Skip to main content

Home/ Hospitality Technology/ Group items tagged protecting

Rss Feed Group items tagged

13More

Three ways technology is improving hotel security | TOPHOTELNEWS - 3 views

  • Mobile keys are making an entrance, and this means added security for guests. In some instances, the technology can alert guests and hotel management when someone has entered the room or tried to get in.
  • Many properties are expanding the number and locations of cameras, upgrading hardware, and using better software to run and monitor the cameras. Some of the more advanced systems offer low-light vision, facial recognition, and movement and color recognition analysis software.
  • To combat cybercrime, hotels are taking steps to incorporate more advanced firewalls, limiting who has access to data, and securing mobile devices of employees.
  • ...6 more annotations...
  • Mobile keys are making an entrance, and this means added security for guests. In some instances, the technology can alert guests and hotel management when someone has entered the room or tried to get in.
  • Mobile keys are making an entrance, and this means added security for guests. In some instances, the technology can alert guests and hotel management when someone has entered the room or tried to get in.
  • 2. Hotel security monitoring systems get an upgrade
  • ware to run and monitor the cameras. Some of the more advanced systems offer low-light vision, facial recognition, and movement and color recognition analysis software.
  • 3. Hotel security and cybercrime
  • New technology, such as mobile key cards, advanced monitoring systems, and cybercrime initiatives are working to protect property and personal information, so travelers can always feel more secure.
  •  
    In this article, TOPHOTELNEWS highlights three ways technology is reducing incidences of theft, assault, and data breaches in the hotel industry. Mobile keys allow guests and hotel staff to monitor who enters a room and when, limiting the chances of theft. Security cameras now offer low-light vision and facial recognition, and their decrease in size allows for discrete placement. Cybercrime initiatives are also working harder than ever to secure delicate information by developing advanced firewalls. Each of these advancements allows travelers to feel more secure in their "home away from home."
  • ...1 more comment...
  •  
    This is a great article as the hotel that i work for as many of these same features including the mobile keys, and high definition security cameras and a great team at the back of it. Although it is all good to have those features having the right team makes a huge difference. I have many examples with while being at the hotel probably having a difficult interaction with a guess the security team call me to make sure that i am ok. This made me feel safe to the highest extent that they are watching and alert.
  •  
    This article discusses three ways that hotel security is being enhanced by technology. One way is by mobile keys. Customers no longer have to use physical keys. They can simply use their mobile phone to open room doors. They don't have to worry about their keys going into the wrong hands. The second way is cameras. Modern cameras are smaller and are more easily hidden and can more accurately take pictures of the faces of persons who enter and exit hotels. The third way is to enhance the cybersecurity of the hotels' computer systems.
  •  
    This article discusses the ways a hotel can implement security measures to keep guest information and company's data safe.
6More

LEED rating system | U.S. Green Building Council - 0 views

  • LEED is for all building types and all building phases including new construction, interior fit outs, operations and maintenance and core and shell
  • For existing buildings that are undergoing improvement work or little to no construction. Includes: Existing Buildings O+M also includes applications for Schools, Retail, Hospitality, Data Centers, and Warehouses & Distribution Centers.
  • For single family homes, low-rise multi-family (one to three stories) or mid-rise multi-family (four to six stories). Includes: Homes Multifamily Lowrise Multifamily Midrise
  • ...2 more annotations...
  • LEED recertification is an important step in protecting your building asset. Recertification helps you maintain and improve your building while keeping your sustainability investment in place
  • Platinum 80+ points earned Gold 60-79 points earned Silver 50-59 points earned Certified 40-49 points earned
  •  
    This article is about what can be LEED certified and how to go about getting certified. I just learned about this topic in my Hosp. Fac. Enviro. Sys. class, when I learned about it, I didn't realize that you have to be reevaluate.
1More

How To Choose the Right Property Management Software for You - Innago - 3 views

  •  
    Choosing the right property management software is essential for effectively managing your real estate assets. Consider your specific requirements, such as the size and type of properties you manage, as well as the tasks you need the software to handle. Look for a scalable and flexible solution that can accommodate your growth and integrate with other systems. An intuitive and user-friendly interface is crucial for smooth operations. Evaluate the features and functionality offered, including rent and lease management, maintenance tracking, accounting, tenant communication, and document management. Decide between cloud-based and on-premise software based on your preferences and needs. Ensure the software prioritizes security and data protection. Consider customer support, training options, and pricing to find a solution that fits your budget. Read reviews, seek recommendations, and participate in demos or trials for real insights. By considering these factors and conducting thorough research, you can choose property management software that streamlines operations and maximizes your real estate investments.
29More

Bed & Breakfast Management Software | Little Hotelier - 0 views

  • higher expectations when it comes to service and accommodation standards.
  • more convenient to analyse performance and determine important business decisions.
  • ‘self-start’
  • ...25 more annotations...
  • channel manage
  • booking engine
  • arn more bookings and revenue.
  • support available 24/7,
  • designs their software with small accommodation businesses
  • issues you have can be solved as quickly as possible
  • understand your goals
  • stay PCI-DSS and PSD2 SCA compliant to protect your small property from fraud and avoid online risks.
  • Make sure you’re free to cancel anytime.
  • Stay connected to your guests throughout their stay
  • Manage important daily tasks straight from your smartphone or tablet
  • enables you to manage your property online. It can include many different features such as a front desk system, booking engine, channel manager, payments solution, and more.
  • payment information is in one place
  • command centre where you can see all your bookings from every booking source in one central calendar.
  • ed and
  • breakfast software is a tool that
  • centralising all the crucial aspects of your property’s operations
  • n keep everything all in one place and make changes at the click of a button
  • nformation you need to view or analyse
  • generated automatically and is easily accessible.
  • simplifying the day-to-day operations of your business
  • more control over your business, leading to better decisions and greater profits.
  • easily control all the vital parts of reservation management
  • add more value to your business.
  • increase upsell opportunities and further enhance guest experience
  •  
    The article discusses what a bed and breakfast system is and how it is beneficial for the bed and breakfast to have a PMS system. If the owner would like to live their life and not be behind the desk they need the bed and breakfast system. The owner is able to have all the functions of their bed and breakfast at their finger tips and make any changed from their phone or tablet.
5More

Generative AI Will Change Your Business. Here's How to Adapt. - 0 views

  • you’ll just see: “What do you want to do today?” And when you tell it what you want to do, it will likely offer some suggestions, drawing upon its knowledge of what you did last time, what triggers the systems knows about your current context, and what you’ve already stored in the system as your core goals, such as “save for a trip,” “remodel our kitchen,” “manage meal plans for my family of five with special dietary needs,” etc.
    • kellym64
       
      Now this will help with various things in the future and help search be narrowed down by past search bar items.
  • For example, for an airline brand that leveraged AI to decide on the “next best conversation” to engage in with customers, we set rules around what products could be marketed to which customers, what copy could be used in which jurisdictions, and rules around anti-repetition to ensure customers didn’t get bombarded with irrelevant messages.
    • kellym64
       
      This will also help the hotel industry if a front desk agent is having trouble finding a way to connect with guests. It can help narrow down appropriate questions to ask the guest.
  • Some companies have created new positions for chief customer protection officers, whose role is to stay ahead of potential risk scenarios, but more importantly, to build safeguards into how product managers are developing and managing the systems.
8More

E-Waste: Five Billion Phones to Be Thrown Away in 2022 - 0 views

  • In the past two months, Apple, Google, and Samsung have all launched their newest devices with the hope of getting consumers to upgrade ahead of the winter holidays. However, the companies and their clients may also be adding to a growing environmental problem—namely, that of electronic waste or e-waste.
  • The International Waste Electrical and Electronic Equipment (WEEE) announced last week that in 2022, 5.3 billion mobile phones will be thrown away
  • Precious minerals not extracted from waste electronics, such as the copper in wire or the cobalt in rechargeable batteries, have to be mined. This further adds to the ongoing problem.
  • ...4 more annotations...
  • These devices offer many important resources that can be used in the production of new electronic devices or other equipment, such as wind turbines, electric car batteries or solar panels—all crucial for the green, digital transition to low-carbon societies.”
  • Official United Nation’s data indicates that the world generated a staggering 53.6 million metric tons in 2019 alone. Of that, only 17.4 percent was recycled.
  • Τhe International Telecommunication Union has set a target to raise that to thirty percent by next year. The reason is because e-waste is one of the “fastest growing and most complex waste streams that affects both human health and the environment, as it can contain harmful substa
  • To improve conditions, the International E-Waste Management Network, run by the U.S. Environmental Protection Agency (EPA) and the Taiwan EPA, held a workshop for eleven countries in 2018.
  •  
    This article addresses the growing environmental, financial, and political issues involved with e-waste. It provides predictions on the future of e-waste if it continues at its dangerous rate. An analysis of e-waste and how it can be reduced is also included.
9More

POV: IHG's Recent Data Breach Wasn't Due to a Weak Password | Hospitality Technology - 0 views

  • come to light regarding the recent IHG data breach, one thing becomes clear: employee training to detect suspicious phishing emails must become a priority. Many news outlets have made it seem that a weak password was the cause for the company’s recent security breach, but if the hackers -- TeaPea -- who are claiming responsibility for the breach are to be believed, this really isn’t the case. TeaPea told the BBC that they were only able to gain access to the company’s internal IT network after an employee was tricked into downloading a malicious piece of software via a booby-trapped email attachment.
  • MPLOYEES ARE THE WEAKEST LINK
  • Unfortunately, in an industry where hospitality and customer service is the primary directive, employees are predisposed for being kind and willing to give to much information," says Andy Rogers, Senior Assessor of Schellman, a global cybersecurity assessor. 
  • ...5 more annotations...
  • or hoteliers, recognizing this as a true weakness and doing what they can to remediate this problem is a necessity
  • MAKE CYBER SECURITY TRAINING A PRIORITYOnce employees are aware of the role they play in protecting the company, they must then receive regular and high-quality training on a variety of phishing attacks
  • remember, an hour long security training session once a year is likely to be highly ineffective. Instead, consider multiple short training sessions regularly.
  • GO BEYOND TRAINING
  • Email systems are too intimate with business applications and are typically installed on the same workstations for convenience," Sackowitz says. "Perhaps, as a safer alternative, it's time to look at sandboxing or bifurcating critical systems over one’s that converge with public delivery. Perimeters are still necessary. Additionally, there are technologies that can block or proxy any outbound URL from email that will minimize risk."
  •  
    this article is about a recent data breach. in essence this article provides an outline for how to possibly prevent something this devastating from happening. the general consensus is that training employees is of the utmost importance because there the weak link.
21More

Cyberattack on Luxury Resort Should Put Hospitality Industry on High Alert | Fisher Phi... - 0 views

  • Cyberattack on Luxury Resort Should Put Hospitality Industry on High Alert
  • Cybercriminals are finding new ways to hold their victims hostage
  • a recent cyberattack on a luxury resort should serve as a warning for your business.
  • ...17 more annotations...
  • The Allison Inn & Spa, recently fell prey to a ransomware attack that left its employees’ and guests’ personal information exposed
  • the stolen information – which includes data from 1,500 employees and more than 2,500 guests, including dates the guests stayed at the hotel as well as employees’ birthdays, phone numbers, and Social Security numbers – was posted on the public internet in easily searchable form.
  • Typically, stolen confidential information such as this is only published on the “dark web” and is not as easily retrieved through any type of online searches.
  • New Tactic Reveals New Dangers
  • If affected devices cannot be removed from the network (or if the network cannot be temporarily shut down), secure the network by powering down infected devices to avoid any further spread of the ransomware infection;
  • the public release of the confidential guest and employee data may have been an “experiment” to see whether it could further ratchet up pressure on the business to pay out the ransom.
  • this new tactic may be a trend we see from cybercriminals looking to extort their victims in future ransomware attacks.
  • they were hoping to force the business to pay them a ransom.
  • be prepared to implement comprehensive cybersecurity risk management processes.
  • Determine what systems were impacted and immediately isolate them
  • What Should Your Business Do?
  • Triage impacted systems for restoration and recovery
  • Engage your internal and external stakeholders
  • Retain legal counsel to provide guidance
  • Retain a third-party incident response provider
  • Report the incident to law enforcement
  • companies should consider deploying multifactor authentication in order to gain access to company networks, provide robust cybersecurity training to all employees on an annual basis, and maintain offline, encrypted backups of all internal data.
  •  
    Cybercriminals are constantly coming up with novel schemes to kidnap their victims. A recent cyberattack on a five-star resort should act as a cautionary tale for your company. In Oregon, the Allison Inn & Spa recently became the target of a ransomware assault that revealed the personal data of its staff and visitors. The stolen data was published in easily accessible form on the public internet and includes details from 1,500 employees and more than 2,500 guests, including dates of the guests' hotel stays as well as employee birthdays, phone numbers, and Social Security numbers. The "dark web" is typically the only place where stolen private information like this is released, making it harder to find through regular online searches. The goal of the cybercriminals was to coerce the company into paying a ransom. The public disclosure of the private visitor and staff information seems to have been an "experiment" to see if it would increase pressure on the company to pay the ransom. Cybercriminals may use this new strategy frequently in the future to demand ransom from their victims. The implementation of thorough cybersecurity risk management procedures should be considered by resorts. In the event of a cybersecurity attack, determine which systems were affected by the attack and immediately isolate them. Then, prioritize those systems for restoration and recovery. After which, involve internal and external stakeholders and retain legal counsel for advice. It is crucial that you hire a third-party incident response provider and notify law enforcement. Multifactor authentication should be used by businesses to protect network access, and they should also annually train all staff in cybersecurity best practices and keep offline encrypted backups of all internal data.
11More

Chapter 2: How Do Restaurant Cloud-Based POS Systems Work? | CAKE - 0 views

  • If your restaurant uses email services, social media networking sites, or an online application like Google Docs, you are already using the cloud to store information. Instead of using a computer in your restaurant to process and store data, a cloud-based POS system processes and stores data online. Let’s look at data storage and security so you can see exactly how it works.
  • As a restaurant owner with a cloud-based POS system, you will not be working directly with data storage. You’ll be running a SaaS application on servers in your vendor’s data center.
  • Most cloud storage systems store the same data on multiple servers using different power supplies. This way, if the power fails, you can still access your data.
  • ...7 more annotations...
  • Greater protection against data loss:
  • Less susceptible to viruses:
  • Monitored by IT professionals:
  • Security is a priority:
  • Encrypted data:
  • Authenticated and authorized:
  • A cloud-based POS can also be the better choice for lower startup costs because you won’t need to pay for installation, on-site maintenance, or a back-office server. Instead, a small restaurant can use these savings in other ways, such as hiring the best staff or marketing their new restaurant.
  •  
    I chose this article because my paper will be on POS systems in restaurants and this article outlines a bit about Cloud-Based POS systems. It explains how the data storage works remotely through the vendors servers. It also outlines a list of reasons why Cloud-Based storage could potentially be more secure than local storage. I think that if I were opening a restaurant I would definitely use a cloud-based SAAS POS.
22More

Augmented Hospitality: How AI, AR, and VR Are Shaping the Hospitality Industry - 1 views

  • • The thriving $570 Billion hospitality industry is augmenting itself by integrating AR in hotel industry with the $31 Billion Augmented Reality industry.
  • • The $30 Billion VR industry is projected to value over $110 Billion by 2025 and hospitality will undeniably be a major shareholder.
  • • Over 70% of travel agencies along with over 60% of hotels have adopted AI in its entire magnificence.
  • ...13 more annotations...
  • interactive hotel rooms with maps pinpointing local attractions and places of interest.
    • akopp008
       
      Examples of realities of AI and AR working know a days in real life inside the industry.
  • Best Western hotel group collaborated with Disney
  • children to see them enjoy the room with Disney characters as their roommates.
  • AI-powered facial recognition tech to perform seamless check-ins.
  • 1. Tourist Info
  • 2. Gamification
  • Tours
  • AI to deliver in-person customer service
    • akopp008
       
      AI can reach to give a contact less check in and recognition
  • customer simply has to smile at a kiosk to get their check-in
  • keys would be sent to their smartphones via Bluetooth
  • • As a response to COVID, the sector is looking to automate some sections of their business.
  • smart hospitality” is expected to rise above 25% by 2021.
    • akopp008
       
      technology int he industry will increase tremendously the next few years
  • Automation helps the business achieve operational efficiency as well as protects them from disruptions.
  •  
    This article gives a great explanation of how these technologies are changing the industry. AR giving the guests a 'try it before you buy it' experience where guests can virtually visit a hotel room, and walk around 360. With the projections of how the demographics will travel and their demands, millions are now being spent on adding these technologies from the booking process though the entire guest cycle. Major hotel brands have begun implementing AI,AR and VR into their product offerings which shows there will be no slowing down anytime soon.
  •  
    AI, AR and VR have increased their technology and their purposes inside the hotel industry over time. However because of covid and the necessities it got more trendy and became more useful. Know a days all of these technologies are used in many ways from helping the operations, to providing clients with a seamless and contact-less experience, with creating experiences for kids, showing details of the amenities in a hotel, tours to make reservations and unique opportunities to grow. These technologies will change tremendously in the upcoming years and will change completely the way the hospitality industry operates and how clients interact with it.
  •  
    This article foresees the benefits of Ai, AR, and VR technology within the hospitality industry. It also provides statistical analysis of revenue and customer expectation. Additionally, it gives a prediction of innovations to come.
11More

Suspected Ransomware Attack on InterContinental Hotels Affected Over 4,000 Guests | Spi... - 0 views

  • Ransomware generally entails infiltration and compromise, exfiltration of data, and the encryption of data/systems/networks. Hospitality was the eighth most targeted sector by ransomware groups between March 2021 and April 2022.
  • 4,053 ICH users and 15 of its 325,000 employees were compromised in the attack whose perpetrator remains unknown.
  • The company was unable to accept online bookings
  • ...7 more annotations...
  • determine whether the latest cyberattack is more significant than the 2016 breach of the ICH systems. Initially thought to have been a minor breach that affected 12
  • Between September 29 to December 29, 2016, 1,175 properties were infected by malware designed to steal credit card data
  • Marriott International has been breached thrice, resulting in the compromise of the personally identifiable information of up to 338 million guests
  • Marriott was also fined £18.4 million ($23.8 million) by the U.K’s data regulator Information Commissioner’s Office for failing to protect the data of the 338 million guests
  • This is yet another reminder of the damaging impacts of cybercrime. Not only is IHG potentially getting held to ransom for its data access, but it is also losing out on customer bookings
  • Organizations should use this as a warning to never gamble with their cyber defenses. After all, the cost of preparing and preventing an attack is far less than the cost of recovering from one
  • Data breaches, on average, cost organizations $4.25 million in 2022, according to IBM’s 2022 Cost of Data Breach report.
  •  
    This article discusses a recent cyber-attack on ICH that is believed to have been a ransomware attack. It's stated that hospitality is the 8th most targeted sector for ransomware as of recently. The recent attack on ICH 4,053 users and 15 employees were compromised, which is actually far less than their last attack in 2016 that effected 1,175 properties. Hotels must take as much precaution as possible against cyber attacks because not only does it decrease their bookings, but they can also be charged millions in fines for information breaches.
16More

Importance of a Security Department in Hotel Front Office Management Tutorial 10 Octobe... - 0 views

  • The front office is a hotel’s communication center; it is the vital link between the hotel management and the guest.
  • The security department staff must react with speed and efficiency to serve the guest.
  • The security department is often regarded as a passive department, reacting only when called on.
  • ...12 more annotations...
  • it is a very active department, setting policies, organizing programs, and delivering training programs to promote guest and employee safety.
  • Hotel Security report article by Patrick M. Murphy, CPP, director of loss prevention services at Marriott International, Inc., Washington, D.C., who reports on Marriott International’s adoption of Crime Prevention through Environmental Design (CPTED) in its chain of 1,900 owned and managed properties worldwide: CPTED is part of a total security package.
  • Guestrooms :- These [electronic locking systems] create an environment where keys are automatically changed when a new guest checks in; locks also can be interrogated to determine the last person to enter the room.
  • protecting the interior, lobby, and guestrooms; exterior and parking area; and the surrounding neighborhood.
  • Building entrances :- When reviewing a property we look to see that all entrances are inviting, brightly lit with no obstructing shrubbery. At night, side entrances should be restricted by use of card readers so that non - registered guests must pass through the lobby and past the main check - in desk.
  • Hotel lobbies :- They should be designed to be visually open, with minimal blind spots for front desk employees. Lobbies also should be designed so that persons walking through the front door must pass the front desk to reach the guestroom corridors or elevators.
  • presence of security or loss prevention officers
  • Guest amenities :- Marriott designs its new properties with glass doors and walls to allow for maximum witness potential when providing swimming pools, exercise rooms, vending areas, and laundry facilities. Adding house phones in these areas makes it possible for guests to call for help if they feel uncomfortable or threatened by anyone.
  • Exterior of the property :- CPTED principles call for bright lighting at walkways and entrances. Traffic should be directed to the front of the hotel property to make would - be criminals as visible as possible. Entrances to the hotel grounds should be limited. Landscaping, such as hedges and shrubbery, can also create aesthetically pleasing barriers to promote the desired traffic and pedestrian flow.
  • Parking :- The preferred lighting is metal halide. High - pressure sodium should be avoided because it casts a harsh yellow light. The optimal parking lot or garage has one entrance and exit with well - marked routes of travel for both cars and pedestrians. Garages need to be as open as possible, encouraging clear lines of sight. Elevators and stairwells that lead from the garage into the hotel should terminate at the lobby level, where a transfer of elevators or a different set of stairs should be required to reach guestroom floors. Other CPTED features in the garage should include CCTV (closed - circuit television) cameras, installation of emergency call boxes, and painting the walls white to increase the luminosity of light fixtures while creating an atmosphere that is appealing to the eye.1
  • The cost of a human life lost because of negligence or the financial loss due to a fire far outweighs the expense incurred in operating a security department.
  • Perhaps the most significant [of high - visibility hotel crimes] was the 1974 rape of singer / actress Connie Francis in a Westbury, N.Y. hotel, which resulted in a much publicized trial culminating in a multimillion - dollar verdict against the hotel. The case is still considered the industry’s “wake - up call” in terms of legal liability.
  •  
    This article gives the general basis of why it is important to have a security department for your front office. The front office is the communication center for the hotel. Therefore it is an area that breeds a healthy amount of human interaction for which you must have a secure, safe plan in the event of an emergency. In my opinion, I agree that front office associates deal with a lot of people on their job and having the appropriate knowledge for the appropriate situation is important.
5More

All Bets Are Off on Casinos and Cybersecurity | UpGuard - 0 views

  • better malware tools and access to deep funding make today's cyber criminals more than a bad movie, especially when lucrative payloads are for the taking.
  • In May 2015, attackers were able to steal cardholder names, credit card numbers, and CVV codes belonging to hotel guests and customers. In 2016 they suffered similar incidents due to malware being installed on POS systems, allowing attackers to steal customers' credit card information.
  • It may come as no surprise that casinos and gaming firms are ideal cyber attack targets, but how competent are these enterprises when it comes to rudimentary security?
  • ...1 more annotation...
  • Online gambling upstart Ignition Casino offers Blackjack, Slots, Poker on its website; fortunately, the company has also taken the requisite security measures for bolstering its website security and email security.
  •  
    This article focused on cybersecurity in hotel casinos. They mention how casinos seem to be a target for a lot of cyber attackers because they tend to not invest as they should on protecting themselves. Casinos hold a TON of financial data; customer info., bank info., and credit card info. I enjoyed the article because they even went as far as giving a few casinos a "security score" in how well/bad they are in staying secure.
23More

The Top Five Cyberthreats Hotel Brands and Franchisees Need to Know About | Netsurion - 0 views

  • ay for guests, it also opens hotels to digital threats perpetrated by malicious actors. Consequently, hotel operators should be aware of the types of cyber attacks, which can significantly hurt their brand reputation and bottom line, not to mention the safety and welfare of employees and guests.
  • In January, for example, cyber criminals took over a luxurious Austrian hotel’s computer-controlled key-card system, locking 180 guests out of their rooms until hotel managers paid a nominal ransom
  • A ransomware attack may disable or alter performance of hotels’ computer-driven systems such as air conditioning and lighting, putting guests’ comfort and, worse yet, safety at risk. In addition, booking systems are extremely vulnerable to ransomware attacks because they process information belonging to the hotels, third-party applications and their customers.
  • ...18 more annotations...
  • 1. Ransomware:
  • hey present further ransomware opportunities to hackers by using computers to automate functions.
  • distributed denial of service, or DDoS
  • One of the largest data breaches in history was conducted through a third-party vendor when hackers stole data from 70 million credit cards by gaining access to a mega-retailer’s network through credentials belonging to an HVAC contractor.
  • 2. Remote hacking through third-party vendors:
  • 4. DDoS attacks on the hotel network:
  • 3. Phishing scam targeting customers and hotels:
  • Train employees. Hotels should train employees to not open suspicious emails or links inside them as they may contain malware.
  • Statistics indicate that such incidents will become more frequent, so it is not a matter of if but when the next cyber attack will occur.
  • Integrate a managed SIEM. Hotels should bring on a managed security information and event management (SIEM) platform for their remote locations to be warned right away of cyber attacks. They may also want it for inside the perimeter if they lack the expertise and resources to properly use SIEM internally.
  • Maintain PCI compliance. The Payment Card Industry Security Standards Council (PCI SSC) has put forth a set of stipulations, the Payment Card Industry Data Security Standard (PCI DSS), in response to rapid PCI expansion. Hotels should make sure they are compliant with these regulations, which require businesses to send credit-card information in a secure environment, to prevent paying heavy fines and losing data, revenue, and customer trust.
  • Install antivirus on all devices. Hotels should ensure they have reliable anti-virus and anti-malware software installe
  • 5. Theft of personal information over public Wi-Fi.
  • According to the FBI, the number of cyber threat occurrences quadrupled to 4,000 per day last year from 1,000 per day in 2015
  • The number of cybersecurity incidents worldwide increased 38 percent in 2015 from 2014, according to the Global State of Information Security Survey 2016 by PwC, CIO, and CSO.
  • In addition, there are large volumes of payment card transactions between restaurants, on-site shops, spas, parking, and the front-desk, ensuring there is plenty of customer data for a hacker to compromise.
  • Hotels are especially vulnerable to this type of attack where a type of malware disrupts access to a system until a ransom is paid. This is because they often use integrated POS systems
  • Hackers can break into hotels’ payment systems through a remote access point belonging to one of its vendors, so they should closely monitor third-party access to their networks
  •  
    This article outlines some of the main cyber attacks on the Hospitality industry. It exposes the threats due to the wealth of data stored in PMS, POS and CRM and suggests steps to take to protect against malware and randsomeware. The article further highlights the necessity for antivirus software on all devices.
  •  
    The article describes the five most common cybersecurity risks for hotel brands such as ransomware, remote hacking and DDoS attacks. The operational elements of each risk have also been discussed. It also covers best practices that hotels and other hospitality organizations can adopt to curb breaches.
13More

Navigating today's hotel security challenges | Security Magazine - 1 views

  • Priorities for hospitality security in 2023
  • Surveillance Technology Loss Prevention Communication Executive Protection Event Planning
  • Surveillance, loss prevention efforts and communication have remained critical over the past years.
  • ...9 more annotations...
  •  The careful balance of overt and covert security plays an important role in hospitality security
  • surveillance is a key tool for hotel security leaders to extend the reach of their teams and ensure safety at their facilities. “The most important technology you can have in a hotel is your audio and video systems,”
  • importance of communication with internal and external stakeholders to maintain a safe hotel environment.
  • uniforms play a part in maintaining the balance of overt vs. covert security in hospitality spaces.
  • ecurity knowledge across departments such that they can act as the extended arm for the security department
  • hotel security departments, which may face workforce shortages and retention issues
  • risk assessment and communication techniques to further bolster their security posture.
  • security leaders can look to
  • The biggest thing is communication with your administration, as well as with your staff, guests and other security professionals,”
  •  
    The new challenges that the hospitality industry will face with security will encompass the need for the very best surveillance technology. Surveillance is a key element to security especially when so many hospitality businesses are experiencing labor shortages. In addition, a hotel will need to develop a strong communication link between all departments and have a well thought out risk management plan. If you have all of these items in place you are ensuring the safety of your guests and staff.
11More

Open Hospitality: Transitioning The Hotel Industry To A Cloud Ecosystem With Open Integ... - 0 views

  • The hospitality industry is witnessing a revolution as several hotel chains and brands embrace modern cloud systems to reduce hardware footprints, enhance customer experience and maintain data safety
  • With the rise in demand for technology to unlock better guest hospitality experiences, hospitality-focused technology innovation is also gaining momentum
  • hotel owners can invest additional cash in innovating hospitality technology to develop and improve core competencies and strengthen the management of hotels and franchise brands.
  • ...7 more annotations...
  • Cloud computing plays an integral role in the evolution of the hotel industry by offering prompt and easy implementation solutions
  • The transition to cloud technology is mainly driven by the opportunity to scale business operations and revenue growth while providing a seamless guest experience
  • Cloud-based PMS for hotels comes with prompt and economical implementation, effective data security, reduced overhead costs, improved efficiency, user-friendly features, immediate customer support, universal access and better connectivity
  • Open API ensures better data-sharing capabilities between hotel management applications by streamlining hotel operations and user experience
  • Cloud computing plays an instrumental role in ingesting, processing and protecting customer data to power a seamless customer experience driven by data
  • Cloud-based solutions can be integrated to provide customized services to guests, ranging from intelligent keyless experiences to self-check-in and checkout.
  • global hotel industry is moving to an experience-driven paradigm, with technology-led initiatives
  •  
    The hospitality industry is finally realizing the advantages of Cloud Computing and are transitioning to it. Hotels want to deliver better guest experiences by providing contactless experiences from checking in to checking out. The on-premises PMS system is moving to the Cloud. This offers better security, reduced costs, universal access and much more.
1More

The Importance of Cybersecurity in the Tourism Industry - PHPTRAVELS Blog - 0 views

  •  
    It is increasingly important for businesses in the tourism industry to safeguard against cyberattacks. As technology advances, vulnerabilities increase. Companies must remain vigilant, stay aware, and keep abreast of the latest safety measures to protect their data and the data of their clients.
49More

Shopkick | The Mobile Proximity Marketing Advantages and Disadvantages Retailers Must Know - 0 views

  • The mobile market is maturing, with 82% penetration anticipated by 2020 in the US.
  • Beacon technology, which powers proximity marketing, results in an estimated 40 million messages a year, and that number is ever increasing. As a result, the retail industry must be sure it is primed to take full advantage of this technology now and in the coming years.
  • While proximity marketing is ideal for targeting the right audience at the right time, it’s also a complex and emerging marketing style that’s bound to have to work out a few kinks.
    • kmill139
       
      Once they fix the kinks they'd be able to make this a really great marketing tactic.
  • ...41 more annotations...
  • The Mobile Proximity Marketing Advantages for Retailers
  • The retailer added beacon technology to their stores in advance of Black Friday in 2015 through its Walk In and Win campaign. Macy employees and advertisements notified visitors of the upcoming event, encouraging them to download the store app in order to stay in the loop. Then, to incentivize consumers on Black Friday, users were given the opportunity to win prizes and play games via their mobile devices whenever they entered a Macy’s store.
  • Increased brand awareness:
  • Engaged users:
  • An automated edge:
  • Insights on purchase behaviors:
  • High-performing, innovative third-party retail apps provide proximity marketing that retailers can easily implement while avoiding many logistical concerns. Reputable partner apps have strong systems in place to prevent data breaches and have the experience to know how to interact with consumers without being intrusive.
  • However, there are some challenges to be aware of. As it’s an emerging marketing technique, there are still some challenges to be aware of before you implement the technology in your store.
    • kmill139
       
      The only downside I can see with this type of marketing is that it only works if the person has the app of the store downloaded. If not they will not see the ad whatsoever.
  • The Challenges of Proximity Marketing and its Disadvantages
  • Conversion issues:
  • Excessive opt-ins:
  • Management complexity:
  • Privacy concerns:
  • While proximity marketing is not without its disadvantages, many of these concerns can be resolved by choosing to partner with a trusted third-party mobile app. By capitalizing on the expertise of third-party companies, retailers of all sizes are able to achieve high conversion rates with beacon-based proximity marketing campaigns.
  • Higher conversion rates:
  • With the majority of adults now with a smartphone in hand, it stands to reason that retailers will want—and need—to leverage these devices to gain foot traffic, sales, and new customers.
  • employs geolocation to market to consumers within physical reach of a store
  • proximity marketing could be a valuable resource for increasing market share and brand awareness
  • minimizing expenses and easily gaining the attention of an existing consumer base
  • This is an emerging platform that companies are just beginning to utilize
  • retailers who choose to use it can garner a lot of attention.
  • doesn’t require much effort
  • unique
  • It is estimated that 57% of consumers are likely to engage with location-based advertising
  • If your target audience is asking for it, it can be assumed that it will be a sure-fire way to gain a bigger following.
  • you’re notifying an audience who is already motivated to buy.
  • drive their sales and increase brand awareness
  • It’s automatic; technology does the work for you.
  • the data it creates.
  • You can see what drives your consumers to buy, whether it’s discounts, informational videos, or interactive campaigns. This allows you to adjust future strategies accordingly.
  • improve customer conversion
  • drive brick and mortar sales
  • It can be difficult to predict which approach will be successful when you are implementing new marketing-based technology
  • they don’t use a majority of those apps regularly.
  • The more screens they must approve, the less likely they’ll be to finish the installation process and start to engage with your brand.
  • It requires the right hardware and programming as well as an expert to monitor it.
  • you’re responsible for its safekeeping
  • this data could be highly desirable for cyber criminals. Companies need to be prepared to not only store but also strongly protect this data.
  • Third-party apps strike the right balance between respecting a consumer’s privacy while providing timely marketing.
  • They also manage and consolidate the user agreements necessary to collect consumer data
  • you can gain access to a user base that is already active and engaged
  •  
    This article discussed the pros and cons of mobile proximity marketing and how to possibly overcome the downfalls of the type of marketing.
  •  
    privacy concerns, complex management, excessive opt-ins, conversion issues
  •  
    There can be many benefits and negatives to introducing new technology into your company. While it can be interesting to see new marketing methods for a company, these results can also be temporary. A company wanting to integrate these new marketing methods into their business will have to identify if their audience would react well with this new form of marketing and make their choices based on those results.
5More

Service Robots and AI: What impact on the future of Hospitality - 0 views

  • Humans and robots working together The question might sound futuristic, yet the use of Artificial Intelligence (AI) is rapidly revolutionizing the business-as-usual model of the hospitality industry. It has the potential to disrupt the customer experience as we know it, and could provide powerful tools to help humans in their decision-making processes, which will impact the industry’s entire workforce. The challenge is to ensure that companies integrate AI and frontline service robots in a fair and equitable way. For that, we need to consider several dimensions such as: The ethical considerations linked to the use of robots in a service delivery context (replacement, responsibility, trust/safety, privacy/data protection, autonomy, and human cues). The customer experience (customer-robot interaction). The optimization of robots’ usage by employees (employee-robot interaction/co-creation with a robot).
  • How AI can improve customer experience By allowing robots to perform repetitive human tasks, AI is redesigning the customer experience. But to what extent? The question remains an open one. However, robots can now provide support to employees or even replace them in some cases. Robots are increasingly being created with specific features that allow them to perform some of the essential tasks of the industry. For example, service robots can perform some of the functions of a waiter, a barista, or the housekeeping team.
  • How the Hospitality sector can take advantage of futuristic opportunities Robots have come a long way since then, and the robotization of the industry is accelerating rapidly as technology and connectivity improves. The use of AI in the field of robotics has also opened up enormous opportunities for the hospitality sector, with a growing range of uses that can improve customer experience, brand awareness and customer loyalty.
  • ...1 more annotation...
  • Getting service robots and customers to co-exist In addition, a key question still needs to be addressed: How will customers adapt to this trend? Do they expect or want their service to be provided by robots? Or, do they still want to be welcomed by smiling humans? The question doesn’t seem to be settled yet. For some guests to accept the implementation of AI enabled service robots more easily, the robots must be able to show empathy and be able to interact, which remains a major technological challenge. At the same time, a whole new generation of travelers is growing increasingly accustomed to a humanless service experience. The future might bring a combination of both.
  •  
    This article is enjoyable to read. It offers a distinct viewpoint on how teamwork and ai technologies are beneficial to the hotel sector. Additionally, it provides good insight into the key lessons learned regarding the development and significance of artificial intelligence in the hospitality and tourism industries.
11More

Why Hoteliers May Want to Step Up Their Game on Security Technology | - 0 views

  • Why Hoteliers May Want to Step Up Their Game on Security Technology
  • Within the hospitality industry, we are all quite aware that Covid continues to spook people all over the world, which will lead to depressed overall travel numbers for quite some time to come. Add to that the various automated systems that together mean hotels may never need to hire back a large portion of their former employees
  • Problems may come about in the form of snatched purses from restaurant tables, missing bags left at the bell desk or minor vandalism of cars left by the front entrance.
  • ...7 more annotations...
  • As we’ve all now promised heightened guest safety in the wake of this rampant virus, so too must we protect our visitors and their belongings during any subsequent increases in criminality. Anything stolen will not only leave guests heartbroken, but this will also reflect quite poorly on the property
  • Beyond retaining a strong security department, much of the contactless technology that hotels have set up in the past months can luckily pull double duty to help prevent theft or other transgressions.
  • Nevertheless, an absence of human eyeballs should be another reason to emphasize touchless technologies including mobile keycards, online payment platforms and elevator floor access systems.
  • Elevator floor access restrictions are often only deployed at night, but these should now be set up for all times of day while also considering elevator cameras
  • The technology underpinning self check-in and mobile key cards can also be used to grant or deny access to other areas on property
  • Even niche operations like poolside or oceanside lounge chairs can be put through an online booking portal to better inhibit unauthorized visitors
  • While cyber threats may still have a much bigger financial impact on hotel companies than any misconduct on a more personal level, it still doesn’t hurt to look at how all the new hardware and software your property has set up to combat Covid might also be redeployed for other safety purposes.
  •  
    To Sum the article, Hoteliers consider high-tech security technology since the outbreak of the coronavirus and the safety of residents in hotel. In order for hotel to prevent the virus from spreading they'll consider limiting who has access to the facility. Another, to prevent criminal activity to take place within hotels by granting access to person who notify resident who stays and to be buzz in, contactless on key card and more.
« First ‹ Previous 461 - 480 of 494 Next ›
Showing 20 items per page