Skip to main content

Home/ Hospitality Technology/ Group items tagged victim

Rss Feed Group items tagged

teresastas

Executive Recycling Company And Executives Sentenced For Fraud And International Enviro... - 1 views

  • xecutive Recycling, Inc. (a corporation) and Brandon Richter, age38, of Highlands Ranch, Colorado, the owner and chief executive officer of Executive Recycling, were sentenced today by U.S. District Court Judge William J. Martinez for their roles in a fraudulent scheme related to the disposal and exportation of electronic waste to foreign countries,
    • cingram21
       
      This article discusses the penalties the CEO and COO of Executive Recycling received for violating the laws that were exposed on 60 minutes
    • teresastas
       
      Thanks for posting this...I was interested to see how this all turned out! Looks like it didn't turn out well for them!
  • Executive Recycling appeared as the exporter of record in over 300 exports from the United States between 2005 and 2008. Approximately 160 of these exported cargo containers contained a total of more than 100,000 CRTs.
  • significant portion of electronic waste collected by the defendants were Cathode Ray Tubes (CRTs). CRTs are the glass video display component of an electronic device, usually a computer or television monitor, and are known to contain lead. The defendants engaged in the practice of exporting electronic waste, including CRTs, from the United States to foreign countries, including the People’s Republic of China.
  • ...2 more annotations...
  • The defendants’ misrepresentation induced customers to enter into contracts or agreements with the defendants for electronic waste disposal. Each victim paid the defendants to recycle their electronic waste in accordance with the representations made by the defendants. Contrary to their representations, the defendants sold the electronic waste they received from customers to brokers for export overseas to the People’s Republic of China and other countries.
  • The defendants claimed to safely recycle e-waste in the U.S., but regularly exported obsolete and discarded electronic equipment with toxic materials to third-world countries,” said Jeff Martinez, Special Agent in Charge of EPA’s criminal enforcement office in Colorado. 
ldevaul

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
carine_elie

How Much Should You Spend on Cybersecurity in 2022? by Lynn Goodendorf Spring 2022 - 0 views

  • Many hospitality companies are struggling with the question of how much to spend on cybersecurity especially in the context of revenue losses related to the pandemic.  The challenge is that the risk of cyberattacks is rapidly escalating.  There are several drivers of this alarming trend.  First, ransomware is growing in severity both in the scope and the scale of attacks as well as the amount of the ransom demand. Next is the increase in remote work during the global pandemic and the rush to facilitate at home working. And finally, small companies are increasingly targeted because they are “easy” victims and typically more vulnerable. As you might expect, the cost of cybercrime increased more than 50% from 2019 through 2020. According to a report by McAfee¹, the global cost is estimated to be more than $1 trillion and monetary losses are estimated at $945 billion.  Examples of hidden or intangible costs that are difficult to measure include system downtime, reduced efficiency, brand damage and loss of trust.  Expenses that are direct and easier to measure are consultant services, legal fees and cyber risk insurance premiums. Below is a chart published in the McAfee report that illustrates this trend.
  • Ransomware - a Denial of Service/Operations and often includes a data breach Business Email Compromise (BEC) - often involves Funds Transfer Fraud Computer Data Breach - theft of personal data such as cardholder data, social security numbers, driver’s license numbers, passport numbers and details, etc.   What is the best way to go about budgeting for cyber security risk?  As a starting point, be sure that you have a qualified information security professional managing your program of work. Regardless of the amount you spend, a knowledgeable and experienced cybersecurity professional can make well informed judgments about priorities in expenditures.   There are three well established strategies that can work together in combination.   Each strategy has advantages and drawbacks and it is not recommended to rely on a single approach. Below is a description of each way to go forward.
  • STRATEGY A:  Key Ratios of Spend
  • ...2 more annotations...
  • STRATEGY B:  Gap assessment
  • STRATEGY C:  Focus on Compliance
  •  
    The writer of this article is Hospitality Upgrade. It includes the expanding worries of the hotel sector.  The key ratio of spend, gap analysis, and a focus on compliance are the top three main strategies being used by the hotel sector. In addition, the other measures are made by businesses to aid in preventing such breaches and the financial repercussions that result from them.
artandmer

Is a lost hotel card key a financial risk? We found out - 0 views

  • USA TODAY took a stack of used hotel key cards to the Black Hat computer security conference in Las Vegas recently and had an expert see what exactly they contained.
  • “You’ve got nothing to worry about. There’s nothing on here at all except the room number and a date field,
  • the presentation the detective had seen actually featured a blank hotel card key which had been used by cybercriminals to store stolen information about a victim and was in no way connected to a hotel.
  • ...2 more annotations...
  • The credit card-sized plastic keys used by most hotels today contain at most four pieces of information — which room the key is for, when the key can begin opening the door, when it should stop working, and, sometimes, a guest number.
  • hotel key cards are a great example of what the computer security world calls “least privilege,” the concept that to maintain security a system should have only enough privilege to access the information it needs to get its work done and no more
  •  
    At some point, we've all probably heard that hotel keycards store guests' personal information and that puts our privacy at risk and perhaps even exposes us to credit card fraud. This is pure myth. Hotels encode the least amount of information possible (a term called least privilege) on a keycard, limiting it to room #, arrival and departure date. The only way anyone's personal information could get onto a keycard is for someone to reuse a hotel keycard to program it as a credit card, and that information would not be obtained from a hotel PMS system.
sosor012

Ransomware attack on chip supplier causes delays for semiconductor groups | Financial T... - 0 views

  • Disruption from a ransomware attack on a little-known supplier to the world’s largest semiconductor equipment manufacturers will continue into March, in a new setback to chip production after years of coronavirus-related delays.
  • first identified on February 3,
  • MKS’s customers include many of the largest companies that produce semiconductors and the specialised equipment necessary to manufacture them, including TSMC, Intel, Samsung and ASML.
  • ...8 more annotations...
  • The company had revealed on Monday that it could still take “weeks” more to restore operations and would cost hundreds of millions of dollars in lost or delayed sales. Most ransomware victims are able to recover in about three weeks, according to industry estimates.
  • The attack affected “production-related systems
  • , the company has now told the US stock market regulator that it is unable to file its annual report on time
  • the final impact on quarterly sales could total as much as $500mn — more than half what Wall Street had previously predicted
  • The semiconductor supply chain, which in many places relies on components made by only one provider, has faced repeated shortages over the past two to three years due to production and logistics delays.
  • However, demand for smartphones and other consumer electronics has waned in recent months as coronavirus lockdowns eased and consumer spending has been squeezed by inflation.
  • , it is unclear if MKS will be encouraged by US law enforcement to resolve the issue by paying a ransom.
  • Shares in MKS fell by about 15 per cent between February 3,
  •  
    The article "Ransomware attack on chip supplier causes delays for semiconductor groups," discusses the affects on a company due to a cyberattack that occurred February 3rd. The company is believed to have setbacks into March and that it would cost hundreds of millions of dollars in lost or delayed sales. The company also believes they will be unable to file its annual report on time and possibly have to resolve the issue by paying a ransom. This also cost a 15% decrease of shares for the Company.
amoon008

Tackling Security Threats In The Hospitality Industry | MetaCompliance - 0 views

  • The hospitality industry faces vast security threats, making it a natural target for cybercriminals because of the value and volume of personally identifiable information that these organisations hold.
  • Marriott, Radisson Hotel Group, InterContinental, Four Seasons, and Hilton Hotels are just some of the major corporations that have hit the headlines in recent years as a result of a data security attack.
  • approximately 55 million online hotel bookings are affected by fraudulent websites and call centers posing as hotel websites, according to the American Hotel and Lodging Association.
  • ...7 more annotations...
  • The majority of all cyber-attacks can be traced back to a phishing email that tricks the victim into divulging their credentials or downloading malicious malware.
  • A study conducted by Intel found that 97% of security experts fail at identifying phishing emails from genuine emails.
  • many hotels becoming completely digitalised in a bid to gain competitive advantage and keep up with online travel agencies such as Expedia and Hotels.com
  • Worryingly, ransomware is evolving into a new type of threat where cybercriminals are not just encrypting data but are also stealing it and threatening to release it on the internet
  • In recent years, hackers have been deploying new tactics and Distributed Denial of Service (DDoS) attacks have been growing in popularity. This type of attack is an attempt to make an online service unavailable by overwhelming it with huge volumes of traffic from multiple sources to cause great damage. This can include loss of data, loss of revenue, reputational damage, and a loss of customers.
  • According to a survey, almost half (44%) of firms have experienced a significant, business-altering data breach caused by a vendor.
  • With the hotel industry increasingly prone to malicious cyber attacks, there are a number of ways organisations can combat cyber security threats
« First ‹ Previous 41 - 46 of 46
Showing 20 items per page