Skip to main content

Home/ Hospitality Technology/ Group items tagged thieves

Rss Feed Group items tagged

18More

Thieves Won't Wait. Neither Should You. | hospitalityupgrade.com - 3 views

  • data is under attack
  • the most afflicted industry was accommodation/foodservice
  • use a combination of hacking and malware (61 percent).
  • ...11 more annotations...
  • success stealing data “in transit” (62.5 percent) versus stored data (28 percent)
  • What this tells us is hotels and restaurants need to do more to protect sensitive payment data and be proactive in keeping up with the hackers and thieves. We also need to pay particular attention to properly securing data as it moves through the merchant IT environment.
  • Point-to-point encryption (P2PE) is a technology
  • has only recently gained momentum in the hospitality sector.
  • P2PE places “data in motion” in a wrapper that can only be decrypted by an endpoint that has the requisite key.
  • The goal of point-to-point encryption technologies is to encrypt as close to the point of entry as possible and guard against thieves who attempt to install sniffing/hacking software on a merchant’s network.
  • P2PE solutions can significantly reduce a merchant’s card data environment, mitigate potential breaches and simplify PCI DSS validation efforts.”
  • You should also understand the types of cards and transactions that can be encrypted. Does the solution encrypt both swiped cards and manually entered cards? Does it encrypt online transactions, as well as on-site or card-present transactions? Is the solution tamper resistant and, what happens if an attempted breach occurs? Where is the HSM (hardware security module) located? Even if data were to be intercepted, is it rendered unusable to cyber thieves?
  • A hosted solution will shift much of the burden of responsibility to the third-party provider and free you from having decrypted data in your environment.
  • Keep in mind, there is no single silver bullet when it comes to payment security. Even with EMV, stolen cardholder data could be used for a fraudulent online transaction. Merchants should implement a variety of technologies and techniques as part of a multi-layered approach to security that ultimately includes EMV to protect against counterfeit card fraud, tokenization to protect data at rest, and P2PE to protect data in-flight.
  • Thieves won’t wait for a unified approach and specification, and are looking to access your valuable data now. By taking a proactive approach to security that includes point-to-point encryption, asking the right questions, choosing trusted partners and keeping yourself updated, you can protect your customers’ data and your reputation.
  •  
    This article deals with the theft that happens on a daily basis in the hospitality field. It happens when credit cards are used to pay for something, like a reservation, and thieves want the information, so they can use your credit card number for whatever intentions they may have. As the article states, "our data is under attack". I can relate to those people that have had credit card numbers stolen, because it has happened to my husband and me, and it is a horrible feeling trying to get your life back on track and recover your money.  I think it would be a great idea, with some research, to get the point to point encryption technology in a field where credit cards are used so often, not only to cover the business (hotel), but also to protect the guest, so they feel at easy when they travel on vacation or business.  The overall point of this technology is to encrypt the information as close to the point of entry, i.e. the swiping of the credit card, as possible. This would in turn "significantly reduce a merchant's card data environment", as the program would encrypt the information so that hackers cannot access the customer's information. As I mentioned earlier, questions should be asked before buying this technology, as there is always something new on the market that may be better. Credit cards are not always swiped, but can also be manually placed in the system, so you want to make sure, that both transactions are protected. Overall, the establishment should always be concerned about the customer and their safety, whether physical or mental and always be prepared for the worse.
  • ...1 more comment...
  •  
    Marilyn, This is a great article and I wish this type of technology was everywhere because like yourself I have credit card numbers stolen before and it is a long process to end that. Working in the hospitality industry we would need to make sure that it is everywhere that a credit card is entered whether that being swiped in house, typed in the system manually, or even processed via the internet. In the hospitality industry we should be very aware of our guests safety and like you mention it is not only just physical safety that is a concern it is the mental state as well making sure the guests credit cards are safe and do not have a chance of being stolen by a hacker. This is a great article, keep up the good work!
  •  
    Great article! Personally after being a victim of credit card fraud, I'm very apprehensive of where I shop, who handles my card and how long it takes them to return it. I recently cancelled a large purchased after the cashier insisted on rubbing my card number on the reciept after the transactions had be approved. In my mind, I was thinking "If I let you do that, then I've open the door for anyone to charge thousand of dollars. I don't think so." As a manager, who hands credit card numbers for manual input, I'm very cautious of them and want to insure that they don't get into the wrong hand. Aftern each transactions is approved, that number is shredded and the credit card machine is batched out. Companies don't realize how important it is to PCI compliant. The risk in exposing sensitive information of our clients and customers can cost thousand of dolllars in fines and fee, in addition to the lost of that customer/client.
  •  
    Marilyn, Great Article...as a Front Desk Manager, it is my responsibility to randomly check our computers to ensure employees are not placing USB driver to collect data from our system. Our company has taking this a step further by putting metal locked case around the PC to avoid possible fraudulent activity. If we have to open a PC, we must log it to show proof why a PC became unlock. Companies should adopt similar procedures to protect the consumers/guests. Nelson
1More

View from the Top | Global Gaming Business Magazine - 0 views

  •  
    "View From  the Top" discusses the new 360-degree camera technology which is helping MGM Resorts and the gaming industry to increase efficiency in their surveillance departments.  These cameras have no blind spots and provide a fish-eye view of the whole casino floor. "It offers situational awareness of the entire floor, and permits the operator to zoom in with other cameras where needed," according to Oncam Grandeye's director of global sales. This company is considered to be a leader in 360-degree technology. The article also discusses a complete solution for surveillance operations. This new technology coupled with more traditional megapixel cameras provide video history of given subjects entering or leaving the property or parking garage (for the entire month). Suspects can even be tracked "back in time" if need be with use of the 360-degree images and software. License-plate recognition software aids in tracking a suspect even if they leave the property. Many thieves end up at another MGM property (there are 10) not realizing their image has been sent out to all of the properties, so if they aren't caught at one, they will be at another. Ticket thieves for slot machines are caught when they try to cash out at kiosks, since their image is on surveillance. Through use of creating triggers in the software, players-club card thieves are caught by patterns and locations of their bets. "We'll mine data for standard deviations, wins that don't look right", says director of surveillance. 360-degree camera technology is one of the most valuable tools in aiding the surveillance operations for the gaming industry.
7More

How Can the Hospitality Industry Protect its Customers? | Hotel Business - 1 views

  • Fraud doesn’t only happen online, and it’s important to also consider the physical data risks within hospitality companies.
  • Personal guest information such as credit card data, addresses, passport and driver’s license copies are a gold mine for hackers and, therefore, make hospitality companies, specifically hotel brands, a prime target,”
  • “When there’s little concern for the repercussions associated with data breaches, it may lead to lack of action in protecting guest information,”
  • ...2 more annotations...
  • Nearly one in five (19%) hospitality companies don’t have a policy for storing and disposing of confidential paper documents,
  • (47%) of C-suite employees say human error or accidental loss by an employee/insider was the cause of their last data breach.
  •  
    The article discusses what practices should hotels adopt to protect their guests, in a world where lodging accommodations are a primary target for criminals and where customers see security as an important factor in decision making. Data breaches can happen online and in the physical world, hospitality companies have to look beyond security software and put into place policies for data storage and disposal of sensitive information, as well as, properly training for employees in information security practices, like proper information handling, and the ability to phishing scams or suspicious emails. In order to ensure that physical or digital sensitive information won't fall on the wrong hands.
  •  
    This article discusses the importance of data security in hotels and what makes it so attractive to hackers/thieves. The article mentions that about 36% of hospitality businesses don't deem data breaches a big deal. If this mentality continues, more and more data breaches will occur for the company that doesn't take data privacy seriously. The hospitality industry has tons of sensitive data about guests stored online and offline, making it a goldmine for data thieves. Organizations need to take precautions like adequately training employees in order to avoid costly security breaches.
2More

New technology helps hospitality industry battle the growing payment fraud problem | Na... - 1 views

    • Charlie Barrett
       
      A restaurant can be a very dangerous place for the consumer in reguards to Crdeit card skimming. With the turn over and lack of good back groud checks, the sittuation is just right for a thief. Tip bosting, by changing the numbers on a written check is on the rise as well. Technology is working in the favor of both the thieves and the guests. The skimmer for the thieves,and portable POS systems make the necessity for leaving with the consumers credit card no more. Pay at teh table technology is effective, saves time and safer for the guests. The same tech trends apply with some resistance for the older consumers. With that in mind the tradditional payment method should be available.
  •  
    For the customers, pay-at-table technology is very convinence and prevent customers from thieves. For the owners, it builds the raputation of the restaurant and effective the working process. The only thing I concern is about the cost to implement this technology. Whether the pay-at-table technology can be widely used or not may depend on the cost to apply.
1More

It's No Longer Just a Personal Threat: Businesses have Become the Newest Target for Ide... - 0 views

  •  
    Many organizations in the hospitality industry underestimate the risk and consequences of business identity theft and they should be more concerned with the risk of personal identity theft. A study by the Ponemon Institute demonstrates that a data breach could cost organizations an average of $7.2 million. This does not even include indirect costs such as lost customers or damaged reputations. To prevent identity theft, companies need to be aware that fraud can occur in many unexpected ways. This article gives a few examples that can help firms to reduce the risk of personal identity theft below.  Instituting a shred-all policy to ensure unneeded files are regularly and safely destroyed Restaurants employee should give their receipts directly to staff rather than leave anything on the table or counter Hotels employee should be instructed to store all sensitive documents in a safe place until they can be securely shredded On the cloud, Businesses should conduct a full security audit of any cloud computing company before storing documents on the cloud Identity theft is the fastest growing crime in the hospitality industry. Just being careful isn't enough to protect customers' identity. If the data is spilled, customers will have a less favorable view of your company or may be angered to the point of never allowing you to serve them again. Any amount of loss of trust and loyalty is harmful to your business.
3More

Security at the Point of Sale - CSO Online - Security and Risk - 1 views

  • The point of sale has always been a target for thieves. While they once went after the cash drawer, retailers often find themselves facing sophisticated networks of thieves intent on the criminal equivalent of volume discounts—reams of credit card data, entire shelves of goods to launder or, in the case of pharmaceuticals like Sudafed, drugs used for making methamphetamines. Retailers, then, operate under the constant threat of having their point of sale either hacked by cyberthieves
  • or spoofed by real ones. Between them, these various thieves target all the major aspects of a modern point-of-sale system: The cash register The bar-code scanner Wireless access The in-store voice or IP network The store inventory management system
  •  
    this article talks about cash, cards, inventory and customer data intersect at the point of sale and introduce the security procedures for how to keep your defenses up to date.
8More

Data Security Basics: Five Security Issues All Hotel Operators Need to Know | hospitali... - 0 views

  • This article looks at the top five issues facing hotel operators and what actionable steps can be taken to decrease the likelihood that your business will be stung by data thieves.
  • Franchise operators need to be aware, however, that an improperly configured RMA is vulnerable to data compromise attack by hackers. 
  • Transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. 
  • ...3 more annotations...
  • Hotel operators need to know that passwords, designed to keep criminals out, can also be a vulnerability in the absence of proper controls
  • Thanks to wireless networks, guests can speed though the check-in process, expedite valet parking and send room service orders directly to the kitchen.  At the same time, hotel operators should recognize that criminals can leverage improperly secured wireless networks to steal cardholder data and should implement strategies to thwart these efforts. 
  • Despite all best efforts, data compromise events can occur and every hotel operator should have a plan in place. Prompt action must be taken by hotels or restaurants that have experienced a suspected or confirmed security breach to help prevent additional exposure of cardholder data and ensure compliance with the data security requirements. 
  •  
    The article discusses five issues that hotel operations are facing, and how to decrease these issues in regards to data thieves. The first security issue discussed is "Remote Access", the article states "Many hotel operators and franchisors use remote management applications (RMAs)". This enable easy access to manage multiple locations downloads; conduct sales polls, and other systems within multiple companies. A advices to remote control issues are to change vendor default settings, in which you can create unique user IDs and complex passwords. Another advice is to "Configure the RMA", in which users are only allowed to connect to known MAC/IP. I personally don't think that creating a unique ID or account password may solve this issue, but allowing connection capability to a set IP/MAC is a wise intake. Although being able to just connect to a set MAC, will cause a limit on where and when you connect. The second security issue is "Network Security", many transaction volumes are being exposed, brand recognition as well; and that attract hackers. In order to reduce this problem, it is suggested that companies need to install and maintain a fire wall at all time. I agree with this other suggestion which is to Use outside resources to help identify new security vulnerabilities. This is great, because a company will be able to receive an outside outlook in regards to security. The last three issues that are on this list are: Password Management, Wireless Security, and Incident Response Plan. Overall it's evident that any system that has a password requirement is causing a major attraction towards security thieves. The suggestions within this article are great, but from my observation; many companies will have to put in time to track and monitor their systems. Systems can't allow to be left open without monitoring, and the internet is a lead way to all this, so any system that requires the internet must be monitored, and protected.
  •  
    Technology enables service. That's the idea, anyway. In the hotel industry, thousands of companies worldwide provide hundreds of software applications to help hotels and hotel companies manage operations to provide better guest service. However, the hospitality industry continues to find itself targeted for damaging data compromise events by hackers. There are some good ways to decrease the attack of hackers. For example, Remote Access, many hotel operators and franchisors use remote management applications (RMAs).  Their ease of use in managing multiple locations makes them ideally suited to disseminate business downloads, conduct sales polls or survey inventory. RMAs are often packaged from vendors with default or blank passwords. Creating unique user IDs and complex passwords can reduce the risk of data compromise and help facilitate compliance with the Payment Card Industry Data Security Standards (PCI DSS). Another example is about Network Security, transaction volume, brand recognition and the potential for sensitive data retention are all factors that make hotels (particularly franchise networks) juicy targets for hackers seeking to exploit insecure networks via the Internet. The hotel can install and maintain a firewall at all times.  Disabling a firewall can put a business at heightened risk of Internet attacks and potential system compromise.
2More

Keep your rooms secure from door lock hackers - 0 views

shared by Omar Shalaby on 02 Jun 13 - No Cached
  •  
    Following a robbery at a Houston hotel in which thieves exploited security flaws in Onity locks first revealed at the Black Hat conference in July, Hotel Management spoke with Todd Seiders, director of risk management at Petra Risk Solutions and former director of loss prevention at Marriott, for tips on how hoteliers can keep their rooms secure.
  •  
    Though this was posted in January, I can still remember the situation like it was yesterday. Of course news articles tend to reach the public later than the issue arises; however, we try to be on top of our game. We heard rumor of the break-ins happening, so we did our research and actually found videos on You Tube on how to create the hacking device and use a dry erase marker to conceal the microchip. It was ridiculously simple, yet a huge threat to the entire industry. We called Onity immediately and had our locks all updated with the new software and hardware to prevent the issues. It was a ridiculous charge per lock for them to come out and manually fix them all, which wasn't at all in our budget, but definitely worth the security increase. That's where there is a problem. Most hotels didn't predict this kind of an issue, so it wasn't accounted for in their budgets. Some are willing to spend the extra to ensure safety and security, but some would prefer to do the "mail-in" procedure to get the motherboard replaced for free. That being said, most hotels do not carry an entire second set of locks, I would estimate 10-20% of the number of rooms is the number of extra locks on hand at any given time, functional or not. So, this process takes up quite a bit of time in doing it in the "mail-in" way, as it would take a minimum of 6 shipments to get all locks replaced. That is beyond time consuming and way too long to wait for this important of a matter. I hope all hotels are done with this by now, but still something for everyone to keep in mind while travelling. Always use your deadbolts and privacy locks, never leave your valuables in plain sight, use the in-room safe or safety deposit boxes where available, and use your instincts. Even as a guest, you can still follow the 5 foot rule and greet everyone you see, not only to be nice or courteous, but also to try and weed out the potential thieves!
2More

Hotel Wifi Hacking is on the Rise - 0 views

  •  
    Hotel wifi connection can be an easy access for identity thieves to stole personal information. Several surveys have show that there are many potential risks to get attacks through hotel internet.  WiFi Hacking Crimes Are Easy to Commit The security of hotel witless networks is a big issue and can be easily attempted by hackers. People may illegally use the internet access by staying in the nearby area of a hotel. Fake access point can also cause consumers in the hotel to lose their personal information such as credit card, banking or other confidential information.  The article also offers some solutions to avoid hackers. 
  •  
    Reading your article brings us back to some topics that we covered in this weeks reading. The security of hotels is important in that industry, especially when guest give out important information. Like you mentioned for example, credit cards and other confidential information that hotels need and use to process the guests into the systems. It is important that hotels protect their guests by affirming that all systems they use are well protected.
4More

E-mail based tax scam targets military members - 0 views

  • The Internal Revenue Service is warning taxpayers to be on the lookout for a new, email-based phishing scam that targets Department of Defense military members, retirees and civilian employees.
  • The e-mail appears to come from Defense Finance and Accounting Services and displays a .mil e-mail address.
  • “The IRS does not send unsolicited e-mail to taxpayers and never asks for personal and financial information such as PIN numbers, passwords or similar secret information for financial accounts,
  •  
    There is a new email phishing scam that is currently targeting military members, retirees and civilian employees.  The emails are asking the targeted audience to send copies of their IRS documents and various VA award letters so they can receive additional benefits.  However, this is a scam that identity thieves are using to seal the identity of these individuals and possibly clean out their financials and ruin their credit.  People are being warned and noted that the IRS will never ask for personal information in an email.   
6More

Todd Seiders, NFC locks, Kaba Lodging, RFID locks, VingCard Elsafe | Hotel Management - 0 views

  • The newer locks don’t have the encryption code in each one; the code is issued at the front desk.”
  • These mechanical caps and security screws block physical access to the lock ports that hackers use to illegally break into hotel rooms. The mechanical solution remains free of charge to customers. Technical solutions vary depending on the age, model and deployment of locks at properties.” 
  • NFC-compatible door locks can streamline the check-in process by allowing guests to skip the front desk and use their smartphone as a room key, but standardizing the credential delivery between the phone and the lock remains a challenge, said Giovanni Iacovino, VP development of mobile solutions at Kaba Lodging.
  • ...1 more annotation...
  • They use very high-level security and encryption protocols to employ the delivery.”
  •  
    Following a robbery at a Houston hotel in which thieves exploited security flaws in Onity locks first revealed at the Black Hat conference in July, Hotel Management spoke with Todd Seiders, director of risk management at Petra Risk Solutions and former director of loss prevention at Marriott, for tips on how hoteliers can keep their rooms secure. An NFC-compatible lock, such as this Signature RFID by VingCard lock, can streamline the check-in process.
  •  
    Some of the major concern hotel such as Houston hotel are facing is robbery. A lot of the older locks in the hotel are so old that it may be easy to rob precious items from the guest rooms. NFC has a new lock where the newer lock does not have an encryption code, instead the guest will get a new code from the front desk. The new lock ensure that hackers can not easily hack into a guest rooms. In addition, the new NFC-compatible locks help guests skip the check in process at the front desk and instead use their mobile phone to open their guest room doors and check themselves into the hotel.
6More

Guest Room Tech Tops Investment Priorities as Locking Hack Makes Headlines | Columns | ... - 4 views

  • Pressure to provide ample bandwidth is on, with high guest expectations for connectivity. But at the moment, it’s room locking technology that’s in the hot seat.
  • Hotel guest room technology — and door locks in particular — received national attention in recent months when Forbes broke the news about a potential room lock security flaw found in Onity locks by a 24-year old software developer and security researcher. In a highly-contested decision (criticized as poor judgment by some and applauded as necessary full disclosure by others), the researcher released specific details of how to perform the lock hack. Since then a handful of hotels have alleged that the method was used by thieves in a series of guest room break-ins.
  • While the threat is limited to one manufacturer’s locking technology, it still could impact as many as 4 million hotel rooms.
  • ...2 more annotations...
  • Hotels, meanwhile, are putting a priority on upgrading locking technology.
  • But regardless of who is to blame, it’s the guest whose safety is compromised and the hotel whose name will be tarnished — much in the same way a payment security breach impacts consumers and merchants.
  •  
    Technology projects will be the biggest investments among hotel executives in 2013. This article focuses on the recent attention room locking technology has received and the priority hotels have placed on upgrading their locking technology. Although the security flaw is limited to one manufacturer, the impact will be felt among the entire industry. Guest safety must always be the top priority among hotel managers and staff. A guest room break in can ruin a hotels reputation in their respective community. Regardless of how the situation occurred a common perception is that the hotel was somehow at fault and guest safety is not a priority. As an industry we must always strive to create a safe environment for our guests. Upgrading our hotel locks, training staff proper safety procedures when entering and exiting guest rooms and proper check in procedures are what our guests demand of us to ensure their continued safety.
1More

Guest Room Tech Tops Investment Priorities as Locking Hack Makes Headlines - 0 views

  •  
    It's crowded at the top of the to-do list. We've just published the 2013 Lodging Technology Study, where hotel executives reveal which technology projects are top priorities for the year ahead. Their biggest investment (20% of their overall IT budgets) will be in guest room technology, focusing first on Wi-Fi access and bandwidth, and soon thereafter on upgrading door locks. Pressure to provide ample bandwidth is on, with high guest expectations for connectivity. But at the moment, it's room locking technology that's in the hot seat. Hotel guest room technology - and door locks in particular - received national attention in recent months when Forbes broke the news about a potential room lock security flaw found in Onity locks by a 24-year old software developer and security researcher. In a highly-contested decision (criticized as poor judgment by some and applauded as necessary full disclosure by others), the researcher released specific details of how to perform the lock hack. Since then a handful of hotels have alleged that the method was used by thieves in a series of guest room break-ins. While the threat is limited to one manufacturer's locking technology, it still could impact as many as 4 million hotel rooms. Onity responded with a fix, but is charging hoteliers for replacement technology, also a decision under criticism. Hotels, meanwhile, are putting a priority on upgrading locking technology. According to our survey, which was conducted at about the same time that the news broke about the potential lock flaw, more than one-third of hoteliers (35% overall) are planning to upgrade their hotel locks. About 20% will do so by the end of 2013, and another 15% will upgrade sometime thereafter. Right now, there are plenty of fingers being pointed with regard to ownership, if the hack method becomes a repeated source of break-ins. But regardless of who is to blame, it's the guest whose safety is compromised and the hotel whose name will
11More

Transforming Business with Mobile Payments - 12 views

  • Mobile systems are transforming the payment environment. According to investment bank Barclays Capital, U.S. mobile commerce sales--that is, purchases made on smartphones and tablets--hit $5.3 billion in 2011, up 83 percent from the year before. Generator Research, a consulting firm specializing in digital media, projects that by 2014, usage by consumers will grow 600 percent to 490 million worldwide.
    • Joe Cilli
       
      Interesting information. Keep in mind there is a high level of cannibalization in that mobile sales are increasing, but the bottom line is unchanged because in-store sales are decreasing. In short, the amount of transactions and dollar amount is roughly the same; it is, however, important to recognize the shift in consumer purchasing patterns.
  •  
    Great article on the rise of mobile payment systems and how businesses who in the past may have been cash only or otherwise are seeing increased sales as the ability to take credit card payments with little hardware and software infrastructure costs. Down the street from me is probably my favorite Rib joint in town, Uncle Rodney's House of Ribs is the name. I love that place, but rarely go because they are a cash only business due in large part to the fact that the owner does not wish to pay for wireless or otherwise internet related services to make his business able to accept credit cards. What are everyone's thought to the increased use of mobile payment systems for restaurants and other businesses?
  • ...6 more comments...
  •  
    I think mobile payment systems are great. I personally have not used them very much but I think they would be very handy at events. I am a Timberwolves season ticket holder and my seats are close to the court where a serving staff is able to get food and beverages for you. Fans are able to pay with credit cards but the server has to take your card to the back area to ring everything up. If the servers were able to carry mobile credit card readers they would be able to speed up transactions and take more orders. It would be a benefit to everyone - the team would be able to sell more items, the servers would make more tips, and the fans would be more satisfied. If someone wanted to keep an open tab until the end of the game I'm sure there could be an app for adding items to a specific seat location instead of doing multiple credit card transactions. I'm sure mobile payment devices are being used by staff at many events and I'm a little surprised it hasn't made it's way into the Target Center yet.
  •  
    That is an interesting artivle talking about the mobile payment that i have not seen in my life. If i was a owner of a store or a restaurant, i would like to try this technology that help to save my money and increase my businesses. On the other hand, as a customer who is asked to pay in this way, i would worry about the security problem because i dont know how it works.
  •  
    It sounds great. I think it is convenience, cause I can pay by my phone whenever I need. But maybe the biggest problem is the security. How to guarantee it, we always use mobile connect ing internet which increase the danger coefficient.
  •  
    I like this idea of mobile payments. It saves business people time and money which they were supposed to spend on the traditional way of credit card payment. It turns out more likely to be a self-monitored business transaction way. However, before signing the contract, the business owner should consider the security level of this payment method from the customers's standpoint. I'm pretty sure that some customers may feel weird and unsecured when they swipe their card on a mobile device.
  •  
    This is a fascinating article. On one hand I can absolutely see the benefits for a mobile business or a business that increases it's sales by accepting mobile payments. It also seems that security would be increased for the merchant as there is not much cash available on hand for petty thieves. The crooks of the future will need to be technologically sophisticated. The increased use of smart phones has greatly increased my small business as many of my customers make their purchases through their smart phones. My personal concern is that our country will see an increase in debt and over spending as purchasing with your credit card account becomes even easier. Will it even be possible to pay with cash in the future or will it all be electronic? Also, what happens if your cell phone is stolen and all of your financial world is on there. Do these scanning systems have much security if there is not a credit card to verify a signature against? Is everything stored in cyber space where the phone thief cannot reach it without expensive technical knowledge?
  •  
    While a few hundred years ago a life of an average person in a small town could consist of two or three events as a war in his country, governor's marriage and a crime in the neighborhood. In today's world the same as centuries ago every moment is full of things which happen somewhere but now we have a unique opportunity to know about them almost few seconds after they happen. Technology can make a huge difference in a small business when an employer finds a right time to use innovation, as Miki Nishihata and Joey Garza did. Their companies got an advantages of using card readers. Mobile systems are transforming the environment of sales and payment processing. A thing which simplifies the prosess of transaction is a benefit because a lot of consumers prefer FAST and EASY shopping when every minute may cost. Assuming all this information a Square company was created by Twitter co-founder Jack Dorsey and glass artisan Jim McKelvey. Nowadays almost everybody has a mobile phone and credit card and combining those two things with an innovative technologies of online sales is a fantastic invention!
  •  
    This is an interesting article, and it is quite amazing to see how the way of payment is drastically shifting with new technological devices such as smartphones, card readers. Just a couple of years ago, if I wanted to buy something online, I had to start my computer then go on whatever website I bought something from which took some time. Now, however, I don't even have to turn on my computer to purchase something on the web because I can buy many things through my smartphone whenever and wherever I want. It is a lot easier and faster than what it used to be.
  •  
    Spasibo bolshoe za interesting article! Ona mne ochen pomozhet v moem research!
14More

Will the Hospitality Industry Tango with Tingo? « HeBS Internet Marketing Blog - 0 views

  • Will the Hospitality Industry Tango with Tingo?
  • I truly expected that after its “liberation” from Expedia, TripAdvisor would try everything possible to repair its strained relations with the industry
  • It further proclaimed that “In 2011 alone, Americans could have saved nearly $314 million if they had had access to a site like Tingo.com
  • ...10 more annotations...
  • It makes the industry look like a bunch of corporate thieves who are cheating and overcharging the traveling public to the tune of hundreds of millions of dollars.
  • which I argued that after its “divorce” from Expedia, TripAdvisor still remained a foe of the industry and that TripAdvisor had to make a clear choice:
  • argued that TripAdvisor needed to overhaul its business model and make the site industry- and advertiser-friendly.
  • This new OTA site is an affiliate of Expedia.com
  • None of the above happened and TripAdvisor has continued conducting business as usual
  • Tingo.com has no unique content, pricing or inventory of its own.
  • refunds when and if a lower hotel rate becomes available – is based on factors that are at the mercy of the other OTAs and the travel marketplace as a whole. Expedia could replicate Tingo’s offering within five minutes or less. Orbitz already offers and widely publicizes similar automatic refunds.
  • Tingo.com’s main selling point – that it will refund the difference to customers if the price of the room they have booked drops after booking – is practically mute and irrelevant.
  • Sooner or later, to counteract decreased merchant commissions and the growth of travel demand as the economy improves, OTAs will be forced to re-institute booking fees that were dropped back in 2009.
  • Analysis of this business model clearly shows how confused and misguided TripAdvisor is as a company:
  •  
    This article is a series of several blog contributions for successful emarketing on Hotels magazine's website. "Will the Hospitality Industry Tango with Tingo" discusses the introduction of Tingo.com, a new Online Travel Agent (OTA) website affiliated with Expedia.com that guarantees its' customers to refund the difference if the price booked for the room drops after booking. This sounds great right? While of great value to customers, especially those who are money conscious, the article explains that Tingo.com is another industry basher that ultimately makes hotels appear to be ripping their customers off. This type of marketing tool should be two fold- both industry and advertiser friendly and an OTA website such as Tingo.com will potentially strain its relationship with business in the hospitality industry sooner than later. Tripadvisor is pointed out as an example of a major hospitality industry resource that has damaged its reputation with hotels and is continuing to do so. An analysis of Tingo.com is presented including the evaluation of several factors Tingo.com does not consider under its business model. The article deems both Tripadvisor and Tingo.com as "confused and misguided." In conclusion, this article presents valid points that I have never considered prior to reading about the challenges and perception some hospitality industry leaders have. From the customer perspective, both Tripadvisor and Tingo are highly favored for obvious reasons but not consistently for hotels and restaurants.
12More

How Employee Time Tracking Software Transforms Hotel Management - 0 views

  • The quality of staff management affects every aspect of the guest experience.
  • Since the cost of labor is a significant expense, optimizing human capital is paramount. Time tracking software is the answer for streamlining employee hospitality timekeeping and scheduling.
  • Employee scheduling requires: Forecasting occupancy Matching staffing demands to expected occupancy Creating shift schedules Adapting schedules to changes Accommodating employee availability and preferences
  • ...8 more annotations...
  • The solution for efficient and cost-effective employee management is advanced time and attendance software. Let’s discuss some of the benefits.
  • Cloud-based time and attendance eliminates hardware compatibility issues. This was a shortcoming of older enterprise systems. With cloud computing, all players can access work information from any internet-enabled device.
  • With an online shift trade board, the manager posts open shifts when an employee calls in sick before the shift begins. If the employee fails to call and just doesn’t show up, the system signals that a worker neglected to clock in. The system sends alerts to all available workers. The current schedule feeds information to the trade board. The system knows which workers are already working and, therefore, unavailable.
  • he manager approves the trade which triggers a confirmation alert to the applicable employee.
  • Time and attendance software remembers everyone’s availability and schedule requests.
  • Any business is susceptible to time theft. Since many hotel employees are unsupervised, the hospitality industry is especially vulnerable.
  • US employers pay millions a year in unnecessary wages due to time theft. A biometric time clock paired with a time tracking system allows managers to apply schedule lockouts and break rules.
  • Time tracking software handles the complex logistics of multiple employee types and pay rates. These include overtime calculations, accruals tracking, break tracking, and absence management.
  •  
    With technology constantly updating and hotels getting larger and obtaining more employees, it is important to have a system that is keeping up with the times, and makes bosses work a little easier and more efficient. With the time tracking software it does all of that. The software allows managers to have available employees cover shifts, it ensures there will be no time theft, it keeps track of overtime, pay rates, absences and more. The system is cost effective because it does not hold up the employer in the office all day, and with the watches out for the time thieves. This system does everything a manual tracker can do and more. It is extremely efficient.
13More

Hotel Security: How to Protect Your Hotel and Your Guests from a Data Breach - By Kevin... - 0 views

  • Information thieves are increasingly targeting hotels due to the large amount of personal information collected from guests.
  • hospitality industry accounts for 87% of point of sale breaches
  • Failure to take precautionary measures can ultimately affect your hotel’s bottom line, and lead guests to feel unsafe and not wanting to return.
  • ...9 more annotations...
  • surprising 74% of hotels do not have proper protection measures in place
  • Destroy information you no longer needed.
  • Provide on-going staff training
  • Continuously update crisis plans
  • Implement a mobile security policy.
  • A Ponemon report shows that 63% of organizations have had a data breach as a result of employees using their mobile devices to access the company’s sensitive and confidential information.
  • Create a document destruction schedule.
  • Despite the fact that 86% of companies have document destruction procedures in place, only 40% of businesses have a system followed by employees.
  • With technology changing hotel operating systems, it is important for the hotel industry to re-visit information security procedure and continuously educate themselves on data security protocols.
  •  
    This article talks about the increasing cyber threats in hotels and its consequences for the guests. The hotel guests are paying more attention to how their data is being stored, pushing hotels to make some much needed changes in their data security plan. Despite these pressures, many hotels do not have any proper protection measures. "The Hospitality Technology's 2017 Lodging technology Study showed that a surprising 74% of hotels do not have proper protection measures in place". Steps to prevent such breaches and avoid millions of dollars in loss and reputation damages are mentioned in this article. Some practical ways highlighted in this article are: Provide on-going staff training, implement mobile security plan etc.
10More

Cloud Computing Is Crucial To The Future Of Our Societies -- Here's Why - 0 views

  • Cloud will provide the digital infrastructure of tomorrow’s cities, where an estimated 6 billion of the world’s population will live by 2045. Smart elevators and parking lots, driverless cars and drone taxis, trains and subways, farms and power plants -- all will be safer and better managed, thanks to the cloud’s ability to store and analyze data.
  • The cloud will also be transformative for companies, especially small and mid-sized businesses, as data analytics, artificial intelligence and other capabilities become available as services.
  • A utilities cloud will automatically repair faults in the power grid to ensure that homes and businesses get the electricity they need.
  • ...6 more annotations...
  • A commercial aviation cloud will help airlines manage ground operations such as maintenance, fueling, baggage handling, and cabin cleaning, thereby increasing efficiency and helping flights take off on time.
  • A banking cloud will let financial institutions scan thousands of transactions per second to prevent fraud.
  • The cloud will also help society cope with growing volumes of data. This includes applications like high-definition video, which Huawei estimates will account for 89% of individual user traffic by 2025.
  • The cloud will support emerging technologies such as artificial intelligence and help them to adapt to new platforms such as mobile. When smartphone sales overtook sales of PCs in 2011, mobile became the world’s largest computing platform. Naturally, AI has made its way into phones.
  • Because inference needs to process data in real time, all the time, even tomorrow’s super-advanced smartphones won’t be able to meet the computing demands imposed by AI. They’ll have to rely on the processing power of the cloud.
  • In particular, video will feature prominently in tomorrow’s vehicles, providing in-car entertainment, enhancing road safety by allowing drivers to “see through” other vehicles, and making cars more secure. To thwart burglars, vandals and car thieves, many cars now have multiple security cameras. Video footage can be stored on a secure digital card inside the car or beamed up to the cloud.
  •  
    The cloud will provide the digital infrastructure for the cities of tomorrow, where an estimated 6 billion of the world's population will live by 2045. A commercial aviation cloud will help airlines. A utilities cloud will automatically repair faults in the power grid to ensure a smooth supply of power to homes and businesses. A banking cloud will scan thousands of transactions per second to prevent fraud. The cloud will help society cope with growing volumes of data. High definition video will account for 89% of individual user traffic by 2025, of which image and video content will be for non-entertainment purposes. The cloud will support the emerging artificial intelligence technologies which will be adapted to mobile use, notably the cell phones which overlook PC sales in 2011. Although driverless cars are still a ways off, it will be realized soon, thanks to the power of the cloud.
10More

Why Cybersecurity in the Hotel Industry Should be a Joint Effort - 3 views

  • The global hospitality industry now sits in the top three of industries most frequently targeted by hackers, according to the 2015 Trustwave Global Security Report.
  • Thieves have seized the opportunity to capitalize on the wealth of data that passes through varying weak spots in hospitality networks, and they're now looking for more than just credit card data. Hotels hold contact details, travel plans, air miles, birth dates, passport data and personal preferences on millions of guests - all of which can be used by criminals in a multitude of ways, ranging from fraud to extortion.
  • According to the aforementioned report, 65 percent of the hospitality industry's security breaches were via point-of-sale (POS) systems, with weak remote access security contributing to 44 percent of those compromises.
  • ...6 more annotations...
  • But a number of breaches also affecting the industry targeted booking partners - companies that facilitate reservations on behalf of the hotel brands for services such as air travel, car rental and room bookings.
  • Regardless of where the initial breach occurs, one thing is certain: if customers can't rely on a brand's booking system, they will simply go elsewhere. Statistics show that nearly one in five shoppers have dropped out of an online travel booking because of security concerns around payment.
  • Understanding where critical data lives within your enterprise and how it moves, both internally and outside of the organization, is paramount.
  • POS attackers often take advantage of vulnerabilities, from configuration errors like easy-to-guess passwords to underlying flaws in the system itself, to access payment terminals and plant malware.
  • it is critical that hotel chains - and their partners - have experts regularly conduct deep-dive penetration to sniff out potential vulnerabilities before criminals can take advantage of them.
  • To mitigate the potential damage caused by unidentified malware, hoteliers and their partners should implement intrusion detection, security management and threat intelligence services, as well as scan inbound and outbound communication to flag data-stealing malware in real time and prevent information from leaving the door
  •  
    This article tells us about the fact, that now days the global hospitality industry is one of the industries which is most frequently targeted by hackers. In order to avoid any attacks there must be tighter control across a hotel and its network of partners. So the main 3 aspects which will help to avoid attacks are: -assess risks everywhere -protect the POS system -find malware and keep data protected
15More

Hotel Security: How to Optimise It | By Lillian Connors - Hospitality Net - 0 views

  • Invest in surveillance software It's not easy operating in the dark, so the first thing you want to do is to obtain a pair of eyes that will allow you to monitor the activity in your hotel, and catch any illegal activity should it occur.
  • This will not only help your guests feel safer, but it will also discourage anyone who's up to no good to proceed with their plan. Likewise, it will give you a clear overview and allow you to keep a tight ship the guests will want to board.
  • Hold regular security meetings Security meetings should be the staple of your customer safety efforts.
  • ...10 more annotations...
  • you want to use these meetings to familiarize yourself with any potential weak points you might have in your security system, and improve where needed. You will also get the opportunity to strategize your next move should a situation arise.
  • Upgrade the locks One of the most important aspects of hotel security is lock quality, durability, and upkeep. The hotel room lock is the last line of defence against assailants and thieves.
  • Improve constantly Trial and error breed success, but only if you work hard to improve on your past mistakes.
  • Likewise, make sure you keep a reliable 24-hour locksmith on speed dial to address any problems as soon as they arise. From lock malfunctions to replacements and upgrades, and even fixing the locks after a break-in, having a locksmith who can come at a moment's notice is imperative.
  • So make sure you always think of new ways you can improve your customer's safety.
  • Meet your customers One of the most effective ways to keep a close eye on what's going around in your hotel is to meet your guests.
  • This is not only a chance for you to check out the type of people staying at your hotel, but it's also a chance to ask them if there is anything you can do to improve their overall experience.
  • Prevent cyber attacks Nowadays, cyber-attacks are becoming more frequent than ever, and you want to ensure your guests' data is protected from malicious activity. To this end, you want to form an IT department that will work on improving the hotels cyber security, and be on call to help your guests with any IT related issues. This will help you provide a better service, and increase your brand's reputation.
  • Do background checks of your staff Finally, you need a reliable staff by your side to make all of the aforementioned tactics work.
  • This way, you will be able to prevent any criminals from infiltrating your business and elevate the overall security of your hotel.
  •  
    No matter how much hotels invest in security, there are still vulnerable areas where hotels should improve to prevent thefts, break-ins, fraud, hacking, and numerous other crimes from happening. In this article, the author has introduced certain ways to optimize hotel security, including increasing the invests in surveillance software, holding regular security meetings, upgrading the locks, meeting your customers, paying attention to cyber-attacks, and carrying on background checks of staff.
  •  
    This article is about hotel security and different ways to optimise it to meet your needs. Some of the topics discussed were the integration of surveillance software, the importance of regularly scheduled security meetings, lock upgrades, and customer interaction. The article touches upon each of the topics mentioned and explains how the integration of all of these practices helps create a safer and more cohesive security system. I liked how it focuses on the need to interact with customers as they are the ones you are protecting the most. I think that interaction really makes a difference.
1 - 20 of 26 Next ›
Showing 20 items per page