Skip to main content

Home/ Hospitality Technology/ Group items tagged scams

Rss Feed Group items tagged

anonymous

11 Tips to Improve Your Restaurant's Cyber Security in the COVID-19 Era | FSR magazine - 0 views

  • wealth of client data on tap from places with lax security
  • unknowingly serve credit card data to hackers. Due to the volume of credit card transactions and CRM data available, restaurants need to take cybersecurity seriously before a criminal gets wind of the vulnerability
  • A hacker only needs to gain access to a restaurant's POS system and install malware to steal customer credit card details.
  • ...20 more annotations...
  • Take Chipotle, for example. The company got devalued by about $400 million after they suffered a data breach.
    • anonymous
       
      Major consequences for restaurants if discovered as the link
  • because most go belly up six months after an attack.
  • Unprotected WiFi
  • Criminals pretend to be from the U.S. government and inform targets their COVID-19 stimulus check is ready, but they would need to verify the details of the recipient first before they can send it.
    • anonymous
       
      Low level scammer
  • CRM software data, which may include names, addresses, and even birthdays. One of the most common ways to achieve this sort of attack is via malware (malicious software). Hackers find a vulnerable backdoor to a restaurant's network to install malware on the POS system. Malicious code then records every transaction and every detail, sending it back to the criminal's server over the internet.
  • GrubHub drivers scam both the restaurants and the customers by marking the deliveries as complete and pocketing the tip money, without bothering even to pick up the order from the establishment.
    • anonymous
       
      AHHHH
  • Businesses are scrambling to find suppliers amidst the chaos, and criminals have been taking advantage of the confusion
  • Scammers are posing as representatives from the World Health Organization (WHO), the Center for Disease Control (CDC), and other public health agencies
  • social engineering on the restaurant staff to pull off phishing attacks.
  • PCI compliant.
  • conduct a risk analysis
  • hiring a security expert either full time or as a consultan
  • Secure your network and always change the free WiFi access point's password with a strong one every day.
  • latest operating system updates
  • Force multi-factor authentication
  • strong passwords
  • Ensure sensitive data encryption
  • web-filter to secure your WiFi network
  • Install a robust security software program on all computers and devices to block, detect, and clean malware.
  • Conduct regular cybersecurity training
  •  
    Restaurants have always been an easy target for cyber security hackers, in particular, hackers who are looking for credit card and ID information. Restaurants provide hackers with a "wealth of client data" due to the high "volume of credit card transactions and CRM data available." Once given access, a hacker could simple install malware and duplicate all customer information. Already facing critical financial issues during Covid 19, restaurants large and small need to take a stronger presence in the protection of their data. If discovered to be the start of a breach, customers will tend to avoid that business. "Chipotle, for example...got devalued by about $400 million after they suffered a breach," and many small restaurants "go belly up six months after an attack." Below is a summary of the types of attachs restaurants face: 1. Unprotected Wifi 2. Social engineering and phishing attacks. This is actually the one that stood out to me the most because of how sophisticated these attacks can be. It is a reminder that we are all at risk, both the technologically challenged and gifted. 3. Malware 4. Covid 19 Scams 5. Grub hub scams 6. Supply chain scams *A particular issue for restaurants and commercial businesses right now as companies scramble to find new vendors who can supply them with the products they require. 7. Public Health scams 8. Government Stimulus scams 9. Technical support scams How can we fight against these? Here are the recommendations: 1. PCI compliance 2. Hire and IT security professional to conduct a risk analysis and if possible, keep on as a consultant or full time 3. Keep a secure network and change free passwords daily 4. Use the latest operating systems, force multi-factor authentication, strong passwords, and use encryption services for data storage and transfers 5. Install and use robust web-filters and security software programs 6. Maybe most important!!! Train your employees. 5.
Kamini Ramsaran

E-mail based tax scam targets military members - 0 views

  • The Internal Revenue Service is warning taxpayers to be on the lookout for a new, email-based phishing scam that targets Department of Defense military members, retirees and civilian employees.
  • The e-mail appears to come from Defense Finance and Accounting Services and displays a .mil e-mail address.
  • “The IRS does not send unsolicited e-mail to taxpayers and never asks for personal and financial information such as PIN numbers, passwords or similar secret information for financial accounts,
  •  
    There is a new email phishing scam that is currently targeting military members, retirees and civilian employees.  The emails are asking the targeted audience to send copies of their IRS documents and various VA award letters so they can receive additional benefits.  However, this is a scam that identity thieves are using to seal the identity of these individuals and possibly clean out their financials and ruin their credit.  People are being warned and noted that the IRS will never ask for personal information in an email.   
dstro007

Some 15 million online bookings are scams by rogue websites - 0 views

  • When it comes to booking a hotel, it pays to go straight to the source. A new study conducted by the American Hotel & Lodging Association (AH&LA) reveals that one in three people are worried about online booking scams, which affect millions of unsuspecting consumers.
  • Early estimates suggested that some 2.5 million hotel bookings a year were affected by deceptive practices through rogue third-party online travel agency (OTA) affiliates who pose as direct hotel booking sites.
  • six percent of consumers who have booked hotels online had the experience of thinking they were booking directly with a hotel, but found out instead that they were booking with an online hotel booking site posing as the direct site
  • ...13 more annotations...
  • translates to some 15 million hotel bookings that have been affected
  • translates to more than $1.3 billion in money going to bad bookings, meaning consumers are not getting what they want and need, not to mention suffering inconveniences, lost room charges, and cancellation and booking fees
  • Another 20 percent of respondents who have booked hotels online reported that they were “not sure” if they had also been scammed.
  • This concern was raised by the Federal Trade Commission
  • These practices also damage hotel reputations and reduce consumer confidence in the online booking process.
  • 14 percent could not get a refund for a cancellation
  • 17 percent were charged unexpected or hidden fees
  • 15 percent did not get their rewards points
  • 14 percent were charged an extra booking fee
  • 32 percent got a room that was different than what was expected
  • Nine percent had reservations lost or cancelled
  • Three percent had their identity or private information stolen
  • The study confirmed that, in order for travelers to be certain they are getting what they want and need, without the frustration and worry, most feel it is better to book directly with the hotel. A majority of those who have booked a hotel online say that they prefer dealing directly with the hotel (56%).
  •  
    So, for the consumers that are used to booking their vacations by themselves, I don't think this article applies to you. For the ones that are trying to save money by not going through a travel agent, I think thesis the article for you. A study conducted by AH&LA shows early signs that almost 2.5 million bookings for hotel properties made online through "fake websites" are being accounted for. This is a huge security issue. Consumers are booking their travel thinking that they are getting certain room types, ample amenities, amazing discounts, and good deals, but turns out they are just getting scammed. Other then not making the clients happy, this also hurts the reputation of the hotel property because when things don't go our way or something happens, we tend to blame the property. And in today's society, most take to the internet to voice their opinions in addition to speaking with the hotel; and bad word-of-mouth is the last thing our industry needs. Also, this can lead to loss of revenue. The survey stated that 56% of customers prefer to book directly with the hotel. It is always recommended to book directly through the property themselves, but for the new guys, how are they supposed to differentiate the difference between real and fake websites? 
Caroline Hardenbergh

Travel Tips - U.S. BBB - 1 views

  •  
    Not only does the Better Business Bureau verify legitimate businesses, but this link provides travel tips which are highlighting possible scams and ripoffs that are occurring related to tourism. It is important for travelers to be hyper-vigilant when making purchases not part of everyday lifestyle, such as taking vacations to foreign & unfamiliar places, which makes opportunities for fraud. Local scams are also discussed such as the risk for ripoffs when buying sports or concert tickets as well as counterfeit team items. Fake lodging and cruise scams are also highlighted, all issues which serve to bring awareness that validation prior to purchases of travel arrangements or leisure offers is a critical step to take before making any commitments, or confirming payment. The BBB recommends: 1) Always check the business first through validation with BBB. 2) Pay with a credit card which can be stopped or possibly recovered according to your provider. 3) Ensure you purchase is actually being used for what you intended by ensuring payment is received by cruise line, hotel, or airline being promoted. 4) Get proper confirmation of your booking. (Nuff said), 5) Don't be afraid to ask lots of questions BEFORE MAKING A PURCHASE! If questions are not welcomed, then don't give them your money! 6) Consider investing in travel insurance - a few dollars goes a long way when problems occur. Plan travel insurance into your vacation budget as a necessary purchase. "For more consumer tips you can trust, visit www.bbb.org/us/bbb-news. "
blevi022

Biden, Gates, Musk and Other V.I.P. Twitter Users Are Hacked in Bitcoin Scam - The New ... - 0 views

  • A Brazen Online Attack Targets V.I.P. Twitter Users in a Bitcoin Scam
  • In a major show of force, hackers breached some of the site’s most prominent accounts, a Who’s Who of Americans in politics, entertainment and tech.
  • Dozens of the biggest names in America — including Joseph R. Biden Jr., Barack Obama, Kanye West, Bill Gates and Elon Musk — posted similar messages on Twitter: Send Bitcoin and the famous people would send back double your money
  • ...6 more annotations...
  • It was all a scam, of course, the result of one of the most brazen online attacks in memory.
  • But soon after, the list of victims broadened to include a Who’s Who of Americans in politics, entertainment and tech, in a major show of force by the hackers.
  • Twitter’s investigation into the breach revealed that several employees who had access to internal systems had their accounts compromised in a “coordinated social engineering attack,” a spokesman said, referring to attacks that trick people into giving up their credentials
  • the attack was concerning to security experts because it suggested that the hackers could have easily caused much more havoc
  • Security experts said that the wide-ranging attacks hinted that the problem was caused by a security flaw in Twitter’s service
  • Cybersecurity experts said the attack showed how vulnerable social media remains to attacks
  •  
    While this story isn't directly about hospitality it shows that poor security by technology companies like Twitter can lead to compromised access social media accounts of prominent figures. The Social Media Hospitality could be and used scam their customers.
ldevaul

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
asant318

Consumers spend $5.2 billion annually in fraudulent and misleading hotel booking transa... - 2 views

  • scams and fraudulent and misleading travel websites and companies continue to mislead and confuse consumers.
  • 28.5 million hotel stays and $5.2 billion in fraudulent and misleading hotel booking transactions in 2017.
  • 39 per cent of travellers reporting that they most often book their hotel rooms through a third-party website
  • ...3 more annotations...
  • Taking a few extra seconds to book directly with a hotel or a trusted travel agent can save time and money in the long run, and lead to a better travel experience overall.”
  • constant flow of new companies entering the online travel market—suggests we need to do more to protect consumers.
  • AHLA encourages consumers to book directly through the hotel website or mobile app
  •  
    This article reviews a survey conducted by the American Hotel & Lodging Association which reveals that 23% of consumers say they have been misled by third-party traveler re-sellers. The article further explains the Federal Trade Commission's investigation of one of these companies, Reservation Counter, LLC which resulted in legal action. The article concludes that to protect consumers AHLA will support legislation known as the Stop Online Booking Scams Acts and strongly encourages travelers to book directly through the hotel or trusted travel agent. I think we are seeing the AHLA's opposition to OTA's in defense of hotel properties that want direct booking. The protection of customers is important, but it seems like an implied warning of ligitimate OTA's like www.booking.com.
nellyvero71

Twitter accounts of Joe Biden, Barack Obama, Elon Musk, Bill Gates, and others apparent... - 0 views

  • Twitter (TWTR) accounts belonging to Joe Biden, Bill Gates, Elon Musk and Apple, among other prominent handles, were compromised on Wednesday and posted tweets that appeared to promote a cryptocurrency scam.
  • Twitter's support account said: "We are aware of a security incident impacting accounts on Twitter. We are investigating and taking steps to fix it. We will update everyone shortly."
  • A little more than an hour after the attack began, Twitter apparently moved to prevent holders of verified accounts from tweeting.
  • ...2 more annotations...
  • A hack like this is particularly concerning not just because of any financial scam that can be run, but because so many world leaders use Twitter -- and some, like President Donald Trump, use it to announce major policy decisions. A hack that took over an account belonging to one of those leaders could have devastating consequences.
  • "We are aware of today's security incident involving several Twitter accounts belonging to high profile individuals," the FBI's San Francisco field office said in a statement. "The accounts appear to have been compromised in order to perpetuate cryptocurrency fraud. We advise the public not to fall victim to this scam by sending cryptocurrency or money in relation to this incident."
  •  
    The article is about what was happening today with some Twitter accounts, such as Former President Barack Obama, Mike Bloomberg, Bill Gates, Kanye West, Kim Kardashian West, Warren Buffett, and Jeff Bezos. Apparently the accounts were hacked and were asking people for money. It is a clear example of cyber attack with Twitter's account.
Rochelle Perez

Barack Obama, Joe Biden, Elon Musk, Apple, and others hacked in unprecedented Twitter a... - 0 views

  • The Twitter accounts of major companies and individuals have been compromised in one of the most widespread and confounding hacks the platform has ever seen, all in service of promoting a bitcoin scam that appears to be earning its creator quite a bit of money.
  • Shortly after the initial wave of tweets from Gates and Musk’s accounts, the accounts of Apple, Uber, former President Barack Obama, Amazon CEO Jeff Bezos, Democratic presidential candidate Joe Biden, hip-hop mogul Kanye West, and former New York City mayor and billionaire Mike Bloomberg, among others, were also compromised and began promoting the scam.
  • It’s unclear how widespread the operation is, but it appears to be affecting numerous major companies and extremely high-profile individuals. That suggests someone, or a group, has either found a severe security loophole in Twitter’s login process or third-party app or that the perpetrator has somehow gained access to a Twitter employee’s admin privileges.
jackyreis

Can You Use Your POS To Help Eliminate Restaurant Fraud? - Total Food Service - 0 views

  • Can You Use Your POS To Help Eliminate Restaurant Fraud?
  • Fraud comes up a lot in the restaurant industry. It’s with good reason. In a business where margins are always tight, customers literally walk in and out, fraud continues to be a constant concern.
  • But did you know your POS has other features to help in your efforts to keep transactions safe and your business secure? Scammers are a crafty lot.
  • ...14 more annotations...
  • Auto-grat scams
  • Automatic tip calculation is a genuine convenience for large parties and those who have difficulty determining appropriate gratuities.
  • Your POS has the ability to determine which tables qualify for an automatic gratuity, so management can easily see which large parties in your dining room will be targeted. If you see cash left after a table has already paid a bill, you may want to intervene and remind the guest that gratuity was already covered, and additional cash should only be left if they intended to do so.
  • Coupon scams
  • Discounts are a fantastic marketing tool. But they’re only good if the customer is aware of the deal.
  • Thankfully, your POS system can ensure all active coupons loaded into the system, and that they’re applied directly to an order, rather than after a cash transaction is complete.
  • Voided transactions
  • Except there are no guests behind those transactions – just wads of unaccounted cash. In a slow restaurant bar, this would never fly. But in a thumping nightclub with high ticket table service bills throughout the facility, a “mere” $500 discrepancy is a drop in the bucket for management, and an easy target for scammers looking to pad their own pockets. Even worse? Serving up complimentary drinks for cash transactions and pocketing the money but adding a tip to the jar as a cover-up.
  • The “Wagon Wheel”
  • In this scenario, a waiter transfers an item like a soda from one check to another prior to closing the tab when a guest pays in cash
  • Then, the next time a guest orders that soda, the server starts the ticket on that tab and continue to transfer the soda while they pockets the cash. Sometimes known as the “revolving soda,” this frequently happens with items like beverages where the server or bartender is preparing their own.
  • To avoid this, restaurant owner’s can monitor activity and behaviors such as low sales of server-controlled items like drinks, compare bartender performance over the same shift, or set restrictions requiring a manager to authorize any transfers.
  • The list goes on. But, thanks to loss prevention features built into modern POS systems, hospitality managers now have the ability to get ahead of scams being run.
  • By leveraging algorithms to identify patterns and suspicious transactions, such as increases in coupon redemption or notably low cash totals, and help you bore down to the source of the problems, before they get out of hand.
Xin Jing

Envysion Implements its Managed Video as a Service Platform with Aloha Restaurant Guard... - 1 views

  • The integration of these solutions enables restaurant owners to monitor cash handling and exception reports, identify trends and validate suspicious transactions identified by Restaurant Guard by viewing the video taken at the time of the transaction.
  •  
    The Aloha restaurant managed video as a service platform which is the leading exception reporting and theft deterrence tool for the restaurant owners. By utilizing Enysion's video, restaurant owners can monitor cash handling easier, identifiy potential suspicious activity faster and monitor the exception report effectively. Moreover, Aloha Restaurant Guard which invented by NCR corporation can identified the common scams through analyzes POS data and transactions. I think that combine Aloha Restaurant Guard to Envysion's video, the owner of the resturant may have a whole picture of the restaurant in their mind through easy used video web interface and secure video clip sharing, data from the two platform and intelligence reports. This is a good model for restaurants to reduce the profit losses from fraudulent activities. It smooth restaurants' daily operation meanwhile employees will regular their own behavior during the work period.
David Glas

3 Real-World Problems Solved Using Cloud Computing | The Small Business Authority | Sma... - 1 views

  • For instance, if a server has 10 or 15 voids in one day, that might indicate a scam. Or if a particular bartender is frequently getting 70 percent tips, that might indicate that he or she is pouring free drinks and being rewarded for it. Each server has a unique login, so a pattern of unusual transactions easily fingers a thief. Additionally, if a certain type of scam is caught running in Chicago, said Lundberg, an algorithm will begin to search for it, and can spot it as soon as it appears in Los Angeles, Miami, or Detroit.
  •  
    The  first part of the article talks about how the cloud is being used in restaurants to monitor all transactions. Aloha POS systems has a add on that takes all the transactions to the cloud in 10 minutes intervals, after that they analyse the date to see if a employee has been doing to many voids or gets to much tips, they do this via algorithms in the cloud. Just another way that the cloud makes the life of a restaurant owner that much simpler. 
Michaela Gave

Digital Gifting Is Trending in the Hospitality Industry - 0 views

  • Mercator further projects the 2013 holiday volume of digital gifting will exceed $1 billion
  • Some related consumer m-commerce facts include: 59 percent are interested in using mobile as a form of payment 50 percent of U.S. consumers shop with mobile devices 61 percent are interested in checking balances 59 percent are interested in organizing and tracking gift cards and loyalty via mobile 76 percent want an alternative to carrying everything in their wallets 12 percent of mobile U.S. subscribers who receive a text message (SMS) advertisement  tend to respond quickly; practitioners claim that offers sent via SMS convert 10 times to 20 times higher than either email or direct mail deals.
  •  
    Summary: The variety of gifting options has grown from a simple plastic gift card to virtual cards delivered by email, text, debit/credit cards and more. The prediction for 2013 will exceed a billion dollars of digital gifting for the holiday season and continue to grow. Digital gift cards have made giving easy due to the convenience of redemption. Paper coupons have proven to be successful to draw in consumer activity, but the digital revolution in virtual gifting is expected to explode as people are so connected to their mobile devices. Even with the convenience and growing popularity of digital gifting comes barriers and security issues. Such issues include personal banking security and privacy. Some small to midsize businesses may not be able to participate in digital gifting due to cost barriers or lack of technology. Due to electronic process, paper receipts will be obsolete. Computers aren't perfect so how does one resolve dollar discrepancies. One benefit of virtual giving is the bar codes/QR codes. Companies are able to collect and retain additional information of givers and receivers by scanning the bar code/QR Code. Often people are reluctant to provide contact information, but in this case they aren't being asked, they have no choice. This is a benefit to the companies because they can make other promotional offers to engage and possibly retain both parties, thereby increasing sales. There are a variety of methods of virtual gifting and redemption. One example is Giftly. Giftly adds the value of the gift to the recipient's credit or debit card which can be used anywhere. This is super convenient for many people and they are able to choose whatever they wish rather than receive a gift chosen for them. This is certainly the digital age version of sending a check via mail to a loved one. Other corporate examples that have impacted the transition from plastic gift cards to virtual gifting are Burger King, Dunkin Donuts, Applebee's and Starbu
msoma003

HNN - 4 cyber security threats looming over hotels - 0 views

  • The world of cyber security is seemingly in a state of constant flux, making the sources of possible threats hard to nail down for hoteliers.
  • The world of cyber security is seemingly in a state of constant flux, making the sources of possible threats hard to nail down for hoteliers.
    • msoma003
       
      Always changing
  • The velocity of change of threat landscape is very challenging for organizations.
  • ...11 more annotations...
  • But the practice is growing more and more sophisticated, panelists said, and phishing attacks are increasingly targeting high-ranking executives, including those in the hotel industry.
  • without checking with multiple sources and having face-to-face conversations.
  • In such phishing emails, the scammers will order subordinates to authorize large wire transactions under the guise of the transfer being for some sort of acquisition or other major transaction.
    • msoma003
       
      An employee will follow the orders from their boss
  • projects (they’ll do), along with the methods and styles of communication
    • msoma003
       
      They study the target, this takes time and sophistication
  • take over the email accounts
  • Ransomware is the practice of finding some vulnerability in a company’s systems to abduct their information or the functions of those systems and then keep it hostage until someone gets a payoff.
    • msoma003
       
      This is new but it can cost the firm a lot of money
  • breach of your point-of-sale systems and loss of customer payment card information.
    • msoma003
       
      Most common and what most consumers are scared of
  • extent of your insurance coverage in the case of such an attack
    • msoma003
       
      Many managers do not look at this
  • Braun called point-of-sale attacks the single biggest cyber security threat to the hotel industry.
  • denial of service, or DDoS attacks
  • hijacked and then used to send little pulses to bring down systems.”
    • msoma003
       
      A firm can be attacked by all sources
  •  
    This article discussed some of the biggest cyber security threats to the hotel industry. One of the biggest threats is that of the POS system, this is not new but we should still watch over it. Another threat that is old is a phishing scam the scams are getting more sophisticated now, hackers get into the email accounts of executives and order large transactions to be made. Internal protocols cannot wipe of the hack but can minimize the risk of employees falling for the fake emails. Ransomware and DDos are also hacks though not as common they still carry big risks.
lclar060

Miami Beach Cracking Down On Restaurant Scams - 0 views

  •  
    Restaurant fraud is a vile act in which customer unknowingly are taken advantage of by restaurant staff members. The article referenced Miami, a primary tourist area in South Florida, have seen where customers complain of being charged double the amount of the quoted rate for food. In other instances, customers are solicited by specials buts again charged more than the initial rate. To protect the destination and rid the area of tacky and or false advertising information, city officials have implemented strict laws. So far, compliance have been enforced and violators charges accordingly.
natashacastro

Fyre Festival, a Luxury Music Weekend, Crumbles in the Bahamas - The New York Times - 0 views

  • Promoted by Instagram influencers including Kendall Jenner, Bella Hadid and Emily Ratajkowski as a never-before-seen V.I.P. event, the gathering — with weekend ticket packages starting around $1,200 and topping six-figures with extras
  • On social media, where Fyre Festival had been sold as a selfie-taker’s paradise, accounts showed none of the aspirational A-lister excesses, with only sad sandwiches and free alcohol to placate the restless crowds. General disappointment soon turned to near-panic as the festival was canceled and attendees attempted to flee back to the mainland of Florida.
  • “Not one thing that was promised on the website was delivered,” said Shivi Kumar, 33, who works in technology sales in New York, and came with a handful of friends expecting the deluxe “lodge” package for which they had paid $3,500: four king size beds and a chic living room lounge. Instead Ms. Kumar and her crew were directed to a tent encampment. Some tents had beds, but some were still unfurnished. Directed by a festival employee to “grab a tent,” attendees started running, she said.
  • ...5 more annotations...
  • By Friday morning, the festival, founded by the rapper Ja Rule and the tech entrepreneur Billy McFarland, was in damage-control mode. “Fyre Festival set out to provide a once-in-a-lifetime musical experience,” the organizers said in a statement. “Due to circumstances out of our control, the physical infrastructure was not in place on time and we are unable to fulfill on that vision safely and enjoyably for our guests.” (A second weekend, planned to start May 5, was also scrapped.)
  • internet programming, the ocean and rap music.
  • But the pair soon discovered logistical hurdles, including a lack of proper water systems and transportation. “There wasn’t the infrastructure we needed. We attempted to build a city out of nothing,” Mr. McFarland said. “Neither of us had developed an island or a festival before.”
  • Still, after a few months of planning — including adding sewage piping and buying an ambulance in New Jersey and shipping it to the island — the organizers thought they were ready for the crowds until the storm on Thursday morning washed away some of what they had built.“Our mistake was trying to own all of it in-house,” said Mr. McFarland, who is also the founder of Magnises, an exclusive members-only benefits card for upwardly mobile millennials. “We were in over our heads.”
  • The Bahamas Ministry of Tourism expressed its dismay in a statement on Friday, citing the festival’s “disorganization and chaos.” It continued: “ We offer a heartfelt apology to all who traveled to our country for this event.”
  •  
    This article is a perfect example of how event planning can go terribly wrong with social media usage. The Bahama music festival hosted by Ja-Rule and his company left hundreds stranded on the Island of Great Exuma. The event started off by being promoted through instagram, mainly by famous celebrities such as Bella Hadid and Kendall Jenner. Tickets were sold at $1,200 for the utmost luxurious experience. Come the weekend of the festival, music go-ers arrived into full chaos. Everything that had been promised to the guests such as deluxe lodges, yoga tents and food courts were missing. People showed up to an empty island with no food, water or basic shelter. Clearly the festival was poorly executed and planned and it was canceled. There was a lack of infrastructure on the island to provide safety for the guests along with a lack of proper water systems and transportation. The event planners had not had a proper back up plan for storms that could potentially hit the island (which happened) which completely set back everything. Many viewed this Fryre Festival as a major scam and were extremely upset, but what it turned out to be was a poorly planned and executed music event.
abrow336

https://www.technologydecisions.com.au/content/security/news/tips-to-stop-cyber-attacks... - 1 views

The Australian Government is worried about the amount of scams that are happening to steal patient data surrounding the Covid-19 vaccine. Many residents of the country are wanting to get the vaccin...

started by abrow336 on 01 Mar 21 no follow-up yet
davidclark33

Coronavirus cybercrime can attack your restaurant system, too | National Restaurant Ass... - 0 views

  • Protecting your business from a data breach is a constant struggle, and it’s even more important during a disaster.
  • Eliot, director of education and strategic initiatives for the NCSA, says cyber incidents and attacks, such as coronavirus-themed email phishing scams, increased as much as 300% to 350% in the first quarter of 2020 and adds that cyber scammers are now trying to target restaurant companies in particular.
  • Cybercriminals have mostly directed malicious emails at telework employees or people donating time and money to those impacted by coronavirus. “We're seeing a huge increase of cyber-related scams promoting coronavirus information or relief efforts. “It’s a big issue.”
  • ...4 more annotations...
  • The PCI Security Standards Council claims that since March, malicious virus-related reports are up 475%. The reason for the uptick is that cybercriminals are trying to take advantage of rapid changes to the payment-card data environment. In addition, 41% of small businesses have said they’ve suffered breaches costing more than $50,000 to fix.
  • Contactless payment is one of the big changes within the payment data environment. Several restaurant companies – from chains to independents – are offering it because it reduces customers' physical interaction with the restaurant's POS system. As part of this move, some businesses have eliminated credit-card PIN numbers.
  • Eliot says malicious email is usually the easiest way for cybercriminals to access your networks. The emails typically show up as urgent requests for sensitive information, often pretending to be from the Small Business Administration or the Centers for Disease Control and Prevention. When the intended victim types in his or her credentials and clicks on a specific link or downloads an attachment, criminals are in.
  • Anyone looking for easy-to-implement security tips can try these six to start. Reduce areas where payment-card data is stored. The best way to protect against a data breach is to avoid storing any card information at all. With many small operators offering curbside pickup and accepting payment over the phone instead of through face-to-face transactions, it’s important they train employees not to write down payment card details. Instead, have them enter numbers directly into a secure terminal. Use strong passwords. Using weak and default passwords is one of the leading causes of payment data breaches among businesses. Effective passwords must be strong and updated regularly. The most recent guidance is: the longer, the better. Think of it almost as a “passphrase” rather than a password. Use it in the form of a sentence, but mix in different characters within the phrase. It’s much harder to break a long passphrase than it is a short, complex password. Weak and vendor default passwords often result in small business data breaches. Also, don’t repeat your passwords. Update your software often. Criminals look for outdated software to exploit flaws in unpatched systems. Timely installations of security patches are crucial to minimizing the risk of a breach. Whenever updates are available, use them. They will improve performance and close out some of the vulnerabilities cybercriminals are searching for. Enable two-factor authentication. It's so important for restaurateurs, especially where their POS systems or any of their sensitive databases are concerned, to have two-factor or multi-factor authentication enabled. If an instance where credentials are stolen occurs, there will be a second layer of verification the operator can rely on to potentially reduce the chances that information will be breached. Segment your networks. If you are going to store payment data, make sure your POS system has its own separate, secure network. Do not store sensitive documents on public cloud services such as Google Docs or DropBox. If you’re going to store sensitive documents, house them in an encrypted, locked down location.   Be hyper-vigilant. Criminals are going to try to take advantage of this pandemic situation as much as possible. You can protect yourself by not giving out sensitive information, especially within unsolicited emails. Don’t click on links you’re not expecting and do everything in your power to protect all sensitive information.
  •  
    This article is about data breaching and cyber crime in the restaurant business. The article specifically talks about the increase in cyber crime during a crisis, and in this case, a pandemic. It talks about contactless payment as a great form of protection for restaurants as well as customers. At the end of the article, it lists six easy to implement security tips.
tkasischke

Hotels Use Technology to Boost Security | International Meetings Review - 0 views

  • Smaller and cheaper cameras, smarter key card systems and communication among hotels add up to a more closely watched environment than in the past but criminals are also using new technology to foil security measures and execute scams.
  •  
    As technology advances so do hackers and criminals. Hotels are placing more cameras in public areas to keep their guests safer. Because cameras are becoming much more popular they are easier to attain and cheaper for hotels to have more than one. Another form of security hotels have been using is key systems. You can track what key and who it was that entered into any room. But hotels are even taking it farther where the guests must use their key in the elevator to get to their floor. All of these steps are in place for the safety and security of the hotel guests. But we still need to be careful as hackers and criminals are coming up with new ways to get hotel stayers. They have even gotten creative enough to make their own Wi-Fi to get guests information. Security teams and hackers will always be neck in neck for who is ahead of the game.
swhit133

Fighting Internet Crime: Protecting Your Small Business From Cyberattacks - 0 views

ata breaches at major corporations like Yahoo, Equifax, Target and Sony Pictures may capture the big headlines, but small businesses also face significant financial, operational and reputational ri...

https:__www.forbes.com_sites_dinahwisenberg_2017_12_20_fighting-internet-crime-protecting-your-small-business-from-cyberattacks_#e288baf30ee1

started by swhit133 on 24 Oct 18 no follow-up yet
1 - 20 of 30 Next ›
Showing 20 items per page