Skip to main content

Home/ Hospitality Technology/ Group items tagged prevention

Rss Feed Group items tagged

lvela051

Safety Security and Loss Prevention During Hospitality Emergencies - Disaster Recovery ... - 0 views

  • Emergency preparedness should be a major part of the hospitality managers’ duties; they must work side by side with other tourism organizations to be prepared well to assist and save the lives of the tourist before, during and after the catastrophic events, and should adopt an updated effective emergency plan.
  • Safety and security are classified as the most important factors in the hospitality industry. Pizam et al., (1997) argued that safety and security are the most important factors to the tourist, and the first in mind when planning to travel.
  • The effective usage of safety surveillance such as closed circuit television (CCTV), electric emergency generators, body guards, fire extinguishers, fire sprinklers, emergency lights will maintain the security procedures adopted by the hotels to ensure their guests' safety, and updated emergency plans to confirm the emergency preparedness and effective planning to overcome the potential risks.
  • ...18 more annotations...
  • Furthermore, it is important to consider the proper dress for the security staff to be in line with the hospitality management philosophy.
  • Safety is a term which relates to protecting guests and staff within the hotel from the potential hazards, injury, and death by dealing with dangerous materials and different kinds of accidents. In contrast, security regards the protection of property from criminal accidents and terrorist activities.
    • lvela051
       
      Main goal with safety.
  • Providing the highest levels of safety standards and security ensures good marketing for the hotels by preventing an accident before it becomes a major issue causing loss of life and property.
  • effective information system and being well prepared for emergencies could prevent or minimize loss for the hotels.
    • lvela051
       
      Preparedness helps to know the situation better.
  • four-phase model to plan for the crisis and to deal with the emergencies; this model proposed reduction, readiness, response, and recovery phases to deal with the crisis.
  • Many practitioners imply that regarding the technology evolution in the last decade, Information Technology has become a fundamental part of the hospitality industry,
    • lvela051
       
      The use of technology is becoming a part of how to prevent the problem.
  • the importance of an updated emergency plan
    • lvela051
       
      things change over time, its important to continuously update the plan.
  • The hospitality industry is one of the most vulnerable industries to crises.
  • is vulnerable to both internal and external emergencies.
    • lvela051
       
      Need plan for both to be prepared.
  • updated regularly, and a direct communication system should be employed to respond to and overcome the crisis.
  • The importance of continuous emergency training for the employees is also emphasized.
  • ole of the media, information, and the social media should be reviewed and evaluated continuously
    • lvela051
       
      With the use of technology becoming a bigger factor, its important to have someone assigned to handle the media.
  • causing negative impacts not only for the hospitality players, but also for the tourists and the local community.
    • lvela051
       
      It affects more than just the establishment.
  • biometric technologies could ensure the hotel security and increase the effectiveness of hotel information systems. This will reduce the costs, improve management of the employee and guest activities, and improve the ability to recognize the criminal activities.
  • Preparedness and an updated emergency plan with managers' awareness will help the hospitality industry to provide the necessary resources, as well as effective training to avoid or minimize risks. Safety surveillance and security systems are very important to save guests' lives and hospitality properties. These factors can also be used as a marketing tool for guests and meeting planners. Finally, it's very important to understand the crisis emergency frameworks to mitigate effects and be well prepared before the crisis strike, and furthermore, to minimize losses during evacuation when the disaster happens.
    • lvela051
       
      What can be done.
  • susceptible to epidemics movements,
    • lvela051
       
      Word of mouth is a big marketing tool that can either hurt of help an industry.
  • Hotels should issue a check-list concerning a hotel’s vulnerability to emergencies caused by natural disasters (hurricanes, earthquakes, tsunamis) or man-made crises (terrorist attacks, explosions, fires, spill, food poisoning).
  • This will transmit a positive image: hospitality may gain a lot by using its safety and security as a marketing tool to attract more tourists to the destination.
  •  
    This article was very interesting and it was about how safety security is very important to the hospitality industry. This article also explained how a study shows the safety and security systems work in the hospitality industry. They also said that it is very important to update the emergency plan because you never know when something going to happen in the hotel and you always have to be ready for anything. This study just showed how an effective information system could prevent and being well prepared can definitely help prevent any emergency.
  •  
    The article is a study that was conducted in regards to the security management within a hotel and how an effective security system can help in preventing accidents or emergencies from occuring. The main priority of a hotel or any establishment, besides the service provided, is having an effective emergency plan set in place to be able to respond and overcome a crisis. International hospitality being a focus over the recent years, has suffered crises, risks, and disasters causing negative impacts on tourism and the community. Hotels should "issue a check-list concerning a hotel's vulnerability to emergencies caused by natural disasters (hurricanes, earthquakes, tsunamis) or man-made crises (terrorist attacks, explosions, fires, spill, food poisoning)." Another part of the plan is to focus on the loss prevention aspect of a hotel by implementing information technology to secure or improve security. On technology mentioned was biometric to increase the hotel information system and also to help reduce cost and improve the way we recognize criminal activities. With the hospitality industry being one of the most vulnerable industries to crimes and disasters, it is important to recognize, improve and update the plans set into place to ensure accurate information. While it's impossible to say that these preventions are going to stop these problems from happening, it can help other learn about the proper steps to handling these situations. I personally think that as much as employers suggest different way, it's the job of the loss prevention team in every industry to construct a plan that address as many issues and conduct trainings that would help to prepare us for these occasions. Trainings are going to be the best way to properly analyze a problem and improve on the emergency plan set.
rebecca Bonet

Keeping hotel locks safe | Hotel Management - 1 views

  • Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • ...18 more annotations...
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate
    • TIANJIAN ZHANG
       
      Nowadays, locks security is an essential issue in hospitality industry. Actually, most hotels upgrate their locks systems with advanced technology. The role of technology in the security sector is fundamental, but despite the rapid technological progress, one thing has remained constant: the importance of trust. Whether hoteliers wising up to the fact that they've bought what could be called a flawed security system will be willing to trust the supplier of said equipment for a fix.
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues. 
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • , preventing
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security
  • “  Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software ,” Shea said. “  When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • For instance, a ‘wandering intruder alert’ warns hotel security personnel when a card is presented to a number of different doors.  Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues.  
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate ,”
  • As with any hotel upgrade, hoteliers understand that renovation and upgrades are a regular part of running their business
  • Looking past RFID solutions for instance, VingCard Elsafe has made our RFID locks compatible with next generation technologies, like Near Field Communications (NFC), providing our customers with an easy upgrade path at reasonable cost.”  
  •  
    This article discusses the security issues with room keys. These hotel locks will not open with cards that are read as duplicates or duplicatable. The locking mechanism has been specifically designed to alert the front desk and secuirty departments in the event these locks are tampered with. I'm sure at one point or another we have all experimented with our room key and tried to open other doors. A system like this will prevent activity like that.
  • ...2 more comments...
  •  
    VingCard Elsafe, the global leader in hospitality security and part of the ASSA ABLOY Group, announces that it has phased out the use of brass metal plating and painting in the manufacture of its locking systems, opting instead to use a more eco-friendly process to color stainless steel. VingCard Elsafe has adopted a new method of metal coloration called physical vapor deposition, or PVD, an environmentally friendly process that involves vaporizing an alloy onto stainless steel within a heated vacuum. PVD requires no chemicals and produces no waste or hazardous materials of any kind, resulting in no environmental impact whatsoever. The PVD process has other added benefits, as well. PVD-treated surfaces have high wear resistance for discoloration, and the stainless steel adds enhanced anti-corrosion properties. Besides eliminating the negative environmental effects of the brass plating process, the move by VingCard Elsafe to simplify its lock manufacturing process has had other related green benefits. By doing away with the need for secondary surface treatments of the locks, new product components are now supplied directly from metal stamping to the point of use in the assembly line. This means less shipping and transportation is required for product manufacture, resulting in a diminished carbon footprint.
  •  
    VingCard Elsafe is a new kind of lock system, which contains RFID technology and is compatible with the Near Field Communications. It has several advantages compared to traditional magstripe locks. First of all, it can add security to the RFID card and prevent cloning, which is much safer than the traditional key card. Another is that it can detect tampering and know when and where staffs use the lock. It can send alert to the front desk. Moreover, the front desk can know when the door is forced open. However, before using the lock system, training program should be provided. So this new kind of lock system brings safety to the guests and to the hotels.
  •  
    This article talk about the issue that hotel are having with their security system lock for guest room. These cards are easy to duplicate. The new system will alert front desk or security if the lock has been tampered with. Other alarms include detecting that a door is forced open 'mule tool' instruction when a door is open from the inside handle without an occupant in the room.
  •  
    This article discusses the current state of hotel lock safety. Monitoring safety has changed as these locks become more automated. The article states that, "Hotel Management corresponded with Tim Shea, president of ASSA ABLOY Hospitality, for ways in which vendors are keeping hotel locks secure." Through VingCard Elsafe's locks, hotel security and safety has increased. VingCard says, "Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software." This is just one of the ways the locks increase security. The article also states that the system is cost-effective for hoteliers.
Yookyung Kim

Casino Hits Labor Savings Jackpot with Preventative Maintenance Management | Case Studi... - 0 views

  •  
    Silver Reef Casino in Ferndale, Washington implemented a web based program called Bigfoot computerized maintenance system (CMMS) to solve the challenges such as the lack of a system for managing, tracking and analyzing repairs over time. Now, the casino has a preventive maintenance program in place so they can notice for everything from the glass washers at the bar, dishwashers in the kitchen, to the rolling press ironers because they are all in the PM scheduler. Also, the CMMS provides valuable information after repairs are made to equipment or other system. Another advantage of a CMMS system is that the managers can easily find information, such as the model and serial number of a piece of equipment, without having to sort through spreadsheets or repair manuals. Therefore, the maintenance team can quickly address customer complaints, and maintain the customer experience. Bigfoot PMs for industrial equipment prevent costly repairs and disruption of guest service. 
Berta Lai

Hotel Enhances Luxury Brand with In-room iPads Without Sacrificing Guest Privacy - 0 views

  • With the introduction of tablets, the hospitality industry experienced a dramatic shift in guest experiences. In fact, a recent study found that 82 percent of guests with tablets in the room used them around 11 times from check-in to check-out.
  • Hotels now have a powerful tool to demonstrate the commitment to innovation through guest services by not only providing in-room technology, such as a tablet, but enabling that device as an in-room companion to enhance the guest experience.
  • Hotel also needed to ensure that guests’ personal information and history on the device remained confidential
  • ...2 more annotations...
  • restrict guests from using the iPad’s camera to prevent guests from seeing previously uploaded content by former guests
  • native web browser was removed to prevent guests from viewing previous web activity
  •  
    Hotels are going way beyond in meeting guests' expectations with the modern day's technologies. One example would be the SLS Hotel, a subsidiary of LA based sbe Entertainment, introducing In-room iPads featuring their internal application, which could be used to change TV stations, place wake-up calls, and order room service. Aside from the above mentioned, guests could surely utilize the internet browsing websites, and other features on the iPad which brings up the next question - Invasion of Guest Privacy. SLS Hotel has partnered with AirWatch in developing a comprehensive securing device in order to deliver a customized brand experience to each guests. Securing measures include restricting guests from using the iPad's camera to prevent guests from seeing previously uploaded content by former guests, removal of the native web browser to prevent guests from viewing previous web activity, etc… SLS Hotel is also planning to implement a cross-platform BYOD program for hotel staff which would also create another security concern on managing confidential and sensitive information within the company. Afterall, a comprehensive security plan and measures have to be in place before any forms of technology could be implemented in this industry. One mistake or negligence could cost the downfall of a company.
Chang Ren

Five tech tips to prevent employee theft | Hotel Management - 0 views

  •  
    this article talks about five tech tips that help to prevent employee theft. for problem 1 taking money from the register, CCTV can help, but internet protocol cameras can bring more convenience and new features. For copying the company's digital asset, using cloud-based security services, company can monitor where its information has been removed. For stealing customer data, encrypting customer data can be vital in dealing with this problem. For pilfering products, RFID readers can help detect either up to 40 feet way or up to 300 feet away. For cheating on time sheets, biometric identification systems keep employees accountable for their time on the job and prevent "buddy punching," the practice of having colleagues clock their peers in and out.
Godelieve Olibrice

SAI's SynergyMMS Selected by Starwood Vacation Ownership for Enhanced Asset Management ... - 0 views

  • SAI's SynergyMMS Selected by Starwood Vacation Ownership for Enhanced Asset Management and Preventive Maintenance
  • SynergyMMS is a Software as a Service (SaaS) solution designed exclusively for hospitality to enhance asset life and longevity by creating "synergy" between front office, engineering and housekeeping staff for enhanced workflow and communications. Starwood Vacation Ownership offers flexible vacation options from spacious villa accommodations in the best locations in the most sought-after destinations to distinctive experiences around the world—all through Starwood Vacation NetworkSM.
  • extend the lifecycle of equipment, reduce energy consumption, minimize equipment downtime, and reduce guest-reported maintenance requests,
  • ...5 more annotations...
  • By tracking workflow in SynergyMMS for the maintenance of these assets, the tasks are completed efficiently. This also aids in establishing the equipment's useful life, prolonging replacement cycles for equipment, and reducing energy and water consumption.
  • n addition to improving the lifecycle of equipment, SynergyMMS also adds accountability for our Engineering teams,"
  • SynergyMMS not only helps identify what work needs to be done and when — both in the villas and across the entire property — but the system tracks exactly when work is completed. SynergyMMS provides another tool for our engineering leaders to monitor productivity and efficiency of the preventive maintenance program.
  • Hailed as the ultimate solution for today's mobile and multilingual workforce, SynergyMMS offers tools that help hotel maintenance staff work together without increasing demands on their time
  • SynergyMMS is all about time, efficiency, and solving today's most tedious preventive maintenance tasks.
  •  
    This is an interesting article about SynergyMMS software which is basically a software aimed at enhancing asset management and preventive management. This software is designed with the hospitality and tourism management in mind since it allows seamlessly communication among various departments of the hotels to improve guests' satisfaction. This system provides real time information about the workflow and maintenance for assigned villas and tracks when the work is completed . Additionally, this system can help monitor water consumption reduce energy consumption enhancing life of equipment cycle have an impact on guest satisfaction ( lower complaints) and less tear down for the hotels.
avila031

HNN - How to prevent, handle employee theft - 0 views

  • No employer hires an employee thinking he or she is someday going to steal. Hoteliers need to take steps to prevent theft and be cautious in taking action against an employee after a suspected theft. Both have practical and legal implications.  
  • The first step is prevention.
  • Maintain a well-publicized policy covering searches of employees’ lockers or personal belongings. Conduct searches in a manner that minimizes confrontation, is minimally invasive and conducted with the dignity of the employee in mind.    
  • ...2 more annotations...
  • Consult with trusted labor and employment law counsel in your particular state before making this decision.
  • While hoteliers can take steps to reduce employee theft, eliminating it entirely is likely an impossibility.
  •  
    This article relates back to our discussion post for the week; employee theft and fraud. It explains how hotels create quite the opportunity for employees to steal and however you try to filter potential employees you never hire someone expecting they will do such a thing to your business. Because you can not be 100% sure your employee is a trustworthy person who would never steal you have to set the proper rules and precautions. Prevention is the first and likely most important step in keeping your company safe from internal theft because once it has already happened there are several contingencies. The article explains the many laws and crimes that an be committed when accusing an employee of theft and from terminating them because of it.
asant318

Ransomware: One of Hospitality's Biggest Threats in 2017 | News | Hospitality Magazine ... - 0 views

  • attack made headlines for locking guests out for their rooms
  • discuss how ransomware can affect the hospitality industry and what hotels and restaurants should consider to protect themselves from future cyber attacks.
  • Travelers may be annoyed, but for the hotel, ransomware can be a major business disruption.
  • ...10 more annotations...
  • The cyber threat has been used to target a variety of businesses from hospitals to retailers and now the hospitality industry
  • , businesses need to always be ready for a breach. Every business should have an action plan in place to prevent their company from being the next victim of ransomware or any other cyber security threat.
  • pirated software, file attachments, web links, and suspicious emails.
  • keep additional devices from being infected.
  • best practices for any company to employ are regular backups and a tested disaster recovery plan
  • Using anti-malware software is a necessary start, but it will not stop everything – especially rogue software downloaded by employees
  • important to act quickly by segmenting portions of the infected network and removing devices to try and prevent the problem from spreading.
  • install ransomware protection
  • malicious software will continue to rise as businesses and consumers become more dependent on the internet for everyday needs.
  • it’s important that businesses take proactive steps to protect not only company data, but the overall integrity of the company network from hackers.
  •  
    The article discusses ransomware attacks on hospitality properties. A 2016 attack left guests locked out of their rooms but the threat could affect different areas of a hospitality business and cause significant disruption to their business. Properties need to be prepared for a security breach with an action plan to prevent cyber-attack. The article points out that it's important to act quickly to segment the network and try to prevent any new devices from being infected. Best practice recommends regular backups and a recovery plan, using anti malware software and being cautious with employee installed software. The most important thing a company can do is to be proactive and prepared for an attack.
khadija2050

50 Facilities Management Tips and Best Practices - Camcode - 0 views

  • Cut night site lighting. “Depending upon how your site lighting is operated and circuited, you can create an ‘economize mode’ for overnight when the site is at its lowest occupancy. Keep perimeter site lighting on around your property and all entrances and main drives lit.
  •  Replace older lighting with LEDs. “Memorial Sloan-Kettering Cancer Center chose LEDs to replace existing lighting in a parking garage open 24/7, halving the garage’s power consumption. Meanwhile, Mediapolis Community Schools in Mediapolis, IA, also embarked on a retrofit of LED exterior lighting.
  • Implement a sustainable facility design plan. “Sustainable design is more attainable and affordable than it’s ever been, especially when you think in terms of years instead of days and weeks. It’s also worth noting that sustainable design is very well favored among the public, which is an extra incentive for companies interested in reinforcing their reputation as socially responsible and environmentally concerned
  • ...47 more annotations...
  • Know the total cost of all facility work done both directly and indirectly. “To the untrained eye, the facilities maintenance arm of a business appears to be a black hole of cost. The costs of these FM services add up, and unless discrepancies arise, that is where most of the business analysis ends. However, facilities maintenance managers, who are privy to all of the nuances that make up eac
  • h work order, understand the complexities and overhead involved in this sector of business.
  • Consider less obvious improvements that impact facility energy use. “Some energy-related projects will be more or less hidden from the users and primarily pursued to reduce energy demand, such as chiller and fan-unit upgrades. Such projects may end up providing the building users with better temperature control, but this is not the primary goal of the upgrade
  • Operational changes such as reducing the hours of HVAC and lighting operation, and changing setback temperatures, which require very little expenditure (if any at all) do not directly affect user experience, but can produce large reductions in electricity loads. In general, working with the building operations team to reduce energy use can produce impressive reductions in loa
  • his allows building and facility management professionals to determine whether the cost to improve a particular element of a building or a system in it against the cost savings over the same period. If the cost of an upgrade over its lifetime offers an advantage over the building operational costs it will save, then it’s generally considered a good investmen
  • “Finding the right suppliers to maintain your facilities can be difficult and time-consuming. From janitorial services, to groundskeeping and maintenance supplies, ensuring suppliers are providing apples-to-apples quotes, developing contracts with clear service levels, and validating that supplier quality
  • “Boilers today can reach efficiencies of up to 96 percent using condensing technology; however, a typical building, including new buildings, uses atmospheric type boilers which, for all intents and purposes, are only slightly more advanced than a science lab Bunsen burner. This technology is reliable and it works, but it is expensive to operate
  • An energy audit systematically identifies and develops opportunities to help reduce energy use in an institutional or commercial facility and, as a result, decrease building operating costs. Focusing the audit is imperative for maintenance and engineering managers.
  • “Commercial kitchens are high energy users, consuming roughly 2.5 times more energy per square foot than any other commercial space, according to the US Environmental Protection Agency (EPA).  Of that, as little as 40% is used in the preparation and storage of food, says the UK’s Carbon Trust; much of the wasted energy is dispersed into the kitchen.
  • All commercial buildings are insulated; building codes make it mandatory to insulate up to  a certain level. Unfortunately, because most buildings are put up under strict guidance to budgets, they are usually put up with only the minimal amount of insulation
  • Develop performance measures for your PM process with an emphasis on measuring the amount of PM that is work completed compared to all other work. Total PM hours should be the highest percentage of all the department’s maintenance work. This goal might seem impossible, but over time, it is very achievable
  • “Preventative maintenance is all about planning, plain and simple. Every piece of equipment or machinery at your disposal or under your care should have a schedule of what type of maintenance it requires and when it requires that check-up.
  • “Failure modes are defined as “how something fails.” Let’s use a flat/membrane roof to show an example of what a failure mode is. On a flat/membrane roof, one failure mode may be “penetration of roof membrane,” and the causes of this failure mode could be many. Knowing the failure mode(s) of a specific maintainable item such as a membrane roof and its causes can be key to early detection of roof failure (not meeting the intent of the end user) so the repair can be made before it affects an operatio
  • “Catch small problems now before they become big ones. Addressing small details can add up to huge improvements in appearance and functionality. Ask your facilities services provider, janitorial company
  • You may schedule preventive maintenance based on meter readings on an equipment. However, equipment meters usually do not differentiate between work time and idle time
  • Greasing the rack and pinion of a beam saw, for instance, can cause grease and saw dust to solidify inside the gears over time, eventually preventing them from moving. If you’re unsure which tasks are beneficial to each piece of equipment, ask your equipment representative.”
  • Having spare parts and supplies around the time of a major preventive maintenance schedule is absolutely critical. Asset management software allows you to check the availability of the spare parts for dates when the work orders are due. This report can help you identify parts that are insufficient for the required work orders in the future. If you know which parts you are falling short on, you can order them in advance from suppliers rather than waiting till re-order limits are reached
  • “Appropriate repetition and reinforcement are necessary. The average person is bombarded with more than 300 messages while at work, and multiples of that outside of work, Finney says. Getting a message to land with an audience might take as many as 12 repetitions, in some cases, he says
  • Let’s get together: when you’re designing your facilities, design social spaces for your employees. These might be lunch or break rooms, games rooms, gyms, or even community gardens.
  • While other managers may work to manage clients or staff, your job is to manage facilities and all that occurs in them. Your corporation’s physical assets are just as important as your human resources, and you are the expert in this field. Whether it’s collating data or contributing to the organization’s bottom line, your input is a valuable part of corporate decision-making
  •  “Workplace inclusion has to be clearly defined before any initiatives can be pushed forward. One useful definition of an inclusive office is a workplace in which all staff are treated with respect and have equal access to resources and opportunities. Facility managers should build on this high-level description to create an idea of what concepts like equal access, diversity and fairness look like in their own facilities
  • Space costs money. Knowing that we are moving towards a working environment consisting of virtual or mobile workers, investing time in developing new workplace designs that can suit these new ways of working while increasing space utilization rates can result in impressive cost savings
  • Performing facility maintenance and engineering tasks is like sailing among icebergs. What technicians can’t see will sink them — or their facilities. Thermal imaging technology gives technicians the ability to see the unseen, making it easier to spot failing motors and electrical components,
  • This concept is broadly used to describe our attempt to formally identify in-house talent in many of our labor shops. We identify talent through a competitive selection process based on potential vs. skills and promote our selected personnel to the worker and helper level while training them to achieve appropriate full mechanic level with associated certifications/licenses
  • This directly leads to the client receiving a more fit-for-purpose solution and ultimately receiving greater value which grows a greater relationship.
  • In other words, there has to be a compelling reason based on our mission for why we would submit budgets for anything.” By presenting specific information on how and why you’ve chosen your budget numbers, you can help the C-suite see that your budget is well within reason
  • When you automate the work order process, you remove human error associated with it. Essentially, you’re taking the people out of the process and ensuring nothing gets missed or overlooked
  • “There are many different software options out there than can aid FMs in organizing and streamlining their everyday tasks. This ranges from software designed to help manage all maintenance activities to logging and tracking facility visitors for security purposes. 
  • uch smart sensors, operating costs are dramatically reduced, productivity is enhanced, and occupants’ comfort is improved.
  • “One of the most exciting features of Facilities Management software is the ability to manage heating and cooling remotely, or set a programmable thermostat to move set temperatures up or down throughout the day. Facilities planners love the ability to analyze and explore energy use from heating and cooling systems
  • “Maintenance and facilities administration systems must frequently abide by national and global regulatory requirements. All maintenance administrators face occasional random or audits inspections by regulatory authorities. Maintenance software enables you to prove regulatory conformity and decrease the amount of paperwork and preparation that is needed for an audit.
  • KPIs allude to opportunities and errors in your company. Paired with the Internet of Things (IoT) and energy management systems, KPIs can be used to highlight missed maintenance tasks, greater traffic area of your business or problems with machinery
  • “Closely monitoring energy and water use to reduce building-operating costs is another benefit. By allowing owners to monitor and analyze the performance of multiple systems—air-conditioning levels, lights on automatic dimmers, water usage
  • “A feature that’s gaining a lot of ground is using facial recognition technology to let people in and out of the building. It’s more secure than key fobs or cards, and unlike cards and fobs, you can’t forget your face at home. It’s like batting a triple, or killing three birds with one stone
  • You cannot do your job properly without the correct information. If you don’t have proper records on the state of your facilities, you can’t do your job as a facilities manager.
  • “A surprising number of facilities managers have no true system in place for managing their space.  More than a quarter of everyone interviewed – 28 percent –
  • . It may help significantly with compliance with various industry standards, such as HIPAA in the healthcare industry and Sarbanes-Oxley in the financial field. It can help to document best practices for avoiding accidents, or in the worst case scenario,
  • This method identifies how critical a piece of equipment or maintenance task is to your business and will ultimately show you where it should land in your prioritization process
  • Smartsheet is a spreadsheet that you share with your co-workers, but its features go far beyond Excel. This tool combines the traditional spreadsheet with project management tools, templates, and forms and allows you and your colleagues to access spreadsheets on mobile devices and work on them collaboratively
  • The business world is increasingly embracing a larger remote workforce. Offices are used as areas to collaborate, develop, and design new ideas. The day-to-day work can be, and often is, done from home
  • “Another possibility for cutting costs, say experts, is not just moving staff around, but moving work around also. This means carefully examining all outsourcing contracts to see if they can be scaled back and the work completed by in-house staff
  • “Verify assets from a minimum of two data points, such as the barcode and the item’s serial number.
  • After collecting data and developing a maintenance schedule for your assets, you need to plan for the long-term maintenance of your asset inventory
  • However good asset management and maintenance planning is, there comes a time when an asset reaches the end of its useful life and should be disposed of.
  • “If you’re trying to get a handle of your documents, the first thing you should do is an asset assessment. Detail the condition of all the main equipment and systems, and document those conditions
  • Strategic asset management integrates key relationships between planning and delivery activities.
  • Maximize your use of vertical cubic footage by placing seasonal products or those that move less frequently in harder-to-reach vertical storage areas
  •  
    the article highlights how companies can benefit from sustainable design and gives tips on preventive maintenance
anonymous

What Is IT Security? - Information Technology Security - Cisco - 0 views

  • Although IT security and information security sound similar, they do refer to different types of security. Information security refers to the processes and tools designed to protect sensitive business information from invasion, whereas IT security refers to securing digital data, through computer network security.
  • Network security is used to prevent unauthorized or malicious users from getting inside your network. This ensures that usability, reliability, and integrity are uncompromised. This type of security is necessary to prevent a hacker from accessing data inside the network. It also prevents them from negatively affecting your users’ ability to access or use the network.
  • Internet security involves the protection of information that is sent and received in browsers, as well as network security involving web-based applications. These protections are designed to monitor incoming internet traffic for malware as well as unwanted traffic. This protection may come in the form of firewalls, antimalware, and antispyware
  • ...3 more annotations...
  • Endpoint security provides protection at the device level. Devices that may be secured by endpoint security include cell phones, tablets, laptops, and desktop computers. Endpoint security will prevent your devices from accessing malicious networks that may be a threat to your organization. Advance malware protection and device management software are examples of endpoint security.
  • Applications, data, and identities are moving to the cloud, meaning users are connecting directly to the Internet and are not protected by the traditional security stack. Cloud security can help secure the usage of software-as-a-service (SaaS) applications and the public cloud.  A cloud-access security broker (CASB), secure Internet gateway (SIG), and cloud-based unified threat management (UTM) can be used for cloud security.
  • With application security, applications are specifically coded at the time of their creation to be as secure as possible, to help ensure they are not vulnerable to attacks. This added layer of security involves evaluating the code of an app and identifying the vulnerabilities that may exist within the software.
  •  
    IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers. IT security includes Network security, Internet security, Endpoint security, Cloud security, and Application security.
obena010

Top 3 Ways You Can Fight Theft at Your Restaurant - 1 views

  • How to Combat Theft in Your Restaurant
  • Employee theft and customer theft in restaurants can become a massive problem if left unchecked.
  • From colluding bartenders and cocktail servers to theft tactics as complex as Ponzi schemes, restaurant theft can occur in a million ways. 
  • ...18 more annotations...
  • False orders, credit card fraud, and comping
  • are some of the most common issues
  • Employee Theft Prevention
  • and theft can account for up to 4% of restaurant sales.
  • liquor lost due to spill or waste – can account for about 25% of alcohol sales.
  • Inventory management:
  • Comping policy:
  • So how can you protect yourself? Enter chip and pin, also known as “smart card” technology
  • Dine-and-Dash Prevention for Restaurants
  • the heroics of dealing with dining-and-dashing should actually be left to restaurant policy.
  • But you can mitigate risk in other ways. Ways to dissuade dine-and-dash theft include:
  • Video surveillance:
  • A host at the front door:
  • The use of a single entrance:
  • Request a credit card:
  • Credit Card Fraud Prevention for Restaurants
  • POS security settings and controls:
  • Restaurant theft prevention starts with establishing a culture that encourages loyalty among staff and policies that protect financial interests.
  •  
    Talks about different ways to prevent fraud in different areas of the restaurant.
  •  
    This article mainly focused on ways restauranteurs can avoid theft. For employee theft, inventory management, complimentary control and a POS system that can track the whereabouts of the items are good ways to deal with it. For dine-and-dash, the restaurant will be safer if adding surveillance and using a single entrance. Also, using credit cards is a nice way. For credit card fraud, preferring to use a "smart card" technology will be a vital way.
Adilen Alfonso

Hotels Tap Tech for Loss Prevention | Top Stories | | Hospitality Magazine (HT) - 0 views

  • But new technologies are becoming available
  • From RFID linen/supplies tagging to inventory management; from automated minibar technology to video surveillance and door locking technology, hotels are finding new and innovative ways to protect their assets, and their guests.
  • a radio frequency identification system (RFID) that allows MGM Resorts to track and understand inventory quickly and effectively.
  • ...7 more annotations...
  • When inventory is received, chips are either pre-installed or sewn into them and inventory is entered into InvoTech’s GIMS system
  • The system was implemented in December 2009, and has resulted in balanced inventory
  • RFID-enabled locking technology
  • The new system allows the facility to monitor and audit a lock to determine when the room was entered and by whom.
  • security cameras provide “eyes in many places
  • merging technology takes these measures to a higher level, using intelligent software for example in security cameras, to provide detailed surveillance information.
  • Good technology in the hands of skilled administrators and managers who have put well-developed and well-communicated processes in place is what really makes the difference in terms of loss prevention for hotels. 
  •  
    This article shows how hotels are using technology to improve their loss prevention and security systems. Hotels, like the ARIA in Las Vegas, are implementing radio frequency identification systems (RFID) to efficiently track their employees' uniforms. This specific hotel has the advantage that it is a new hotel and therefore can start with a blank slate, versus other hotels that will implement it as their budget allows. The RFID chips are sewn into the uniforms and then entered into the inventory system. This allows the hotel to monitor where and in whose hands the uniforms are. Other hotels, like the Arnold Palmer in Orlando, are using RFID for security. The RFID locking technology audits locks and tell the hotel when and who entered a room. In addition, sophisticated cameras with intelligent software are being used throughout different points of hotels' perimeters to safeguard guests. These sophisticated technological breakthroughs are only efficient if organized data management and communication processes are put in place. I think that the use of technology to better monitor theft and security is a great area for hotels to invest their money on. The use of cameras to detect alarming fast speeds of boats near hotels with ocean perimeters is not something that guests look for when deciding on hotels, but it is an added feature that adds value to the hotel in the long-run and one that can save lives.
kteme001

Cybersecurity and the hospitality industry - Las Vegas Review-Journal - 0 views

  • 42 million visitors last year
  • nearly half of cyberattacks worldwide in 2015 were against small businesses with fewer than 250 workers.
  • the average consolidated total cost of a data breach is now $3.8 billion
  • ...3 more annotations...
  • A study by Verizon stated that 99 percent of breaches in 2014 were caused by known vulnerabilities with fixable patches.
  • all working together in an atmosphere that prioritizes data security
  • PCI and our partners are working together to educate our members, find solutions to prevent cybercrime and ensure our work-force and our patrons’ data remains secure.
  •  
    This article highlights a meeting that will be held to gather the world's cyber security experts to discuss and troubleshoot potential threats. Las Vegas specifically is at high risk for intrusion with the high amount of room and restaurant reservations made in this location. The hospitality industry in general is at high risk for cybercriminals to invade their data. Especially small business, the article stated that half of the cyber attacks made in 2015 were against businesses with 250 employees. The data being breached has reached the outrageous total of $3.8 billion. The main point is that most of these issues are preventable, it's all about knowing what can and can't protect you. Investing in the proper technology and dedicated staff can make all the difference. Las Vegas' efforts to prevent these intrusions should set an example for others.
irinatroitskaya

How CMMS Asset Management is helping the Hospitality Industry | By Lindsey Walker - Hos... - 1 views

  • As a hotel maintenance manager, you should always be on the lookout for any glitches that can lower customer satisfaction levels.
  • Efficient management of assets is only possible if you understand precisely the layout of the hotel in terms of the location of your equipment.
  • One of the major pitfalls in the hospitality industry is delays in responding to work orders.
  • ...4 more annotations...
  • With mobile CMMS, it is easier to track any volume of maintenance requests and this is done in real-time.
  • The preventive maintenance software helps you keep up with pending maintenance to reduce breakdown and avert emergencies.
  • The more maintenance requests you have the more important scheduling and planning becomes.
  • CMMS in the hospitality industry lowers operational costs by reducing breakdowns.
  •  
    This article discusses the importance of the Computerized Maintenance Management Systems for the hotels. In the hospitality industry, the emphasis is made on the customer satisfaction. Thus, every issue including proper, thorough and timely maintenance is extremely important in making a guest happy. The maintenance manager may experience a large workload. The CMMS is intended to help in organizing the work and keeping it done fast and efficiently. Here are some functions of the CMMS. The assets are easily tracked with the detailed reports of the layouts, scheduled or completed repairs, etc. The guests' requests are responded faster as they are sent directly to the person in charge of the particular situation. It also provides effective scheduling procedures so that every request would be reacted in the best possible way. CMMS also schedules preventive maintenance for the most appropriate time. Regular preventive maintenance would save money on emergency repair. Thus, as the physical plant in the hotels becomes more complex the maintenance issues are getting more difficult to manage. The CMMS is able to assist the management in maintaining the facility in a way that will be satisfying to the customer.
augu010

5 Best Practices to Prevent Insider Threat - 0 views

  • Insider threat continues to be a problem with approximately 50 percent of organizations experiencing at least one malicious insider incident per year, according to the 2017 U.S. State of Cybercrime Survey.
  • While intellectual property (IP) theft, IT sabotage, fraud, and espionage have continued to appear as the primary forms of malicious insider threats, new research has led us to understand the patterns related to unintentional insider threats. These threats represent a significant risk for organizations and potential attack vectors for malicious insiders and external adversaries.
  • Know and protect your critical assets Develop a formalized insider threat program Deploy solutions for monitoring employees actions and correlating information from multiple data sources Clearly document and consistently enforce policies and controls Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees
  • ...18 more annotations...
  • The trust that organizations place in their workforce can leave them vulnerable to malicious insiders, who often use particular methods to hide their illicit activities.
  • Current technology allows seamless collaboration, but also allows the organization's sensitive information to be easily removed from the organization. A complete understanding of critical assets (both physical and logical) is invaluable in defending against attackers who will often target the organization's critical assets.
  • Critical assets can be both physical and logical and can include facilities, systems, technology, and people. An often-overlooked aspect of critical assets is intellectual property.
  • Insider Threat Incident Response Plan:
  • Organization-wide Participation:
  • versight of Program Compliance and Effectiveness:
  • Confidential Reporting Mechanisms and Procedures:
  • Formalized and Defined Program:
  • ommunication of Insider Threat Events:
  • Protection of Employees' Civil Liberties and Rights:
  • Policies, Procedures, and Practices that support the InTP:
  • Data Collection and Analysis Techniques and Practices:
  • Prevention, Detection, and Response Infrastructure:
  • Insider Threat Practices Related to Trusted Business Partners:
  • Insider Threat Integration with Enterprise Risk Management:
  • Organizations should ensure policies and controls provide: concise and coherent documentation, including reasoning behind the policy, where applicable consistent and regular employee training on the policies and their justification, implementation, and enforcement Organizations should be particularly clear on policies regarding acceptable use and disclosure of the organization's systems, information, and resources use of privileged or administrator accounts ownership of information created as a work product evaluation of employee performance, including requirements for promotion and financial bonuses processes and procedures for addressing employee grievances
  • wareness training for the unintentional insider threat should encourage employees to identify potential actions or ways of thinking that could lead to an unintentional event, including level of risk tolerance--someone willing to take more risks than the norm attempts at multi-tasking--individuals who multi-task may be more likely to make mistakes large amounts of personal or proprietary information shared on social media lack of attention to detail
  • Our intent was to develop a single definition for insider threat that covers malicious and non-malicious (unintentional) insider threats covers cyber and physical impacts applies to both government and industry is clear, concise, consistent with existing definitions of 'threat', and broad enough to cover all insider threats
  •  
    This article goes into detail about various safe practices that can prevent cyber threats. Policies and procedures must be created in order to protect us from cyber crimes. Governments have worked hard to protect data from being hacked.
leahesper

10 Ways to Prevent Fraud By Restaurant Employees - 0 views

  • Employee fraud should be a major concern to restaurant operators because it can significantly cut into revenue.
  • Quite simply, this is an issue that you can’t afford to ignore.There are two main areas where employees can inflict financial harm on a restaurant: they can steal product or they can steal money.
  • First, consider all of the areas that are at risk for fraudulent behavior.
  • ...9 more annotations...
  • Restaurant managers should have a good understanding of what is happening with transactions.
  • As you review transactions, look for unusual activity.
  • The next step is to investigate any patterns or irregularities you find.
  • At smaller chains, spot-check from each register to look for anomalies.
  • When employees know a fraud detection system is in place, the number of cases decreases.
  • Review your authorization process and revise as needed
  • Rolling out cashless payments can help reduce this problem.
  • Preventing and identifying fraud should be an everyday part of your financial management.
  • Lastly, keep in mind that restaurants with lower menu prices may be at risk for more theft.
  •  
    This article gives examples of cases in which fraud took place in the establishment and then gives ways you can identify employee fraud and take steps to prevent it!
lwu014

8 Types of Restaurant Fraud and How to Prevent Them - 0 views

  • 8 Types of Restaurant Fraud and How to Prevent Them
  • Types of External Fraud in Restaurants
  • What are chargebacks?
  • ...6 more annotations...
  • How to stop chargeback fraud
  • How to stop break-ins and robberies
  • How to stop vendor fraud
  • Break-ins and Robberies
  • What is vendor fraud?
  • Types of Internal Fraud in Restaurants
  •  
    This article gives us 8 ways in which we can prevent fraud. It includes charges backs,vendor fraud, time theft (for employees) etc..
  •  
    This article was talking about 8 types of Restaurant Fraud and How to Prevent Them
qszero

Leanpath Celebrates 15 Years of Food Waste Prevention Technology - 0 views

  • The company also introduced Spark, a post-consumer food waste tracking product. Plate waste is tracked through a display monitor that shows diners how much waste has been generated and how they can help prevent it.
  • The Leanpath software now incorporates behavioral science in a way it did not initially.
  • Founded in 2004, Leanpath launched the first automated food waste tracking system. Kitchens are outfitted with tracking stations that include a scale, integrated camera and touchscreen to identify what is being wasted and why.
  • ...1 more annotation...
  • Celebrating its 15th anniversary, Portland, Ore.-based Leanpath continues to hit milestones in its food waste prevention platform, which can be described as an ecosystem of hardware, software and support that allows foodservice kitchens to track and prevent food waste.
  •  
    This was an interesting article as a while back this was a subject I touched up on once when researching technology for restaurants and I actually didn't think this software technology was this old already. LeanPath pretty much is a technology to help reduce food service organizations reduce their food waste by 50%. With the UN Sustainability goal it calls in the world to reduce their food waste in half by 2030 so LeanPath has set a goal to start a program in providing free or reduced cost hardware/software to qualified resourced constrained educational and non-profit organizations to further expand in this initiative. When they first started it was software that was installed on the PC but now it is cloud based. They started to incorporate behavioral science so instead of just providing numbers and raw data they are incorporating photography to create a deeper environmental impact as one would be more self conscious seeing a pan of wasted food to relate the data than just reading a statistical number of the same result.
melnetra112

Why Hoteliers May Want to Step Up Their Game on Security Technology | - 0 views

  • Why Hoteliers May Want to Step Up Their Game on Security Technology
  • Within the hospitality industry, we are all quite aware that Covid continues to spook people all over the world, which will lead to depressed overall travel numbers for quite some time to come. Add to that the various automated systems that together mean hotels may never need to hire back a large portion of their former employees
  • Problems may come about in the form of snatched purses from restaurant tables, missing bags left at the bell desk or minor vandalism of cars left by the front entrance.
  • ...7 more annotations...
  • As we’ve all now promised heightened guest safety in the wake of this rampant virus, so too must we protect our visitors and their belongings during any subsequent increases in criminality. Anything stolen will not only leave guests heartbroken, but this will also reflect quite poorly on the property
  • Beyond retaining a strong security department, much of the contactless technology that hotels have set up in the past months can luckily pull double duty to help prevent theft or other transgressions.
  • Nevertheless, an absence of human eyeballs should be another reason to emphasize touchless technologies including mobile keycards, online payment platforms and elevator floor access systems.
  • Elevator floor access restrictions are often only deployed at night, but these should now be set up for all times of day while also considering elevator cameras
  • The technology underpinning self check-in and mobile key cards can also be used to grant or deny access to other areas on property
  • Even niche operations like poolside or oceanside lounge chairs can be put through an online booking portal to better inhibit unauthorized visitors
  • While cyber threats may still have a much bigger financial impact on hotel companies than any misconduct on a more personal level, it still doesn’t hurt to look at how all the new hardware and software your property has set up to combat Covid might also be redeployed for other safety purposes.
  •  
    To Sum the article, Hoteliers consider high-tech security technology since the outbreak of the coronavirus and the safety of residents in hotel. In order for hotel to prevent the virus from spreading they'll consider limiting who has access to the facility. Another, to prevent criminal activity to take place within hotels by granting access to person who notify resident who stays and to be buzz in, contactless on key card and more.
Yuting Peng

Tech-Laden Hotels Call for Modern Disaster Plans - 0 views

  • the plan has assumed a new life as both a disaster prevention and action schematic for all physical plant systems, computer systems, appliances and all normal uses of the facility. The plan revolves heavily around backup generators and battery power for electricity, as well as services that run on electrical power.
  •  
    It often happen in hotel that the physcial plant system has some problem.The plan resolves heacily around backup generators and battery power for electricity. Lota's plan contain every system, if hotel obey the plan I think they can operate better.Make sure every physical plants in a good working condition.
  • ...1 more comment...
  •  
    It is realize that the potentially harmful effects that utility service interruptions can have on the hotel's many operating systems. With the Y2K threat just a memory, the plan has assumed a new life as both a disaster prevention and action schematic for all physical plant systems, computer systems, appliances and all normal uses of the facility. The plan revolves heavily around backup generators and battery power for electricity, as well as services that run on electrical power. If a fire, earthquake or other disaster causes a blackout, guests will most likely have to be alerted via the intercom. That system has a battery backup. The phone system also uses backup generators, which can also power message lights on the individual units if there's a problem.
  •  
    The duty engineer is also supposed to walk through all machinery spaces to check for any flooding or hazardous conditions. If the outage is of an unspecified "long duration," the duty engineer is also bound to continually check the fuel level of the emergency generator and request that the manager call the contractor for more fuel when the fuel level reaches half-full.
  •  
    The Sheraton hotel in California is the place for business travelers in the high-tech and government sectors. And to avoid the potentially harmful effects that the utility service interruptions can have on the hotel's many operating systems, the manager came out with a detailed engineering contingency plan. This plan is originally intended in prat to address potential Y2K woes. The plan assumed that a new life as both a disaster prevention and action schematic for all physical plant systems. 
1 - 20 of 330 Next › Last »
Showing 20 items per page