mirrored in the United States and other countries soon after.
  • PSD2 includes enhanced guidelines for online payments and the handling of sensitive data to reduce the risk of credit theft, fraud, and security breaches. One major change is the requirement of Strong Customer Authentication (SCA) for online transactions. With SCA, rather than simply typing in a credit card number and clicking “pay,” consumers will need to provide a second layer of authentication, which could be a PIN code or an SMS verification code, before the payment can go through.
  • Guests book nearly three-quarters of hotel reservations online, so PSD2 will likely impact every hotelier as Strong Customer Authentication (SCA) becomes a requirement for payment processing.
  • Are any charges processed after the guest has checked out, such as minibar chargers? To prevent any hiccups with payment after check-out, charge an authorization on the guest’s card for the full incidental amount and have the guest provide two-factor authentication in person, such as chip-and-pin, when the guest checks in.
    • earagon22
       
      A property rule where I work is that each guest must insert or tap their cc at check-in in order to follow this rule and we take an incidental hold each night. Guests that have not traveled for years are surprised by incidental holds which makes sense based on when this was implemented.
  • The key takeaway here is that transactions initiated by the hotel at a time when the guest isn’t present won’t comply with PSD2 requirements.
  • protect consumers’ sensitive data, and, as a result, every merchant that uses credit card information must follow these rules, from small businesses to large corporations.
  • By partnering with a trusted technology solution and investing in PCI and PSD2 compliance now, hoteliers can prevent the potential catastrophe that could come with the theft of sensitive data.
  •  
    PCI compliance is a crucial and necessary set of guidelines that all hotels must follow. The Payment Card Industry Security Standard was created in 2006 and outlines rules regarding accepting, storing, and/or processing card information. These rules were put into place to protect consumers sensitive information. For example, in 2014 Marriott hotels was attacked and 300 million guests information was compromised. This attack led to new regulations being put into place, the Payment Services Directive 2 (PSD2). These regulations take into account international customers and enhanced guidelines for sensitive data.
kyleemcroberts

5 Key Lessons Learned from Critical Infrastructure Cyber Attacks - 0 views

  • 5 Key Lessons Learned from Critical Infrastructure Cyber Attacks
  • Cyber criminals are highly motivated, creative, and nimble
  • Consider the rise of cryptojacking, which uses mining malware to hijack computers to mine cryptocurrency.
  • ...8 more annotations...
  • Don't be complacent — limit Internet access points with silos.
  • The attackers were just trying to look for unused processing power that they could use for their benefit."
  • finding the time to consistently audit and always be improving security is critical too
  • Keeping the critical infrastructure efficient and effective is challenging enough.
  • Train your humans.
  • This example underlines the importance of educating employees to always be vigilant and raising awareness of potential threats.
  • Stay current.
  • Concerns that new operating systems or software updates might destabilize crucial infrastructure can inhibit the best practice of always updating.
  •  
    There have been many cyber-attacks in many different nations and that is for many different reasons, such as outdated, human error, and all software being in one vulnerable spot. It is important to always update your programs, use cloud computing, and to educate your personal on all cyber-attacks. It is also important for your teams to understand the "why" behind updating and cloud computing and this is to always keep an upper edge on cyber-attacks. Cyber criminals are always changing their ideas and new ways to take over networks and workday and night to find someone to slip up and it can cause the complete down fall of a company or nation.
amoon008

Tackling Security Threats In The Hospitality Industry | MetaCompliance - 0 views

  • The hospitality industry faces vast security threats, making it a natural target for cybercriminals because of the value and volume of personally identifiable information that these organisations hold.
  • Marriott, Radisson Hotel Group, InterContinental, Four Seasons, and Hilton Hotels are just some of the major corporations that have hit the headlines in recent years as a result of a data security attack.
  • approximately 55 million online hotel bookings are affected by fraudulent websites and call centers posing as hotel websites, according to the American Hotel and Lodging Association.
  • ...7 more annotations...
  • The majority of all cyber-attacks can be traced back to a phishing email that tricks the victim into divulging their credentials or downloading malicious malware.
  • A study conducted by Intel found that 97% of security experts fail at identifying phishing emails from genuine emails.
  • many hotels becoming completely digitalised in a bid to gain competitive advantage and keep up with online travel agencies such as Expedia and Hotels.com
  • Worryingly, ransomware is evolving into a new type of threat where cybercriminals are not just encrypting data but are also stealing it and threatening to release it on the internet
  • In recent years, hackers have been deploying new tactics and Distributed Denial of Service (DDoS) attacks have been growing in popularity. This type of attack is an attempt to make an online service unavailable by overwhelming it with huge volumes of traffic from multiple sources to cause great damage. This can include loss of data, loss of revenue, reputational damage, and a loss of customers.
  • According to a survey, almost half (44%) of firms have experienced a significant, business-altering data breach caused by a vendor.
  • With the hotel industry increasingly prone to malicious cyber attacks, there are a number of ways organisations can combat cyber security threats
« First ‹ Previous 61 - 66 of 66
Showing 20 items per page