Skip to main content

Home/ Hospitality Technology/ Group items tagged protecting

Rss Feed Group items tagged

upasnab

Hotel Security: How to Protect Your Hotel and Your Guests from a Data Breach - By Kevin... - 0 views

  • Information thieves are increasingly targeting hotels due to the large amount of personal information collected from guests.
  • hospitality industry accounts for 87% of point of sale breaches
  • Failure to take precautionary measures can ultimately affect your hotel’s bottom line, and lead guests to feel unsafe and not wanting to return.
  • ...9 more annotations...
  • surprising 74% of hotels do not have proper protection measures in place
  • Destroy information you no longer needed.
  • Provide on-going staff training
  • Continuously update crisis plans
  • Implement a mobile security policy.
  • A Ponemon report shows that 63% of organizations have had a data breach as a result of employees using their mobile devices to access the company’s sensitive and confidential information.
  • Create a document destruction schedule.
  • Despite the fact that 86% of companies have document destruction procedures in place, only 40% of businesses have a system followed by employees.
  • With technology changing hotel operating systems, it is important for the hotel industry to re-visit information security procedure and continuously educate themselves on data security protocols.
  •  
    This article talks about the increasing cyber threats in hotels and its consequences for the guests. The hotel guests are paying more attention to how their data is being stored, pushing hotels to make some much needed changes in their data security plan. Despite these pressures, many hotels do not have any proper protection measures. "The Hospitality Technology's 2017 Lodging technology Study showed that a surprising 74% of hotels do not have proper protection measures in place". Steps to prevent such breaches and avoid millions of dollars in loss and reputation damages are mentioned in this article. Some practical ways highlighted in this article are: Provide on-going staff training, implement mobile security plan etc.
Qianqian Kang

Cyber security breaches at hotels are a growing concern - 0 views

  • Mangal says that all hotel employees need to be aware of cyber security threats. “It's in the interest of every employee to look out for their guests’ well-being,” she says. “As much as [guests] expect a physical building to be secure, they also expect that their data would be kept secure.” While protecting guests is paramount, an additional reason for hotel professionals to care about cyber security is that breaches hurt a hotel’s brand. “If you compromise your data, you're also, to an extent, tarnishing your brand name. It's everybody's job in the hotel environment to be a hotel brand ambassador.”
  • Mangal encourages hotel operators to be careful when they store data and to make sure their information storage systems are up to the task. She says that in many cases, hotels’ systems are no longer adequate. Hotel operators are often reluctant to overhaul their systems because of the cost.
  • It's not a foolproof system, but it definitely does make it safer,” she says. She adds that hotels should foster of a culture of data security and establish policies and procedures to protect data. Training employees to follow best practices is also important.
  • ...2 more annotations...
  • In the future, Mangal says that hotel operators may want to invest in biometric technology and to use fingerprints or facial scans to restrict access to data.
  • Mangal says that hotels are unlikely to hire more IT professionals directly but that they will continue to contract with firms that specialize in cyber security. “Indirectly, there is a growing need for specialists and IT or tech professionals” to upgrade hotels’ data security and to train employees, she says.
  •  
    This article brings us the real version of how important to launch cyber security system, as there are actual cases in which hotel face loss because imperfect security net. Thus, the professor Mangal suggests that all hotel employees should keep an eye on the threats. At the same time when we protect our customer, we protect and branding our reputation as well. In the future, advanced technology such as biometric technology will be implemented to restrict access to data. Although hotels are unlikely to hire IT professionals directly, but they truly need cooperate with firms which specialized in cyber security, at the same time, help hotels strengthen the training of employees.
augu010

5 Best Practices to Prevent Insider Threat - 0 views

  • Insider threat continues to be a problem with approximately 50 percent of organizations experiencing at least one malicious insider incident per year, according to the 2017 U.S. State of Cybercrime Survey.
  • While intellectual property (IP) theft, IT sabotage, fraud, and espionage have continued to appear as the primary forms of malicious insider threats, new research has led us to understand the patterns related to unintentional insider threats. These threats represent a significant risk for organizations and potential attack vectors for malicious insiders and external adversaries.
  • Know and protect your critical assets Develop a formalized insider threat program Deploy solutions for monitoring employees actions and correlating information from multiple data sources Clearly document and consistently enforce policies and controls Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees
  • ...18 more annotations...
  • The trust that organizations place in their workforce can leave them vulnerable to malicious insiders, who often use particular methods to hide their illicit activities.
  • Current technology allows seamless collaboration, but also allows the organization's sensitive information to be easily removed from the organization. A complete understanding of critical assets (both physical and logical) is invaluable in defending against attackers who will often target the organization's critical assets.
  • Critical assets can be both physical and logical and can include facilities, systems, technology, and people. An often-overlooked aspect of critical assets is intellectual property.
  • Insider Threat Incident Response Plan:
  • Organization-wide Participation:
  • versight of Program Compliance and Effectiveness:
  • Confidential Reporting Mechanisms and Procedures:
  • Formalized and Defined Program:
  • ommunication of Insider Threat Events:
  • Protection of Employees' Civil Liberties and Rights:
  • Policies, Procedures, and Practices that support the InTP:
  • Data Collection and Analysis Techniques and Practices:
  • Prevention, Detection, and Response Infrastructure:
  • Insider Threat Practices Related to Trusted Business Partners:
  • Insider Threat Integration with Enterprise Risk Management:
  • Organizations should ensure policies and controls provide: concise and coherent documentation, including reasoning behind the policy, where applicable consistent and regular employee training on the policies and their justification, implementation, and enforcement Organizations should be particularly clear on policies regarding acceptable use and disclosure of the organization's systems, information, and resources use of privileged or administrator accounts ownership of information created as a work product evaluation of employee performance, including requirements for promotion and financial bonuses processes and procedures for addressing employee grievances
  • wareness training for the unintentional insider threat should encourage employees to identify potential actions or ways of thinking that could lead to an unintentional event, including level of risk tolerance--someone willing to take more risks than the norm attempts at multi-tasking--individuals who multi-task may be more likely to make mistakes large amounts of personal or proprietary information shared on social media lack of attention to detail
  • Our intent was to develop a single definition for insider threat that covers malicious and non-malicious (unintentional) insider threats covers cyber and physical impacts applies to both government and industry is clear, concise, consistent with existing definitions of 'threat', and broad enough to cover all insider threats
  •  
    This article goes into detail about various safe practices that can prevent cyber threats. Policies and procedures must be created in order to protect us from cyber crimes. Governments have worked hard to protect data from being hacked.
dsada005

Hotel Security: Preserving Hospitality While Protecting Guests | Allied Universal - 0 views

  • How can hoteliers ensure that their property provides as secure an environment as possible, while maintaining friendly customer service? 
  • “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.”
  • A single act of crime on your property could diminish your brand.
  • ...3 more annotations...
  • Hotels need to partner with an experienced physical security provider, and ensure that the entire staff understands the need to keep security top of mind - always. 
  • Maintain security-minded customer service  Review key card access  Establish evergreen background screening protocol  Control after-hours access  Assess location and local crime statistics  Train security officers to welcome and protect  Bolster public/private initiatives  Maintain emergency response plans  Commit to ongoing training
  • The open environment fostered by hotels is welcoming to guests and visitors but, unfortunately, also creates vulnerabilities that must be addressed. Ensuring that all public spaces are continually monitored by staff and security personnel is crucial in maintaining a hospitable environment. 
  •  
    This article emphasizes the importance of security in any hotel. "It takes 20 years to build a reputation and five minutes to ruin it." This quote stuck to me as you can spend all your life working on a brand, for it to be destroyed due to a lack of safety measures. When going to a hotel, or traveling in general, a guests main concern is their safety. However, too many safety measures can actually have an adverse effect on guests, making them wonder why there are so many safety measures and if they are actually safe in this hotel. For example, going through a metal detector in an airport is accepted to be normal, however, if a hotel had such, I am sure this would have most of the guests feeling unsure about staying in the hotel. Too much security and you are deemed as unsafe, and too little security can ruin your brand if something were to happen, therefore, a good balance of security is necessary. Some security measures in this article are: key card access, evergreen background screening, after-hours access, assessing local crime statistics, security officers must be properly trained to welcome and protect, and emergency response plans must be practiced.
jackyreis

The Role of Green Technology in the Sustainability of Hotels Essay - Free Argumentative... - 2 views

  • Throughout the life of hotels— from building construction, operation, maintenance and evolution—the environmental issue is the wasteful consumption of vast amount of resources such as water and energy and accumulation of air, soil and water pollution in a built environment. The unique service function and operations of hotel result to a stronger ecological impact when compared to other buildings used for commercial purposes. (Bohdanowicz, Simanic & Martinac, 2004)
  • It is imperative for hotels to construct buildings, design their facilities, operate, and refurbish structures in a way that causes the least possible harm to the environment. (Straus & Gale, 2006)
  • Protection of the environment through eco-friendly practices by hotels involves a radical change in operations and a long-term impact, which makes this a sustainability-driven strategy
  • ...41 more annotations...
  • The growing concern over sustainability in the business sector led to developments in innovative environment friendly processes and tools collectively called green technology
  • Green technology enables the eco-friendly practices of business firms.
  • The concept of sustainability emerged in the field of natural sciences in recognition of the scarcity of natural resources and the need to rationalize usage to secure sufficient resources for future generations (Kirk, 1995).
  • The concern of sustainability is ensuring the continuation of the well-being of people and protection of the environment from wasteful use or destructive activities.
  • The implementation of sustainability plans involves innovative methods and tools accessible to hotels and responsive to the multi-dimensional issues including impact of operations on the environment experienced by hotels. Green technology understood as eco-friendly tools and processes or environment friendly products support the successful implementation of sustainability plans in the hospitality industry.
  • 1.      Minimized pollution and rational energy and water consumption. 2.      Respect for culture and tradition. 3.      Community involvement in the hospitality economy. 4.     Consideration of quality instead of quantity in terms of the visitors to tourist destinations. 5.      Economic benefits redound to the community. (Robertson, 2007)
  • In relation to environmental sustainability, there are also considerations for inclusion into the sustainability plan of hotels to ensure that they meet environmental compliance (Butler, 2008)
  • However, even if sustainability planning is a tedious task, the expected outcomes are long-term and compelling because this determines the continuity or viability of hotels, firms whose future survival depends on sustainability (Butler, 2008).
  • 1.      Scale and distribution of operations in a given area. 2.      Hotel demand and means of alleviating the negative effects. 3.      Protection of key assets historic buildings, townscape or coastline. 4.     Contribution to other related areas such as economic development and cultural preservation. (Sharma, 2004)
  • Since the sustainability of hotels spans multidimensional aspects, the contribution of hotels to other areas such as employment or job creation also supports its sustainability.
  • Green technology received recognition as an aspect of human society and therefore part of sustainability. In a sustainability panel of representatives from the hospitality industry, sustainability as a strategy meant addressing today’s needs without adversely affecting tomorrow’s needs (Knowles, 2008).
  • Examples of product enhancement are energy saving appliances and fixtures such as fluorescent instead of incandescent lights or intelligent air conditioning systems that regulate room temperature depending on the presence of its occupant
  • The extent of reduction of waste varies since this could range from minimal to significant decrease in the volume of waste generated, capacity of landfills, and transportation needs. By benefiting the environment, economic benefits also accrue. (Billatos & Basaly, 1997)
  • dopting waste management processes and tools accrues financial, economic, and environmental benefits for hotels.
  • Key to these activities is the ability to harness the full functional value of materials and product components at the least possible additional processing cost for recovery and reuse. (Billatos & Basaly, 1997)
  • First is design of recycling or the cost-effective manner of recovering and reusing materials. The design provides support during the disposal stage to ensure low added cost for recovery. Second is design for disassembly encompassing the methods enabling the minimization of cost in segregating reusable materials. This leads to savings that accumulate when design interventions are made during the stages of material selection and assembly that already separates reusable materials
  • Third is toxics management comprised of the activities of controlling and eliminating toxic materials that are innate components of products such as cadmium or lead. Excessive levels of these toxic materials are hazards to health and the environment. (Billatos & Basaly, 1997)
  • Environmental benefits include reduced accumulation of waste and lesser risk of soil, water and air contamination of toxic production. (Billatos & Basaly, 1997)
  • Pollution prevention involves the elimination of processes in manufacturing that cause pollution. This requires change by redesigning the production process in a manner that prevents the accumulation of harmful by-products or the redesign of the finished products so there would be no use for processes that result in hazardous by-products. The prevention of pollution in production design exacts capital investments but the cost of redesign is deemed less when compared to the cumulative cost of controlling pollution, which would likely increase with new regulations imposing more active methods of pollution control. (Billatos & Basaly, 1997)
  • Green technology as a process and a collection of tools addresses four objectives, which are a) waste reduction, b) materials management, c) pollution prevention, and d) product enhancement (Billatos & Basaly, 1997). There are processes and tools specifically targeting any one, some or all of these objectives so that the appropriate choice depends on the priority of hotels.
  • The technological development of product enhancement innovations is escalating and promise greater functions for business establishments. (Billatos & Basaly, 1997)
  • Utilizing product enhancement technologies influence the sustainability of hotels in terms of savings on operating cost, lesser pollution and waste in the built environment, and value creation for environmental conscious customers (Yaw, 2005).
  • Overall, green technology supports the sustainability of hotels by decreasing a wide range of economic and non-economic costs to support the financial viability of hotels in the long-term and conserving the natural environment on which the hospitality industry depends for the continuity of business. By adopting green technology, hotels gain processes and tools it can use to secure its sustainability.
  • A range of energy saving technologies is available to the hotel industry. These technologies could make hotels green buildings by targeting various areas for energy saving.
  • One is electric heating pumps as alternatives to conventional electric boilers or condensing/non-condensing boilers requiring gas to run. The use of this green technology by a hotel in Hong Kong with a rooftop swimming pool showed a reduction in energy consumption by 26.5-32.5 MWh and a reduction in greenhouse gas emissions by 12,000 kg. When computed over a ten-year period, using this technology would save the hotel HK$226,400 in energy cost savings. The hotel can earn back the cost of adopting this technology in two years. (Chan & Lam, 2003)
  • Building designs able to harness alternative sources of energy comprise green technologies that support the sustainability of hotels. Solar panels continue to gain function in energy saving for hotels (“Building in a green edge,” 2008) although the payback period is longer than expected, the energy saving potential extends to the long-term. The use of building designs that harness natural light such as skylight atriums that do not use artificial lighting during the day are also green alternatives for hotels (Kirby, 2009).
  • Another direction of green technology for the kitchen is the reuse of exhaust heat from the kitchen by harnessing the heat from the exhaust or condensing hot air to produce steam for use in cooking. This is a means of recycling energy. However, this involves the integration of the design in the structure of the kitchen or the building itself, which means greater investment. (Higgins, 2008) Nevertheless, further innovations in this technology could enhance practical value for hotels.
  • In other areas of hotels such as rooms and bathrooms, e-sensor systems and LED lights comprise green technology options. E-sensor systems apply to different systems such as lighting and air conditioning. The e-sensors have the capability to change automatically the lighting or air conditioning settings depending on the area of the room where there are people or temperature changes in the room. LED lights offer greater energy savings than fluorescent lights so this represents the third generation in lighting technology. (Kirby, 2008) Systems thinking in energy management comprise a promising green technology in saving on energy costs (Sobieski, 2008).These technologies are widely available and accessible to different hotels. The energy saving is experienced in the short term and the payback period is shorted. The problem with this is hotel guests tampering with the system leading to added cost for repairs. This means that awareness and information dissemination are important for the effectiveness of these technologies.
  • Another green technology for rooms is the biodegradable key cards. These have the same life span as the conventional key cards except that these are biodegradable or recyclable. (Gale, 2009) These require little cost with high environmental impact.
  • This involves the placement of water treatment plants that recycle water used in baths for flushing in toilets. (Edwards, 2004) These comprise viable and accessible water conservation practices that would contribute savings on the cost of water to rationalize the consumption of water as a scarce resource.
  • One is the conscious involvement of hotels in the protection of the environment since the nature of the business of the hospitality industry and the closely connected industries such as tourism heavily rely on the soundness of the natural and socio-cultural environment for business
  • The other is the investment in environment protection in a manner that secures economic and financial as well as a range of non-monetary benefits for hotels in the long-term (Vermillion, 2008).
  • Energy consumption is also a benchmark of the eco-friendliness of hotels
  • The water conserving technologies provide the process and tools for hotels to achieve this benchmark.
  • Waste and pollution management are also benchmarks of the ecological involvement of hotels.
  • Green technology takes the role as an enabling process and tool for hotels to become sustainable.
  • With hotels competing to maintain its customer base and pull customers to shift to the hotel’s services, green technology could become an enabler for hotels to become competitive.
  • Investing in green technology enables hotels to significantly cutback on operating cost. This enables hotels a wider profitability margin and room to offer promotional prices to attract more customers (Jones, 2002).
  • Green technology has taken a central role in the sustainability of hotels. The concept of sustainability of hotels involves the aspects of environmental protection and business viability.
  • The use of green technology also contributes to the viability of business firms in terms of financial standing and non-financial competencies in the long-term. Going green attracts the niche market of environment enthusiasts that contribute to sales. Using the range of green technologies available would also result in savings from operating costs in the long-term, which increases the profit of hotels and gives them flexibility to invest in marketing activities.
  • It is a sound strategy for hotels to consider green technology as a process and a collection of tools in support of sustainability goals.
jlewinsky

Hotels: Are Your Cyber Defenses Ready for 2021? | Hospitality Technology - 0 views

  • Two of the top five biggest data breaches made public in 2020 were at hotel chains. Attackers stole personal information including names, emails and addresses from 5.2 million guests at Marriott and 10.6 million guests of MGM Resorts.
  • To ensure a swift recovery from COVID-19, the hospitality industry must shore up its cybersecurity protections — or risk more headline-making breaches in the future.
  • Risk is especially high at hotels because attackers have multiple points of entry.
  • ...14 more annotations...
  • Breaches undermine hospitality brands’ reputations and erode customer trust. Eighty-one percent of consumers will stop engaging with a brand after a breach, according to a 2019 study.
  • When it comes to cybersecurity, companies today have two options: Defend the fort or devalue the data. The former is the more traditional approach. By strengthening the digital “walls” around your data — via firewalls, intrusion detection, 24/7 monitoring and other security protections — the defend-the-fort approach works to keep attackers from accessing your systems at all.
  • However, one of the biggest vulnerabilities may be on the hotel grounds themselves.
  • hotels have multiple point of sale (POS) terminals across different locations, from the front desk to restaurants, all of which are connected to each other. If a POS device is not properly secured, attackers can use malware or other attack vectors to steal clear-text credit card numbers and other data.
  • POS attacks remain one of the most common causes of data breaches in accommodations and food services.
  • Guests may share their credit card numbers with the hotel in advance via a booking app or website, opening up the possibility of web-based attacks. Loyalty programs are another source of online vulnerability, with an estimated $1 billion a year lost to account fraud and related crimes.
  • One important and underutilized aspect of cyberdefense is employee training.
  • Make sure your employees use strong passwords and know how to spot fraud and spear phishing attacks. You may also want to limit employee access to confidential data, so if an account gets hacked, private guest information doesn’t go with it
  • You should also make sure your software is up to date with all security patches, as attackers often exploit known weaknesses in programs. Isolating POS devices from the rest of the network can also limit the damage from malware infections at that entry point.
  • it’s unlikely that even the strongest digital “walls'' will prevent all incursions. Defenses are important, but the ever-changing nature of technology means that new, hard-to-catch vulnerabilities will pop up all the time.
  • important to devalue your data, rendering it unusable to attackers who gain access to your systems. One way to do this is to implement point-to-point encryption (P2PE) by encrypting payment information from the moment it enters your network at the POS
  • Encrypted data is unintelligible to anyone who doesn’t have the right digital key. Implementing P2PE is the only way to ensure that clear-text payment data doesn’t fall into the hands of attackers targeting POS systems with malware.
  • Data that’s stored for the long term, like passport information or credit card numbers saved to a loyalty program, can also be devalued through tokenization. Data that’s tokenized gets replaced with an alphanumeric pseudonym, so the actual sensitive information isn’t stored on your servers. This method helps secure guest information beyond the initial transaction at the POS.
  • Hotels that reckon with their security vulnerabilities now will protect themselves from fines and other fallout from data breaches as business rebounds. They’ll also build deeper, more trusting relationships with customers by keeping their personal information secure. By strengthening security protections and devaluing their data, hotels can set themselves up for a brighter future. 
  •  
    This article describes the vulnerabilities in the security systems of the hotel Industry. The POS system was recognized as one of the most vulnerable areas that are more targeted by hackers. This is due to the multiple stations where the POS systems are located on the premises of the hotel. Likewise having POS systems independent of the hotels security system left the system open to hackers. Two options to defending the cyber-defense, are digital walls and employee training. Digital walls works by keeping hackers from accessing the systems. Although even with a strong firewall it is recommended to implement point-to-point encryption (P2PE), this encrypts payment information of guest. the other is tokenization. This uses alphanumeric pseudonym to protect data stored for long periods of time. Another way to prevent cyberattacks is employee training, encourage the use of strong passwords an dhow to detect fraud and phishing attacks.
mcont036

Cybersecurity guide for the hospitality industry - Help Net Security - 1 views

  • A practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive target for hackers: the hotel property management system
  • allowing hotel owners to control and limit access to their PMS and protect guest privacy and payment card information.
  • According to a recent industry report, hospitality ranked third among industries compromised by cybersecurity breaches in 2019, and the industry suffered 13% of the total incidents.
  • ...3 more annotations...
  • About two-thirds of these breaches were attacks on corporate servers, which often store guest information and communicate with on-site property management systems.
  • The design protects data moving within this environment, and it prevents user access to the various systems and services.
  • “Zero trust principles mean access is not granted to devices or user accounts based solely on their physical or network location or who owns them. Instead, authentication and authorization of both subject and device are required before users can access a network’s resources
  •  
    The National Institute of Standards and Technology created a practical cybersecurity guide to help hotel owners protect their PMS from hackers. Hotel owners can learn to protect the privacy of the data stored in their systems, which is highly vulnerable. The guide also advocates for the zero trust principle, which dictates that access to a system is never fully granted, but must be continually evaluated through authentication and authorization.
rosedelice

Why Is Hotel Security Important? - American Protection Group - 0 views

  • Hotels are part of the hospitality industry, where providing good customer service is essential. A hotel’s reputation is staked largely on the guest experience, and investing in proper security services plays a central role in ensuring guests feel safe and protected. It also protects owners from the damages and costs that may arise from criminal activity such as theft.
  • Security officers patrolling the hotel’s grounds can look out for suspicious activity. Hotels should have security officers regularly patrol the hallways, stairwells, lobbies, parking lots, restaurants and bars.
  • Security officers can handle unruly guests or visitors and prevent negative situations from spiraling out of control. Officers can also provide additional protection to VIP or controversial guests of the hotel that might attract public attention or protests.
  • ...4 more annotations...
  • Security officers can prevent hotels from incurring property damage, particularly if officers are patrolling the hotel’s grounds. They can also assist in incidents involving guests damaging their rooms.
  • In addition, the presence of security officers at a hotel can make guests and employees feel safer and more at ease. Many hotel guests are in an unfamiliar location, and this sense of security can increase their satisfaction with the hotel.
  • Security officers on the premises of a hotel can react appropriately and rapidly when emergencies occur. In the case of a fire, they can help evacuate guests and maintain order. In a shooting or other act of violence, they can stop the perpetrator and protect guests and staff from danger. They can also provide valuable assistance and information to law enforcement when they arrive on the scene.
  • Hotel guests may occasionally become unruly or intoxicated, particularly in hotels with bars. Security officers follow hotel policy for dealing with these guests by escorting them either off of the premises or to a taxi, or detaining them for the police as appropriate. They can also escort trespassers and loiterers off the premises. In addition, security officers can safely help staff and guests to their vehicles upon request if they feel unsafe.
  •  
    It is very important for hotels to provide excellent security. It makes the customers feel safe and enhance their confidence and safety.Security officers patrolling the hotel's grounds can look out for suspicious activity.Security officers can prevent hotels from incurring property damage, particularly if officers are patrolling the hotel's grounds. They can also assist in incidents involving guests damaging their rooms.
Laura Alonso

7 Things You Can Do to Make Internet Explorer More Secure - CIO.com - 0 views

  • How well Internet Explorer--or any Web browser, for that matter--protects against attacks and malware greatly depends on whether you keep it up to date and have the right security settings. Here's how to take the proper security measures with Internet Explorer 9 and 10.
  • IE lets you set custom security settings for different zones: Internet, Local Intranet, Trusted Sites, and Restricted Sites. When you visit a website, IE automatically classifies it as in the Internet zone. The exceptions are websites hosted by your local network (say, a site set up for use on your company's network)--then it's Local Intranet--or sites that you've added to the Trusted or Restricted lists beforehand. You can set each zone to a predefined security level and customize the settings as well.
  •  
    The article by Eric Geier is mainly an informative piece as well as a basic tutorial of Internet Explorer Settings. Geier focuses on security, the core of a browser's purpose next to actual browsing. He provides a few tricks that aren't always set for users, such as tracking protection, a feature that protects your privacy and reduces pop-ups, especially from unwanted ads. The largest focus of the article is what I find most important, and it's most talked about for a reason. Staying on top of a browser's update is essential for not only the browser's performance but most importantly for your computer's security. To put it into perspective, every time you get on Internet Explorer, it's like leaving your house. If you update your browser constantly, you are always making sure the door is locked. But the longer you wait between updates the more likely the door will be unlocked. And if you completely forget to update for an extended period of time it's like leaving the door open for malware, or malicious software.
Amy Sena

Homeland Security Approves Their Right To Search and Seize Your Electronics Without Sus... - 0 views

  • the Department of Homeland Security quietly released a strangely worded document reaffirming their own right to search and seize your electronics without suspicion or cause, anywhere along the United States border (which they define as 100 miles in from the border – an area twice as long as Rhode Island).  In reality, this is nothing new, Homeland Security been doing this since at least 2009
  • For now, the business community has figured out a way around having the government search and confiscate devices with company secrets – give their employees blank laptops, and put the important information in the cloud.
  • Courts around the country are struggling to decide how to balance security with privacy.
  • ...1 more annotation...
  • In today’s world of cloud computing and ubiquitous screens, these protections are horribly inadequate
  •  
    Since 2009 Homeland Security has been searching and seizing electronics without suspicion or cause anywhere along the United States border. The business community has figured out how to get around the government searches by providing their employees with blank laptops and putting important information in the cloud. It has now been 25 years since Ronald Reagan signed the digital privacy protection laws which in today's rapidly advancing technology era these protections are inadequate.
Yaping Li

Green Business Initiative - Environmental Protection Agency, Ireland - 0 views

shared by Yaping Li on 22 Sep 12 - No Cached
  • The Green Business Initiative is an inter-linked suite of projects, specifically aimed at helping enterprises save money and help to reduce their environmental impacts.
  • The projects aim to actively help enterprises to become more “resource efficient”. This means that they will use less energy, less water and less raw materials, in turn producing less waste and costing the business less money. It’s a great example of the Green Economy in action and a real win-win situation. 
  • The Green Hospitality Programme (GHP) is a range of projects specifically aimed at the tourism and hospitality industry. 
  • ...1 more annotation...
  • Utilising the capacity and techniques perfected in the Green Hospitality Award and greenbusiness.ie project, the National Waste Prevention Programme is working with healthcare providers to look at water and energy use and waste production, with a special emphasis on food waste. By investigating areas where efficiencies can be made, often through simple "no" and low cost procedures, real savings can be generated for hospitals.
  •  
    This article introduces some green business initiative that is the projects to help enterprises use less resource to make money. With the development of the society, it is more important for us to protect the environment. The green business initiative is a good example to protect the environment. The article shows the greenbusiness.ie project offer an effective tool to help the company not only reduce the cost but also reduce the pollution. It also introduce the project that aimed to help hospitality industry solve the save resource problem. It list some projects like Green Festivals, Less Food Waste, More Profit to prove these program already save more money and resource. The Green Healthcare and SMILE (Saving Money through Industrial Linkage and Exchanges) are the other two examples of green business initiative.
upasnab

Routier joins forces with Cybint to protect user data | Hotel Management - 1 views

  • Routier has partnered with Cybint, a cybersecurity education company, for integrated cybersecurity into the Routier interface and hospitality management software. The partnership was formed in the wake of an increased cyberattacks on user data in the travel and hotel industries.
  • Our partnership with Cybint and the addition of its cybersecurity educational programming will help secure and protect end users in the wake of the Marriott [International] hacking scandal,
  •  
    This recent article talks about the partnership which was formed due to the recent Marriott International hacking scandal. Cybint, military trained cybersecurity experts, and Routier, a service which provides hotels with engagement, operational and marketing products, have joined forces to prevent such future attacks. Routier co-founder and CEO Gal Bareket states "Our partnership with Cybint and the addition of its cybersecurity educational programming will help secure and protect end users in the wake of the Marriott [International] hacking scandal,". The article further highlights other benefits of this union between Cybint and Routier such as cyber literacy courses and hands on simulator labs for cybersecurity professionals. The article also highlights the prime features and services provided by both Cybint and Routier.
galca008

What Are the Accounting Procedures in the Hospitality Industry? | Your Business - 0 views

  • Many of the accounting procedures used by hospitality companies are the same as those applicable to businesses in other industries. Methods for recording cash, receivables and deferred tax assets are similar while industry-specific transactions require special treatment. For guidance, accountants within the industry reference generally accepted accounting principles.
  • Retention periods for important records such as source documents, journal entries and reconciliations are prescribed by GAAP. Auditors must have access to evidence that supports management’s assertions in financial statements, and failure to comply with retention provisions can lead to various negative outcomes.
  • Data security is also a relevant concern, and tax returns, financial schedules and forecasts require safeguarding to prevent unauthorized access.
  • ...6 more annotations...
  • Management must maintain effective internal control over financial reporting to protect owners and other relevant stakeholders. A number of standards related to a company’s control activities are listed by GAAP, and auditors are charged with evaluating internal control on engagements with publicly traded clients. Because cash transactions are prevalent throughout the hospitality industry, segregation of duties is a critical part of efforts to prevent liquid assets from misappropriation
  • Not all cash inflows are recorded as revenue and some are actually carried as current liabilities on the balance sheet.
  • Staying at a hotel or buying a timeshare unit requires some form of upfront payment by consumers and a potential refund when criteria are met. Tips are sometimes aggregated by restaurants and similar establishments and then distributed to employees. Whether transactions are completed by cash, check or credit, hospitality companies must record revenue only when it is appropriate.
  • Vacation ownership interests, contract receivables and resort construction projects are among the line items that require special accounting treatment for timeshare companies.
  • Most timeshare companies sell their units or points via financing agreements, and accounting for mortgages requires a record of accrued interest, advance payments and other related events
  • Timeshare transactions are among the most complicated among all of the recordable events in the hospitality industry.
  •  
    This article outlines some of the procedures that are used in the Hospitality Industry accounting departments. Beginning with document retention, GAAP is followed to comply with how long the documents need to be kept. In keeping documents, data security needs to be in place to protect sensitive information. Internal controls are also important and follow GAAP, so that stakeholders and owners are protected. The procedure is so that the proper allocation of assets are maintained. Revenue recognition is also part of accounting procedures, as revenues may be sorted in various ways as appropriate. Lastly, timeshare accounting being one of the most complicated, due to the different agreements. I found this article to be a good guide in knowing the basic procedures that are followed in hospitality accounting.
asant318

Consumers spend $5.2 billion annually in fraudulent and misleading hotel booking transa... - 2 views

  • scams and fraudulent and misleading travel websites and companies continue to mislead and confuse consumers.
  • 28.5 million hotel stays and $5.2 billion in fraudulent and misleading hotel booking transactions in 2017.
  • 39 per cent of travellers reporting that they most often book their hotel rooms through a third-party website
  • ...3 more annotations...
  • Taking a few extra seconds to book directly with a hotel or a trusted travel agent can save time and money in the long run, and lead to a better travel experience overall.”
  • constant flow of new companies entering the online travel market—suggests we need to do more to protect consumers.
  • AHLA encourages consumers to book directly through the hotel website or mobile app
  •  
    This article reviews a survey conducted by the American Hotel & Lodging Association which reveals that 23% of consumers say they have been misled by third-party traveler re-sellers. The article further explains the Federal Trade Commission's investigation of one of these companies, Reservation Counter, LLC which resulted in legal action. The article concludes that to protect consumers AHLA will support legislation known as the Stop Online Booking Scams Acts and strongly encourages travelers to book directly through the hotel or trusted travel agent. I think we are seeing the AHLA's opposition to OTA's in defense of hotel properties that want direct booking. The protection of customers is important, but it seems like an implied warning of ligitimate OTA's like www.booking.com.
smones

Why first responders need your hotel's information | Hotel Management - 0 views

  • breakdown when it comes to execution,
  • clear plans for emergencies
  • Stephen Nardi, CEO of Chicago-based mobile software company RealView,
  • ...17 more annotations...
  • His company assists with the process by providing a streamlined way to equip first responders with your hotel’s up-to-date floor plans, as well as other considerations.
  • “We provide a preplan program where we make everything a responder would need available to them ahead of time,” Nardi said. “With planning, both employees and responders won’t be operating on trial and error but reality.”
  • RealView provides solutions such as digital floor plans, fire protection information, protocol for ingress and egress and any particulars regarding persons in need of special assistance. This information can be accessed using portable tablets or at designated security stations, is updated remotely and is shareable digitally with first responders.
  • before they arrive on the scene,”
  • This information is crucial because it can also protect your hotel from a liability standpoint.
  • “The front-end policies you have will protect you in the moment and in the end,” Parafinczuk said. ““Any break in the chain is a liability. It’s a minefield.”
  • The greatest barrier to improving a hotel’s security is fear of hampering the guest experience.
  • 4 Proactive Safety Tips
  • 1. Identify Your Guests
  • Hotels struggle with tracking guests on property.
  • supply event attendees with wristbands or badges,
  • 2. Make Information Available
  • According to Nardi, some hotels are concerned about making floor plans and other information public knowledge because it could give a bad actor the information they need to harm guests or damage property.
  • 3. Respond Immediately
  • Parafinczuk said it took six minutes for authorities to respond to the deadly shooting at Las Vegas’ Mandalay Bay in 2017, and they were hampered by a lack of information on arrival.
  • 4. Document and Report
  • operators are still not in the clear until they document and disclose every aspect of the event internally.
  •  
    RealView is a Chicago-based mobile software company that assists hotels with emergencies by equipping first responders with hotel's up-to-date floor plans and other relevant information. "We provide a preplan program where we make everything a responder would need available to them ahead of time," Stephen Nardi, CEO of RealView, said. "With planning, both employees and responders won't be operating on trial and error but reality." All of this information is streamlined to portable tablets or security stations and can be updated remotely and shared digitally. This software is important not only because of the safety of hotel patrons and visitors, but also to protect a hotel from a liability standpoint. "The front-end policies you have will protect you in the moment and in the end," Justin Parafinczuk, a partner for the defense law firm Koch, Parafinczuk, Wolf and Susen said. ""Any break in the chain is a liability. It's a minefield." In my opinion, this type of software not only makes sense but should be required in all hotels. When dealing with emergencies that involve life and death, seconds matter. It is software like RealView that can be the difference in saving peoples live's. RealView offers the ability to streamline real time information and make it easily sharable. I believe that not having this type of software should be considered a legal liability to hotels and they should be held accountable if they do not have this type of software implemented.
anonymous

Hotels Remain a Prime Target for Hackers - Security Boulevard - 0 views

  • Two years ago, in its “Hotels Outlook Report 2018-2022,” PWC found that hotels are a favorite target for hackers, with the hospitality industry having the second-highest breach numbers after the retail sector
  • . The same report found that 74% of hotels lacked breach protection
  • In 2018, hackers attempted to access Marriott International’s Starwood Hotels & Resorts Worldwide guest reservation database. In the same year, the Radisson Hotel Group identified a breach affecting Radisson Rewards members
  • ...11 more annotations...
  • These breaches can also be costly, with the UK’s Information Commissioner’s Office (ICO) fining Marriott $23.8 million for the Starwood breach.
  • Today, close to 50% of all bookings happen through online travel agencies or online channels, with the share of offline bookings dropping every year.
  • For hotels, the information is exchanged between the payment gateway, the OTA, the intermediary and its central reservations system (CRS
  • These multiple data exchanges among partners leave the data that much more susceptible to breaches
  • , as not all providers have the same security standards.
  • First, they should reduce the temptation to focus on standalone point solutions
  • Instead, they should look at technology providers that help in securing the entire data value chain by focusing on having a security framework that stops data from moving outside of the country (which is where it is typically misused
  • Second, hotels should know the storage practices and policies of all providers, insisting on a zero percent storage rate to reduce the chance of personal data getting expos
  • Similarly, hotels should make sure that partners do not store any credit card information locally, which will reduce the risk of exposure
  • lso, with most companies using some form of cloud infrastructure, hotels should know the structure used by any partner (private, hybrid, public) as well as what protections are in place
  • They will also be taking an important step in protecting their brand identity, as brand will be essential as the recovery from the COVID-19 fallout continues
  •  
    This article points out that hotels are still a huge target for hackers. Hotels need to make sure they reduce the temptation on standalone point solutions. Hotels should focus on having a security framework that stops data from moving outside of he country. To limit hacking as well, hotels should not store information locally. It was surprising to read that 74% of hotels lacked breach protection.
leahesper

Cybersecurity and the hospitality industry - Cyber Security Review - 0 views

  • The hospitality and restaurant industries in particular, are high-value targets for cybercriminals.
  • In addition to larger brands, cybercriminals are now finding it easier to target multiple small restaurants.
  • In fact, nearly half of cyberattacks worldwide in 2015 were against small businesses with fewer than 250 workers.
  • ...9 more annotations...
  • Restaurateurs are not technology experts.
  • The cost of cybercrime is on the rise around the globe.
  • Stealing our personal and payment information is something cybercriminals do over breakfast.
  • For the global economy, cybercrime is one of the greatest collective threats of our time.
  • It might come as a surprise to many that almost all of the headline-grabbing payment card data breaches we’ve seen over the past few years were entirely preventable.
  • Most breaches involving credit card data have been neither sophisticated nor “new.”
  • A study by Verizon stated that 99 percent of breaches in 2014 were caused by known vulnerabilities with fixable patches.
  • Strong security protection principles that involve people, process and technology all working together in an atmosphere that prioritizes data security are vital for all of us to protect ourselves, our families and our companies.
  • So what actions can we take today to protect ourselves and our customers? For starters, many companies need to change the way they view security and make it a 24/7 priority. Data security must be deeply ingrained into an organization’s culture, not layered like frosting on a cake but baked in from the start.
  •  
    This article discusses cybersecurity in the hospitality industry. It presents the question of what actions can we take to protect ourselves and our customers which is exactly what we are talking about in this module. It states facts related to security breaches in the hospitality industry in the year 2015.
kuhang

Cybersecurity in Tourism & Hospitality: the urge of protecting customer data - NTG - 0 views

  • Organizations in tourism and hospitality have massive databases of personal data nowadays as they ask their consumers to leave their data for better and optimized services.
  • Cybersecurity is defined as the area related to computing and telematics that focuses on protecting the computer infrastructure and avoiding all types of threats, which put at risk the information that is processed, transported and stored in any device.
  • The accommodation industry is beginning to be aware of the relevance of this topic: if hotels do not manage this issue properly, they lose the opportunity to give the clients the reliability and security they need.
  • ...3 more annotations...
  • n many cases, it is the employees themselves who fall into errors that expose the security of the hotel and the privacy of their clients through a lack of cyber security. Incorrectly shared passwords, professional accounts that link to personal devices or the dissemination of internal company information are some of the mistakes employees make. In order to correct these errors and ensure that they do not happen again, training and awareness-raising are the keys.
  • Employees must be informed at all times about the correct practices to be followed, thus avoiding making mistakes that in most cases have terrible consequences, both for the hotel and for the customers themselves.
  • For the peace of mind of the guests, the hotels should complete constant intrusion tests to evaluate the state of the systems, auditing their security from the point of view of possible external attacks. In order to make an optimal security assessment, it is best to carry out controlled attacks on the systems.
  •  
    This paper mainly discusses the importance of network security in tourism and hotel industry. Due to the characteristics of the industry, it is inevitable for hotels to manage and protect their customers' personal data. Therefore, network security is very important for hotels. Then the author analyzes the reasons of the hotel data breach and puts forward solutions. The main approach is conduct network security training for employees and regularly evaluates the system status.
guanhuahao

Top Cybersecurity Tools for Business - 0 views

  • All cyber threats are not equal. Some may hold your data for ransom, while others may destroy your information for good.
  • Digital tech analysis firm Juniper Research predict that the cost of data breaches will rise from $3 trillion annually to over $5 trillion in 2024.
  • organizations should look to Next Generation Anti-Virus solutions (NGAV) to protect their assets. NGAV takes traditional AV and then adds advanced analytics, behavioral analysis powered in real-time by large scale cloud back-ends to thwart known and unknown attacks. Leading NGAV solutions include Sentinel One, Carbon Black, and CrowdStrike.
  • ...16 more annotations...
  • The National Institute of Standards and Technology (NIST) offers cybersecurity guidelines for best practices to manage cyber risk. These include identify, protect, detect, respond and recover. Another resource is the NCSA’s national program, CyberSecure My Business.
  • Firewall Often referred to as a company's "first line of defense," a firewall is a security control that filters and screens network traffic entering and exiting your corporate network.
  • People can rely on the password manager to create and store dozens of passwords in an encrypted database without having to remember them.
  • Password managers are quite helpful, and some are even free.
  • store the first part of sensitive site passwords
  • but keep the last few digits memorized and fill them manually.
  • This way, if there is ever a compromise of the password database, hackers don't have those full passwords.
  • You should also consider implementing multi-factor authentication (MFA). MFA authentication uses more than one thing or "factor" to log you in
  • , biometrics is part of this last category
  • SPAM & Malware filters screen email for unwanted and dangerous elements, blocking them before they ever reach your users.
  • In the world of cybersecurity, there's a phrase, "humans are the weakest link." An employee who accidentally clicks on the wrong link or email attachment can put in motion a chain of events that results in a cyber breach. Security awareness training is an anti-phishing tactic all organizations should employ.
  • RDP access must be protected by a VPN connection.
  • reduce the risk of getting hacked is to ensure your systems and software are updated regularly, or "patched.
  • patching shouldn't end with the operating system. Your patch program should also look to patch all other applications running on your systems
  • regardless of the security tools implemented to prevent a data breach, you should plan for a compromise occurring.  
  • That's where 24/7/365 network and endpoint monitoring comes in
  •  
    Cyber attacks open more and more often and varied since cybercriminals are becoming more cunning and their methods more challenging to detect. This article introduces some types of strategies implemented to protect companies' businesses from cyber threats and cybercriminals. Including using Anti-virus software, firewalls, password managers (very useful while some even free), VPN, patch management program which not only for operating program but also for other applications running on your system, consider the email SPAM/Malware filters and security awareness training for the employee since "humans are the weakest link." An employee who accidentally clicks on the wrong link can put in motion a chain of events that results in a cyber breach. Finally, plan a 24/7/365 network and endpoint monitoring.
davidclark33

Coronavirus cybercrime can attack your restaurant system, too | National Restaurant Ass... - 0 views

  • Protecting your business from a data breach is a constant struggle, and it’s even more important during a disaster.
  • Eliot, director of education and strategic initiatives for the NCSA, says cyber incidents and attacks, such as coronavirus-themed email phishing scams, increased as much as 300% to 350% in the first quarter of 2020 and adds that cyber scammers are now trying to target restaurant companies in particular.
  • Cybercriminals have mostly directed malicious emails at telework employees or people donating time and money to those impacted by coronavirus. “We're seeing a huge increase of cyber-related scams promoting coronavirus information or relief efforts. “It’s a big issue.”
  • ...4 more annotations...
  • The PCI Security Standards Council claims that since March, malicious virus-related reports are up 475%. The reason for the uptick is that cybercriminals are trying to take advantage of rapid changes to the payment-card data environment. In addition, 41% of small businesses have said they’ve suffered breaches costing more than $50,000 to fix.
  • Contactless payment is one of the big changes within the payment data environment. Several restaurant companies – from chains to independents – are offering it because it reduces customers' physical interaction with the restaurant's POS system. As part of this move, some businesses have eliminated credit-card PIN numbers.
  • Eliot says malicious email is usually the easiest way for cybercriminals to access your networks. The emails typically show up as urgent requests for sensitive information, often pretending to be from the Small Business Administration or the Centers for Disease Control and Prevention. When the intended victim types in his or her credentials and clicks on a specific link or downloads an attachment, criminals are in.
  • Anyone looking for easy-to-implement security tips can try these six to start. Reduce areas where payment-card data is stored. The best way to protect against a data breach is to avoid storing any card information at all. With many small operators offering curbside pickup and accepting payment over the phone instead of through face-to-face transactions, it’s important they train employees not to write down payment card details. Instead, have them enter numbers directly into a secure terminal. Use strong passwords. Using weak and default passwords is one of the leading causes of payment data breaches among businesses. Effective passwords must be strong and updated regularly. The most recent guidance is: the longer, the better. Think of it almost as a “passphrase” rather than a password. Use it in the form of a sentence, but mix in different characters within the phrase. It’s much harder to break a long passphrase than it is a short, complex password. Weak and vendor default passwords often result in small business data breaches. Also, don’t repeat your passwords. Update your software often. Criminals look for outdated software to exploit flaws in unpatched systems. Timely installations of security patches are crucial to minimizing the risk of a breach. Whenever updates are available, use them. They will improve performance and close out some of the vulnerabilities cybercriminals are searching for. Enable two-factor authentication. It's so important for restaurateurs, especially where their POS systems or any of their sensitive databases are concerned, to have two-factor or multi-factor authentication enabled. If an instance where credentials are stolen occurs, there will be a second layer of verification the operator can rely on to potentially reduce the chances that information will be breached. Segment your networks. If you are going to store payment data, make sure your POS system has its own separate, secure network. Do not store sensitive documents on public cloud services such as Google Docs or DropBox. If you’re going to store sensitive documents, house them in an encrypted, locked down location.   Be hyper-vigilant. Criminals are going to try to take advantage of this pandemic situation as much as possible. You can protect yourself by not giving out sensitive information, especially within unsolicited emails. Don’t click on links you’re not expecting and do everything in your power to protect all sensitive information.
  •  
    This article is about data breaching and cyber crime in the restaurant business. The article specifically talks about the increase in cyber crime during a crisis, and in this case, a pandemic. It talks about contactless payment as a great form of protection for restaurants as well as customers. At the end of the article, it lists six easy to implement security tips.
‹ Previous 21 - 40 of 494 Next › Last »
Showing 20 items per page