Skip to main content

Home/ Hospitality Technology/ Group items tagged protecting

Rss Feed Group items tagged

kelseybarton

Protecting the Hospitality Sector With Security Intelligence - 1 views

  • A decade ago in 2009, hospitality was — by some reports — the most widely attacked industry of all. And while other industries have now surpassed it, a 2019 report by Trustwave still ranks hospitality as the third most-breached industry, accounting for 10% of all breaches.
  • the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it
  • attacks targeting the hospitality industry are mostly aimed at stealing payment card data.
  • ...10 more annotations...
  • Why Is Hospitality So Hard to Secure?
  • 1. They often have large, complex networks.
  • 2. Customers are onsite — and attackers could be too.
  • 3. Staff churn.
  • 4. Franchising.
  • 5. Third-party risk.
  • Protecting the hospitality industry from cyber threats isn’t an easy job. Security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce. On top of all of that, they have limited security resources to work with.
  • Comprehensive security intelligence helps security teams identify unknown threats to the organization, and make informed decisions about how and where to allocate time and resources for maximum effect.
  • Threat intelligence provides the context analysts need to quickly distinguish between valuable alerts and false positives, drastically improving their ability to respond to genuine cyber threats.
  • Threat intelligence can help security teams drastically reduce the time needed to identify and contain a breach by alerting them the moment stolen assets (e.g., guest or passenger data) are made available for sale via the dark web.
  •  
    (1 of 2) "The hospitality sector has always been a popular target for cyberattacks." This is the first line of this Recorded Future article published in January. The article discusses breaches that happened for both Marriott and British Airways and how this is a regular occurrence in the industry as it is such a big target with so many possible points that can be attacked. While the statistics for the hospitality industry have improved greatly in the last decade, in 2019, they were still accounting for 10% of all breaches. Not only does a breach affect the way an organization operates, but also it also severely effects their bottom-line and takes quite a but of time for them to recover. "According to Ponemon's 2019 Cost of a Data Breach Report, the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it." The article continues by stating that hackers are typically seeking payment card data when compromising the hospitality industry.
  •  
    (2 of 2) The article then discusses the many reasons why it is so difficult for hospitality-oriented companies to secure their assets versus other organizations of similar stature. Some of these reasons include the large, complex networks which are typically publicly accessible and contain many customers in the databases, the fact that customers are always onsite and so are attackers, the high turnover leading to inconsistent training and sharing of credentials, franchisers owning the responsibility of security yet not knowing much about it, and the risk associated with all of the various third parties the hotels do business with. While intelligence has come a very long, "security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce… [AND] they have limited security resources to work with." Comprehensive security intelligence systems are now capable of protecting many aspects of the organization. Some of these updated features include responding rapidly to security incidents, blocking online brand abuse and impersonation, managing third-party risk, reducing breach containment times, and better allocating security resources. Property data security is so important to the hospitality industry. If a business does not take the proper precautions to protect their systems and their customers, then it could lead to a devastating event for the business. While security intelligence has progressed within the last decade, a business needs to make sure that they have chosen a reliable agent to partner with who will produce consistent service. If the business keeps up with their system updates and protections, they should not have to worry about their security system failing.
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
llibe010

This is personal: Cybersecurity and the hospitality industry | HLB - 1 views

  • The hospitality industry has been a prime target for cyberattacks in recent years. From ransomware to data breaches, hotel chains and other businesses in the hospitality industry have experienced a variety of attacks
  • First, hospitality businesses deal with large amounts of Personally Identifiable Information (PII), including credit card information and contact details of customers.
  • Second, the hospitality industry relies heavily on technology, creating additional attack surfaces for criminals to exploit. For example, many hotels use electronic key cards that can be easily hacked
  • ...6 more annotations...
  • Finally, the hospitality industry is often slow to adopt new security measures, leaving it behind the curve in protecting against emerging threats and scams.  
  • One type of attack is known as malware injection. This occurs when malicious software is injected into a hotel's or restaurant's computer system. The malware can then be used to steal customer data or take control of the system
  • Fortunately, there are steps that the hospitality industry can take to protect itself from these types of attacks, including investing in robust cybersecurity solutions, educating employees about cybersecurity risks and best practices, which can help reduce employee mistakes that could lead to an attack, and staying up-to-date on cybersecurity threats and trends
  • To protect themselves, these businesses need to follow GDPR guidelines (General Data Protection Regulation), a set of regulations that European Union member states must implement to protect digital data privacy
  • The most important thing you can do is to use a unique password for each account. This may seem like a lot of work, but it's the only way to ensure that your data is safe
  • This ensures that if an attack does occur, critical information can be recovered quickly. Additionally, it is important to keep software updated with the latest security patches. Many attacks exploit known vulnerabilities, so by staying up-to-date, businesses can make it more difficult for attackers to access their systems
  •  
    The article discusses the relevance of cybersecurity for hotels in light of more and more people working from home after the pandemic. Common risks and their safeguards have been described along with a set of best practices that hotels should adopt to prevent breaches.
earagon22

PCI and PSD2 Compliance: Why Are Hotels on the Hook? - 0 views

  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • Established in 2006, PCI stands for the Payment Card Industry Data Security Standard, which contains guidelines for accepting, storing, and processing credit card information
  • ...12 more annotations...
  • These days, cyber security and regulatory compliance aren’t just necessary skills for the IT team. Every hotel manager - even the “non-tech savvy” ones - must understand these crucial components of data protection in order to protect their businesses.
  • A few rules of thumb include using PCI-compliant POS and PMS providers, storing both digital and paper data securely, and limiting access to sensitive data to only the employees who truly need it.
  • Examples of these guidelines include using an online checkout/payment page controlled by a licensed 3rd-party service provider, storing credit card data via a 3rd-party “vault” provider rather than in your own system, and masking the full credit card number on receipts, showing only the last 4 digits instead.
    • earagon22
       
      As an example, if guests book through a 3rd-party like Expedia then I at the front desk see an Expedia card not the guest's card. The card I see is pre-loaded with the amount of the stay ONLY. Even then, I cannot see the 3rd party's full cc number. I only see the last 4 digits just like guest credit cards.
  • “The attack on Marriott was hapless and still has many gaps to fill on what actually happened. A popular entry point for adversaries is through email spoofing. This tactic is used in phishing in order to get malware onto a target network to then move laterally across all systems,” Ryan Cornateanu, Application Security Engineer @ CrowdStrike.
    • earagon22
       
      This attack mentioned compromised cc details, passport numbers, and dates of birth for 300 million guests in their database. This happened in 2014. https://hoteltechreport.com/news/marriott-data-breach#:~:text=And%2C%20the%20financial%20burden%20is,the%20largest%20data%20breaches%20ever.
  • because of increased payment security, the amount of chargebacks will likely become much lower, which is something all hoteliers can celebrate.
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should still comply, since regulations like these are often mirrored in the United States and other countries soon after.
  • PSD2 includes enhanced guidelines for online payments and the handling of sensitive data to reduce the risk of credit theft, fraud, and security breaches. One major change is the requirement of Strong Customer Authentication (SCA) for online transactions. With SCA, rather than simply typing in a credit card number and clicking “pay,” consumers will need to provide a second layer of authentication, which could be a PIN code or an SMS verification code, before the payment can go through.
  • Guests book nearly three-quarters of hotel reservations online, so PSD2 will likely impact every hotelier as Strong Customer Authentication (SCA) becomes a requirement for payment processing.
  • Are any charges processed after the guest has checked out, such as minibar chargers? To prevent any hiccups with payment after check-out, charge an authorization on the guest’s card for the full incidental amount and have the guest provide two-factor authentication in person, such as chip-and-pin, when the guest checks in.
    • earagon22
       
      A property rule where I work is that each guest must insert or tap their cc at check-in in order to follow this rule and we take an incidental hold each night. Guests that have not traveled for years are surprised by incidental holds which makes sense based on when this was implemented.
  • The key takeaway here is that transactions initiated by the hotel at a time when the guest isn’t present won’t comply with PSD2 requirements.
  • protect consumers’ sensitive data, and, as a result, every merchant that uses credit card information must follow these rules, from small businesses to large corporations.
  • By partnering with a trusted technology solution and investing in PCI and PSD2 compliance now, hoteliers can prevent the potential catastrophe that could come with the theft of sensitive data.
  •  
    PCI compliance is a crucial and necessary set of guidelines that all hotels must follow. The Payment Card Industry Security Standard was created in 2006 and outlines rules regarding accepting, storing, and/or processing card information. These rules were put into place to protect consumers sensitive information. For example, in 2014 Marriott hotels was attacked and 300 million guests information was compromised. This attack led to new regulations being put into place, the Payment Services Directive 2 (PSD2). These regulations take into account international customers and enhanced guidelines for sensitive data.
aquin206

What Is Backup and Recovery? - Why It's Important | NetApp - 1 views

  • Backup and recovery describes the process of creating and storing copies of data that can be used to protect organizations against data loss. This is sometimes referred to as operational recovery.
  • The purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure.
  • Primary data failures can be the result of hardware or software failure, data corruption, or a human-caused event,
  • ...4 more annotations...
  • Storing the copy of the data on separate medium is critical to protect against primary data loss or corruption.
  • his additional medium can be as simple as an external drive or USB stick,
  • The possibility of weather-related events may justify having copies of data at remote locations.
  • For best results, backup copies are made on a consistent, regular basis to minimize the amount data lost between backups.
  •  
    Backup and recovery describes the process of creating and storing copies of data that can be used to protect organizations against data loss. This is sometimes referred to as operational recovery. The purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure. Primary data failures can be the result of hardware or software failure, data corruption, or a human-caused event. Storing the copy of the data on separate medium is critical to protect against primary data loss or corruption. This additional medium can be as simple as an external drive or USB stick. The possibility of weather-related events may justify having copies of data at remote locations. For best results, backup copies are made on a consistent, regular basis to minimize the amount data lost between backups.
Katie Gallagher

5 pressing hotel security concerns for 2012 - 0 views

  •  
    This article was all about the hotel security concerns for 2012. The 5 things the article lists as issues are: IT, terrorism, skimmers, liability and insurance fraud, and finally security as taboo. IT in a concern for hotel security because mobile and cloud technology is becoming very popular. Companies that do not protect their information with passwords are even more at risk. Data protection needs to include end to end management so companies are not just patching the security. Terrorism is another issue that was a concern in 2012. Hotels need to keep staff and travelers knowledgeable about possible threats, but in a way that does not scare them. Campaigns were placed in airports to educate travelers about notifying security upon seeing something suspicious. Another thing that hotel security should be concerned about is skimming. Skimming is a device that catches credit card numbers. Usually there is a need for an inside man for this type of threat. These people usually aren't criminals, but opportunists. Prevention of this in your hotel could be to hire an investigative team man making that known to the employees. This will keep honest people honest. Insurance fraud is one of the greatest business risks and it's the most expensive. Claims could be as small as a guest seeking a free room for stubbing his toe to a drawn out worker's compensation case. Liability is the label that hoteliers are held liable for criminal acts of a third party. Hoteliers should properly educate themselves on these issues and consulting an attorney if necessary. The final issue is security as a taboo. Security should become a part of day to day operations and hoteliers will be better able to address it. Hotel executives should insist their GM's make security a priority. This article was written for the year 2012. I still think that all these issues are relevant in 2013.
Cindy Saunders

Hotel Cyber-Security | Past Issues | Lodging Magazine - 0 views

  • Hotel cyber-security is facing increasing scrutiny from federal regulators. Case in point, last June the Federal Trade Commission sued Wyndham Worldwide hotels after apparently unsophisticated hackers allegedly stole the credit card information of more than 600,000 customers leading to a more than $10.6 million fraud loss.
  • So what are reasonable data security measures? The FTC itself has stated that the data security measures it considers reasonable “will depend on the size and complexity of the business, the nature and scope of its activities, and the sensitivity of the information at issue.” In other words, it is nearly impossible to know if your data security is adequate until the FTC tells you it is inadequate. While data security has been a hallmark of compliance for healthcare providers and banks for more than a decade, the hospitality industry has not been subjected to the same regulatory framework.
  • Review your privacy policy immediately
  • ...4 more annotations...
  • Stay one step ahead.
  • Data security work is often outsourced
  • If there is a breach, act quickly and decisively
  • Ask your attorney and IT professional to work together
  •  
    This article discusses how banking and healthcare have been held to a historically high level of cyber security, but only recently has the hospitality industry. It highlights a cyber attack on Wyndham Hotels and their reluctant response to take corrective action. The article offers steps that a hospitality company should take to protect themselves as they launch and work to protect their guests, their information and their company.
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
anonymous

Insiders suspected in Saudi Aramco cyber attack | SciTech | GMA News Online | The Go-To... - 0 views

  • Hackers from a group called "The Cutting Sword of Justice" claimed responsibility for the attack. They say the computer virus gave them access to documents from Aramco's computers,
  • The hacking group that claimed responsibility for the attack described its motives as political
  • the group said Saudi Aramco was the main source of income for the Saudi government, which it blamed for "crimes and atrocities" in several countries, including Syria and Bahrain.
  • ...9 more annotations...
  • According to analysis of Shamoon by computer security firm Symantec, the way the virus gets into networks may vary, but once inside it tries to infect every computer in the local area network before erasing files to render PCs useless.
  • Yet those sources say such protections could not prevent an attack by an insider with high-level access.
  • insiders were implicated in just 4 percent of cases last year.
  • The hackers behind the Shamoon attack siphoned off data from a relatively small number of computers, delivering it to a remote server
  • Because the virus wiped the hard drives, it is difficult for Saudi Aramco to determine exactly what information the hackers obtained.
  • The Shamoon virus is designed to attack ordinary business computers
  • . It does not belong to the category of sophisticated cyber warfare tools
  • Saudi Aramco has said that only office PCs running Microsoft Windows were damaged. Its oil exploration, production, export, sales and database systems all remained intact as they ran on isolated and heavily protected systems.
  • It is standard industry practice to shield plant operating networks from hackers by running them on separate operating systems that are protected from the Internet.
  •  
    Saudi Arabias national oil company, Aramco, was attacked by a computer virus, Shamoon, and it is suspected that an insider or employee assisted the hackers. The virus spread through the network and infected about 30,000 PC business computers and wiped their hardrives. This is one of the worst attacks against a single business. The hackers who claimed responsibility, The Cutting Sword of Justice, were politically motived. The companies more important documents including plant operating networks were not affected by the virus because they were on a separate and higher security network. Recently, other Middle Eastern natural gas firms with relations to Saudi Arabia have been hit by cyber attacks. Because the Aramco hackers admitted their motives against the Saudi Arabian government income sources, I think that all the cyber attacks may be politically motivated. As a Middle Eastern oil company with relations to Saudi Arabia, this is a major indication to take precautionary measures and increase network security. This attack demonstrates that no matter how much security you have in place, if an insider is willing to assist hackers or provide hackers with necessary information, you are no longer protected. It would seem imperative that employees with this access are chosen carefully or network access is very limited.
Mary White

The Rise of Cyber Theft - Subway Loses Millions - 8 views

  •  
    A relatively unsophisticated group of hackers stole millions from Subway by hacking through their poorly secured POS systems. These franchise businesses possibly failed to adhere to the standard required by Subway Corporation and failed to establish two points of entry for remote access into the POS system, making it easy for hackers to steal credit card information. These types of crimes are likely to increase in the future as hackers from around the world take advantage of sub-par security systems. Businesses can no longer concern themselves only with the sale of an item, they also need to offer a sense of security to their customers and accept the reality that cyber theft is a rising problem.
  • ...2 more comments...
  •  
    I definitely agree that businesses need to accept the fact that cyber theft is a rising problem. Cyber theft is so common, we now have to guard and protect our computers with various anti-virus protection; which serves no purpose to a very professional hacker. The fact that a company like Subway experience losses through poorly secured systems, say a lot about their management in regards to protecting their brand and their customers. It's very mind blowing to think that the Subway corporation was just focusing their attention in what they view as important. This is just another wake up call and alert to everyone, who seems to layout their information carelessly. I also hope that Subway refocus themselves in regards to this matter.
  •  
    I have seen a few restaurants more so lately place messaging on the registers or pos system stating that their wireless networks are in fact secure by outside firms or services. With the rise of cyber theft and the increasing awareness about its effect, especially at the small business level, I thought it was a saavy move by this restaurant to assure its customers that at the very least they take the issue seriously. I personally know that no system is 100% safe, but as a consumer it means alot to me knowing they have that proactive approach.
  •  
    It seems everybody should check their online accounts frequently=_=
  •  
    Jeremy, I can appreciate the transparency of those restaurants. I wish more businesses would be open about their security. People are wound pretty tight about money right now and need to feel that the business world does care enough to protect their information.
jennifer amador

New Restrictions Quickly Added for Air Passengers - NYTimes.com - 0 views

  • new restrictions on travelers that could lengthen lines at airports and limit the ability of international passengers to move about an airplane.
  • But several airlines released detailed information about the restrictions, saying that passengers on international flights coming to the United States will apparently have to remain in their seats for the last hour of a flight without any personal items on their laps.
  • Overseas passengers will be restricted to only one carry-on item, and domestic passengers will probably face longer security lines.
  • ...3 more annotations...
  • Travel has declined about 20 percent since 2008 because of the economy, and airlines have been dealing with numerous delays in the past week because of snowstorms on the East Coast and in the Midwest.
  • T.S.A. had ordered new measures for flights departing from foreign locations to the United States, including mandatory screening of all passengers at airport gates during the boarding process. All carry-on items would be screened at security checkpoints and again at boarding, the airline said. It urged passengers to leave extra time for screening and boarding.
  • The new restrictions began to be instituted Saturday on flights from Canada and Europe to the United States. Air Canada said it was waiving fees for the first checked bag, and it told passengers to be prepared for delays, cancellations and missed connections because of the new limits.
  •  
    After September 2011 alot of changes have occured in airline and airports throughout the world. TSA has purchased, trained, and introduced innovative machinery that can easily detect authorized items inside luggages. The US governement have spend alot of money also to simply protect the nation from terrorists and any form on violence especially in the hospitality and tourism industry. Alot of th airlines have changed the way they used to operate before the attacks; for instance food is no longer served on airplanes, and more fees are charged for luggages and definitely more screening in airport terminals. The introduction of air marshalls and new machinery have definitely changed the perspective of traveling nowadays, travelers have to wait longer to be screened and to even get out of the plane after the plane have landed at its destination. On a positive note, everything that have changed is for our own safety as citizen of the US and i personally believe moew things should be implemented if it can only improve the way we are being protected.
AQUEELAH THOMPSON

How Hotel Chains Are Going Green - Articles | Travel + Leisure - 0 views

  • looks at how several hotel companies are going a step beyond those ubiquitous towel- and linen-reuse programs, from their guest rooms to their boutiques.
  •  
    This article highlight what different hotel chains are doing in order to "go green" It looks at different sections of the hotel and explains what the hotel chosen is doing to go green in the different areas. The first are is the Guest Room. The article explains the the Kimton Hotels have recycling bins for bottles, cans and paper and this increase there recycling rate to 75% over 3 years. The second area the article touches on is the Kitchen. It explains how the Fairmont Hotels and Resorts are encouraging their kitchens all over the world to use organic foods. The third area the article explains in the Bathroom. Apparently, the Aloft group has installed refillable shampoo and body wash dispenser at its locations and plan to do it for the future locations they are opening. As it relates to the outdoors, Asia's Six Senses is protecting the seascapes with chlorine fee pool sanitation system in order to protect the coral and marine life. The article also explained that the RockResorts have changed chemical cleaners to cleaners that were more natural. The article also states that changes are being made in shops and boutiques. The Swedish Scandic hotels stopped selling bottle water at 147 of their hotels and Banyan Tree resorts has partnered with local vendors to sell in their boutiques. I feel that all of these hotels and resorts are going in the right direction in order to save the environment in which they operate.
Ruoxi Wang

Environmental Initiatives - Marriott News Center - 0 views

  • The company formed an Executive Green Council in 2007 to catalyze sustainability beyond water and energy conservation and collaborated with Conservation International, a global environmental NGO based in Northern Virginia, to set the following goals:
  • Marriott’s Spirit to Preserve® Goals:  • Further reduce energy and water consumption by 25 percent per available room by 2017;• Expand our green hotel development ten-fold in five years;• Green our multi-billion dollar supply chain;• Educate and inspire associates and guests to support the environment;• Address environmental challenges through innovative conservation initiatives including rainforest protection and water conservation.
  • In China, Marriott is helping to safeguard fresh water. The company is investing $500,000 over two years to support a vital water conservation program that helps protect the largest source of fresh water on the planet.
  • ...1 more annotation...
  • Marriott believes its commitment to social responsibility contributes to its growth and development, as well as the company’s culture. Marriott has been ranked one of Newsweek's "The Greenest Big Companies," and has been recognized for its environmental leadership in the hotel industry by several groups, including Ceres, an alliance of investors and environmentalists; the non-profit organization ClimateCounts.org; and Travel + Leisure magazine.
  •  
    This article described the goal of Marriott's environmental initiatives goals and what did they do in all over the world. Marriott plays a leading role in the environmental initiatives in the industry. It can reduce wastes and costs. What's more, it can improve the image of the firm. I think other hotel chains should learn form Marriott and set up their image. This can not only help protect our world and life but also make a great contribution to the development of the company.
miamigol

Choosing Fire Protection For Data Rooms In A Facility - 0 views

  •  
    This article is about the replacement of Halon 1301 as suppression agent in server rooms. Halon 1301 was an effective and popular clean agent alternative to traditional water-based fire suppression system in the 1980's and early 1990's. Yet, in 1994 the U.S. Environmental Protection Agency banned it because it was determined that Halon 1301 aided in the depletion of the Ozone layer. The articles indicates that two great alternatives were found to replace it. One of these choices is inert gases. Naturally present in the atmosphere, inert gases extinguish fire by reducing the level of oxygen between 15% (the minimum needed to burn fire) and 14% (minimum safety oxygen level required). The second alternative, according to this article, is synthetic gas, which extinguishes fire by removing heat rather than suppressing oxygen levels. The average cost of an unplanned data outage is about US$7,200 per minute, therefore, under-protecting an IT data room is unacceptable.
sbarr011

Who takes responsibility for cyber security in a hotel? - 0 views

  • it is vital that franchisors and their corporate security teams communicate franchisees’ contractual duties;
  • It’s you who may need to ensure all policies are upheld, that’s why it pays to provide incentives that will make it worth franchisees’ while to comply.
  • The study also reported that the cost for each lost or stolen record containing sensitive and confidential information increased from an average of $154 to $158.
  • ...9 more annotations...
  • And, while there’s no definitive answer to who owns cyber security in a hotel franchise, hotel owners or franchisees can take measures, such as investing in cyber insurance and maintaining updated systems, to prevent a cyber attack.
  • there have been multiple data breaches in some of the biggest hotel chains, with 55% of data compromises resulting from a corporate/internal network breach.
  • If the lines are still blurred come May 2018 – when GDPR is implemented – hotels may not be compliant and will face strict penalties.
  • Last year’s Ponemon study found the average total cost of a data breach is $4 million.
  • Adding to the cyber security difficulty: most franchisees have multiple properties, each with their own brands and contracts, making it even more important for cyber security policies to be implemented and upheld.
  • However, currently, too many hotel owners rely heavily on central reservation systems; thus, they don’t have much, if any, involvement in data collection or storage. That makes it difficult to implement an effective cyber security policy.
  • Many of the vulnerabilities are due to a gap in hotel franchise’s cyber security responsibility.
  • Unfortunately, this industry is a popular target for attack, because of the type of data it holds – credit card data, frequently used throughout the hotel either at check-in, in bars, restaurants, or shops – as well as relatively poor cyber security.
  • According to a recent Trustwave 2016 Global Security Report, the hospitality industry accounted for the second largest share of data compromises among any other last year.
  •  
    This article discusses the liability for a cyber breach at various branded hotels between the franchise owner or the corporation. The Trustwave 2016 Global Security Report stated that the hospitality industry had the second largest amount of data breaches. Additionally, more than half of the breaches are from a corporate/internal network breach. According to a Ponemon study, the average cost of a data breach is $4 million. While this is alarming, it is a surprise since hotels store numerous amounts of personal customer data including guest's credit card information. The article states that cyber hacks are largely due to the gap in not knowing who is responsible for the cyber security. There is an issue of control of data versus franchise network requirements. The hotel brand places individual franchisees in control of their own cyber security. However; they must rely on many centralized corporate owned reservation systems that could be possible access point for cyber attacks. The article suggests that the individual franchisee should make more effort in protecting their customers information as the hotel brand will take most of the blame. This does not help either side. Also, it mentions that in order to protect the hotel franchise it is important to have updated systems and should consider investing in cyber insurance.
adel168

Shred-it Helps Hoteliers Prevent Data Security Issues | Hotel Business - 0 views

  • One of the challenges hoteliers are facing today in terms of data security is the failure to identify information as confidential
  • “Another challenge is the strong focus on cybersecurity,” said Nickolas. “While it is of course important to ensure that online data surrounding hotels and their guests is protected, it’s just as essential to implement strategies that protect physical information as well.”
  • Consumers are more conscious than ever before about their personal data and information security, and it has become a major factor in the hotel booking process.
  • ...2 more annotations...
  • “Nearly one-third of hotels (32%) admitted they have no known policy for storing and disposing of documents,
  • “Employees can be a hotel’s greatest security asset if they put the right training and policies in place,”
  •  
    Shred-it, a global information security service provided by Stericycle Inc., is providing services such as document destruction, hard-drive destruction, media destruction, etc. Shred-it hotel clients are helped to stay compliant with the latest laws around protecting consumer data and confidential information. Shred-it also offers hotels with implementing new policies and procedures that will better help their physical security as well as policies limiting employee access to certain areas.
kpony001

Guests want smart technology, but security concerns remain | Hotel Management - 0 views

  • More than 96 percent of hotel guests travel with a smartphone and nearly 46 percent of guests travel with at least two smart devices, representing a 10 percent increase in just two years
  • More than 80 percent of guests indicated a desire to wirelessly cast content from their devices onto guestroom televisions and more than 90 percent of surveyed hoteliers agreed that today's guests would prefer to be offered wireless casting abilities, rather than traditional video-on-demand services.
  • With hotels around the world universally experiencing diminishing profits from VOD, the survey points to entertainment platform functions that hoteliers can deploy alongside wireless casting in order to regain these revenues
  • ...12 more annotations...
  • more than 60 percent of surveyed guests indicated that they would like the ability to order amenities and services via the guestroom television, if given the option. Sixty-five percent of guests would like to be able to surf the internet on the TV entertainment system
  • Another 61 percent of guests also indicated a preference to access information on available hotel services, such as restaurant hours, via the guestroom television.
  • 65 percent of guests are “highly concerned” about inputting usernames and passwords into a guestroom television app, according to HIS. 
  • As voice becomes the preferred interface for guest and staff interactions with technology in hotels, there must be safeguards in place to ensure that no data falls into the wrong hands,
  • The same is true for protecting hotels’ proprietary data from disclosure
  • Hoteliers have a duty to protect their guests personally identifiable information and we’ve built our technology atop the leading natural language processing platforms to ensure they meet this duty.
  • How are you protecting the privacy of my guests? Are recordings associated with our guests’ personally identifiable information?
  • How are you protecting the security of my hotel’s proprietary data?
  • Many travelers have unique accents or dialects that aren’t well understood by popular voice assistants. Does your solution improve the accuracy of interactions? 
  • How are you measuring return on investment? How will your solution drive efficiencies and increase revenues?
  • Can I easily change and update interactions with my guests once deployed?
  • Without the right integrations, even the best product can add complexity and cost. Hoteliers need to make sure any vendor they consider has the integrations they need to set their team up for success.”
  •  
    The article reports that the great majority of hotel guests desire to have state of the art innovation for their convenience, such as casting and voice interface technology. The type of innovation stems largely from guests being able to use their laptops or phones on the TV, while also access hotel services such as restaurant hours and possibly food services from the same interface. They assert. however that it is important for hoteliers to know how guests may be able to keep their identity hidden from potential practices such as "integration with the platform that may use this data for remarketing", integrate a system that can understand an manage foreign accents. It also brings up concerns of how to measure return on investment, showing a increase in revenue and that it is possible to update the interactions with guests once the technology is deployed.
kteme001

Environmentally Friendly Computers and Monitors Hit the Market | GreenBiz - 1 views

  • Compared to traditional computer equipment, all EPEAT-registered computers have reduced levels of cadmium, lead, and mercury to better protect human health.
  • EPEAT products are identified as EPEAT-Bronze, EPEAT-Silver, or EPEAT-Gold depending on the number of optional environmental criteria incorporated in the product.
  • EPEAT also makes it possible for individual consumers to review environmental considerations before making their own purchases.
  • ...6 more annotations...
  • The three-tiered EPEAT rating system includes 23 required criteria and 28 optional criteria.
  • 100 representatives from environmental groups
  • “We recognize the potential human health impacts associated with the materials found in traditional computers. As a result, we are very pleased to be one of the first private sector companies to use the EPEAT green computer standard, in addition to other environmental criteria, in our computer purchasing practices.”
  • Having a consistent standard makes it easier for customers to evaluate the environmental features of the technology they purchase,
  • Dell is pleased to be one of the first manufacturers to register products with EPEAT.”
  • The U.S. Environmental Protection Agency, using very conservative assumptions, estimates that over the next five years, purchases of EPEAT registered computers will result in reductions of: More than 13 million pounds of Hazardous Waste More than 3 million pounds of Non-hazardous Waste More than 600,000 MWh of Energy - enough to power 6 million homes
  •  
    This article talks about the efforts computer companies are making to reduce the negative environmental results of traditional technology equipment. There are more than 60 electronic devices from companies like Dell and HP that are becoming apart of the U.S. Environmental Protection Agency. This is a funded project called EPEAT that has the goal of identifying environmentally friendly computer equipment that still outputs the same level of performance for the customer. This new "green" certification system even provides a list online of the products that meet the standards. EPEAT allows customers to rank computer electronics by their environmental. There are 23 required criteria and 28 optional criteria involved in the rankings. The optional criteria determines if the product is EPEAT Bronze, Silver, or Gold. These standards include having lower levels of lead, mercury and cadmium as well as being more energy efficient so they reduce emissions put into the atmosphere to help reduce the levels of greenhouse gases. These products are also more simple to upgrade and have recycled… businesses actually have to provide safe ways to recycle the products they sell when the customer can no longer use them. Manufacturers think having an even playing field for the customer to be able to view their products by environmental aspect is better and are proud to be apart of something so beneficial to the environment. The EPEAT program was expected to reduce 13 million pounds of hazardous waste and 3 million pounds of non hazardous waste.
elena_martynova

Why Cybersecurity in the Hotel Industry Should be a Joint Effort - 3 views

  • The global hospitality industry now sits in the top three of industries most frequently targeted by hackers, according to the 2015 Trustwave Global Security Report.
  • Thieves have seized the opportunity to capitalize on the wealth of data that passes through varying weak spots in hospitality networks, and they're now looking for more than just credit card data. Hotels hold contact details, travel plans, air miles, birth dates, passport data and personal preferences on millions of guests - all of which can be used by criminals in a multitude of ways, ranging from fraud to extortion.
  • According to the aforementioned report, 65 percent of the hospitality industry's security breaches were via point-of-sale (POS) systems, with weak remote access security contributing to 44 percent of those compromises.
  • ...6 more annotations...
  • But a number of breaches also affecting the industry targeted booking partners - companies that facilitate reservations on behalf of the hotel brands for services such as air travel, car rental and room bookings.
  • Regardless of where the initial breach occurs, one thing is certain: if customers can't rely on a brand's booking system, they will simply go elsewhere. Statistics show that nearly one in five shoppers have dropped out of an online travel booking because of security concerns around payment.
  • Understanding where critical data lives within your enterprise and how it moves, both internally and outside of the organization, is paramount.
  • POS attackers often take advantage of vulnerabilities, from configuration errors like easy-to-guess passwords to underlying flaws in the system itself, to access payment terminals and plant malware.
  • it is critical that hotel chains - and their partners - have experts regularly conduct deep-dive penetration to sniff out potential vulnerabilities before criminals can take advantage of them.
  • To mitigate the potential damage caused by unidentified malware, hoteliers and their partners should implement intrusion detection, security management and threat intelligence services, as well as scan inbound and outbound communication to flag data-stealing malware in real time and prevent information from leaving the door
  •  
    This article tells us about the fact, that now days the global hospitality industry is one of the industries which is most frequently targeted by hackers. In order to avoid any attacks there must be tighter control across a hotel and its network of partners. So the main 3 aspects which will help to avoid attacks are: -assess risks everywhere -protect the POS system -find malware and keep data protected
yuqiongliang

11 ways to help protect yourself against cybercrime - 0 views

  • 1. Use a full-service internet security suite
  • 2. Use strong passwords
  • 3. Keep your software updated
  • ...10 more annotations...
  • 4. Manage your social media settings
  • 8. Take measures to help protect yourself against identity theft
  • 6. Talk to your children about the internet
  • 7. Keep up to date on major security breaches
  • 5. Strengthen your home network
  • guard your personal data. A VPN — short for virtual private network — can also help to protect the data you send and receive online, especially when accessing the internet on public Wi-Fi.
  • 9. Know that identity theft can happen anywhere
  • 10. Keep an eye on the kids
  • 11. Know what to do if you become a victim
  • Contact the companies and banks where you know fraud occurred. Place fraud alerts and get your credit reports. Report identity theft to the FTC.
  •  
    In a way, fighting cybercrime is everybody's business. Think of it as an obligation to do your part in the fight against cybercrime. For most people, that means following a few simple, common-sense steps to keep yourself and your family safe. It also means reporting cybercrimes to relevant officials at the appropriate time.
« First ‹ Previous 41 - 60 of 494 Next › Last »
Showing 20 items per page