Skip to main content

Home/ Hospitality Technology/ Group items matching "passports" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
adel168

At Alibaba's futuristic hotel, robots deliver towels and mix cocktails - 0 views

  • drastically cuts the hotel’s cost of human labor and eliminates the need for guests to interact with other people.
  • Guests check in at podiums that scan their faces, as well as passports or other ID
  • Elevators scan guests’ faces again to verify which floor they can access and hotel room doors are opened with another face scan.
  • ...2 more annotations...
  • To check out, guests press a button on the app after which the room locks and they are automatically charged through Alibaba’s online wallet.
  • develop AI and other high-tech expertise which will propel Alibaba’s e-commerce offerings forward, as well as develop new areas of business at a time when e-commerce revenue growth rates are slowing,
  •  
    The Alibaba hotel in China has incorporated several e-business components that decrease the hotel's cost of human labor drastically. The traditional front desk check-in process is replaced by podiums that scan guests face as well as documents. To check-out, a button is pressed on an app which locks the room and automatically charges the guest through an online wallet. Apart from hotels, Alibaba has also launched projects for grocery stores and book stores.
elena_martynova

Why Cybersecurity in the Hotel Industry Should be a Joint Effort - 3 views

  • The global hospitality industry now sits in the top three of industries most frequently targeted by hackers, according to the 2015 Trustwave Global Security Report.
  • Thieves have seized the opportunity to capitalize on the wealth of data that passes through varying weak spots in hospitality networks, and they're now looking for more than just credit card data. Hotels hold contact details, travel plans, air miles, birth dates, passport data and personal preferences on millions of guests - all of which can be used by criminals in a multitude of ways, ranging from fraud to extortion.
  • According to the aforementioned report, 65 percent of the hospitality industry's security breaches were via point-of-sale (POS) systems, with weak remote access security contributing to 44 percent of those compromises.
  • ...6 more annotations...
  • But a number of breaches also affecting the industry targeted booking partners - companies that facilitate reservations on behalf of the hotel brands for services such as air travel, car rental and room bookings.
  • Regardless of where the initial breach occurs, one thing is certain: if customers can't rely on a brand's booking system, they will simply go elsewhere. Statistics show that nearly one in five shoppers have dropped out of an online travel booking because of security concerns around payment.
  • Understanding where critical data lives within your enterprise and how it moves, both internally and outside of the organization, is paramount.
  • POS attackers often take advantage of vulnerabilities, from configuration errors like easy-to-guess passwords to underlying flaws in the system itself, to access payment terminals and plant malware.
  • it is critical that hotel chains - and their partners - have experts regularly conduct deep-dive penetration to sniff out potential vulnerabilities before criminals can take advantage of them.
  • To mitigate the potential damage caused by unidentified malware, hoteliers and their partners should implement intrusion detection, security management and threat intelligence services, as well as scan inbound and outbound communication to flag data-stealing malware in real time and prevent information from leaving the door
  •  
    This article tells us about the fact, that now days the global hospitality industry is one of the industries which is most frequently targeted by hackers. In order to avoid any attacks there must be tighter control across a hotel and its network of partners. So the main 3 aspects which will help to avoid attacks are: -assess risks everywhere -protect the POS system -find malware and keep data protected
anonymous

JetBlue is going to let passengers board with just a selfie - Business Insider - 2 views

  •  
    In 2017 JetBlue announced that they will be the first airline to partner up with US Customs and Border Patrol (CBP) to come up with a biometric technology that will use facial recognition to check in their customers and allow them to board the airplane, instead of using cell phone applications or paper boarding passes. The way it will work is that your image will be sent to CBP where it will be matched with your passport or visa. At the same time the technology will verify your flight details and let you know when you're okay to board the flight.This will be the first time biometric facial recognition is cleared through CBP.
  • ...1 more comment...
  •  
    Hello, Thank you for posting this article as it was quite interesting. It is notable that technology benefits numerous industries, including the airline industry. I believe airlines have faced the challenge of how to alleviate long lines while checking in. In my opinion, as I read this article numerous questions and scenarios arose, such as the requirement of needing to verify the flyer's visa, having to check in baggage which may require human assistance, and technical bugs or changes in the flyer's appearance which may impact the selfie option. Nonetheless, I find this feature fascinating, especially as it will enhance national security aspects and become a more reliable approach towards identifying individuals. Thank you very much.
  •  
    I was just reading this today! Great article and fascinating technology.
  •  
    I am a frequent flyer with Jet Blue, and love everything their airline. This futuristic step will not only enhance security, increase boarding speeds, but also help the environment with paperless boarding. I think there will always be passengers who want to be offered the traditional boarding pass, and those who do not want their picture taken. However, the more airlines that come to use this system, the quicker it could become airports new normal. Thanks for posting!
bhern082

4 Ways You Can Keep Your Business and Guests Safe from Data Breaches | Hospitality Technology - 0 views

  • external data breaches constitute 96 per cent of all breaches in the hospitality industry.
  • Many guests are increasingly choosing to stay at hotels that prioritize information security since many employees are working remotely or must take work away with them on vacation.
  • : Verify that the hotel’s privacy policy complies with federal and provincial laws that apply.  Ensure that your staff remains compliant of these laws by making them a mandatory part of staff training to avoid breaches and fines. 
  • ...4 more annotations...
  • Documents such as copies of travel information, passport and identity documents, licenses, customer lists, etc. should be shredded daily.
  • Invest in cyber-security tools such as firewalls and tokenization and encryption to avoid online breaches through the business’ website or third-party sites.
  • Regularly update equipment and software with monitoring systems that can detect breaches at numerous terminals to avoid PoS breaches.
  • Ongoing training helps ensure employees understand and follow policies and best practices. They should also be trained on how to recognize potential risks such as phishing.
  •  
    This article review four ways in which the hospitality industry can keep their guests safe. The first way is to have a company "shred list" so that the guests physical information is being shredded upon he completion of their stay. The second way is to remain compliant with federal laws when it comes to their privacy policy. The third way is to have IT safeguards like regularly updated equipment and have cyber security firewalls in place. ?The last way is to have constant employee training to keep the employees up to date on the best practices.
ruchit0622

Chinese tourist town uses face recognition as an entry pass | New Scientist - 1 views

  • Who needs tickets when you have a face? From today, the ticketed tourist town of Wuzhen in China is using face-recognition technology to identify people staying in its hotels and to act as their entry pass through the gates of the attraction.
  • It was only a matter of time before face-recognition software was rolled out on this scale,” says Mark Nixon at the University of Southampton, UK.  It’s more convenient to use your face than tickets, he says, so it’s likely that the technology will soon be seen elsewhere.
  • The system is first being used to track the 5000 people per day staying in hotels in Wuzhen, who make up around 15 to 20 per cent of the town’s total visitors
  • ...1 more annotation...
  • you have to present your passport and the software determines whether the person standing in front of the camera matches that identity.
  •  
    This is one of the astonishing software I have come across. The Chinese tourist town in Wuzhen, have started using this software in many of its hotels, even at the port of entry on the airport. The software senses the face of the individual and authenticates it with the proof identification shown by the individual. The software has huge amount of data stored inside it, this makes the check in procedure easier for the hotel. The software recognizes the faces of the individual accurately, research shows that the software so far has an accuracy of 99.8%. This software is about to substitute the finger print software, which was time consuming. The software is believed to be more secure and safe than the finger printing.
fdiaz75

Up to 5.2 Million Guests Affected in Marriott Breach | CoStar - 2 views

  • Marriott International announced a data breach with a property system, in which loyalty and contact information could have been obtained for approximately 5.2 million guests.
  • end of February 2020, the company identified that an unexpected amount of guest information may have been accessed using the login credentials of two employees at a franchise property. The company believes that this activity started in mid-January 2020.
  • information involved included Marriott Bonvoy account passwords or PINs, payment card information, passport information, national IDs, or driver’s license numbers.
  •  
    This article proves that no matter how big a hotel is they can still encounter a target data breach. The fact that this data stealing went on for two months and affected 5.2 million guests. Also the data collected aside from fincial information, but the personal data makes it larger threat to guests. Adding a specific website will help some concerns.
afost026

Top Cybersecurity Challenges for the Hospitality Industry | KirkpatrickPrice - 0 views

  • Organizations within the hospitality must consider why they’re a target for cybersecurity attacks, which data privacy and security frameworks and regulations apply to them, and what challenges they will face.
  • Data Collection
  • When Marriott’s guest reservation database was breached, the names, mailing addresses, phone numbers, email addresses, passport numbers, rewards account information, dates of birth, gender, arrival and departure information, reservation dates, communication preferences, and encrypted payment card numbers of up to 383 million guests were compromised –
  • ...2 more annotations...
  • Data collection inherently makes the hospitality industry a target for hackers and cyber attacks
  • If a hacker can get into just one location’s gift shop or front-desk system, they can access a whole lot more
  •  
    This article talks about the many challenges for the hospitality industry due to hacking. One example is interconnected technology. If a hacker can hack into one location, they can hack into multiple connected locations.
bhern082

11 new ways technology is transforming cruise ships - 6 views

  • from passport credentials to food preferences, and
  • you will be sent your wearable Ocean Medallion (the size of a coin, this can be worn as a bracelet or necklace) in advance.
  • . But some cruise lines have put millions into developing multi-faceted wearable technology that solves the problem entirely.
  • ...12 more annotations...
  • Royal Caribbean’s WOWbands ($4.99/£3.70 or free depending on ship and class of travel) look like watch straps, but use radio frequency technology to open your cabin door. You can use Carnival Corporation’s wearable Ocean Medallion (free to all guests) with the Ocean Compass app to order food, drink and retail items on demand. It also unlocks your cabin door as you approach
  • Interactive maps are becoming far easier to use than expected thanks to the digital way-finder on the MSC for Me app. Just indicate where you want to go, and a map will demonstrate how to get there from your current location.
  • A rather futuristic option is available on some AIDA Cruises and Costa Cruises ships in the form of a robot called Pepper, which provides guests with information, including how to ge
  • t from A to B
  • on board.
  • MSC Meraviglia has 114 interactive screens that allow you to book dinner as well as other activities, such as the theatre or spa, with few clicks and a swipe of your wearable bracelet
  • Carnival is launching MedallionNet soon (prices currently unavailable), which it says will be the fastest internet connection at sea and will provide pervasive cabin coverage. 
  • With MSC Cruises’ wearable bracelet, however, you can monitor your children in real-time and know where they are at any moment. T
  • With MSC’s interactive bracelet (or the Cruise Card) you can pay for everything, from your shopping session at the 100-metre high street to your evening meals. The wearable technology means staff quickly know who you are and your first language, which adds a sparkle to the customer service.
  • Personalised recommendations (such as which bottle of wine to try) will be offered on MSC Meraviglia in the not-too-distant future as part of the digital concierge service.
  • A modern take on arts and crafts can be enjoyed with the HP Sprout, scanner and 3D printer. Here children (around 7-12 years old) can design their own creations in the computer and then print 3D versions to take home
  • The days of cruise passengers feeling disconnected from the rest of the world while at sea are gone, which is good news for first-timers who may not have got their sea legs yet. 
  •  
    This article features 11 new tech features that cruise ships have implemented.Technology is transforming these floating hotels into smart cities. From remote check-in, wearable technology, to geo-locating your children aboard. These tech gadgets are helping cruisers enjoy their time aboard as stress free as possible. As stated by the author "Once on board, it didn't take too long to figure out how the MSC for Me app, public interactive screens, cabin TV and wearable bracelet, available for the first time on Meraviglia, all worked together to streamline and enhance life on board."
  • ...2 more comments...
  •  
    This is great technology and can most certainly be studied while in use to better assist guests in having that "stress free" vacation. The technology is personalized and almost seamless in using since they have made it into something of "jewelry" to help avoid it being an irritating app. I see this being developed in many more places other than just cruise ships and Disney. It is very convenient for the guests.
  •  
    I agree that this technology is very useful for guests. Personally, it would make me feel less like I was in a floating hotel and more like a floating city. I would enjoy the possibility of finding a solution to a problem that I was having without having to wait in line at guest services, which would potentially save me time and give me the ability to return to whatever onboard activity I was engaged in.
  •  
    I agree. I think this technology will be very beneficial for not just guests but also for the cruise lines. This helps collect data and help personalize the guest experience. This will have guests coming back time and time again. This also provides an incredible guest experience since they won't have to wait in long stressful lines. I think this technology is very beneficial for both the guests and employees.
  •  
    Cruise ships have really stepped up their game when it comes to technology. I wrote a paper last semester about Princess Cruise Line's latest technology, the OceanMedallion. This little wearable device allows guests to unlock a whole new level of different features such as room key, tracking system, and a bunch of different amenities. It will be interesting to see what other cruise lines come up with to compete with this.
jlewinsky

Hotels: Are Your Cyber Defenses Ready for 2021? | Hospitality Technology - 0 views

  • Two of the top five biggest data breaches made public in 2020 were at hotel chains. Attackers stole personal information including names, emails and addresses from 5.2 million guests at Marriott and 10.6 million guests of MGM Resorts.
  • To ensure a swift recovery from COVID-19, the hospitality industry must shore up its cybersecurity protections — or risk more headline-making breaches in the future.
  • Risk is especially high at hotels because attackers have multiple points of entry.
  • ...14 more annotations...
  • Breaches undermine hospitality brands’ reputations and erode customer trust. Eighty-one percent of consumers will stop engaging with a brand after a breach, according to a 2019 study.
  • Guests may share their credit card numbers with the hotel in advance via a booking app or website, opening up the possibility of web-based attacks. Loyalty programs are another source of online vulnerability, with an estimated $1 billion a year lost to account fraud and related crimes.
  • However, one of the biggest vulnerabilities may be on the hotel grounds themselves.
  • hotels have multiple point of sale (POS) terminals across different locations, from the front desk to restaurants, all of which are connected to each other. If a POS device is not properly secured, attackers can use malware or other attack vectors to steal clear-text credit card numbers and other data.
  • POS attacks remain one of the most common causes of data breaches in accommodations and food services.
  • When it comes to cybersecurity, companies today have two options: Defend the fort or devalue the data. The former is the more traditional approach. By strengthening the digital “walls” around your data — via firewalls, intrusion detection, 24/7 monitoring and other security protections — the defend-the-fort approach works to keep attackers from accessing your systems at all.
  • One important and underutilized aspect of cyberdefense is employee training.
  • Make sure your employees use strong passwords and know how to spot fraud and spear phishing attacks. You may also want to limit employee access to confidential data, so if an account gets hacked, private guest information doesn’t go with it
  • You should also make sure your software is up to date with all security patches, as attackers often exploit known weaknesses in programs. Isolating POS devices from the rest of the network can also limit the damage from malware infections at that entry point.
  • it’s unlikely that even the strongest digital “walls'' will prevent all incursions. Defenses are important, but the ever-changing nature of technology means that new, hard-to-catch vulnerabilities will pop up all the time.
  • important to devalue your data, rendering it unusable to attackers who gain access to your systems. One way to do this is to implement point-to-point encryption (P2PE) by encrypting payment information from the moment it enters your network at the POS
  • Encrypted data is unintelligible to anyone who doesn’t have the right digital key. Implementing P2PE is the only way to ensure that clear-text payment data doesn’t fall into the hands of attackers targeting POS systems with malware.
  • Data that’s stored for the long term, like passport information or credit card numbers saved to a loyalty program, can also be devalued through tokenization. Data that’s tokenized gets replaced with an alphanumeric pseudonym, so the actual sensitive information isn’t stored on your servers. This method helps secure guest information beyond the initial transaction at the POS.
  • Hotels that reckon with their security vulnerabilities now will protect themselves from fines and other fallout from data breaches as business rebounds. They’ll also build deeper, more trusting relationships with customers by keeping their personal information secure. By strengthening security protections and devaluing their data, hotels can set themselves up for a brighter future. 
  •  
    This article describes the vulnerabilities in the security systems of the hotel Industry. The POS system was recognized as one of the most vulnerable areas that are more targeted by hackers. This is due to the multiple stations where the POS systems are located on the premises of the hotel. Likewise having POS systems independent of the hotels security system left the system open to hackers. Two options to defending the cyber-defense, are digital walls and employee training. Digital walls works by keeping hackers from accessing the systems. Although even with a strong firewall it is recommended to implement point-to-point encryption (P2PE), this encrypts payment information of guest. the other is tokenization. This uses alphanumeric pseudonym to protect data stored for long periods of time. Another way to prevent cyberattacks is employee training, encourage the use of strong passwords an dhow to detect fraud and phishing attacks.
irinadolgopolova

How to Prevent Malware Attacks and Promote Cybersecurity at Your Hotel - 0 views

  • Each time a hotel’s guest records get breached, the property is burdened with financial strain and faces broken trust with guests. As a hotelier, you don’t need to be an expert in cybersecurity, but you absolutely need to understand the basics to protect your business and your guests.
  • hotels process lots of transactions and store tons of guest data. A hacker can simultaneously target a property’s point-of-sale and property management system to capture payment card information as well as personal data, like passport numbers and email addresses.
  • Research from Symantec, a cybersecurity firm, found that more than 65% of hotels are routinely leaking booking reference codes through third-party sites. Why is this important? Because the information shared through these codes would allow a bad actor to login to a reservation, view personal details, and even cancel a booking altogether. When this happens, your guest information is vulnerable and you risk destroying the guest relationship.
  • ...3 more annotations...
  • Compliance with the Payment Card Industry Data Security Standard (PCI-DSS) not only helps to ensure that data security software, hardware, and practices are safer, but also helps to protect against fines and penalties when a breach occurs,
  • The right technology is only half the equation; over the years, security experts have also identified employees as part of the problem. Hotels must train their staff to handle personal information security, comply with privacy policies, and change user access credentials regularly.
  • Even with a great PMS/POS system and the right training, it’s important to perform routine penetration testing and risk assessments. There’s no straightforward answer as to how often you should pen test your network, but experts warn once a year probably isn’t frequently enough
  •  
    The article is about the reasons why the hotels are attractive for hackers, the author also explains the key concepts in the cyber security. Then, the biggest cyber attacks in hotel industry are described in the article. At the end, the author tells us how hoteliers can improve the security measures.
leonfai

Why cybersecurity matters | Hotel Management - 0 views

  • Cybersecurity is not just a buzzword. In today’s technology-abundant world, it has become a critical undertaking for companies across all industries—including hospitality.
  • Trustwave’s "2018 Global Security Report" lists hospitality as one of the top three industries most vulnerable to payment card breaches. Other estimates project that hotels are the unwelcome recipients of around 20 percent of all cyberattacks.
  • Additional anecdotal evidence supports these numbers. One need not look further than Marriott International’s Starwood Hotels & Resorts Worldwide group, which recently disclosed the theft of more than 25 million passport numbers and 380 million unique guests’ personal information.
  • ...9 more annotations...
  • After all, the industry has been and continues to be focused on cultivating a user-friendly atmosphere. Unfortunately, for hackers this combination is nothing short of a gold mine.
  • Since a businesses' hard-earned reputation relies heavily on instilling confidence in its customer base, a breach of trust is sure to compromise that relationship. If an attack affects millions and is publicized to millions more, the impact on brand equity can be difficult to recover. 
  • Marriott, for instance, was criticized not only for the breach, but also for responding inadequately and unprofessionally.
  • In short, as more and more consumers become aware of the importance of reliable cybersecurity, a hotel that neglects this pain point is compromising the strength of its product among its competitive set. 
  • Considering that the annual frequency and severity of cyberattacks are only rising, the time is now to establish organizationwide security operations, recovery plans and budget allocations.
  • a cohesive top-to-bottom strategy is required and often is best delegated to a trusted strategic advisor with depth of experience in cybersecurity breach prevention and resolution.
  • Next, the goal becomes full-scale protection. From the technical side, this includes setting up firewalls and securing weak points (such as point-of-sale terminals).
  • There needs to be an efficient method for detecting the attack and mitigating any damages. Lastly, to avoid the pitfalls noted above, a predetermined plan to address this worst-case scenario is vital. From reviewing insurance policies to preparing for impending litigation, recovery is a process best started with a go-to advisor before it is needed. 
  • The only way to avoid being another statistic in future Internet crime reports is by staying as ahead of the looming threats as possible.
  •  
    This article talks about how cyber security is very important to the safety of the personal information.
  •  
    Author, Lena Combs, discusses why hospitality has become vulnerable to cyber attack. Ranging from the failure to secure POS systems and credit card data. To hotels' inability to detect and effectively respond to potential cyber threats. Combs outlines the steps involved in implementing a cohesive top- to bottom strategy that will effectively address these dilemmas. More importantly, why doing so protects a hotel's bottom line and brand positioning.
  •  
    The following article highlights the importance of cybersecurity in general and why it is especially important in the hotel industry. This highlights many facets, one being the fact that the hotel industry is one of the most vulnerable to cyber-attacks, therefore, needing to have top-notch cybersecurity.
jchac014

Highly connected hotel industry continues to be vulnerable to cyber attacks | PhocusWire - 0 views

  • cyber threats in hospitality, which claims there have been 13 “notable data breaches” in the industry in the past three years.
  • PwC’s Hotels Outlook report 2018 to 2022 which says hospitality has the second-largest number of cybersecurity breaches after the retail sector.
  • factors which make them attractive to fraudsters such as the volume of financial transactions that hotels carry out, the sensitive and valuable personal data collected, use of loyalty programs and their national and international spread.
  • ...5 more annotations...
  • dark web “chatter’ breakdown reveals Hilton had a 31% share of mentions on hacker forums followed by Marriott at 28% and IHG at 19%
  • Marriot recently revealed that its data security breach had cost the company $28 million.
  • It’s unsurprising that as the aviation industry grows and airlines look to adapt their distribution models, cyber attacks and other fraudulent activity also increases.
  • Air Europa says that as it went through its digital transformation, it needed to handle fraud more efficiently.
  • the airline industry saw a 29% decrease in fraud attacks in 2018, but the company attributes that the large data hacks involving passport details have not yet “been reused to commit air travel fraud.” 
  •  
    This article talks about how the hospitality industry has become more susceptible to cyber-attacks. Hotel companies like the Marriott have faced costly fraudulent cases online and have implemented new programs to ensure safety and security.
tcale003

5 Reasons Why You Need A Travel Agent - More Than Ever - 0 views

    • tcale003
       
      Travel agents are considered travel advisors or consultants. Large corporations still use travel advisors for their travel needs. Travel consultants are needed for a multitude of reason including their expertise.
  • Travel agents are even more important to luxury travelers, who ironically often think they know a lot about travel and rely on their own misguided sense of expertise. But while a good agent is so vital that it is simply foolish to plan a high-end trip on your own without one, they can also help travelers of all budgets.
  • pros of using an agent: “They can find crazy deals”; “They will be your advocate”; “They’ll take care of the little things”;
  • ...13 more annotations...
  • The reality is that while it was widely predicted that the internet was going to kill off travel agents when digital tools were placed at every traveler’s disposal, that just hasn’t happened, for several good reasons.
  • a good travel advisor can often save you money.
  • true experts” and “They don’t usually cost extra.”
  • My tech savviest friends use travel advisors, and so does every major corporation - because it is the smart thing to do.
  • “Information overload, thousands of new hotels on the scene, all sorts of new cruise ships, passport and visa issues, weather, transit strikes, political unrest, natural disasters, travel insurance, travel providers going out of business, it’s never ending. How does one navigate all of this? To avoid the travel landmines that lay in front of you, you need to get a great travel advisor!
  • “They’re
  • good travel agents prefer to be called travel advisors, or sometimes travel consultants, and those are both totally accurate, but since most people still think of the industry in terms of travel agents
  • “Travel agents are a thing of the past - they primarily booked tickets and beds. Travel advisors have taken on a much more complex role - part psychologist, life coach, executive producer, concierge, fixer, dream maker, and ‘Blink Blink’ genie, with the multitude of services that they provide.”
  • Emergencies:
  • Expertise
  • VIP Connection
  • Extras
  • Better Trips
  •  
    There are many reasons one still needs a travel agent. They are now called advisors or consultants because of what they can do and their knowledge. These advisors can assist with a multitude of things including emergencies, getting great deals on trips, They will be your best advocate when issues arise and at no extra cost to the consumer. In addition, a good travel advisors save you time and money on trying to plan you own trip. Travel agents who just booked flights and beds are a thing of the past, travel advisors play a much more complex role and provie a great variety of services.
nbakir

Hospitality industry more prone to cyber attacks | TravelDailyNews International - 1 views

  •  
    The article by, a financial policy author, explains in detail the extent of cyber-attacks in the hospitality industry. The article explains that the hospitality industry is more prone to cyber-attacks, given the nature of information most of the organizations generate daily in their operations. The article explains that most organizations in the hospitality industry may not be aware that they have already been hacked. The article emphasizes the importance of internal audits and the critical evaluation of cyber footprints in hospitality organizations to minimize cyber-attacks. The author of the article delves into the cybersecurity risk factors in the hospitality industry and reports about the UAE IAA members' seminar which was aimed at sharing information and networking with a focus on building cyber-resilience against cyber-attacks. The article shows the prevalence of cyber-attacks in the hospitality industry noting that each stolen data record costs an average of $148 with the average cost of a cyber-attack being valued at over 3 million dollars (Karantzavelou, 2020). The article quotes a statement by the Jumeirah group chief internal audit officer who asserts that protection against cyber threats should be the DNA of every organization, and they should be continuously on the lookout for potential threats and ensure adequate protection. Members in the seminar advised on the importance of having internal auditors to provide assurance, suitable frameworks, and to set up controls to mitigate key cybersecurity risks. The article explains that hotels are prone to Cyber-attacks since they collect varied, valuable and sensitive customer information. The article also cites a cyber-breach in 2018 where up to 500 million customer details and passport information was compromised in an international hotel chain for up to four years continuously without detection (Karantzavelou, 2020). At the bottom line, contributors in the seminar explain the importance of cybe
teresastas

5 Reasons Why You Need A Travel Agent - More Than Ever - 0 views

  • The major search sites routinely leave out flights (lots of them) and even entire airlines. A lot of the flights they do show are ones you don’t want, starting with “basic economy” fares that hit you with tons of restrictions and fees, so the price you see isn’t the one you end up paying, along with connections way too short or way too long, ones that no responsible travel agent would let you book.
    • teresastas
       
      This is a very good point that is often overlooked. Southwest Airlines is one of those who do not publish their fairs on most of these OTA searches.
  • The reality is that while it was widely predicted that the internet was going to kill off travel agents when digital tools were placed at every traveler’s disposal, that just hasn’t happened, for several good reasons.
  • “They can find crazy deals”; “They will be your advocate”; “They’ll take care of the little things”; “They’re true experts” and “They don’t usually cost extra.”
    • teresastas
       
      I think that the general public believe that TA's cost extra to use. For the most part that isn't true...unless it's a cooperate travel.
  • ...15 more annotations...
  • Travel agents are a thing of the past - they primarily booked tickets and beds. Travel advisors have taken on a much more complex role - part psychologist, life coach, executive producer, concierge, fixer, dream maker, and ‘Blink Blink’ genie, with the multitude of services that they provide.
  • Anything that causes cancelled flights (or cruises, etc.) means hassles, but the people who get through this process the most smoothly and the ones who get rebooked first and get the few available seats out of Dodge are usually the ones who used a travel agent. It’s that simple. First off, you actually have someone to call, versus long lines at banks of airport phones masquerading as “help desks.” But good agencies are constantly monitoring their clients’ flights and they usually know about your problem before you do - and often have a resolution before you even call them.
    • teresastas
       
      They make a good point about having someone to call.
  • Expertise: No one knows everything about travel, no matter how deeply they are involved in the industry.
    • teresastas
       
      Reason #2: Expertise
  • Emergencies: This is the one most applicable to the average occasional travel.
    • teresastas
       
      Reason #2: Expertise
  • It is important to remember that these advantages are not just for luxury travelers. Good travel advisors do not just know what the best hotel is, they know what the best hotel is for you and your budget and can help you find the right fit.
  • Connections: Whether you are trying to book space at a coveted 8-villa safari lodge in Africa or get a room in a top Paris hotel during Fashion Week, most hoteliers keep emergency inventory and guess who gets it? The travel advisors they have known for years who book a lot of guests and send them a lot of business.
    • teresastas
       
      Reason #3: Connections
  • “Travel advisors provide our clients with access: access to people, places, and experiences that could never be replicated, much less imagined. A great travel advisor has invested time and relationships in creating their ‘black book’ of contacts and relationships, so that when their clients travel, they are treated as a VIPs, not just a credit card number.” In my experience, everyone likes being treated like a VIP.
    • teresastas
       
      I think this lends itself to who your travel agent is and what they are most experienced in. I couldn't agree that all travel agents are going to give their clients VIP experiences.
  • “Information overload, thousands of new hotels on the scene, all sorts of new cruise ships, passport and visa issues, weather, transit strikes, political unrest, natural disasters, travel insurance, travel providers going out of business, it’s never ending. How does one navigate all of this? To avoid the travel landmines that lay in front of you, you need to get a great travel advisor!
  • Extras: When you get more than you expected for the same price, that’s a great deal, and with travel advisors this happens all the time.
    • teresastas
       
      Reason #4: Extras
  • “The millennial generation specifically may have seen their parents use a travel advisor, but don’t feel like they need one - until they are deep in the spiral of research. By shifting gears to planning with an expert, they feel liberated from the immense pressure of choosing the ‘best’ resort - because we’re cutting through the noise of all the conflicting opinions they’re seeing online.
    • teresastas
       
      This is a great point. I know first hand that when booking an actual vacation it can be so much easier to have an expert weed out the options they know won't work for you.
  • Air: If you are trying to buy the cheapest round-trip economy ticket from New York to Dallas, even the best advisors probably can’t get it for less than you can buy it online, though you still have to deal with all the pitfalls of the online travel sites and you will lose the safety net advisors provide when things go wrong. But in a couple of other cases, buying your air through an agent can actually save you money, or miles, or both.
    • teresastas
       
      Reason 5: Air Fare You will usually be able to find the cheapest economy online but there are times when a travel agent might be able to save you fees on airlines.
  • It just doesn’t seem possible, but it is, real tickets, same airline, better seats, less money. I don’t know how they do it, and frankly I don’t care, but if you know who to call this happens all the time (if you are not a client of SmartFlyer booking your vacation or business trip, they will charge you a fee to do the legwork and find you great deals on premium and mileage tickets, but in almost every case I’ve seen, it still saves you money).
    • teresastas
       
      This is a great travel tip!
  • Better Trips! At the end of the day this is the bottom line, the big win you get with a good travel advisor. They know more than you do, they are better connected, they have access to benefits you can’t get yourself, and they can match and often beat any prices you find. They plan a better trip and then provide a safety net.
    • teresastas
       
      Reason number 6: Better Trips Your trip is better all around when you use a good travel advisor!
  • Travel advisors take the overwhelming amount of information out there and distill it into the key points that apply to you - the best hotel/destination/tour for your interests, your budget, and your time frame.
  • 5 Reasons Why You Need A Travel Agent - More Than Ever
    • teresastas
       
      We have been discussing a lot about the role of GDS's and OTA's it has become clear that the role of the traditional travel agent has evolved. The question of what is the role of a travel agent and why should we still use them has come up a lot and this article breaks down the answer giving 5 reasons why we still need travel agents. The reasons are listed as emergencies, expertise, connections, airfare and extras. All of these reason collectively make a better trip all around. After reading this it makes me want to book my next vacation through a travel agent!
ldevaul

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
mmoutsatsos

Why Germ-Zapping Robots and AI Technology Could Be the Future For Cruise Ships - 0 views

  • Cruise lines have arguably been well ahead of the game when it comes to new technology in the travel industry
  • -- even before the COVID-19 pandemic took hold in March and led to a global suspension of operations.
  • What COVID-19 has done is to add a more 'urgent' element that will force the industry to speed up that process of adding to the passenger experience and enhancing health protocols."
  • ...28 more annotations...
  • thermal imaging cameras to test passengers' temperature; the aim of the technology is to give a ship's medical team the information to decide whether a passenger should be allowed to board.
  • Royal Caribbean's fast track check in -- take a selfie and scan your own passport; Celebrity's facial recognition technology; MSC Cruises' artificial intelligence system, Zoe, an Alexa-like onboard assistant; and Princess' Ocean Medallion, a part-app, part token approach to customized cruising.
  • Princess Cruises' Ocean Medallion, for example, unlocks the door as you approach so guests don't need to touch their door handle. It was simply a luxurious feature pre-COVID-19; now, in our new world it, holds far more practical importance."
  • Another possible change passengers might see are disinfection tunnels leading to the terminal and an entirely biometric system operating in the terminal, according to Jennifer Willy, editor at the
    • mmoutsatsos
       
      In our discussion we talked about how to justify spending money on technology and I believe this article does a good job at showing all the different tech the different cruise lines were investing in and how it todays day with COVID it has become money well spent. We also talked about disruptive innovation and how if a company doesn't adapt it will fail. The cruise industry see the move to things become touchless and have already taken steps to meet expectations.
  • Apple and Google both are developing track and trace apps, which can alert crew whether someone has been near an infected person.
  • "Most likely to be rolled out first across most cruise lines and port terminals is temperature scanning, for example, thermal imaging using infrared to detect elevated skin temperatures, not only at embarkation, but for monitoring throughout the cruise."
  • One of the aspects that we might lose, at least in the short term, is the personal touch --
  • "There are systems for air purification and pathogen removal for the whole terminal facility that could be implemented, along with UV lighting, and the obvious thermal imagining for temperature checks,"
  • touchless tech. This is already used widely by the lines in the form of apps, which allow you to do a whole variety of things -- often without the need to log onto onboard Wi-Fi.
  • ct as a keycard to open your cabin, to order and pay for drinks; make bookings at restaurants, shows and the spa; book shore excursions, check your account, track your loved ones or even control the lights and temperature in your cabin.
  • "For instance, a ship could use virtual queueing apps to limit how many people are able to go to a certain area at any given time, which would make certain there is no crowding at a lunch buffet, in the fitness center or at the pool.
  • MSC Cruises' geo-location wristbands mean you can find your friends or family wherever they are on the ship (using your app), rather than meeting them at a central point somewhere.
  • Ocean Now on some of Princess Cruises' ships, passengers can order food, drink and a selection of other products and receive them in a different location, away from other passengers or shopping areas.
  • "Royal Caribbean's Bionic Bar cocktail maker was surely little more than a publicity stunt when it was conceived but it now seems a prophetic move by the cruise line. People will be understandably worried about food and drink preparation -- and shared buffets in particular - when they return to cruising. We may see an increase in automation as a result."
  • Most of the major lines have been running with enhanced technology for a couple of years.
  • could cruise lines introduce some of the changes that are already being pioneered at hotels such as limited housekeeping, no room service and surfaces devoid of many items to help with cleaning?
  • whose LightStrike Germ-Zapping Robots (they've been likened to R2D2) are already being used in hotels, restaurants, food processing facilities, and office buildings -- and it has built protocols for cruise ships.
  • The robots use broad spectrum UV light to quickly decontaminate rooms and public spaces.
  • Xenex, Texas Biomedical Research Institute tested the robot against the virus that causes COVID-19 and it killed it in two minutes.
  • worried about touching surfaces in your cabin, just ask Zoe to look up information or power items on or off for you – MSC Cruises' voice activated Alexa-like speaker is in every cabin onboard MSC Bellissima and MSC Grandiosa, and is likely to be retrofitted onto other ships in the fleet.
  • "Voice tech will become important in the new touchless world too. Rather than having to turn off the lights or lower the blinds by hand, just ask 'Alexa' to do it for you,
  • "It will be an expensive time for cruise lines when they can least afford it. Lifelong cruise lovers will return after the pandemic ends but convincing new people to give a cruise a try may rely on ships becoming as touchless as possible."
  • I think onboard technology will augment the ways guests can communicate and interact with the crew, rather than replace them."
  • "Once again, completely replacing a human being is unlikely, and handing off conversations will be an important step."
  • Royal Caribbean found out to its cost in 2014 when it first introduced tablets for waiters to take orders, and were hit with a deluge of complaints because it meant waiters were buried in their screens
  • Cruising is all about the personal attention and relationships built with crew and other guests. 
  • "Personal contact with the ship board staff is and always has been a very important component of creating memorable experiences. The cruise product cannot eliminate that essence of the cruising experience.
  • He added: "Otherwise it will be just transportation from one place to another."
  •  
    This article talks about the different technology cruise lines have implemented and the future technology they plan to include as they move for a more touchless approach to certain things.
kellym64

Making Waves: Cruise Technology and Digitization for Post-Pandemic Passenger Experience - 0 views

  • Digital check-ins and boarding passes that rely on biometric technology, which are already being used across most major airlines, have now become the norm for cruise ships. Royal Caribbean's seamless check-in is one example of the touchless boarding experience, wherein passengers can simply take a selfie and scan their passports. A similar move has been made by Carnival Corp, who implemented infrared cameras to screen passengers prior to boarding, which helps the ship maintain safety protocols.
    • kellym64
       
      Some of the bigger cruise lines have already implemented these changes and will stick to it to decrease wait times and less contact to avoid any germs spreading.
  • Radio Frequency Identification (RFID) technology has also become a popular adaptation for cruise lines to provide passengers with a more seamless way to board, move about and pay for items on the ship.
  • Wearable devices such as Princess Cruise’s Ocean Medallions, Royal Caribbean’s WOW Bands, or Viking Cruise’s intelligent TraceSafe devices, that come equipped with RFID technology, can act as a room key, enabling passengers to automatically open up doors and pay for drinks, services, games and other amenities. Wearable devices enable mobile identification, which also allows passengers to easily embark and disembark the ship. With just a scan of the wristband, crew members can access a passenger’s necessary information, to maintain faster boarding processes while also keeping travelers and crew members safe and accounted for.
    • kellym64
       
      I have personally used the wirleess key and it is 100 times better than a room key. I can wear the key in the water and I don't have to remember where I placed a room key or remember to take it with me before leaving the cabin.
carine_elie

How Much Should You Spend on Cybersecurity in 2022? by Lynn Goodendorf Spring 2022 - 0 views

  • Many hospitality companies are struggling with the question of how much to spend on cybersecurity especially in the context of revenue losses related to the pandemic.  The challenge is that the risk of cyberattacks is rapidly escalating.  There are several drivers of this alarming trend.  First, ransomware is growing in severity both in the scope and the scale of attacks as well as the amount of the ransom demand. Next is the increase in remote work during the global pandemic and the rush to facilitate at home working. And finally, small companies are increasingly targeted because they are “easy” victims and typically more vulnerable. As you might expect, the cost of cybercrime increased more than 50% from 2019 through 2020. According to a report by McAfee¹, the global cost is estimated to be more than $1 trillion and monetary losses are estimated at $945 billion.  Examples of hidden or intangible costs that are difficult to measure include system downtime, reduced efficiency, brand damage and loss of trust.  Expenses that are direct and easier to measure are consultant services, legal fees and cyber risk insurance premiums. Below is a chart published in the McAfee report that illustrates this trend.
  • Ransomware - a Denial of Service/Operations and often includes a data breach Business Email Compromise (BEC) - often involves Funds Transfer Fraud Computer Data Breach - theft of personal data such as cardholder data, social security numbers, driver’s license numbers, passport numbers and details, etc.   What is the best way to go about budgeting for cyber security risk?  As a starting point, be sure that you have a qualified information security professional managing your program of work. Regardless of the amount you spend, a knowledgeable and experienced cybersecurity professional can make well informed judgments about priorities in expenditures.   There are three well established strategies that can work together in combination.   Each strategy has advantages and drawbacks and it is not recommended to rely on a single approach. Below is a description of each way to go forward.
  • STRATEGY A:  Key Ratios of Spend
  • ...2 more annotations...
  • STRATEGY B:  Gap assessment
  • STRATEGY C:  Focus on Compliance
  •  
    The writer of this article is Hospitality Upgrade. It includes the expanding worries of the hotel sector.  The key ratio of spend, gap analysis, and a focus on compliance are the top three main strategies being used by the hotel sector. In addition, the other measures are made by businesses to aid in preventing such breaches and the financial repercussions that result from them.
earagon22

PCI and PSD2 Compliance: Why Are Hotels on the Hook? - 0 views

  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • Established in 2006, PCI stands for the Payment Card Industry Data Security Standard, which contains guidelines for accepting, storing, and processing credit card information
  • ...12 more annotations...
  • These days, cyber security and regulatory compliance aren’t just necessary skills for the IT team. Every hotel manager - even the “non-tech savvy” ones - must understand these crucial components of data protection in order to protect their businesses.
  • A few rules of thumb include using PCI-compliant POS and PMS providers, storing both digital and paper data securely, and limiting access to sensitive data to only the employees who truly need it.
  • Examples of these guidelines include using an online checkout/payment page controlled by a licensed 3rd-party service provider, storing credit card data via a 3rd-party “vault” provider rather than in your own system, and masking the full credit card number on receipts, showing only the last 4 digits instead.
    • earagon22
       
      As an example, if guests book through a 3rd-party like Expedia then I at the front desk see an Expedia card not the guest's card. The card I see is pre-loaded with the amount of the stay ONLY. Even then, I cannot see the 3rd party's full cc number. I only see the last 4 digits just like guest credit cards.
  • “The attack on Marriott was hapless and still has many gaps to fill on what actually happened. A popular entry point for adversaries is through email spoofing. This tactic is used in phishing in order to get malware onto a target network to then move laterally across all systems,” Ryan Cornateanu, Application Security Engineer @ CrowdStrike.
    • earagon22
       
      This attack mentioned compromised cc details, passport numbers, and dates of birth for 300 million guests in their database. This happened in 2014. https://hoteltechreport.com/news/marriott-data-breach#:~:text=And%2C%20the%20financial%20burden%20is,the%20largest%20data%20breaches%20ever.
  • because of increased payment security, the amount of chargebacks will likely become much lower, which is something all hoteliers can celebrate.
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should still comply, since regulations like these are often mirrored in the United States and other countries soon after.
  • PSD2 includes enhanced guidelines for online payments and the handling of sensitive data to reduce the risk of credit theft, fraud, and security breaches. One major change is the requirement of Strong Customer Authentication (SCA) for online transactions. With SCA, rather than simply typing in a credit card number and clicking “pay,” consumers will need to provide a second layer of authentication, which could be a PIN code or an SMS verification code, before the payment can go through.
  • Guests book nearly three-quarters of hotel reservations online, so PSD2 will likely impact every hotelier as Strong Customer Authentication (SCA) becomes a requirement for payment processing.
  • Are any charges processed after the guest has checked out, such as minibar chargers? To prevent any hiccups with payment after check-out, charge an authorization on the guest’s card for the full incidental amount and have the guest provide two-factor authentication in person, such as chip-and-pin, when the guest checks in.
    • earagon22
       
      A property rule where I work is that each guest must insert or tap their cc at check-in in order to follow this rule and we take an incidental hold each night. Guests that have not traveled for years are surprised by incidental holds which makes sense based on when this was implemented.
  • The key takeaway here is that transactions initiated by the hotel at a time when the guest isn’t present won’t comply with PSD2 requirements.
  • protect consumers’ sensitive data, and, as a result, every merchant that uses credit card information must follow these rules, from small businesses to large corporations.
  • By partnering with a trusted technology solution and investing in PCI and PSD2 compliance now, hoteliers can prevent the potential catastrophe that could come with the theft of sensitive data.
  •  
    PCI compliance is a crucial and necessary set of guidelines that all hotels must follow. The Payment Card Industry Security Standard was created in 2006 and outlines rules regarding accepting, storing, and/or processing card information. These rules were put into place to protect consumers sensitive information. For example, in 2014 Marriott hotels was attacked and 300 million guests information was compromised. This attack led to new regulations being put into place, the Payment Services Directive 2 (PSD2). These regulations take into account international customers and enhanced guidelines for sensitive data.
‹ Previous 21 - 40 of 43 Next ›
Showing 20 items per page