Skip to main content

Home/ Hospitality Technology/ Group items matching "card" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
rebecca Bonet

Keeping hotel locks safe | Hotel Management - 1 views

  • Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a Card is being misused,”
  • Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • ...18 more annotations...
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate
    • TIANJIAN ZHANG
       
      Nowadays, locks security is an essential issue in hospitality industry. Actually, most hotels upgrate their locks systems with advanced technology. The role of technology in the security sector is fundamental, but despite the rapid technological progress, one thing has remained constant: the importance of trust. Whether hoteliers wising up to the fact that they've bought what could be called a flawed security system will be willing to trust the supplier of said equipment for a fix.
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues. 
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID Card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with Cards that have no anti-cloning capability.”
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • , preventing
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security
  • “  Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software ,” Shea said. “  When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID Card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with Cards that have no anti-cloning capability.”
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a Card is being misused,”
  • For instance, a ‘wandering intruder alert’ warns hotel security personnel when a card is presented to a number of different doors.  Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues.  
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate ,”
  • As with any hotel upgrade, hoteliers understand that renovation and upgrades are a regular part of running their business
  • Looking past RFID solutions for instance, VingCard Elsafe has made our RFID locks compatible with next generation technologies, like Near Field Communications (NFC), providing our customers with an easy upgrade path at reasonable cost.”  
  •  
    This article discusses the security issues with room keys. These hotel locks will not open with cards that are read as duplicates or duplicatable. The locking mechanism has been specifically designed to alert the front desk and secuirty departments in the event these locks are tampered with. I'm sure at one point or another we have all experimented with our room key and tried to open other doors. A system like this will prevent activity like that.
  • ...2 more comments...
  •  
    VingCard Elsafe, the global leader in hospitality security and part of the ASSA ABLOY Group, announces that it has phased out the use of brass metal plating and painting in the manufacture of its locking systems, opting instead to use a more eco-friendly process to color stainless steel. VingCard Elsafe has adopted a new method of metal coloration called physical vapor deposition, or PVD, an environmentally friendly process that involves vaporizing an alloy onto stainless steel within a heated vacuum. PVD requires no chemicals and produces no waste or hazardous materials of any kind, resulting in no environmental impact whatsoever. The PVD process has other added benefits, as well. PVD-treated surfaces have high wear resistance for discoloration, and the stainless steel adds enhanced anti-corrosion properties. Besides eliminating the negative environmental effects of the brass plating process, the move by VingCard Elsafe to simplify its lock manufacturing process has had other related green benefits. By doing away with the need for secondary surface treatments of the locks, new product components are now supplied directly from metal stamping to the point of use in the assembly line. This means less shipping and transportation is required for product manufacture, resulting in a diminished carbon footprint.
  •  
    VingCard Elsafe is a new kind of lock system, which contains RFID technology and is compatible with the Near Field Communications. It has several advantages compared to traditional magstripe locks. First of all, it can add security to the RFID Card and prevent cloning, which is much safer than the traditional key Card. Another is that it can detect tampering and know when and where staffs use the lock. It can send alert to the front desk. Moreover, the front desk can know when the door is forced open. However, before using the lock system, training program should be provided. So this new kind of lock system brings safety to the guests and to the hotels.
  •  
    This article talk about the issue that hotel are having with their security system lock for guest room. These cards are easy to duplicate. The new system will alert front desk or security if the lock has been tampered with. Other alarms include detecting that a door is forced open 'mule tool' instruction when a door is open from the inside handle without an occupant in the room.
  •  
    This article discusses the current state of hotel lock safety. Monitoring safety has changed as these locks become more automated. The article states that, "Hotel Management corresponded with Tim Shea, president of ASSA ABLOY Hospitality, for ways in which vendors are keeping hotel locks secure." Through VingCard Elsafe's locks, hotel security and safety has increased. VingCard says, "Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software." This is just one of the ways the locks increase security. The article also states that the system is cost-effective for hoteliers.
Sungoo Kang

A New Meaning to "Eat and Run"? Restaurants and Mobile Payments | Davis Wright Tremaine LLP - JDSupra - 1 views

  • Many mobile payment systems tailored for restaurants and other food vendors were introduced in 2011. Restaurant-industry insiders say 2012 will be the year of widespread adoption – and possibly a shakeout. A brief overview of the main contenders and considerations follows:
  •  
    This article basically talks about four different types of POSs for restaurants, a brief overview of the main contenders and considerations.  The one of the interesting POS systems in the article is The Rail which is introduced last month, a digital bill folder that enables restaurant customers to self-swipe credit or debit cards at the table without the cards ever leaving their possession, thereby protecting against credit card and identity theft.  The basic Rail system includes POS integration, the BaseStation, a secure wireless system, a set of Rail devices (generally 1 device per every 3 tables), and monthly maintenance. Basic Rail devices incorporate a credit card swiper with encryption, billing touch screen display, bill splitting, tip calculator, signature field, NFC payment capabilities, LED stage lights, and receipt email program. The other POSs in the article are card Case, Tabbedout which are a mobile payment system with smart phone, Square which is mobile card reader, and Chain-Specific Apps which permit the patron to call up menus, locations and nutritional data, as well as to order and pay on-line. Nowadays, many mobile payment systems tailored for restaurants and other food vendors are being introduced. Since they are new and challenges to restaurateur, considering what the pros and cons are and what kinds of POSs best fit to their establishments will be necessary and critical to remain competitive with others.
Marcos Oliveira

America's Most Hi-Tech Hotels - Articles - Executive Travel - 1 views

  • the hottest high-tech hotels feature an intricate network of intelligent systems working to make every aspect of your stay more comfortable, more convenient and more secure—both for you and for the hotel staff
  • Instead of swiping your card through the lock and waiting for the green light, you can simply approach the door with card in hand and walk in, thanks to smart technologies that unlock the door for you as you approach
  • radio-frequency ID (RFID) cards replace the conventional swipe card, allowing various systems throughout the hotel to detect your presence automatically and respond appropriately
  • ...9 more annotations...
  • Hyatt is also experimenting with a version of this approach, building RFID into customer loyalty cards to let regular guests bypass the front desk and head straight for the comfort of their rooms.
  • The technology also allows the hotel to maintain better security by knowing more clearly who’s coming and going throughout the hotel, since each RFID card can be detected by multiple sensors in the lobby, elevators and rooms.
  • Hilton and InterContinental are working with a company called OpenWays to deploy a new key technology that plays a specially encoded sound from your phone. Give your cell phone number to the hotel at the time of booking, and you’ll receive a text message with a special phone number to call. When you arrive at the door of your suite, just call the number and hold the phone up to the door lock. As the garbled noise plays from your phone’s speaker, the lock will “hear” it and open on command.
  • Soon you’ll be able to use your own cell phone as your room key at a number of top hotels
  • OpenWays
  • audio key system
  • One of the most advanced high-tech security technologies, facial recognition, is starting to make its way from the government sector to the hospitality industry
  • 3VR Security
  • From the moment you step into the lobby to the time you check out, high- tech hotels of the future will be tracking your moves, identifying you to hotel staff and opening doors to luxurious amenities. This sophisticated tracking will help ensure your security and may even enhance the guest experience by personalizing your interactions with hotel staff in much the same way that Google and Facebook personalize your web browsing experience by showing you relevant content
  •  
    As hotels make every attempt to come up with new and innovative techniques to conduct business, technology companies are looking for ways to being the first on scene with new technological tools. Many hotels now have instead of swiping ones card through the lock and waiting for the green light to enter, the guest can simply approach the door with a card in their hands and walk right into their rooms. This is possible through radio frequency identification (RFID). RFID are also being used to track customer loyalty to ones brand. RFID Technology also allows the hotel to maintain better security by knowing more clearly who's coming in and going throughout the hotel, since each RFID card be detected by multiple sensors in the lobby, elevators and rooms. There is even the possibility to access ones room by simply utilizing their cell phones and having the phone unlock the door. This is done by simply dialing a phone number and when prompted placing the cell phone next to the door lock. An audio key will play and the door will be unlocked. The audio is unique to each and every reservation.
shuo zhang

Restaurant Chain Secures Business by Securing Payment Data | Case Studies | | Hospitality Magazine (HT) - 0 views

  • all five of its locations were required to be Payment Card Industry Data Security Standard (PCI DSS) compliant
  • According to American Express, Level 2 merchants process anywhere from 250,000 to one million American Express transactions annually. Therefore, it is paramount that retailers protect the data being transmitted.
  • Card accepting merchants are required to comply with these data security standards.
  • ...3 more annotations...
  • PCI DSS is the standard developed jointly by the credit card brands.
  • In a sense, achieving PCI compliance serves customers because they expect that when they pay for their meal, their credit card data will be protected.
  • A key feature in the package is routine vulnerability scans. These scans examine both the internal and external threats that allow access into a network, which can be misused by hackers. Weaknesses in a system can also allow viruses and malware to infiltrate a network compromising customer card data. VendorSafe provided the company with yearly and quarterly scans with the results stored online for easy review.
  •  
    the new standard for credit card cecurity is published fpr the restauran to use. it is a good news for customers, who are consume in the restaurant with the credit card, and can be keep safe and secret about the card using. 
taurus1313

Credit Card Protection and Credit Safety Tips - 0 views

  • You’re probably already practicing basic online and mobile safety, but consider taking these credit card-specific measures as well: Know your merchant. When shopping online, look for sites with “https” in their web addresses (the “s” stands for “secured”) and the green lock icon; make sure the URL includes the correct company’s name, rather than a close-but-not-correct version; and, even on a secured site, share your information only if you know how it will be used. Type for each transaction. Never allow your credit card number to be stored on an online shopping site. Add a layer. Consider using an online payment system or mobile payment service like PayPal, Apple Pay, Samsung Pay or Android Pay to keep your credit card number out of the hands of merchants, so that if a merchant is hacked, it can’t leak your account number. Watch out for public Wi-Fi. Don’t shop or conduct financial transactions, including checking your accounts, using public Wi-Fi. Because it’s a public network, your information can easily be viewed by anyone.
  •  
    "You're probably already practicing basic online and mobile safety, but consider taking these credit card-specific measures as well: Know your merchant. When shopping online, look for sites with "https" in their web addresses (the "s" stands for "secured") and the green lock icon; make sure the URL includes the correct company's name, rather than a close-but-not-correct version; and, even on a secured site, share your information only if you know how it will be used. Type for each transaction. Never allow your credit card number to be stored on an online shopping site. Add a layer. Consider using an online payment system or mobile payment service like PayPal, Apple Pay, Samsung Pay or Android Pay to keep your credit card number out of the hands of merchants, so that if a merchant is hacked, it can't leak your account number. Watch out for public Wi-Fi. Don't shop or conduct financial transactions, including checking your accounts, using public Wi-Fi. Because it's a public network, your information can easily be viewed by anyone."
artandmer

Is a lost hotel card key a financial risk? We found out - 0 views

  • USA TODAY took a stack of used hotel key cards to the Black Hat computer security conference in Las Vegas recently and had an expert see what exactly they contained.
  • “You’ve got nothing to worry about. There’s nothing on here at all except the room number and a date field,
  • the presentation the detective had seen actually featured a blank hotel card key which had been used by cybercriminals to store stolen information about a victim and was in no way connected to a hotel.
  • ...2 more annotations...
  • The credit card-sized plastic keys used by most hotels today contain at most four pieces of information — which room the key is for, when the key can begin opening the door, when it should stop working, and, sometimes, a guest number.
  • hotel key cards are a great example of what the computer security world calls “least privilege,” the concept that to maintain security a system should have only enough privilege to access the information it needs to get its work done and no more
  •  
    At some point, we've all probably heard that hotel keycards store guests' personal information and that puts our privacy at risk and perhaps even exposes us to credit card fraud. This is pure myth. Hotels encode the least amount of information possible (a term called least privilege) on a keycard, limiting it to room #, arrival and departure date. The only way anyone's personal information could get onto a keycard is for someone to reuse a hotel keycard to program it as a credit card, and that information would not be obtained from a hotel PMS system.
yuzhu li

New Point of Sales Technology for Your Business | Family Money Values - 0 views

  • Chip based credit cards.
  • is closely intertwined with NFC and smartphones.
  • New payment services players.
  • ...4 more annotations...
  • field offering lower entry costs to small merchants
  • With the ability to pair small mobile card readers with smartphones, businesses can ensure that their employees can take payment anywhere, anytime, which has tremendous potential for never missing a sale.
  • Enhanced security.
  • the natural evolution of a technology key to day-to-day business transactions, they are also a response to fraud and identity theft
  •  
    For family run business, according to Ms. Bekiroglu, to know its business' better way is to keep up all like payment kiosks, self-check out stations, touchscreen interfaces, etc. and the most important 3 parts are the "chip based credit cards", "new payment services players" and the "enhanced security". Chip based cards is more secure and the data is single used in the transaction, and it can crack down on fraud and identity theft. New payment services players mostly means the apps. From my opinion, the important thing for the whole business world is the security part. One of my friend used the credit card for gas, however, in days, the card had been used over 4 thousands. Finding out the reason is because the leaking information at the gas station. Only the security part has been enhanced, POS systems would be more effective.
Jia Zhu

Starbucks accepting Square payments beginning early November | Digital Trends - 0 views

  • Square will begin processing all of Starbuck’s credit card-based payments and users can make purchases using their phones through a digital Starbucks card. Square’s in-app directory will also offer a list of the nearest Starbucks shops among the 7,000 locations throughout the U.S
  • when you approach a Starbucks location (you must have Starbucks’ iOS app downloaded and have added your Starbucks Card to Passbook), a Passbook notification will appear on the lock screen of your iPhone. You can then select the Starbucks Card and swipe your phone to make the purchase, and even enjoy loyalty rewards on occasion. 
  • Starbucks will later integrate Square’s GPS-based point of sale system, which should make purchases a breeze and speed up the lines especially during coffee rush hours.
  • ...1 more annotation...
  • when Starbucks first launched its mobile payment app, the company has hosted over 70 million transactions, and its partnership with Square has been a mutually beneficial one for both companies.
  •  
    Starbucks invested $25 million to develop movie payment system with partnership with Square. The mobile payment integration with the point of sale solution will be available in November. The point of sale solution mobile app will make customers purchase using their phones through a digital Starbucks card and square will processing all of the Starbuck's credit card - based payments. Meanwhile, Starbucks also revealed its IOS app's integration with Passbook. When you approach a Starbucks location, a Passbook notification will appear on the screen of iPhone and you can then select the starbucks card and swipe your phone to make the purchase. Later Starbucks will integrate Squar's GPS- based point of sale system which should make purchases a breeze and speed up the lines during coffee rush hours. This allow you to select the item with Square app and simply say you name to the cashier to confirm the payment.  An image of your face will present from the profile photo to prevent theft or misuse. Since January 2011 starbucks first mobile payment app has host over 70 million transactions and the partnership with Square has been a mutually beneficial on for both sides. Starbucks will significantly expand Square's scale and accelerate the benefits to business on the platform in the future.
anonymous

Credit Card Security Systems: 3-D Secure™ and SecureCode™ / GSPAY - 0 views

  • Many Ecommerce merchants and credit card holding online consumers are concerned with credit card fraud. CNP transactions and with them credit card fraud cases have become too popular lately.
  • Visa’s 3-D Secure™ and MasterCard’s SecureCode™
  • Visa’s 3-D Secure™, a key component of The Visa Authenticated Payment Program, adds extra security protection to SSL (secure socket layer) secure forms. The 3-D Secure™ system is supposed to decrease the number of chargeback disputes and fraud cases by 80%
  • ...5 more annotations...
  • The benefits or Visa’s 3-D Secure™ are clearly seen: high level of security for consumers, a significantly lower chance of chargeback and credit card fraud, and overall confidence in CNP transactions.
  • As for MasterCard’s SecureCode™ is resembles Visa’s 3-D Secure™. MasterCard credit Card holders register at MasterCard’s SecureCode™ website and asked to provide a personal secure code, which will then be asked for when purchasing online.
  • he benefits for e-Commerce merchants using Visa’ 3-D Secure™ and MasterCard’ SecureCode™ technologies are:
  • The benefits for consumers who make purchases at e-Commerce online stores bearing the 3-D Secure™ or SecureCode™ logos, thus using 3-D Secure™ or SecureCode™ for safe processing are:
  • 3-D Secure™ and SecureCode™ will definitely improve the world of e-Commerce and CNP online shopping.
  •  
    This article is about the concern of customers paying their purchase online, and not through a machine as is the most typical way to do it. But for many this transaction is not safe at all, there could be hackers that can make fraud. This is why two of the most popular CC companies has developed the Visa's 3-D Secure™ and MasterCard's 28SecureCode™ to keep their customers safe, these Cards requires a personal security code for every transactions and other personal information in order to keep the purchase safe and some others requires a monthly fee to obtain this service.
danalbert

How Apple may have ended the retail point-of-sale data breach crisis - GeekWire - 0 views

  • The mag stripe technology in credit cards dates from the 1960s; the POS systems that process them are using technology from the 1990s (at best). By contrast, attackers are using 2010s technology. The POS infrastructure is just outgunned and it’s now its falling.
  • By including Apple Pay capabilities on all new iPhones moving forward, Apple has overnight solved one half of the bootstrapping problem.
  • In a single day, Apple may have changed how we pay for things for good, and helped us bring the retail POS data breach crisis to a close in the long term. And in so doing, they may have also saved all of us from the hassle of “chip and pin.”
  •  
    As iPhone 6s begin shipping to pre-order purchasers tonight, this article is very timely for retailers everywhere. Apple already has the support of the big three credit card companies (Visa, Mastercard, and American Express) covering 83% of all credit cards out there. They also have buy in from a variety of companies including: Disney, Subway, McDonalds, Walgreens and many more. 220,000 stores are already ready to accept contactless payments . The system uses a combination of hardware, software and biometrics to keep the transactions secure. No actual card data ever leaves the phone. All transactions have unique codes and store personnel never get their hands on a card. Apple may have finally broken the code to making shopping easier and more secure.
  •  
    Apple Pay is going to solve so many issues when it comes to security and fraud. By using biometrics it will be nearly impossible for people to use credit cards that are not theirs. Disney is already set up to start using Apple Pay and it will be so interesting to see how guests react to using this method of payment. Although we already use biometrics when guests enter the main entrance of our theme parks at Disney the idea of giving biometric information has not appealed to all of our guests. Biometrics are something many companies will be using in the future as an extra step in security and it will be essential that people adjust to this change.
TIAN LIU

Hotel tech trade association offers best practices for reducing payment card risk - SC Magazine - 0 views

  • "The result allows hotels to complete the process of removing all payment card data from all of their systems, dramatically reducing the cost of PCI (Payment card Industry) compliance," according to the framework's executive summary. "Because hotels have no obligation or reason to tell customers if a breach of useless data occurs, the cost and impact of remediation, and the effect on brand reputation, are minimized."
  • In addition, according to HTNG, guests' credit card numbers typically are shared with a number of third parties during the booking process. As well, many hotels are independently owned and operated, and these franchisees often lack the technical resources to ensure security and compliance.
  •  
    Security is absolutely a big issue for the hospitality, it include a lot of content, not only keeping the guest safe in hotel's room. But also preparing the attached form internet to protect the guests' property. This system is designed to enhance payment card security and compliance across an industry that has been hard hit by hackers. Specifically, the framework provides guidance on implementing tokenization, a technology that substitutes card data with unique identifying symbols.
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
natalieemmanuel

Point-of-sale malware has now infected over 1,000 companies in US | Ars Technica - 0 views

  • According to the US-CERT advisory, the group behind the Backoff malware operation scanned the Internet to find potential victims by detecting installations of the remote-desktop software frequently used by service providers to manage the point-of-sale systems of their retail clients. The attackers look for remote desktop solutions like Microsoft’s Remote Desktop, Apple's Remote Desktop, Chrome Remote Desktop, Splashtop 2, Pulseway, and LogMeIn, according to the advisory. Once a potential target is identified, the group uses the equivalent of a digital sledgehammer, attempting to break into the system using a list of common passwords.
  • Such techniques are a common threat to small retail businesses, according to Trustwave, who helped the government agencies in their analysis of and response to the 'Backoff' program. A third of cybercrime attacks on businesses focused on the point-of-sales systems in 2013, according to the company's 2013 Global Security Report. In 31 percent of incidents, attackers exploited weak passwords to gain access to targeted systems
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
ypere044

Apple Point-of-Sale Upgrade Signals Better Security, NFC Access - 0 views

  • EasyPay mobile point-of-sale (POS) system
  • the company has taken a pre-emptive strike to ensure the security of customer credit card transactions and prepare for the future possibility of contact-less credit card purchases
  • the device accepts chip-and-pin (EMV) cards, which offer the current maximum level of account security.
  • ...1 more annotation...
  • NFC-equipped smartphone might be tapped to exchange information with the EasyPay device.
  •  
    This article introduces the upgrade to the EasyPay mobile POS system used in the US by Apple. The company has improved it's POS system by choosing to use new hardware (the iPhone 5s) and enhancing the hardware with a hard shell, accepting chip-and-pin (EMV) cards as well as a pin pad, and a Near Field Communications (NFC) feature in which smart phones may exchange information with the EasyPay. The article also talks about the future of chip-and-pin cards, Visa and Mastercard may be forced to begin using chip-and-pin cards by October of 2015. There is also talks of Apple including NFC features in their phones making it easier for guests to pay, share pictures and documents. 
apate114

Top 5 risks and security challenges for hotels in 2015 - eHotelier - 0 views

  • 1. Identity theft leading to credit card fraud
  • Identity theft and credit card fraud is the new form of pick pocketing, but on a much larger scale. The number of compromised credit cards is expected to increase this year.
  • 2. Silent invasions
  • ...11 more annotations...
  • 3. Longer or no security audit cycles
  • APTS are considered the most dangerous type of cyber-attack as they simply bypass the defenses that are in place.
  • Cyber-crime shows up on the security radar as the second highest risk the hotel industry is exposed to.
  • The gap between the low number of qualified security auditors worldwide and new hotels built is getting bigger and bigger.
  • Nearly 1.26 million hotels worldwide are dealing with all sorts of safety & security issues.
  • 4. Physical crime will remain an issue for hotels
  • Physical crime ranges from professional burglaries using nifty social engineering techniques to temporary drug laps in hotel rooms.
  • Holdups at night involving firearms have increased since hotels are easily accessible and less protected compared to other industries operating at night.
  • 5. Loss of competitive advantage after a major security incident
  • The recovery costs after a security incident, including the attention of the media, are often much higher than the investment in security and risk management.
  • Reputation is a vital yet fragile advantage that requires its very own security plan in a strong competitive market where guests nowadays love to make their booking decisions with the help of online travel review sites such as Tripadvisor & Co.
  •  
    The article highlights the top five risks and security challenges in the hospitality industry. The following are the top five security risks according to the article. 1. Identity theft leading to credit card fraud - compared to other industries, the hotel industry is at more risk for credit card fraud and identity theft. This is because hotels are highly targeted by hackers. Hotel properties for the most part have credit card information for each and every guest that has stayed at a specific property. Hotels must be ahead of the technology curve when it comes to security however this is not always the case. 2. Silent invasions - This consists of all the cyber attacks that can affect a business by infecting the network. As discussed during the first module, hotels run majority if not all of their business using technology. If a hotel were to have their networks hacked it would leave them in a very bad situation. Since hotels operate their entire business using technology and multiple different systems, they would not be able to operate if they experienced a network breach. 3. Longer or no security audit cycles - Most branded hotels are required by the franchise to have consistent security audits done for each property. Independent hotels are deemed greater at risk for a security attack because they are not mandated to have security audits. These hotels sometimes skip audit cycles to save money. 4. Physical crime - This ranges from professional robberies to drug laps in hotel rooms. Hotels are at risk for armed robbery due to to lower chance of security compared to other industries that operate overnight. 5. Reputation risk - Hotels that experience a security breach almost always will see some sort of loss in competitive advantage. Nowadays with social media and the news travelers are more aware with what is going on and they would be more inclined to book their reservation somewhere else if they heard of the property having a security breach.
marvahb

Technology and Electronics Reviews - USATODAY.com - 0 views

  • Unfortunately, only 44% of retail storefronts have chip card readers enabled on their POS systems,
  • While no system is 100% secure, most can be made much safer than they are. But not all retailers take the necessary steps
  • Consumers can try to protect themselves by looking for retailers that have enabled chip-based credit and debit card use on their POS terminals
  • ...1 more annotation...
  • Even so, there are still lots of these thefts, in which criminals insert malicious software into a company's point-of-sale (POS) system. The malware surreptitiously records credit and debit card information when customers swipe them through payment terminals. It later sends the card information to the thieves, who sell it on the Internet underground, known as the dark web
  •  
    This article is well worth the read. It informs us as to why our credit cards keep getting hacked although our favorite retail stores seems to have secure POS systems. There is actually lots of time and money that needs to be invested in order to have a secure POS. Many of these hacks keep happening because companies wait until it's too late to upgrade to chip reader POS or a higher performance security
Manali Rabari

Has Debit Fee Reform Helped or Hindered Hospitality? | Top Stories | | Hospitality Magazine (HT) - 0 views

  • Since it went into effect in October of 2011, the Durbin Amendment changed the architecture of swipe fees for debit card transactions. Its impact on the hospitality industry is mostly felt by restaurants where debit cards are most commonly used, and its subsequent effect on the supply chain of payment transactions within the industry is difficult to ascertain.
  • “While the Federal Reserve’s rule significantly brought down debit swipe fees for many merchants, some small businesses will pay higher fees on smaller ticket transactions — evidence that the Fed provided card networks like Visa and Mastercard too much latitude to increase rates well above a reasonable and proportional level,” said Scott DeFife, executive vice president of policy and government affairs for the NRA in an earlier statement.
  • “The hospitality industry has not, as yet, presented a unified front on the Durbin Amendment and similar actions,” says business attorney Robert Braun, partner, Jeffer Mangels Butler & Mitchell LLP, (www.jmbm.com) Los Angeles, California. “We also have to consider whether there will be significant federal legislation in an election year, when attention is being drawn elsewhere. We might be looking, however, to the impact of implementing regulation and to legislation adopted by states, which could have an impact on credit card transactions.”
  •  
    This article discusses the unknown impact on the structure of the fees of debit card transactions that is more commonly used in restaurants as a form of payment. The impact of the Durbin Amendment has not made an significant role in whether restaurants or hotels will feel the need to invest in anti-fraud technology. Even though most restaurants are in need of this type of technology. I wonder what the impact this would make on the restaurants if they were to invest in such a technology would it make it easier to track fraudulent charges made, and combat them. What do restaurants do in cases when fraudulent activity has taken place? How do they account for it on their inventory side? On the sales end the transaction will be decline by the vendor of the card but the options left for restaurants are to "eat the cost". How is this handled?
diana morales

A Mobile POS Solution Increases Poolside Food and Drink Sales at the Gaylord Hotels - Yahoo! Finance - 1 views

  • The hotels offered poolside service and with acres of pool area to cover, servers spent a lot of time walking between the pools, bar, and kitchen to enter and check on orders, and process payments.
  • This resulted in long wait times and had a negative impact on sales and customer satisfaction.
  • The servers use the iPod touch in combination with Daily Systems' iAPS sled, which is a unique all-in-one solution with a bar code scanner, credit card reader, smart card reader, and receipt printer.
  • ...1 more annotation...
  • "The cutting-edge mobile POS solution is also a factor in creating the impression that the Gaylord Hotels is a technologically savvy and modern company."
  •  
    Gaylords Hotels has added the POS system for their customers to experience. POS stands for Point Of Sale. Its a small devices that allows an employee to charge the customers credit card right then and there. No cashier, no register. The article elaborates on how the hotel has implemented this systemin their pool area. It discusses how pool attendants spend so much time walking back and forth which eventually makes the order longer. This system allows the employee to charge the credit card and print the receipt right then and there, saving a few trips. This should be implemented in most places saving time and preventing a slick employee to steal someones credit card information
Jenna Rashbaum

Biometrics Provide Undeniable Time & Attendance for Beachside Resorts | Case Studies | Hospitality Magazine (HT) - 0 views

  •  
    The La Jolla Beach and Tennis Club in California has had many problems with time cards for their employees over the past several years. They used to use swipe cards with bar-codes to tell when people were coming in and out of work but there are a lot of problems with that technology. If people misplaced their cards or knew they were going to be late so gave it to a co-worker to punch them in is not a very smart thing to have in the hotel. After a lot of problems with this system management finally went in a new direction. They decided to move to newer technology and go with Biometrics. The hotel now has a hand reader system that makes every employee get there hand measured to clock in. This technology measured length, width, thickness, and surface area of the hand to store in the system so it knows each persons hand every time they go to clock in any time there after. When going to clock in the system asks for the employee number and then is ready for your hand on the little screen for your scan. The entire process of this takes under 1 minute. This technology of the HandPunch 3000 not only allows the employees to clock in but also allows management to collect data for pay codes, tips collected, and to allow the employees to go back and view their past times in and out. This system is a very green way to go in the hotel industry because there is no paper for records of clock in times, and there are no swipe cards that need to be made for clock in times. Ever since this hotel got the HandPunch 3000 they have not had issues of other employees clocking in other people. The system of course had some glitches to it in the beginning but they were fixed immediately while the staff was there installing it. My only question to this article that is not answered is : since it is a machine that has to be plugged in, what happens if the power goes out? Can employees still clock in to work because the hotel still is functioning?
Chris Cardoso

Hotel Telecommunications Strategies - 6 views

  • No matter what telecommunications strategy a property takes, one thing is for certain, it needs to be a different one from the past.
  • The guest now has a variety of choices for communicating including fax over the Internet, e-mail, cell phones, calling cards and now even Internet-based phones. 
  • Assuming that the wireless reception quality is acceptable, it is very difficult for the hotel to compete on a cost basis.
  • ...18 more annotations...
  • Given the hotel’s advantage in quality over the guest’s portable devices, the proper packaging of services will lure even the most avid self-contained guest back to using the hotel’s telecom services.
  • Hotels are unable to compete on price with devices that the guest has brought with him.  What the hotel can do is offer a better experience at a reasonable price to entice guests to use the hotel’s telecom infrastructure.
  • Attracting the Guests to Use the Hotel’s Telecommunication Services
  • The guest now has a variety of choices for communicating including fax over the Internet, e-mail, cell phones, calling cards and now even Internet-based phones.   All these alternatives offer a less expensive means of communicating than using the traditional hotel guestroom phone and other services such as fax.
  • No matter what telecommunications strategy a property takes, one thing is for certain, it needs to be a different one from the past.
  • The guest now has a variety of choices for communicating including fax over the Internet, e-mail, cell phones, calling cards and now even Internet-based phones.   All these alternatives offer a less expensive means of communicating than using the traditional hotel guestroom phone and other services such as fax
  • No matter what telecommunications strategy a property takes, one thing is for certain, it needs to be a different one from the past.
  • Attracting the Guests to Use the Hotel’s Telecommunication Services   Hotels are unable to compete on price with devices that the guest has brought with him.   What the hotel can do is offer a better experience at a reasonable price to entice guests to use the hotel’s telecom infrastructure. No matter what cell phone the guest may carry or what service provider is used, no wireless connection is as good as a land-line connection
  • Guests had little choice back then but to use the guestroom phone and grumble about the cost.
  • Assuming that the wireless reception quality is acceptable, it is very difficult for the hotel to compete on a cost basis .
  • Assuming that the wireless reception quality is acceptable, it is very difficult for the hotel to compete on a cost basis
  • Another concern among hoteliers is what can be termed the self-contained guest
  • Another concern among hoteliers is what can be termed the self-contained guest
  • Theoretically, the self-contained guest needs no hotel telecommunications services .  
  • Theoretically, the self-contained guest needs no hotel telecommunications services
  • Guests had little choice back then but to use the guestroom phone and grumble about the cost.
  • Hotels are unable to compete on price with devices that the guest has brought with him.   What the hotel can do is offer a better experience at a reasonable price to entice guests to use the hotel’s telecom infrastructure. No matter what cell phone the guest may carry or what service provider is used, no wireless connection is as good as a land-line connection
  • The early 1980s marked the beginning of an era of profitable hotel telephone departments.  The advent of call accounting systems (thanks to deregulation) enabled hoteliers to easily mark up calls to a profitable (some say too profitable) level.  Guests had little choice back then but to use the guestroom phone and grumble about the cost. This era has come to an end.  With few exceptions, most hotels have seen between a 15 percent and 25 percent drop in telephone revenues over the last five years.  The main reason for this decrease is guest choice.  The guest now has a variety of choices for communicating including fax over the Internet, e-mail, cell phones, calling cards and now even Internet-based phones.   All these alternatives offer a less expensive means of communicating than using the traditional hotel guestroom phone and other services such as fax . A fax machine in the guestroom was considered a premium amenity for many years.  With the Internet explosion, however, the machines have seen less use.
  •  
    No matter what telecommunications strategy a property takes, one thing is for certain, it needs to be a different one from the past. The early 1980s marked the beginning of an era of profitable hotel telephone departments. The advent of call accounting systems (thanks to deregulation) enabled hoteliers to easily mark up calls to a profitable (some say too profitable) level.
  • ...6 more comments...
  •  
    Nowadays, people have many choices for communicating including fax over the Internet, e-mail, cell phones, calling cards and now even Internet-based phones. Hotel guests are restricted by the largest telecommunications service providers from making long distance collect and credit card calls to countries other than their home country. The guest is not able to complete his desired call from the guest room telephone. In addition to frustrated guests, this generates absolutely zero revenue to hotels. What the hotel can do is offer a better experience at a reasonable price to entice guests to use the hotel's telecom infrastructure. The hotel can use some systems to reach this goal, such as the BBG Communications. It can increase revenue for every international operator assisted call. It assumes all responsibility for billing and collection of all calls. It has over 500 multilingual, live operators servicing customers. The most important thing is there is no cost and risk to the hotel, because the BBG assumes all associated cost and responsibility.
  •  
    This article is talked about hotel telecommunications in the 21st Century. No matter what telecommunications strategy a property takes, one thing is for certain, it needs to be a different one from the past. The early 1980s marked the beginning of an area of profitable hotel telephone department. Few years later, this area has come to an end. The main reason for this decrease is guest choice. Later on, guests have a variety of choices for communicating including fax over the Internet, e-mail, cell-phones, calling cards and even Internet-based phones. All these alternatives offer a less expensive means of communicating than using the traditional hotel guestroom phone. With the time passed by, hotel telecommunications update and improve better and better. Nowadays, High-speed Internet access is fast becoming an expected amenity. This the revolution for hotel telecommunications in the 21st Century.
  •  
    This article that is written by Geoff Grisworld. Talks about how telecommications has changing in the 21st century. One of them being hotel. Hotel takes a big advantage in telecommication because there is always a change in the communication system. That is why hotel have to upgrade their system often. This is why hotelier organizes packaging deal when it comes to communication system from using the phone to HSIA. This is a few system that is always need to be change constantly, so the hotel can offer a better experience at a reasonable price while they are enjoying their stay.
  •  
    This article speaks about the growth and development of telecommunication within the hospitality industry in the 21st century. "No matter what telecommunications strategy a property takes, one thing is for certain, it needs to be a different one from the past," the article states. Since the 80s hotels utilized their telephone department to offer a service for a profit. Because there was little to no competition with communication, this was profitable as guest pretty much had no choice but to use the phone service provided at a set cost by the hotel. Today, however, we see a shift in technology now where everyone has communication at their disposal via smart phones, Internet and other communication tools. With this happening, "it is very difficult for the hotel to compete on a cost basis." (Griswold) It also explains how high-speed Internet access (HSIA) is almost seen as an amenity anticipated by the guest and has worked in the hotels' favor. The article goes on to describe the "self-contained guest" that carries a smart phone, small printer, notebook computer and technology of their own which allows them to virtually have no use in the hotel telecommunications services. So what does this article suggest for concerns as such? Hotels are to attract guests to use their telecommunication services. By offering packaged deals at affordable prices, Griswold believes hotels will be able to be the ideal option for telecommunications services. After viewing this article, I realize how hospitality industry workers think about those they serve all the time and should always display it. Even though the hotel is trying to make money by charging for Internet and phone services, they wish to market the service as the best option for the guest. The Internet connection would be faster provided by the hotel over a smart phone is one feature they wish to advertise. This type of mentality is smart yet should be withheld throughout the industry and always show that the
  •  
    The early 1980s marked the beginning of an era of profitable hotel telephone departments, because guests had little choice back then but to use the guestroom phone and grumble about the cost. Nowadays, guest has a variety of choices for communicating including fax over the Internet, e-mail, cell phones, calling cards and now even Internet-based phones. All these alternatives offer a less expensive means of communicating than using the traditional hotel guestroom phone and other services such as fax. And high-speed Internet access (HSIA) is fast becoming an expected amenity in 21st century. Today hotels are unable to compete on price with devices that the guest has brought with him. What the hotel can do is offer a better experience at a reasonable price to entice guests to use the hotel's telecom infrastructure.
  •  
    This article explains how much are creating incentives for hotel guest in an effort to get them to use the technology that the hotel provides.
  •  
    In modern society hotel need more attrahent thing increase revenue. The traditional way may lose competitiveness, like telephone services. Because almost everybody using personal cell phone and more and more people prefer to use internet to communicate such as email and skype. In my opinion if hotel build some telecommunications use internet such as physical skype phone and provide cheap service that may be attract more people to use that.
  •  
    With the emergence of "self-contained guest," hotel telecommunications departments must change its offerings because old strategies no longer apply. A self-contained guest is one that does not need the traditional amenities hotels would offer for telecommunications, such as fax machines and printers. Guests now look for a fast, free internet connection as an amenity. Some may not even need wifi, because they have a faster mobile service that they use. Even hotel telephones, guests no longer want to use the land line and pay hotel fees to make a call. Cell phones have eliminated that need (even for international calls). So hotels must not stay the same, and must change their strategies for producing revenue from their telecommunications department.
‹ Previous 21 - 40 of 624 Next › Last »
Showing 20 items per page