Skip to main content

Home/ Hospitality Technology/ Group items tagged spam

Rss Feed Group items tagged

anonymous

Americans not ready for Canada's anti-spam law: report | Canadian Lawyer Legal Feeds - 0 views

  • CASL
  • will contain some of the toughest anti-spam provisions in the world, banning senders from delivering unsolicited commercial electronic messages without receiving express or implied consent from the recipient.
  • It applies to all messages sent from, or received in, Canada, which means American firms marketing in Canada fall under its jurisdiction.
  • ...3 more annotations...
  • 60 per cent of American marketing executives were completely unaware of the new law.
  • Individuals who breach the law can face penalties of up to $1 million, while corporations are liable for as much as $10 million.
  • “They’re saying, ‘never mind, we’ll stick to sending post cards in the mail, and do telemarketing instead
  •  
    This article is about the new new anti-spam laws that will be enforced in 2013 by the Canadian government. What was pretty interesting was the fact that 60 percent of American marketing companies were unaware of the new law. Funny thing is that most of those who were aware decided that they would simply resort to other forms of spam like telemarketing and postal mail.
diana morales

http://blog.milestoneinternet.com/website-promotion/effective-email-marketing/ - 0 views

  • Effective Email Marketing
  • Effective Email Marketing
  • Book Rooms and Build Relationships
  • ...5 more annotations...
  • Permission Email vs. Spamming
  • 4 Easy Steps To Conducting Effective Email Marketing
  • In-House vs. Outsourced
  • Using Email Marketing to Up-sell
  • Using Email Marketing to Build Relationships and Get Feedback
  •  
    This webpage is an explanation of all the effective ways you can market thru email in the hotel industry. Obviously if the guests received an email from your company is because they provided you with their email adress, meaning that they are interested. E- Marketing is not spamming. It is very proffesional. At the end of the guests stay, you can use e marketing tools to lude the guest back in your way. You can benefit from E-Marketing by upselling. It is a very powerful tool that can bring you a lot of traffic if you have a great business plan. E- Marketing is also important because you can get guest feed back and fix problems that might occur and also help them come back as well. E-Marketing has changed the hospitality industry in a great way. People no longer need to walk in to your hotel to find out information. If you have a great website, guests can quicly make their own assumptions. If a guest is coming back to the city, E-Marketing can lure them back in.
kayshap96

Proximity Marketing in 2018 and the market forecast for 2022 | Beaconstac - 0 views

  • Proximity Marketing in 2018 and the market forecast for 2022
  • Proximity-based marketing isn’t a new concept. It has been around for decades. Whether it’s giving out flyers in the busiest part of the city or hiring a sign spinner to drive sales, it has always relied on location-based marketing.
  • With the dawn of the World Wide Web, marketers were able to target consumers using their IP address.
  • ...15 more annotations...
  • In 2018, consumers have evolved to avoid spam Consumers have become exceedingly aware of marketing tactics. According to research, 69% of people who use text messages reported receiving unwanted spam and text messages. 25% of those people face this issue weekly. Proximity based marketing takes care of unwanted spam by showing only hyper-local relevant ads to consumers
  • Google’s competing Eddystone technology that debuted in 2015, can trigger URLs and web pages directly without an app on Android.
  • The Eddystone protocol designed by Google negates the need of having an app on Android phones
  • Not requiring an app to receive notifications allows marketers to target a much wider audience
  • People in stores, on the move who are inside buildings or on the sidewalk and have their data switched off cannot receive any digital advertisements. This segment of people are not being targeted through digital or traditional marketing.
  • Using location based marketing, brands and marketers can show relevant targeted ads.
  • The game changed in the 2000s when smartphones took off and GPS, geofencing and geo-targeting came into the picture.
  • People today love personalised recommendations
  • According to the ‘Trends in Personalisation study,’ 96% of all marketers agree that personalisation advances customer relationships. 88% have reported a measurable rise in business resulting from their personalisation campaigns. Which is why, proximity marketing is a notch above the rest.
  • Introduction of BLE smart technology and Bluetooth Mesh Leaving the Bluetooth switched on pre-2010 meant massive battery drainage. With Bluetooth low energy, people are more prone to leaving their Bluetooth on. After every new iOS update, Bluetooth is automatically switched on.
  • WiFi and beacons can also work in conjunction to provide better services, even prompting users to turn on their Bluetooth.
  • Privacy is a major concern
  • There is no personal identifiable data that is collected from users making it more compliant to laws and regulations globally.
  • There are more mobile devices than people in the world. Proximity marketing makes good use of this fact.
  • n fact, proximity marketing isn’t just limited to mobile devices. Wearables can also receive beacon notifications. The global wearables market is all set to reach 126.1 million units in 2019.
  •  
    " "
sliu043

eMarketing Do's and Don'ts | Top Stories | Hospitality Magazine (HT) - 0 views

  • The Do's: 1. Follow the rules of spam filters and the Can Spam Act, which applies to all marketing and promotional e-mail distribution, except transactional e-mails such as confirmations or thank-you correspondence.
  • 2. Play the keyword game.
  • 3. Make your customers feel special.
  • ...6 more annotations...
  • 4. Tap e-marketing's immediacy. Among the benefits of e-marketing is the ability to cut the cycle time from offer to close.
  • The Don'ts: 1. Avoid messaging without a purpose. Inundating customer mailboxes with generic and too-frequent messaging dilutes the program's value and can be interpreted as spam. Sign-ups without an explanation of the program garner little participation.
  • 2. Don't overwhelm.
  • 3. Don't overuse e-coupons, an easy temptation to succumb to when early campaigns boost business. Making a special offer in every e-mail trains guests to wait for the offer and diminishes the full price value of the product. Narrow e-mail coupons to a few per year and always for a particular reason, and make it time sensitive, tied to a purchase and personalized.
  • 4. Don't forget surveys.
  • Surveys can also flesh out information garnered through earlier solicitations, making for a richer database to mine for marketing uses (and avoiding appearing too intrusive at sign-up).
  •  
    In this article, the author pointed out that nowadays the Internet has played a prominent role in the lives of most consumers, so hotels and restaurants must make the good use of the Internet to send their marketing messages. Through the e-marketing experiences, the article has introduced some best practices as well as tactics for hotels and restaurants, revealing a list of e-marketing Do's and Don'ts. In one word, the author believed that striking the right tone is essential in an e-marketing program. Be clear, straightforward, respectful and fun to score points with recipients, and offer things they value: exclusivity and meaningful rewards. In addition, use database analysis tools to make the most of the data collected: to cater to specific groups and even personalize messages.
guanhuahao

Top Cybersecurity Tools for Business - 0 views

  • All cyber threats are not equal. Some may hold your data for ransom, while others may destroy your information for good.
  • Digital tech analysis firm Juniper Research predict that the cost of data breaches will rise from $3 trillion annually to over $5 trillion in 2024.
  • organizations should look to Next Generation Anti-Virus solutions (NGAV) to protect their assets. NGAV takes traditional AV and then adds advanced analytics, behavioral analysis powered in real-time by large scale cloud back-ends to thwart known and unknown attacks. Leading NGAV solutions include Sentinel One, Carbon Black, and CrowdStrike.
  • ...16 more annotations...
  • The National Institute of Standards and Technology (NIST) offers cybersecurity guidelines for best practices to manage cyber risk. These include identify, protect, detect, respond and recover. Another resource is the NCSA’s national program, CyberSecure My Business.
  • This way, if there is ever a compromise of the password database, hackers don't have those full passwords.
  • People can rely on the password manager to create and store dozens of passwords in an encrypted database without having to remember them.
  • Password managers are quite helpful, and some are even free.
  • store the first part of sensitive site passwords
  • but keep the last few digits memorized and fill them manually.
  • Firewall Often referred to as a company's "first line of defense," a firewall is a security control that filters and screens network traffic entering and exiting your corporate network.
  • You should also consider implementing multi-factor authentication (MFA). MFA authentication uses more than one thing or "factor" to log you in
  • , biometrics is part of this last category
  • SPAM & Malware filters screen email for unwanted and dangerous elements, blocking them before they ever reach your users.
  • In the world of cybersecurity, there's a phrase, "humans are the weakest link." An employee who accidentally clicks on the wrong link or email attachment can put in motion a chain of events that results in a cyber breach. Security awareness training is an anti-phishing tactic all organizations should employ.
  • RDP access must be protected by a VPN connection.
  • reduce the risk of getting hacked is to ensure your systems and software are updated regularly, or "patched.
  • patching shouldn't end with the operating system. Your patch program should also look to patch all other applications running on your systems
  • regardless of the security tools implemented to prevent a data breach, you should plan for a compromise occurring.  
  • That's where 24/7/365 network and endpoint monitoring comes in
  •  
    Cyber attacks open more and more often and varied since cybercriminals are becoming more cunning and their methods more challenging to detect. This article introduces some types of strategies implemented to protect companies' businesses from cyber threats and cybercriminals. Including using Anti-virus software, firewalls, password managers (very useful while some even free), VPN, patch management program which not only for operating program but also for other applications running on your system, consider the email SPAM/Malware filters and security awareness training for the employee since "humans are the weakest link." An employee who accidentally clicks on the wrong link can put in motion a chain of events that results in a cyber breach. Finally, plan a 24/7/365 network and endpoint monitoring.
hui wang

Greening the Internet: How much CO2 does this article produce? - CNN - 0 views

  • Twenty milligrams; that's the average amount of carbon emissions generated from the time it took you to read the first two words of this article.
  • if you consider all the people visiting a web site and then all the seconds that each of them spends on it, it turns out to be a large number
  • It is part of the whole sustainability picture
  •  
    Computer on your desk is contributing to global warming? That is not a joke! Actually, most people don't appreciate that fact. It is true that if the electricity comes from coal power plant it produces as much CO2 as a sports utility vehicle! Especial, the total electricity that needed to transmit the trillions of spam emails sent annually equals the amount required to power over two million homes in the US. Unbelievable! As millions more go online each year, which means there comes out more electricity needed and produce more CO2. As the researcher's saying, it becomes part of the whole sustainability picture.
Wei Ding

TripAdvisor CEO discusses fake reviews, Google#.Txg1IKe1ZQ8.diigo - 0 views

  •  
    Nowadays, TripAdvisor play an important role in tourism industry. Most of people will review TripAdvisor ranking and then make their own holiday arrangements. On-line user review rankings are important in contemporary society. As the TripAdvisor president said, trip advisor is a honest person's opinion. TripAdvisor website plays the role of trusted intermediary for the independent traveler. However, some hoteliers concern about their personal reputation. I read another article that hotel owner Duncan Bannatyne complains the consumer resource is bad for business. For example, if a hotel was reported for bad bug exist, this definitely is a fatal effect on hotel reputation even this hotel already take proper action to kill all bad bugs. On the other hand, as TripAdvisor CEO stated, "Ninety-eight percent of our audience when we surveyed 'Do you trust the reviews,' the answer was 'yes' because they read the reviews, they go and they stay and it matched expectations. The system works." TripAdvisor also take '"most of hoteliers" concern into their consideration, they have a decade of expertise at catching people who are try to spam their system.
  •  
    From my experience in the industry. I know how much people really depend on trip advisory to help them decide on where to stay when they choose the destination they will be traveling. But I have heard stories on how the Owner of the hotel I used to work for would write on trip advisor amazing comments of the hotel to bring more crowd in and then he would invite his friends to write in trip advisor as well. This makes me question how real are all these comments posted in trip advisor. If you think about it, anyone can make up a profile and fill out a comment about a specific hotel. What makes us so sure about this website overall?
paige rosenberg

NetworkEtiquette.net Netiquette Rules - 0 views

  •  
    Netiquette is network etiquette on the internet through emails, websites, etc. Some core rules would be to always use spell check, never use all caps, tell the truth, be yourself, do not flame or spam, be conservative, do not send email at night, shop on secure sites and use discretion. The common conventions of online communication between users are the rules of netiquette. Netiqutte takes into account the context of how information is shared. Internet etiquette is centered around data and its use. The type of data are; text, audio, graphic and video. Netiquette is social code for network communicatin. The internet is the most popular digital network in the world, therefore it is centered around internet use because its the culture of digital networks and the internet if the most popular in the world.
Michaela Gave

Digital Gifting Is Trending in the Hospitality Industry - 0 views

  • Mercator further projects the 2013 holiday volume of digital gifting will exceed $1 billion
  • Some related consumer m-commerce facts include: 59 percent are interested in using mobile as a form of payment 50 percent of U.S. consumers shop with mobile devices 61 percent are interested in checking balances 59 percent are interested in organizing and tracking gift cards and loyalty via mobile 76 percent want an alternative to carrying everything in their wallets 12 percent of mobile U.S. subscribers who receive a text message (SMS) advertisement  tend to respond quickly; practitioners claim that offers sent via SMS convert 10 times to 20 times higher than either email or direct mail deals.
  •  
    Summary: The variety of gifting options has grown from a simple plastic gift card to virtual cards delivered by email, text, debit/credit cards and more. The prediction for 2013 will exceed a billion dollars of digital gifting for the holiday season and continue to grow. Digital gift cards have made giving easy due to the convenience of redemption. Paper coupons have proven to be successful to draw in consumer activity, but the digital revolution in virtual gifting is expected to explode as people are so connected to their mobile devices. Even with the convenience and growing popularity of digital gifting comes barriers and security issues. Such issues include personal banking security and privacy. Some small to midsize businesses may not be able to participate in digital gifting due to cost barriers or lack of technology. Due to electronic process, paper receipts will be obsolete. Computers aren't perfect so how does one resolve dollar discrepancies. One benefit of virtual giving is the bar codes/QR codes. Companies are able to collect and retain additional information of givers and receivers by scanning the bar code/QR Code. Often people are reluctant to provide contact information, but in this case they aren't being asked, they have no choice. This is a benefit to the companies because they can make other promotional offers to engage and possibly retain both parties, thereby increasing sales. There are a variety of methods of virtual gifting and redemption. One example is Giftly. Giftly adds the value of the gift to the recipient's credit or debit card which can be used anywhere. This is super convenient for many people and they are able to choose whatever they wish rather than receive a gift chosen for them. This is certainly the digital age version of sending a check via mail to a loved one. Other corporate examples that have impacted the transition from plastic gift cards to virtual gifting are Burger King, Dunkin Donuts, Applebee's and Starbu
kdibe001

Predicting the Future of Computer Networks and the Internet - 0 views

  • Broadband routers and other home gateways become obsolete: As people end up owning hundreds of wearable and mobile devices that need to communicate both inside in the home and away, installing fixed routers inside a home to manage traffic will no longer make sense: Devices will all communicate with each other and the Internet directly.
  •  
    This article predicts the future of networking and the internet, which is a challenging thing to do, considering how complex this technology is. Among some things predicted are that web site address space will eventually run out and the domain names will crash as human recognition will be able to navigate through web pages. The most interesting thing I found is that broadband routers will soon disappear due to multiple internet capable devices will be able to solely communicate with each other, meaning our phones, watches, and computers will all be connected without a router. It also goes deeper into the possibility of a future without an internet network. It's hard to predict that we will also be able to fight against cyber attacks and spam and keep our internet at use. Imagine a future with no internet! What will be the next big thing then?
Irina Stepanenko

The Power of Email Marketing in the Hospitality Industry - 0 views

  • arketing power of the Internet in terms of reach and frequency. Nowhere is this better illustrated than through email marketing. Following the lead of the airlines, many hospitality managers are evaluating email marketing for its low cost, rapid dissemination, and measurability.
  • Following the lead of the airlines, many hospitality managers are evaluating email marketing for its low cost, rapid dissemination, and measurability.
  • Email marketing is a crucial component of the hotel eMarketing and online distribution strategy.
  • ...22 more annotations...
  • Email gets the most attention of any hospitality eMarketing effort because intuitively it makes sense—since email can create direct revenue opportunities with past, present, and future customers.
  • By category, travel relate
  • Low cost
  • ssion-based email marketing is the second-generation email approach that goes well beyond guerilla email marketing, known as email spam.
  • Permi
  • Precision e-mail marketing is the next, third generation email approach that dynamically "reads" customer profiles, purchasing habits and history to create highly personalized emails.
  •   Reach:
  • Hotels must employ new strategies to take advantage of these opportunities to capture this Internet market. 
  • Protects brand integrity:
  • Personalization:
  • Instant gratification:
  • Rich Media:
  •   Results: Outcomes based, from knowing who opened the message, clicked on which links, how much time spent viewing each page, completed a transaction, or forwarded the email.
  • There are three main groups of email audiences: consumers (leisure or business), travel intermediaries (travel agents, wholesalers) and corporate clients.
  • Hoteliers are in a unique position to build a robust list from existing customers. Using a list built from existing customers, the conversion rates can be ten times greater than any standalone rented mailing list because the targeted group already knows and has experienced the product first-hand. In addition, the hotel can stratify the customer list by specific characteristics, communicate and offer value in the message, and send targeted and rele
  • vant mailings frequently to the intended audience, an audience that even anticipates these messages announcing hotel specials.
  • d email marketing retains a loyal audience, especially if it offers the recipient value, accurate communication, relevance, and familiarity.
  • Travel agents that use the Internet and email are exactly the travel agents hoteliers must reach.
  • Collecting the right information is essential to not confuse long-term marketing plans
  • Recent trends in email technology and services include:
  • A total email strategy addresses every aspect of the email marketing process. It's organized to leverage a hotel’s existing and future client base for ongoing and upselling opportunities. This includes matching the right messages with the intended audiences for ongoing customer relations.
  • In conclusion, a total email marketing strategy serves as a springboard to launch various email campaigns, to boost ongoing customer acquisition, relationship management, and increased bookings on and off line.  An experienced eBusiness hospitality consultancy can help you navigate and utilize the Internet to its fullest potential.
  •  
    Email marketing is a crucial component of the hotel eMarketing and online distribution strategy. The website is a key to establish interactive relationship with customers and capture client email profiles by the company. In hospitality industry, especially the travel agency frequently use the emarketing to retain the loyalty, and offer accurate communication. The permission-based email marketing is very useful and practical for sending the promotional emails. And the precision e-mail marketing used by the airlines has generated up to a fivefold increase in response rates and tenfold lower conversion costs than direct mail. The email marketing provides some benefits for hoteliers, such as low cost, accessibility, protecting brands integrity, hommization, timeliness, good visual sense and positive results. The consumers, travel intermediaries and corporate clients are the significant customers for email marketing. The hotel can stratify the customer list by specific characteristics, communicate and offer value in the message. Hotels must employ new strategies to take advantage of these opportunities to capture this Internet market.
  •  
    As this class teaches us, along with this article, " the marketing power of the Internet in terms of reach and frequency." This article in particular speaks about the advantages of email marketing. With the low cost for companies in the hospitality industry, email marketing can produce positive results form the masses. The article goes on to explain how and why email marketing have been seen to be so efficient as a marketing tool. One obvious pro for instance is that everyone uses emails in today's society. After reading this article I can agree that email marketing is a very good way to put the internet to use when it comes to marketing. My concern, however, as mentioned in the article is the control the receiver has with the emails. For instance, how many emails are too much, too frequent or just not relevant? Features today have given the consumer the opportunity to now have a bit of control over this issue as I have mentioned. I believe this may be one of, if not the best form of marketing online because it gets directly to the customer, usually requires interaction whether to the main website or further clicking for deals, and sets up a format in which sufficient information can be given.
  •  
    Many hospitality managers choose email for its low cost, rapid spread, and measurability. There is an incline to online purchasing, which means that Internet is the place to establish relationships with your customer, through email for instance. Email can be easily personalized, include only relevant promotions, and be a tool to keep in touch with your regular and new customers. Permission-based email is sent only to customers who have allowed to be emailed, thus, you are targeting people who gave you permission and who most likely are interested in your product/service. Email is also a better tool because it is cheaper and faster than regular mail. Also, it is easier to track the results, using the tools to see who opened the email, clicked on the link, etc. There are key factors to remember in order to be successful: -interactive relationships -frequency -personalize and relevance -permission-based The article provides a rationale for implementing total email marketing strategy.
haojingting

Computer Network - 0 views

  • Computer network security should be a concern for all
  • A computer network can simplify one's technical capabilities if they own multiple computers and the various technical equipment used to enhance computer functioning. When computers talk to each other through a network, tasks can be more efficient and people can save time and money, streamlining systems. Computer networks are great for home or small businesses, and can also be wide area networks (WAN) reaching across the world to bring shared technology to large corporations or global industries. Another important facet is computer network security which operators should be aware of when looking at networking through a WAN.
  • Computer networks are great for home or small businesses, and can also be wide area networks (WAN) reaching across the world to bring shared technology to large corporations or global industries. Another important facet is
  • ...3 more annotations...
  • a network will allow the system operator to share a single Internet connection for all of home computers.
  • Networking will also allow a family or business to share various files. Windows allows for easy entry to another computer's files, making it possible to access information from one desktop to another.
  • A firewall may be implemented to filter the information coming through the Internet connection into the private system in the home or business.
  •  
    This article gives a brife introduction of the functions and advantages of computer networks. There are also discussions about the computer network security issues.
  •  
    This article gives a brife introduction of the functions and advantages of computer networks. There are also discussions about the computer network security issues.
  •  
    Computer networks are great for home or small businesses, and can also be wide area networks (WAN) reaching across the world to bring shared technology to large corporations or global industries. Another important facet is computer network security which operators should be aware of when looking at networking through a WAN. Networking will also allow a family or business to share various files. Windows allows for easy entry to another computer's files, making it possible to access information from one desktop to another. Other computer network activities include: sharing a printer, playing games that allow multiple users on different desktops, and sending output devices to other computers in the home. There are different levels of security, and the reason for use of computer networking will determine how much security should be installed. The highest levels of security will block out everything coming into the desktop, even email, with the lowest levels of computer network security allowing in email spam and undetected viruses.
fotan001

E-marketing in the hospitality industry - Digital Doughnut - 0 views

  • A successful e-marketing strategy should comprise a set of specific e-actions that help hoteliers reach their planned objectives.
    • fotan001
       
      This article does a great job at summarizing the successful e-marketing strategies and actions that help hoteliers reach their planned objectives. Search Engine Marketing,  Social Media Marketing, Mobile Advertising, Email Advertising and Display advertising are mentioned as the e-actions of successful Marketing in Hotels.  It also touches on the importance of Reputation Management and how leading companies such as Starwood have deployed this important tool to maximize their online presence, solidify their marketing strategy and also keep a close eye on the competition. The article reiterates the fierce competition to lead the online space and also mentions the overwhelming amount of marketing being thrown at the consumer. It also warns of the importance of managing the online space correctly and of providing updates and innovations to attract customers and 'keep their interest constantly stimulated'.  I think this is especially important as so much information is being shared through e-Marketing that it has the potential of becoming spam, or over-saturating the consumer. Good e-Marketing is not just 'in your face', it's also crafty, opportunist and subtle. 
pattyjoe10

6 Lesser Known Uses of Beacons in Restaurants | News | Hospitality Magazine (HT) - 1 views

  • allowing customers to order ahead
    • pattyjoe10
       
      Beacons allow customers to order-ahead of time. It attracts a different clientele and allows us to gain others because of a shorter or no waiting time. Like an express line. But they have to make sure the order is left ready by the time customers arrive.
  • consumers today value personalized, contextual mobile engagement, built around their current location, interests and buying preferences.
  • 80% of consumers prefer receiving personalized, context-aware branded content through their mobile app.
  • ...12 more annotations...
  • Therefore, it is highly likely that, merging mobile marketing efforts with iBeacon technology could result in higher click-through, quicker conversion, more sales and greater loyalty.
    • pattyjoe10
       
      Technology has taken a huge toll on society and business now a day. If our business is keeping itself updated with technology, could mean we are at the top of our game. 
  • Q app
  • busy a restaurant is at a particular time
  • real-time information
    • pattyjoe10
       
      Beacons also allow customers to know exactly how much people are at that exact time at the restaurant or business, and thus waiting time, if any.
  • not overwhelm users with notifications
  • deep understanding of the value offered to customers and deliver it in the best way possible.
    • pattyjoe10
       
      I believe this is one of the most challenging for businesses. Customers (as myself) hate when we get attacked by too much notifications.  If it were useful in anyway or if it called my attention every now and then, buy companies apparently don't pay attention to how customers may feel.  It is very important to use the access wisely and give out information customers really want. Offer what they are looking for, by personalizing.
  • delivering personalized deals and messages
    • pattyjoe10
       
      Attract customers by promoting events or special offers. People like a place they can see as happy and fun. Also, who doesn't like discounts.
  • prevent boredom
  • offer customized discounts for first-time customers, encouraging them to come back often
    • pattyjoe10
       
      I believe this is one of the best efforts to retain and gain customers. Reward the customer who passes by every now and then, with personalized dishes; and reward  first time customers by attracting them with discounts specifically for them.
  • deliver custom menus to valued customers based on previous orders and visit history
  • awarding crawlers
  • ollect massive amounts of untapped data
    • pattyjoe10
       
      Another must. Keep track of everything to better improve employee wages and specifics of customers that are out-and-about.
  •  
    Technology has taken a huge toll on society and business now a day. If our business is keeping itself updated with technology, could mean we are at the top of our game. This article briefly  demonstrates how Beacons can help improve your business by providing how, when and where are customers behaving. For example, Beacons allow customers to order-ahead of time. It attracts a different clientele and allows us to gain others because of a shorter or no waiting time. Like an express line. But  it may become a challenge if the business doesn't know how to ensure a time-effective preparation before customers arrive. Beacons also allow customers to know exactly how much people are at that exact time at the restaurant or business, and thus waiting time, if any. Another advantage would be "push-customized notifications". I believe this is one of the most challenging for businesses. Customers (as myself) hate when we get attacked by too much notifications.  If it were useful in any way or if it called my attention every now and then, but companies apparently don't pay attention to how customers may feel.  It is very important to use the access wisely and give out information customers really want. Offer what they are looking for, by personalizing. It also helps to attract customers by promoting events or special offers and notifying via beacons. People like a place they can see as happy and fun. Also, who doesn't like discounts? A fifth advantage, and as I believe to be one of the best ways to retain and gain customers, is to reward the customer who passes by every now and then, with personalized dishes, and reward first time customers by attracting them with discounts specifically for them. And finally, another must consider, is that beacons help keep track of everything (all happening at a specific given time) to better improve employee wages and specifics of customers that are out-and-about.
  •  
    Technology has taken a huge toll on society and business now a day. If our business is keeping itself updated with technology, could mean we are at the top of our game. This article briefly demonstrates how Beacons can help improve your business by providing how, when and where are customers behaving. For example, Beacons allow customers to order-ahead of time. It attracts a different clientele and allows us to gain others because of a shorter or no waiting time. Like an express line. But it may become a challenge if the business doesn't know how to ensure a time-effective preparation before customers arrive. Beacons also allow customers to know exactly how much people are at that exact time at the restaurant or business, and thus waiting time, if any. Another advantage would be "push-customized notifications". I believe this is one of the most challenging for businesses. Customers (as myself) hate when we get attacked by too much notifications. If it were useful in any way or if it called my attention every now and then, but companies apparently don't pay attention to how customers may feel. It is very important to use the access wisely and give out information customers really want. Offer what they are looking for, by personalizing. It also helps to attract customers by promoting events or special offers and notifying via beacons. People like a place they can see as happy and fun. Also, who doesn't like discounts? A fifth advantage, and as I believe to be one of the best ways to retain and gain customers, is to reward the customer who passes by every now and then, with personalized dishes, and reward first time customers by attracting them with discounts specifically for them. And finally, another must consider, is that beacons help keep track of everything (all happening at a specific given time) to better improve employee wages and specifics of customers that are out-and-about.
  •  
    Creative and a bit scary application of existing technologies. Much like Facebook Messenger, when do we cross the line between convenience and forfeiture of privacy? As part of the industry, the responsibility falls to us to manage the line in favor of our guests. They will know when it has become too much, and we will know very soon after when business evaporates. Provide friendly, targeted service without being too invasive. Remembering orders and having them ready on time is fine. Sending a pop-up message every time the guest passes by in a cab may be a bit much. Consider how many Starbucks messages you could receive in any major metropolitan area. Without proper care, we could be giving a whole new meaning to the word Spam.
jmelilli

Groups360™ Offers Industry-Wide Use of GroupSync™ Sourcing Technology Through... - 0 views

  • In the face of tumultuous changes in the meetings industry including the yet unknown impact of an evolving commission structure, Groups360 has announced its decision to open its proprietary GroupSync technology for free use by all meeting planners, hoteliers and intermediaries through March 31, for a sneak peek at the future of meeting planning technology.
  • Groups360's GroupSync searches more than 70,000 hotels to curate a list tailored to the planner's preferences and needs, reducing a weeks-long process to mere minutes. Not only does the GroupSync Market Estimate reveal how much a planner can expect to pay before contacting hotels, the Marketplace Advantage Program™ highlights available incentives offered by hoteliers for the specific dates under consideration, cutting down the need to sift through irrelevant paid placements and email spam.
  •  
    This is a really short article about Group360 offering their software for free the first quarter of the year. It is a smart move to get more properties signed up and using the software. If their software works as advertised then they stand to convert a number of sales. 
lavendersheshe

Cybercriminals are capitalizing on coronavirus fears, security firm warns - CBS News - 0 views

  • A leading cyber security firm says criminals and a group affiliated with China are capitalizing on growing fears over the coronavirus, leading to a spike in malicious online activity.
  • "They've been sending people emails to prey on people's fears and open attachments
    • lavendersheshe
       
      It is important to be careful on opening suspicious emails and rely on watching the news to learn about the coronavirus updates. Opening such emails and downloading attachments can launch a harmful virus into your system and lead to your computer being hacked
  • China-based adversary known as PIRATE PANDA uses major news events as a lure to implant malware that allows remote access to a victim's computer network
  • ...3 more annotations...
  • Another group, identified by CrowdStrike as MUMMY SPIDER, is using the coronavirus theme in an "email thread-hijacking technique" that "ultimately led victims to download malware
  • The security firm said the strategy can be used to steal financial information or login credentials, and expanded to other targets
  • CrowdStrike also reported a surge in queries from companies who anticipate employees will work from home over the next three months, which can leave company data more vulnerable
    • lavendersheshe
       
      If employees work from home then an organization has less control over the security of online systems and exposes the company to more risk.
  •  
    Cybercrime has been on the rise since the outbreak of the coronavirus and hackers are capitalizing on the fact that people are now more concerned about protecting themselves and their loved ones. It is important to be more aware now as an organization in making sure that employees are informed on safety measures on using systems when there at home, using the needed resources in increasing cyber security and backing up important information.
jorgeegutivav

Email marketing for hotels - everything you should be doing (and more) | PhocusWire - 1 views

  •  
    This article discusses the most effective ways for hotels, both small and large, look to email their prospective clients. The ages of emails spam from companies in order to engrave their name onto their client's eyeballs are over. Personalized emails with relevant information, discounts, and rewards are much more effective and are increasing revenues for hotels everywhere. The article goes into all of these aspects with great detail and allows hoteliers to improve on their own methodology with these tried-and-true techniques.
teresaricks

Cyber Security In The Hotel Industry | protel - 4 views

  • And phishing isn’t the only strategy these computer thugs use, either. Just about every hotel in the world could be vulnerable to malware, ransomware, spam, hacking and social engineering. 
  • The argument for educating staff on cybersecurity is a simple one: if staff don’t know how to recognize a security threat, how can they be expected to avoid it, report it, or remove it?
  • the 2019 State of IT Security Survey found that email security and staff training were listed as the top problems faced by IT security professionals.
  • ...16 more annotations...
  • Yet, more than 30% of staff surveyed by Wombat Security Technologies didn’t even know what phishing or malware was. This is probably why scams like the Business Email Compromise (BEC) result in whopping losses of over $3 billion (according to the FBI).
  • But as humans, hoteliers make mistakes, they’re trusting of fake identities, tempted by clickbait, and vulnerable to other sneaky tactics used by criminals to gain access to company information.
  • Staff need cybersecurity training to protect themselves and the hotel against cyberattacks.
  • By making employees aware of security threats, the impact they might have on your business, and what procedures to follow when a threat has been identified, you’re strengthening the most vulnerable links in the chain.
  • The World Economic Forum in their latest report, The Global Risks 2019, puts cyber-attacks and data theft into the higher-than-average likelihood bracket during 2019.
  • To achieve these record levels of data breaches and cyber-threats, cybercriminals are focusing their attention on the manipulation of human behavior.
  • So how do we counter these threats? Education, education, education. 
  • Security awareness training is not a point event or solution, it is a process. Security awareness comes out of a series of ideas, thoughts, and preparations that are used to develop a holistic security awareness training program.
  • Identify the Specific Cybersecurity Needs of the Hotel/Property   
  • Include Cybersecurity Awareness Training During Onboarding
  • Cover Relevant Topics
  • Make Staff Cybersecurity Training An Ongoing Process
  • We all make mistakes and occasionally slip up. It is really important that staff know that they can come to you and that they are free to report problems without there being a risk of them losing their jobs. This will come from your personal management style. 
  • Cybersecurity is everyone’s responsibility, whether you are C-level, management, accounting, housekeeping, maintenance, or reception, it does not matter. Everyone needs to be made aware of the hotel’s individual cybersecurity policies, attitude, and culture. 
  • Continuously send reminders via email, Slack, or any other messenger your hotel may be using with reminders to change passwords, to update anti-virus programs, and with information about the latest phishing techniques.
  • If you create a culture of cybersecurity awareness within your organization, then the chances of your organization becoming a victim are greatly reduced.
  •  
    This article stresses the importance of providing cybersecurity training to staff in the hospitality industry.
rakiasimon

What Is Cloud Computing and How Does It Work? - Definition & Overview - 0 views

  • The information is stored on physical servers maintained and controlled by a cloud computing provider, such as Apple in regards to iCloud. As a user, you access your stored information on the cloud via the Internet.
  • By using cloud storage, you don’t have to store the information on your own hard drive. Instead, you can access it from any location and download it onto any device of your choice, including laptops, tablets, or smartphones.
  • Fees are usually set at monthly or yearly rates, depending on the services you are using.
  • ...4 more annotations...
  • Cloud computing provides increased storage, so you won’t have to worry about running out of space on your hard drive.
  • There are numerous cloud computing applications available for free, such as Dropbox, and increasing storage size and memory is affordable. If you need to pay for a cloud computing service, it is paid for incrementally on a monthly or yearly basis.
  • That said, some servers like Google Cloud Connect come with customizable spam filtering, email encryption, and SSL enforcement for secure HTTPS access, among other security measures.
  • Individuals will find Apple’s iCloud particularly useful if you are using Apple devices. Small businesses, in turn, can opt to share documents via Google Cloud Connect, Google Docs, or Dropbox.
  •  
    The aim of this article was to explain what cloud computing is and how it works. The article provided a lot of great information and clarity on the concept and how it can be used by individuals and businesses alike. It also provides a list of pros and cons to cloud computing.
  •  
    Cloud computing is like the icloud, basically having the data in one location that everyone can have access too. The amazing feature and benefits in my personal opinion is the ability to have an entire department work on a spreadsheet together and have access to the same information.
anonymous

Survey Shows US Cybersecurity Attacks Costing Orgs More Money - 0 views

  • Survey Shows US Cybersecurity Attacks Costing Orgs More Money
  • Cybersecurity attacks are leading to estimated financial losses of an average of $884,000, according to an IDG survey.
  • "As organizations prepare for various attacks and breaches, hackers continue to be savvier in their approaches,”
  • ...6 more annotations...
  • “Resilient organizations must have all employees embrace security practices, from awareness training to behavior monitoring to gap protections."
  • Firewalls, spam filtering, network-based antivirus tools, access controls, and encryption were listed as the most effective solutions for detecting or deterring external threat factors.
  • The top three types of cybersecurity incidents also differ depending on whether it was an insider or outsider threat. The report found that outsider threats tend to consist of the following: Unauthorized access to/use of information, systems, or networks Customer records compromised or stolen Confidential records (trade secrets or intellectual property) compromised or stolen
  • The average cost of a data breach is $3.62 million globally, according to the 2017 Cost of a Data Breach Study: Global Overview sponsored by IBM Security and conducted by Ponemon Institute.
  • "Data breaches and the implications associated continue to be an unfortunate reality for today's businesses," Ponemon Institute Chairman and Founder Dr. Larry Ponemon said in a statement. "Year-over-year we see the tremendous cost burden that organizations face following a data breach.”
  • Cybersecurity incidents stemming from insider threats will include private or sensitive information being unintentionally exposed, customer records being compromised or stolen, and employee records being compromised or stolen.
1 - 20 of 24 Next ›
Showing 20 items per page