Skip to main content

Home/ Hospitality Technology/ Group items matching "hacker" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Lu Zhang

Hotel Industry Risk: Cybercrime Has Targeted Hotel Wireless Networks To Steal Credit Card Information | HOSPITALITY RISK SOLUTIONS - 0 views

  • While financial services companies used to receive the bulk of hacker attacks, last year hotels emerged as the new choice target among hackers-out of 218 breaches in a total of 24 countries, 70 of those breaches took place through hotel networks, according to a report by security firm Trustwave SpiderLabs.
  • Even larger hotel chains are often poorly protected against cybercrime dangers, making it very easy for hackers to gain access to one computer and then use it as a doorway into the hotel’s central computer system, from where they can lift the credit card data of guests staying at the hotel along with other sensitive information.
  • It often takes hotels months before they notice the hack-last year, the average time between a security breach and discovery was over five months.
  • ...1 more annotation...
  • While credit card companies, ultimately, are on the hook for fraudulent charges, you do have to report unauthorized activity, and catching credit card fraud early can save much time and hassle down the road.
  •  
    This article report that sensitive data such as credit card information can be easily received through hotel wireless networks by cybercriminals due to the poor protection network. With the information, cybercriminals can make clone credit cards, which are indistinguishable from the real one and difficult to be traced. What worse is it takes months for hotels, customer and credit card companies to find out this criminal activity. Although hotels have began to step up security, this article notice that customers, especially those travel a lot, need to pay attention to their bank statement since the trend of hacker attacks didn't go down.
Mary White

The Rise of Cyber Theft - Subway Loses Millions - 8 views

  •  
    A relatively unsophisticated group of hackers stole millions from Subway by hacking through their poorly secured POS systems. These franchise businesses possibly failed to adhere to the standard required by Subway Corporation and failed to establish two points of entry for remote access into the POS system, making it easy for hackers to steal credit card information. These types of crimes are likely to increase in the future as hackers from around the world take advantage of sub-par security systems. Businesses can no longer concern themselves only with the sale of an item, they also need to offer a sense of security to their customers and accept the reality that cyber theft is a rising problem.
  • ...2 more comments...
  •  
    I definitely agree that businesses need to accept the fact that cyber theft is a rising problem. Cyber theft is so common, we now have to guard and protect our computers with various anti-virus protection; which serves no purpose to a very professional hacker. The fact that a company like Subway experience losses through poorly secured systems, say a lot about their management in regards to protecting their brand and their customers. It's very mind blowing to think that the Subway corporation was just focusing their attention in what they view as important. This is just another wake up call and alert to everyone, who seems to layout their information carelessly. I also hope that Subway refocus themselves in regards to this matter.
  •  
    I have seen a few restaurants more so lately place messaging on the registers or pos system stating that their wireless networks are in fact secure by outside firms or services. With the rise of cyber theft and the increasing awareness about its effect, especially at the small business level, I thought it was a saavy move by this restaurant to assure its customers that at the very least they take the issue seriously. I personally know that no system is 100% safe, but as a consumer it means alot to me knowing they have that proactive approach.
  •  
    It seems everybody should check their online accounts frequently=_=
  •  
    Jeremy, I can appreciate the transparency of those restaurants. I wish more businesses would be open about their security. People are wound pretty tight about money right now and need to feel that the business world does care enough to protect their information.
kabir joshi

Hotels taking steps to improve data protection - 2 views

  • This being the case, it is encouraging to see some hotels are making moves to lock down their data security practices. There is clearly a great deal of work that needs to be done, but if a hotel can demonstrate it is capable of protecting customer information, it may be more likely to inspire confidence in consumers, which, in turn, could afford the hotel a competitive edge.
  • According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information. To overcome some of these and other concerns, McBeth said hotel operators are applying the best practices detailed by the Payment Card Industry Data Security Standard (PCI DSS), which aims to address data security for businesses that handle payment cards. However, he admitted that the task of ensuring protection throughout an organization is difficult, given the number of channels where vulnerabilities could be uncovered.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • ...21 more annotations...
  • This type of situation was brought to a head earlier this year when marketing services giant Epsilon experienced a massive breach to its email systems. According to a SecurityWeek report, among those impacted by the breach were several hotel operators, including Hilton, Ritz-Carlton and Marriott.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information
  • According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • Hotels
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • otels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • Hotels
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  • According to a USA Today report, a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators recently told an audience at the LodgeNet’s Customer Technology Symposium in Chicago that protecting customer data is becoming their top priority.
  •  
    This article is related to IT security in hotels. Around six months back a panel of IT executives from Starwood Hotels, Hilton and other lodgings operators met at the LodgeNet's Customer Technology Symposium in Chicago to discuss on how protecting customer data is becoming their top priority. This type of situation was brought to a head earlier this year when marketing services giant Epsilon experienced a massive breach to its email systems. According to a SecurityWeek report, among those impacted by the breach were several hotel operators, including Hilton, Ritz-Carlton and Marriott. According to a 2010 Wall Street Journal report, the most common security vulnerability in hotels is point-of-sale software. Often, hotels do not require employees to change the default names and passwords of these programs, making it easier for hackers to break in and steal customer information. To overcome some of these and other concerns, McBeth said hotel operators are applying the best practices detailed by the Payment Card Industry Data Security Standard (PCI DSS), which aims to address data security for businesses that handle payment cards. However, he admitted that the task of ensuring protection throughout an organization is difficult, given the number of channels where vulnerabilities could be uncovered. This being the case, it is encouraging to see some hotels are making moves to lock down their data security practices. There is clearly a great deal of work that needs to be done, but if a hotel can demonstrate it is capable of protecting customer information, it may be more likely to inspire confidence in consumers, which, in turn, could afford the hotel a competitive edge.
  •  
    Its a tough task to monitor this, because at the end of the day, the responsibility is at the property level to ensure that data is secure across the board. So training employees on the importance of data security and what a breach means could go along way.
balle028

Feds recover millions from pipeline ransom hackers, hint at U.S. internet tactic - 0 views

  • The FBI was able to seize control of DarkSide's proceeds by gaining access to a central account holding about 63.7 bitcoins, worth around $2.3 million, Deputy Director Paul Abbate said. A court document said that the seizure took place in Northern California, putting it within reach of U.S. law, and that the FBI was able to access the "private key," or password, for one of the gang's bitcoin wallets. It was unclear how the key was compromised.
  • Elvis Chan, an assistant special agent in charge at the FBI's San Francisco office, said in a news call Monday that the funds were specifically seized from hacker subcontractors who had used the DarkSide ransomware to hack Colonial.He declined to give specifics of how the FBI was able to gain access to the wallet, but he said it did not rely on waiting for criminals to use U.S. cryptocurrency services. It did, however, rely on the fact that so much internet infrastructure is based in the U.S., where the FBI can get warrants.
  • Ransomware gangs have been responsible for more than 1,000 hacks worldwide this year, mostly in the U.S., according to figures prepared for NBC News by Allan Liska, an analyst at the cybersecurity company Recorded Future.
  •  
    This Article deals with the hacking of Darkside the hacker group who extorted over 4 million dollars paid in bit coin, this article goes into ho w the FBI was able to get the monies paid back to the company.
tredunbar

Cybersecurity Best Practices for Restaurants | QSR magazine - 0 views

  • In the case of a restaurant, a cyber attack would likely be seeking;Employee details stored by the restaurantCustomer bank details obtained by the restaurantThe restaurant’s business bank account details
  • A restaurant’s POS system could see hundreds of different bank account details every day
  • Internal software used by restaurant staff is likely to contain sensitive information such as employee details (on an HR system), as well as accounting information for the restaurant
  • ...8 more annotations...
  • Restaurant owners and/or accountants who use online banking facilities must be aware of the possibility of this being targeted
  • Shoulder-surfing is a very real security concern, and hackers have been known to place recording devices in computer rooms, enabling them to physically see passwords being entered
  • Restaurants that use a website on which customers can order food need to consider its security. If cybercriminals manage to hack into the site, they will be able to obtain customers’ personal information such as addresses and bank details
  • Create a human firewall by educating your staff
  • Use reputable, recommended providers and suppliers
  • Keep computers away from the front of house
  • Carry out background checks on employees
  • Introduce unique identification numbers for staff
  •  
    The focus of this article is to point out why restaurants are targets for cyber attacks, what information hackers are looking to obtain and to identify what steps can be taken to protect consumer information. hackers target a restaurant's POS system for the large amount of bank data it may record as well as any online banking occuring in the restaurant. The personal information from employees as well as any app or website utilized by guests, is prone to cyber attacks. The most important solutions rely on conducting background checks on employees and making sure that they are trained on what to look for. Restaurants can also put practices in place that involve using unique employee numbers, keeping computers out of guests' view, and using vendors with a stellar reputation.
lethannelson268

Eventbrite sued over Ticketfly data breach | IQ Magazine - 0 views

  • Eventbrite is facing a class-action lawsuit over allegations Ticketfly’s “lax cybersecurity procedures” allowed hackers to gain access to 27 million customers’ personal data in May’s cyberattack
  • names, addresses, email addresses and phone numbers was stolen
  • uding
  • ...5 more annotations...
  • Personal information incl
  • hich led to a week-long shutdown of all Ticketfly services, as well as a number of Ticketfly.com-based venue websites, and forced several promoter partners to push back onsales or migrate to parent company Eventbrite’s platfor
  • in the data breach, w
  • consumer fraud, deceptive practices, breach of contract and negligence for its supposedly poor web security
  • Ticketfly failed to notify her that her data had been compromised, instead limiting its immediate response to a “passive support page” on the Ticketfly website and a “single tweet on social media”. Consequently, she says, she did not learn about the hack until September, months after her personal data was accessed
  •  
    This article discusses a data breach that Ticketfly, a ticket booking online service, suffered due to hackers breaking in. Ticketfly is owned by major event booking company Eventbrite, and according to the article, Eventbrite failed to have adequate cybersecurity to prevent the breach, causing over 27 million customer information to be disclosed to the hackers. This just highlights the horrors that can happen when booking through a event registration software.
jalipman

Sun, Sand and Cyber: Does the Hospitality Industry Need to Invest in Cybersecurity Now? - Infosecurity Magazine - 0 views

  • To ensure businesses are in the best possible position to compete during and long after the Coronavirus pandemic is over, both customers and employees need to be educated on the security measures on offer to feel comforted in this brave new business climate. 
  • For businesses to feel empowered against today’s many challenges, a consistent approach to risk management is absolutely crucial. A CISO with the authority to carry out real change and impart strong governance across the business would be hugely valuable.
    • jalipman
       
      An entity to regulate and update cyber security in order to keep all information safe would be very helpful. But it could be argued that an organization that has access to all systems could pose a larger risk to cyber security than it would negate.
  • These burdens come into sharper focus when you consider the digital environment in which hotels are operating. Individual hotels are often connected to the organization’s national or international network, meaning only one hotel has to be breached before the entire company is at risk of hemorrhaging huge volumes of its data.
    • jalipman
       
      This is a good example of why every hotel needs to be constantly updating and on alert for cyber attacks because if one hotel server is compromised the entire national system is at risk.
  • ...9 more annotations...
  • Most crucially, a cybersecurity strategy must include a solid plan for Business Continuity and Disaster Recovery in order to prepare for any worst-case scenarios. In the era of COVID-19, incidents of the worst kind are fast emerging and businesses deserve a fighting chance to succeed.
  • The root of this cyber crisis lies in the way hotels are hampered by disparate legacy systems and out-of-date software where breaches are rife for the taking, particularly on hotels’ Point of Sale (POS) systems and other external vendors. Adding to this, hotels often outsource their customer IT connectivity but unfortunately forget to consistently monitor and audit suppliers’ security measures. 
  • Today, the systems used for various functions in a hotel’s back and front operations are manned by employees who are not yet well-equipped to pick up on and counter large-scale cyber-attacks until it’s too late.
    • jalipman
       
      Simply put, hotels are not focusing enough on these attacks and their security systems are made primarily to identify and ongoing attack rather than preemptively stop them.
  • Mobile phones, tables and laptops connected to open networks become a hunting ground for hackers to harvest banking details through card payments. 
    • jalipman
       
      Not only is personal information stored but guests use these open networks for many different things allow hackers a direct link to the guests devices as well.
  • Worth billions of pounds, the hospitality industry is a perfect victim for cyber-criminals. Its make-up of luxury resorts and hotels alongside huge volumes of high net-worth individuals has fast become prey for hacker
  • While financial services and the public sector have been forced to endure an endless stream of cybercrime, the hospitality industry has also become a prime contender for hackers in the wake of its rich data-base. 
    • jalipman
       
      The constant influx of new information makes hospitality company databases prime targets for hackers.
  • No matter the size of the business, inefficient cyber support diverts crucial time from business activities and relationships with customers.
    • jalipman
       
      Not allocating for proper cybersecurity not only puts you at risk but takes away from time you spend on business when you are dealing with potential or ongoing threats that would have been better addressed by a proper cyber security system.
  • With global business fighting relentlessly to survive against the chaotic threat of the Coronavirus, all industries are exposed to criminal cyber-threats, and so the security of highly sensitive data must be handled appropriately.
    • jalipman
       
      In unprecedented times like we are currently going through things like cybersecurity will be put on the back burner in order to deal with issues at hand but this can create environments for cyber attacks.
  • British Airways and Marriott International are two major hospitality companies to be victims of high-profile breaches in recent memory. They serve as a stark reminder of the heavy costs faced when the safety of customers’ data is compromised. 
yiran DING

Hotel Wifi Hacking is on the Rise - 0 views

  •  
    Hotel wifi connection can be an easy access for identity thieves to stole personal information. Several surveys have show that there are many potential risks to get attacks through hotel internet.  WiFi Hacking Crimes Are Easy to Commit The security of hotel witless networks is a big issue and can be easily attempted by hackers. People may illegally use the internet access by staying in the nearby area of a hotel. Fake access point can also cause consumers in the hotel to lose their personal information such as credit card, banking or other confidential information.  The article also offers some solutions to avoid hackers. 
  •  
    Reading your article brings us back to some topics that we covered in this weeks reading. The security of hotels is important in that industry, especially when guest give out important information. Like you mentioned for example, credit cards and other confidential information that hotels need and use to process the guests into the systems. It is important that hotels protect their guests by affirming that all systems they use are well protected.
Grant Beck

FBI: Beware Of Malware Installed Via Hotel Networks - Forbes - 0 views

  • fake software updates booby trapped with malware that are being pushed through hotel internet connections .
  • malware that are being pushed through hotel internet connections.
  •  
    This article brings to light security threats that are transfered via hotel networks. Fake software updates are used to hide malware which is installed on the computer when the update is accepted. The FBI offers tips on how to avoid being exposed to this after data on several hundred firms was stolen by hackers. The hackers broke into Marriott International Inc.'s records and had access confidential information. This article is important because firms have the responsibility of providing security for the clients as well as themselves. It is important to be aware of threats like this and of how it can be avoided so that the firm isn't put in a bad situation and have to deal with stolen information. With mobile devices and wireless networks becoming more common these types of threats need to be taken into consideration. Most users don't read the fine print or consider where software updates are coming from, especially if it looks like the source is a hotel they are staying at. This makes it even more critical that the hotel is aware of and blocking these threat because claiming that it was done without the knowledge of the hotel may not always be enough and looks badly for the security.
laura kaczkowski

Restaurants, Beware: Hackers Want Your Customer Data - 1 views

  • The simple fact is that cyber criminals today want information that they can use to make money
  • We found that nearly 90 percent of attacks were designed to steal customer information including cardholder data, e-mail addresses and account information.
  • many restaurants and franchise businesses, unsecure and public WiFi networks are conveniently (for the criminal) connected to point of sale systems.
  • ...14 more annotations...
  • but the number one is that they all process credit cards.
  • assets targeted by criminals were point-of-sale software systems
  • Think of the scenario of a hotel that maintains a restaurant, a spa, as well as other services all connected to one POS system
  • The risk is even greater when hotels are part of a hotel chain with interconnected systems.
  • Franchise businesses are particularly at risk primarily because franchises tend to have the same POS system duplicated at all locations
  • Most of the time these business don’t have trained security professionals on staff; instead most assume their IT personnel are taking care of all of their security needs.
  • 76 percent of environments we investigated had a third party introduce a security flaw within the environment that contributed to criminals being able to compromise data.
  • Another alarming trend we found in our investigations was that self-detection of breaches decreased in 2011, and only 16 percent of victimized organizations actually detected the breach themselves.
  • The best intrusion detection systems are neither security experts nor expensive technology, but employees.
  • Very often businesses ignore that fact that while their employees might not be security experts,
  • the POS screen looked differently than it had the day before.
  • The cashier reported it to the company’s security hotline and sure enough there was a cybercriminal on the system.
  • When working with third parties, always build in security requirements into the contract and impose policies and procedures such as good password policies to ensure tight control and better security.
  • The quicker an organization can identify an issue and respond to a breach, the less likely they will experience the deep penalties, both financial and to their brand.
  •  
    The article I read was called, "Restaurants, Beware: Hackers Want Your Customer Data." In the article it talked about how cyber criminals want credit card information from people so that they can make money off of them. Criminals find new ways everyday to breach systems and steal information from guests staying at hotels or eating in restaurants. It states that many restaurants and franchise businesses use unsecure and public WiFi networks are connected to the point of sale system. "Franchise businesses are particularly at risk primarily because franchises tend to have the same POS system duplicated at all locations." A lot of times businesses don't have trained security on staff, they just assume that their IT person will be talking care of the security. According to the article the best detection systems are neither the technology nor the security but it's the employees who work there. The employees can tell when something has changed in the system and as soon as they realize that, they need to report it to their manager. I never even considered people breaking into the systems and stealing credit card information but it does happen and it's important to know what to do in these kinds of situations.
Joshua Frost

Onity releases firmware upgrade, mechanical cap for its locks to address hacking vulnerability concerns - 0 views

  • Onity provides lock upgrades following hack
  • Black Hat cyber security conference in Las Vegas
  • According to a story published by Forbes, the hacker, using less than $50 worth of equipment, was reportedly able to exploit a port located underneath each lock to read their memory and find a decryption key, at which point he was able to gain access to the lock’s firmware.
  •  
    As close to home as this hits, with a security breach at my hotel recently, I'm happy to see that companies are upgrading their systems. The Black Hat cyber security conference in Vegas had a hacker present how easy it was to gain access into a hotel room. He had less than $50 in equipment that he used to infiltrate the locks on the hotel doors. In response to this, Onity, the company whose locks were tested, came out with a plan for a "two-tier" security upgrade. This makes me feel a little bit better but at the same time, it seems like hotels aren't being proactive about protecting their customers, so maybe more hotels needs to be exploited.
  •  
    I don't see this how it make anyone feel a little better, all the company is doing is giving price discounts and tightening up some locks, make it harder to pick apart. The problem is the avg their or experienced theif can take a part a lock in minuets if not seconds. Chances are you wouldn't even hear it if you were asleep, on the phone, watching TV. The system isn't very good if it can be hacked with up to 50$ of equipment
anonymous

Cloud PMS - A Safe Bet for Security, Liability and Payments - By Jos Schaap - 0 views

  • As cloud usage continues to soar, we can rest assured that these percentages will increase.
  •  
    A hotel's PMS is at the core of all functions, but outside threats are becoming more common. "In a report researched by Sky High Networks, the percentage of organizations that experience at least one threat per month from data exfiltration (hackers) is 49.8%." Keeping guest information private is critical and when information is leaked it is hard for the company to gain back guest trust. It is clear that society is becoming more and more comfortable with e-commerce. This article points out that reliance on cloud based PMS systems may be the next best thing. These systems use hi-tech encryption which make it near impossible for hackers to breach. However the article says properties must choose a PMS that makes the most sense. Technology is constantly changing and jumping on the bandwagon of cloud computing may not be the best decision. Who knows what new technology will be implemented next.
Ted Rood

FTC Sues Wyndham Hotels Over Data Security Failures - Security - Privacy - Informationweek - 0 views

  • The Federal Trade Commission Tuesday announced that it had filed a suit against global hospitality company Wyndham Worldwide Corporation, as well as three of its subsidiaries
  • failing to institute a robust information security program, even in the wake of a major exploit.
  • exposure of over 600,000 credit card accounts and $10.6 million in fraudulent credit card charges, the FTC alleged.
  • ...5 more annotations...
  • More Security Insights Webcasts Malware from B to Z: Inside the threat from Blackhole to ZeroAccess Remove Administrator Rights Without Disrupting End User Productivity More >>White Papers
  • Valentino said the company overhauled its information security practices in the wake of the attacks, and also dismissed claims that anyone had been harmed by the breaches. "At the time of these incidents, we made prompt efforts to notify the hotel customers whose information may have been compromised, and offered them credit monitoring services," he said. "To date, we have not received any indication that any hotel customer experienced a financial loss as a result of these attacks."
  • "unfair and deceptive
  • The FTC accused Wyndham of failing to address the security vulnerabilities highlighted by the first breach, as well as failing to implement technology that could have detected unauthorized access to its networks. As a result, the agency said, in March 2009 attackers--"using similar techniques as in the first breach"--again
  • gained access to the Wyndham Hotels and Resorts network.
  •  
    This article describes one of the worst situations that could occur when operating a hotel. According to the text, Wyndham Hotel Group failed to implement a strong enough security system, resulting in hackers breaching the network and stealing over 600,000 credit card numbers and over 10 million dollars in fraudulent charges. The FTC is suing Wyndham Corporation for failing to take the proper security measures to guarantee the security of the most important customer information. The FTC also states that Wyndham used improper software configurations that presented credit card information in a manner that was clear and easy to read. Michael Valentino, spokesman for Wyndham Worldwide, the company made prompt efforts to notify those whose information had been compromised and according to Valentino, no hotel customer had experienced a financial loss as a result of the attacks.  Despite Valentino's claims, the FTC is suing Wyndham for unfair and deceptive practices in failing to protect the privacy and personally identifiable information about guests. The FTC claims that Wyndham failed to address the security failures that occurred after the first breach in 2008 and did not implement technology that could have detected unauthorized access to networks. In 2009, hackers used similar techniques to break into the network again as steal as much personal information as they could. 
marilyn diaz

Thieves Won't Wait. Neither Should You. | hospitalityupgrade.com - 3 views

  • data is under attack
  • the most afflicted industry was accommodation/foodservice
  • use a combination of hacking and malware (61 percent).
  • ...11 more annotations...
  • success stealing data “in transit” (62.5 percent) versus stored data (28 percent)
  • What this tells us is hotels and restaurants need to do more to protect sensitive payment data and be proactive in keeping up with the hackers and thieves. We also need to pay particular attention to properly securing data as it moves through the merchant IT environment.
  • Point-to-point encryption (P2PE) is a technology
  • has only recently gained momentum in the hospitality sector.
  • P2PE places “data in motion” in a wrapper that can only be decrypted by an endpoint that has the requisite key.
  • The goal of point-to-point encryption technologies is to encrypt as close to the point of entry as possible and guard against thieves who attempt to install sniffing/hacking software on a merchant’s network.
  • P2PE solutions can significantly reduce a merchant’s card data environment, mitigate potential breaches and simplify PCI DSS validation efforts.”
  • You should also understand the types of cards and transactions that can be encrypted. Does the solution encrypt both swiped cards and manually entered cards? Does it encrypt online transactions, as well as on-site or card-present transactions? Is the solution tamper resistant and, what happens if an attempted breach occurs? Where is the HSM (hardware security module) located? Even if data were to be intercepted, is it rendered unusable to cyber thieves?
  • A hosted solution will shift much of the burden of responsibility to the third-party provider and free you from having decrypted data in your environment.
  • Keep in mind, there is no single silver bullet when it comes to payment security. Even with EMV, stolen cardholder data could be used for a fraudulent online transaction. Merchants should implement a variety of technologies and techniques as part of a multi-layered approach to security that ultimately includes EMV to protect against counterfeit card fraud, tokenization to protect data at rest, and P2PE to protect data in-flight.
  • Thieves won’t wait for a unified approach and specification, and are looking to access your valuable data now. By taking a proactive approach to security that includes point-to-point encryption, asking the right questions, choosing trusted partners and keeping yourself updated, you can protect your customers’ data and your reputation.
  •  
    This article deals with the theft that happens on a daily basis in the hospitality field. It happens when credit cards are used to pay for something, like a reservation, and thieves want the information, so they can use your credit card number for whatever intentions they may have. As the article states, "our data is under attack". I can relate to those people that have had credit card numbers stolen, because it has happened to my husband and me, and it is a horrible feeling trying to get your life back on track and recover your money.  I think it would be a great idea, with some research, to get the point to point encryption technology in a field where credit cards are used so often, not only to cover the business (hotel), but also to protect the guest, so they feel at easy when they travel on vacation or business.  The overall point of this technology is to encrypt the information as close to the point of entry, i.e. the swiping of the credit card, as possible. This would in turn "significantly reduce a merchant's card data environment", as the program would encrypt the information so that hackers cannot access the customer's information. As I mentioned earlier, questions should be asked before buying this technology, as there is always something new on the market that may be better. Credit cards are not always swiped, but can also be manually placed in the system, so you want to make sure, that both transactions are protected. Overall, the establishment should always be concerned about the customer and their safety, whether physical or mental and always be prepared for the worse.
  • ...1 more comment...
  •  
    Marilyn, This is a great article and I wish this type of technology was everywhere because like yourself I have credit card numbers stolen before and it is a long process to end that. Working in the hospitality industry we would need to make sure that it is everywhere that a credit card is entered whether that being swiped in house, typed in the system manually, or even processed via the internet. In the hospitality industry we should be very aware of our guests safety and like you mention it is not only just physical safety that is a concern it is the mental state as well making sure the guests credit cards are safe and do not have a chance of being stolen by a hacker. This is a great article, keep up the good work!
  •  
    Great article! Personally after being a victim of credit card fraud, I'm very apprehensive of where I shop, who handles my card and how long it takes them to return it. I recently cancelled a large purchased after the cashier insisted on rubbing my card number on the reciept after the transactions had be approved. In my mind, I was thinking "If I let you do that, then I've open the door for anyone to charge thousand of dollars. I don't think so." As a manager, who hands credit card numbers for manual input, I'm very cautious of them and want to insure that they don't get into the wrong hand. Aftern each transactions is approved, that number is shredded and the credit card machine is batched out. Companies don't realize how important it is to PCI compliant. The risk in exposing sensitive information of our clients and customers can cost thousand of dolllars in fines and fee, in addition to the lost of that customer/client.
  •  
    Marilyn, Great Article...as a Front Desk Manager, it is my responsibility to randomly check our computers to ensure employees are not placing USB driver to collect data from our system. Our company has taking this a step further by putting metal locked case around the PC to avoid possible fraudulent activity. If we have to open a PC, we must log it to show proof why a PC became unlock. Companies should adopt similar procedures to protect the consumers/guests. Nelson
Yue Li (3011472)

Hotel's Free Wi-Fi Comes With Hidden Extras - NYTimes.com - 0 views

  • The hotel’s Internet service was secretly injecting lines of code into every page he visited, code that could allow it to insert ads into any Web page without the knowledge of the site visitor or the page’s creator. (He did not actually see any such ads.)
  • The lines of code include references to “rxg,” which stands for Revenue eXtraction Gateway, a service aimed at generating money from Internet access points. On its Web site, a company called RG Nets, which makes Revenue eXtraction Gateway, explains that its system rewrites every Web page on the fly so that it can include a banner ad.
  • Even though this ad-serving system was apparently not serving ads, it was the principle of the thing that upset the online critics. Mr. Watt said that the technique not only affected people browsing the Web, but also the content creators, because they would not get a cut of the revenue and their own ads could be blocked.
  •  
    Mr. Watt, a customer who was spending his weekend at the Courtyard Marriott in Midtown Manhattan was browsing the website. He realized that there was a strange drawing appeared on the top of the web page, which did not exist before. At first, he did not pay too much attention to it, but he still determined to check source codes to see if there was anything wrong with the computer or the Internet. After checking the source codes, he found lines of code which include references to"EXG". He thought it was a hacker attack, but his IT background enabled him quickly figured out that lines of code that include EXG had nothing to do with a hacker attack, but was a service named Revenue Extraction Gateway used by RG Nets company to inject advertisement secretly without the knowledge of the users, which aims at generating revenue from the Internet access points. Mr. Matt claimed that although this service will not bring harm to the users, but the principle of the thing that upset the users most. The hotel then apologized to Mr. Watt, and promised not to use this service anymore. What I feel interesting is that I also had such problems before, and after I interviewed some of my classmates and friends, I realized that this is a pervasive problem. However, what surprised me the most is the truth that most of the hotels do not know that their hotels' internets are exposed to secret ads injection because this kind of secret service is not on the contracts that the hotels signed with the internet company. In my opinion, it is an unethical service. Customers who use the internet feels that he/she is being spied on, and for the web content creators, they could not get a cut of the revenue from this.
JIACHEN LI

Study: Hotel network security lacking - SC Magazine - 0 views

  • Most U.S hotels are vulnerable to malicious attacks and are "ill prepared" to protect their guests from internet security problems, claims a study published by Cornell University
  • hotels
  • having a robust set of firewalls that are managed and properly configured, splitting networks, and educating staff of the importance of security standards.
  • ...3 more annotations...
  • Ogle recommended that all hotels use Wi-Fi Protected Access (WPA) encryption,
  • For guests, Ogle recommended connecting to the internet using a Virtual Private Network (VPN)
  • ted anti-virus and firewall software and making sure each secured website starts with “https://” rather than “http://”. The danger of not securing a
  •  
    The Article attached to this link reports commun issues found in hotel internet networks. The author mentions a study conducted with 38 hotels. It resulted that 33 out of the 38 hotels had flaws in their network configuration and allowed the researcher to access unauthorized information via the internet. We all understand that reliable internet connectivity is a priority for guests and business travelers; however, security is a concern that can't be neglected. Another reason to be concerned is that so many softwares and applications are stored via internet. Adding a password is a simple measure that every business should consider. Network issues cold not only hinder guests but the hotel as well.
  • ...1 more comment...
  •  
    Nowadays, since many business travelers connect remotely to continue working while on the road, the potential for theft of corporate information exists. Some hotels still rely on relatively rudimentary hub technology for their networks, and these are particularly subject to hacking. Tested by Ogle, most hotels are lacking of security and responsibility for the safety when guest searching internet. Guests' information is easy for the hackers to steal, which means when we use the network in the hotel, we are almost peeped by other people we are unknown. Such a terrible thing! Hotel should increase its network's security, a hotel could potentially be considered at fault for not taking the necessary precautions to protect their guests from hackers. Based on this article, hotels can use Wi-Fi Protected Access (WPA) encryption, the password can provide kind of base wall to protect security. What is more, it is necessary that having a robust set of firewalls that are managed and properly configured, and educating staff of the importance of security standards.
  •  
    According to the research by Cornell University, most US hotels are vulnerable to hackers. There are two main reasons contribute to the issue. One is the flaws in many hotels' network topology, making it possible for customers to lose their privacy. The other is careless employees provide access information to help hackers' breach. Ogle thought that WPA encryption, VPN and training employees are good ways to solve the problems. I think that if the computer networks of hotel are weak, the guests' password, email message or other private information will not be protected, and they will even suffer loss. So it is important for a hotel to use different measures as Ogle recommended to ensure the safety of the computer network.
  •  
    this article is talking about the problem on the hotel network security. a author from the Cornell university said he tested wireless network at 38 hotels at the same time. he found that most hotels were easy to break into. moreover, as long as you use the Linux distribution BackTrack and a high-power wireless card and high-gain omnidirectional antenna, you can break into the hotel guest network and then get the password, email message and the website people are viewing. importantly, this procedure just cost 100$. this is full of loopholes. hotel manager should pay more attention on this problem. at the end of the article, the author recommend a security app called Wi-Fi Protected Access encryption. this app require the guest to enter the password if the guest wants to surf the internet.also, he recommend connecting to the internet using a Virtual Private Network (VPN), having updated anti-virus and firewall software and making sure each secured website starts with "https://" rather than "http://".
Mary White

Hotels are easy targets for hackers - 1 views

  •  
    The failure of hotels to properly store and transmit sensitive credit card data makes them an easy target for hackers. This article shows that in 2009 a whopping 38% of credit card theft was associated with the hotel industry. These thefts necessitate a level of uniformity for hotel security standards. The biggest key to this article is the reminder that hotels cannot be lacking in their technology security measures. The industry is based on service and must do its due diligence to protect its customers and retain their loyalty and trust.
  •  
    That article is really eye opening. I couldn't help but notice the article is from a year and a half ago. I wonder how much improvement hotels as a whole have made on this front. I imagine it is significant or else I feel like we would be hearing more about it now. This really teaches you to keep a close eye on your accounts. I thought the Wyndham Hotels' spin about "sophisticated hackers" was kind of amusing. I assume someone forgot to "CYA" but they couldn't tell that to the people whose credit card information had been stolen.
  •  
    I noticed the time frame as well. I would love to see a more recent article or study done. It is definetely a reminder to consumers that you cannot rely upon hotels or other industries to provide security. Consumers need to be more responsible for tracking their own actions. Hotels also need to recognize that this threat is not going to go away. They must continuously look for new attack angles. It seems to me that the very best amongst the hospitality industry are casinoes. Other hotels should use them as a model and avoid "sophisticated hackers."
lumduan roth

Wyndham Hotels & Resorts Shaken by Data Breach | News | Hospitality Magazine (HT) - 1 views

  • Wyndham Hotels & Resorts (WHR) issued an open letter to its customers in February informing guests that certain Wyndham brand-franchised and managed hotel computer systems had been compromised by a hacker, resulting in the unauthorized acquisition of customer names and credit card information. According to the letter, the hacker was able to infiltrate central network connections to move information to an off-site URL before the hotel company discovered the intrusion in late January 2010. The breach is believed to have occurred between late October 2009 and January 2010. The incident did not affect other branded hotels in the Wyndham Hotel Group system.
  •  
    What a nightmare! One of the marketing strategies to attract new guests is data mining, the process of drilling through information contained in the data warehouse and analyzing this information, such as; back ground, preferences, and demographics. Unfortunately, hackers also mine this data for customer's credit card information.
  •  
    This incident has happened more likely in Asia now, especially in my country, Viet Nam. Because Viet Nam is a new development country and we did not have the system like credit score and many banks try to get customers through processing of credit cards; therefore, many information of guests has been collected into server of the bank recently. And the problem associate with that is that the security of the banking system in Viet Nam is not up to date or very loose making many data breach has been reported. I believe this is not just stop at banking industry but other industries as well as Hotel because many information has been saved there. This incident proves that technology played a very important role for all industries not just some technical related industries.
Donald Wojciechowski

Hotel Cyber-Security | Past Issues | Past Issues - 0 views

  • Hotel cyber-security is facing increasing scrutiny from federal regulators.
  • last June the Federal Trade Commission sued Wyndham Worldwide hotels after apparently unsophisticated hackers allegedly stole the credit card information of more than 600,000 customers leading to a more than $10.6 million fraud loss
  • The FTC has claimed that Wyndham did not maintain appropriate firewalls, did not configure security software to protect credit card information, did not remedy known security vulnerabilities, and failed to use complex passwords allowing hackers to infiltrate through “brute force” – essentially by guessing the password of the administrator.
  •  
    This article discusses the Federal Trade commission's actions against Wyndham Worldwide Hotels. Unsophisticated hackers breached the hotels system and obtained the credit card records of 600,000 guests, causing the FTC to claim that the hotel group did not maintain proper system security. However, several groups file a Amicus Brief that the FTC is not clear as to what security standards they require. Currently the FTC requirements "will depend on the size and complexity of the business, the nature and scope of its activities, and the sensitivity of the information at issue". This means to many in the industry that company does not know if they are maintain proper security in the eyes of the FTC until they are sued by the FTC. The article goes on to say that a company should "Review your privacy policy immediately to insure it is compliant with the most recent standards and that the data security systems in place are actually consistent with the stated policy".
cpaez007

Hotel sector faces 'cyber crime wave' - 0 views

  • Hilton Hotels, Starwood Hotels & Resorts, Mandarin Oriental and the Trump Collection have all admitted that their payments systems were compromised this year as hackers hunting for credit card details switch their attention to the leisure industry. This week Hilton and Starwood said guests’ personal details had been taken after hackers gained access via payment systems.
  •  
    Hotel industries have been under attack from excessive hacking, as seen with Hilton being targeted for private financial information from guests. In 2014, it was noticed that hackers had been targeting Hilton throughout the course of 17 weeks. They state that the industry itself has not really focused budgeting on cyber security. It seems that the process is done by integrating a virus into these hotels POS system. The virus was actively attacking the Micros program, which was being used in more than 300,000 hotels and resorts. An ultimate treasure chest for information, some of which was not even encrypted. In addition, the virus appears in the system as a legitimate software, and then it obtains over 90 percent of stored information. This hacking is being conducted by organized groups, who moved from the retail industry because it had indeed improved its cyber security. With hotels it seems that the concept has not been taken as seriously. There are many hotels susceptible to such an attack. As long as there is a sales software, then someone is looking to get into it. A person could be sitting inside of your location, and infiltrating a guests' wireless internet, and they would not even know. In order to engage this threat, locations must be proactive in attempting to stop what is occurring. The only question is, how much are they willing to invest in cyber security?
‹ Previous 21 - 40 of 196 Next › Last »
Showing 20 items per page