Skip to main content

Home/ Hospitality Technology/ Group items matching "victim" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Dale Gomez

Colombian man pleads guilty to computer fraud - 0 views

  • The computer fraud scheme had more than 600 victims worldwide, including U.S. Department of Defense employees, the DOJ said.
  • That laptop contained the names, passwords and other personal and financial information of more than 600 people.
natalieemmanuel

Point-of-sale malware has now infected over 1,000 companies in US | Ars Technica - 0 views

  • According to the US-CERT advisory, the group behind the Backoff malware operation scanned the Internet to find potential victims by detecting installations of the remote-desktop software frequently used by service providers to manage the point-of-sale systems of their retail clients. The attackers look for remote desktop solutions like Microsoft’s Remote Desktop, Apple's Remote Desktop, Chrome Remote Desktop, Splashtop 2, Pulseway, and LogMeIn, according to the advisory. Once a potential target is identified, the group uses the equivalent of a digital sledgehammer, attempting to break into the system using a list of common passwords.
  • Such techniques are a common threat to small retail businesses, according to Trustwave, who helped the government agencies in their analysis of and response to the 'Backoff' program. A third of cybercrime attacks on businesses focused on the point-of-sales systems in 2013, according to the company's 2013 Global Security Report. In 31 percent of incidents, attackers exploited weak passwords to gain access to targeted systems
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
asant318

Ransomware: One of Hospitality's Biggest Threats in 2017 | News | Hospitality Magazine (HT) - 0 views

  • attack made headlines for locking guests out for their rooms
  • discuss how ransomware can affect the hospitality industry and what hotels and restaurants should consider to protect themselves from future cyber attacks.
  • Travelers may be annoyed, but for the hotel, ransomware can be a major business disruption.
  • ...10 more annotations...
  • The cyber threat has been used to target a variety of businesses from hospitals to retailers and now the hospitality industry
  • , businesses need to always be ready for a breach. Every business should have an action plan in place to prevent their company from being the next victim of ransomware or any other cyber security threat.
  • pirated software, file attachments, web links, and suspicious emails.
  • keep additional devices from being infected.
  • best practices for any company to employ are regular backups and a tested disaster recovery plan
  • Using anti-malware software is a necessary start, but it will not stop everything – especially rogue software downloaded by employees
  • important to act quickly by segmenting portions of the infected network and removing devices to try and prevent the problem from spreading.
  • install ransomware protection
  • malicious software will continue to rise as businesses and consumers become more dependent on the internet for everyday needs.
  • it’s important that businesses take proactive steps to protect not only company data, but the overall integrity of the company network from hackers.
  •  
    The article discusses ransomware attacks on hospitality properties. A 2016 attack left guests locked out of their rooms but the threat could affect different areas of a hospitality business and cause significant disruption to their business. Properties need to be prepared for a security breach with an action plan to prevent cyber-attack. The article points out that it's important to act quickly to segment the network and try to prevent any new devices from being infected. Best practice recommends regular backups and a recovery plan, using anti malware software and being cautious with employee installed software. The most important thing a company can do is to be proactive and prepared for an attack.
imontenegro

Fyre Festival Organier Seneneced to Six Years in Federal Prison - 0 views

  •  
    The organizer, Billy McFarland, 26, was also sentenced for running a sham ticket-selling business - but that fraud was run-of-the-mill compared with the Fyre Festival, which had been promoted by A-list social media influencers but imploded just as publicly on Instagram and Twitter. Mr. McFarland had promised an event with luxury accommodations and performances by bands like Blink-182. But the festival never took place, leaving attendees wandering unfinished sites on the island of Great Exuma in the Bahamas.
  • ...2 more comments...
  •  
    Then in July, Mr. McFarland pleaded guilty to two more counts of fraud related to another company that he ran while out on bail that sold fake tickets to fashion, music and sports events and was said to have cost at least 30 victims a minimum of about $150,000.
  •  
    Prosecutors said that the music festival, which was to have taken place in 2017, was the product of an elaborate scheme. The festival's website identified its location as Fyre Cay, a fictional place that was described as a private island that had once belonged to the drug lord Pablo Escobar.
  •  
    In a sentencing memorandum, prosecutors had asked for a prison term of at least 11 years. They called Mr. McFarland "the consummate con artist," adding: "He betrayed and deceived his investors, customers, and employees while he was living the high life at his luxury apartment, traveling to exclusive locales, staying at luxury hotels, being chauffeured in his Maserati, and entertaining himself and his friends at restaurants, bars, and casinos."
  •  
    Summary: Billy McFarland utilized all of the tools available to hype up an event that had no validity or credibility by solely relying on social media influence to promote a lie.
galca008

Improving data security in the hotel industry lets guests sleep peacefully | Hotel Management - 1 views

  • The hospitality industry is quickly growing as a favored target of hackers and cybercriminals. In fact, according to the 2016 Trustwave Global Security Report, hospitality is the vertical industry with the second-highest number of data breaches, behind only the retail industry.
  • Hotels are high-value targets for cybercriminals because they not only hold payment card information on guests, but also a wealth of other sensitive personal data that can be used to steal their identity.
  • The fallout from a widespread data breach that compromises guests’ payment card data or personally identifiable information can be disastrous for a hotel chain. The average cost of a data breach in 2016 was $4 million. This figure encompasses everything from breach mitigation to crisis team management costs, business losses and even the more intangible consequences: damages to brand reputation.
  • ...6 more annotations...
  • However, with more countries migrating to chip cards and EMV-compliant POS systems, attackers have shifted their focus to card-not-present fraud and are targeting industries where consumers are making their payments and reservations over the phone—such as hotel contact centers.
  • If guests aren’t convinced that the hotel is keeping their personal and financial data secure, they will take their business elsewhere. In order to protect their brand reputation and their business, hotels need to create a culture of security throughout their entire organization that focuses on protecting guests’ digital property in addition to their physical property. One of the best places to start is their contact center.
  • In an era of increasing cyberattacks, hotels can make themselves less of a target by adopting technology to ensure that payment card data and other personally identifiable information is kept secure and segregated from the contact center.
  • With such an approach, customers calling to make a reservation or order additional services discreetly type their card numbers into the telephone keypad, rather than reading them out loud to the agent on the phone line. The data is securely routed to the payment gateway or a more secure server so it is never shared with the agent and is not held in the contact center infrastructure. This ensures that there is no possible spillover of the data to the unsecured or unmonitored areas of the business. It also reduces the number of individuals with access to the sensitive data, and makes the hotel contact center a less attractive target for cybercriminals. As an added benefit, this approach makes it easier for the hotel to comply with Payment Card Industry Data Security Standards by reducing the scope of compliance. By keeping payment card data out of the contact center, hotels can significantly reduce the high costs and extensive time associated with maintaining PCI DSS compliance.  
  • With stronger security practices for handling guests’ sensitive data, the hotel industry as a whole can transform itself from being one of the most likely targets for data breaches to becoming a model for data security, thereby ensuring that fewer customers ever have to go through the experience
  • Guests can sleep peacefully knowing that their data is secure, and the hotel can rest assured that its name won’t be making headlines as victim of a costly data breach.
  •  
    The hospitality industry is a major target for cyberattacks, resulting in sensitive guest information being compromised. When these attacks happen it leaves guests restless, because they know or believe their information is not safe. This article discusses this issue and how security can be improved to avoid these attacks.
  •  
    The article titled, "Improving data security in the hotel industry lets guests sleep peacefully" shows how the breach of data security can be anywhere. As technologies improve, so do ways in which cyber security can become at stake. According to this article, "Hotels are obligated to maintain the physical security of guests and their belongings during their stay-if guests don't feel safe staying in their room or leaving their belongings there, they won't continue to patronize that hotel brand. The same thinking applies to data security: If guests aren't convinced that the hotel is keeping their personal and financial data secure, they will take their business elsewhere". Thus, hotels need to make sure they are safeguarding information such as their payment information as well as other confidential information. Hackers are becoming even more sophisticated, where they can target specific industries, such as hotel industries since guests speak with hotel representatives over the phone to provide payment information. In the even that a hotel's data has been compromised, what is its responsibility? First, they should send the client a letter of apology, and then handle the complete process efficiently, so the client can at least feel they re supported. The avoidance and handling of data breach is becoming even more common nowadays with the rise of technology.
glope143

Can Disney's Magic Bands be Hacked? - MouseChat.net - Orlando News & Reviews | Disney World | Disney Cruise Line | Disneyland | Universal Studios - 0 views

  • While it is still certainly possible to potentially clone a MagicBand (and thereby gain access to protected resources by impersonating the original band holder), the fact that the band operates on the 2.4 GHZ frequency inherently presents some challenges to any would-be malicious users. Admission to the parks is fairly expensive (Fig. 5) and the cost of the hardware required to conduct such a cloning attack far exceeds the cost of a legitimate day pass. For the attack to even be considered economical, the malicious user must clone many passes over time.
    • glope143
       
      This paragraph brings up an interesting point when it comes to the security of Disney's RFID MagicBands. The primary information on the Band itself that could be most "easily" accessed if cloned is a ticketed theme park entrance. The author believes the chances of this happening are slim to none given the amount of theme park entrances that would needed to be stolen in order to justify the cost of expensive RFID cloning hardware. For arguments sake, should a hacker clone a MagicBands individual RFID code there are still a variety of hurdles to cross before being able to walk away unnoticed. Since every RFID code is individualized, should the Band that was hacked enter the the theme park prior to the duplicate, the duplicate will be stopped and questioned by security. There are also bio-metric scanners in the front of each entrance that require the scanned fingerprint to match that on file. Should the fingerprint scanner fail, a cast member with access to the original MagicBand owner's photograph will deem the duplicate band a fraud.
  • Part of the MagicBand system allows guests to make purchases with the band at specific registers provided they have tied a credit/debit card to their account via an external process. This can be seen as a very big convenience to guests who do not wish to continually use their cards to make purchases while in the parks, or for those who find themselves wishing to buy merchandise when they had not initially anticipated in doing so and do not have their wallet/purse/money clip in their possession. Yet in order to make purchases, a user must first swipe their band against a specially designed reader (Fig. 6) and subsequently enter a matching PIN number. Even if our malicious user had an RFID token that was a working clone of a legitimate one, it is somewhat unlikely he would be able to successfully guess the matching PIN number within a reasonable number of tries in one sitting before the cashier would begin to get suspicious.
    • glope143
       
      One of Disney's star features for their MagicBands is the ability to go hands-free throughout their vacation by having everything necessary stored on one device, including credit card information. This gives guests the ability to make purchases across the Resort without the additional moral barrier of having to remove their wallet from their purse or pocket. Should a MagicBand be misplaced, or duplicated as in the context of this article, a four digit code is still required to make purchases with the credit card on file. This code is not available for viewing on the band and cannot be changed though any means besides visiting the front desk with property identification.
  • While multifactor authentication certainly adds to the security of the system in a significant way, biometric  hardware is not flawlessly reliable. Florida is a rather humid place [5] which inevitably affects the performance of sensitive electronic hardware like fingerprint readers. To address this issue and counteract the likelihood of the system presenting users with false negatives, it would be fair to assume that the fingerprint readers themselves are configured to fail open (ie, when in doubt, allow entry). This gives malicious users the potential benefit of knowing that they merely need to intentionally cause the reader to malfunction to be granted access. Social engineering could also potentially play a factor in the exploitation of the MagicBand system by using Disney’s own customer-service policy against itself. Suppose our malicious user is successfully stopped dead in his tracks at the gate. He has been beaten to the entry gate by his victims and has lost the calibration race; there is no hope the machine will accept his cloned band. Yet he scans it anyway, and is denied access immediately. He knows he will not gain entry, but he continues to scan it. The employees at the gate attempt to help him, scanning his band for him, fiddling with the machine, etc, all to no avail. Yet a large line is beginning to form behind him.
    • glope143
       
      This article does a great job at playing devil's advocate in the situation of MagicBand cloning and creates a sound argument at what could happen should a hacker attempt to enter a Disney park with a previously used RFID code. As someone to frequently visit's the Disney theme parks, I would not be surprised if a cast member simply waved a guest through in order to avoid a line back up, especially during peak season times.
  • ...1 more annotation...
  • Despite the inherent arms-race between malicious users and system security mechanisms, overall the MagicBand system seems to hold up under scrutiny and is fairly well designed. The high cost of the hardware required to compromise the system via an RFID cloning attack combined with the multifactor authentication process provides sufficient layers of systematic defenses; even the most judicious adversaries may still fail to successfully thwart system security.
yuqiongliang

11 ways to help protect yourself against cybercrime - 0 views

  • 1. Use a full-service internet security suite
  • 2. Use strong passwords
  • 3. Keep your software updated
  • ...10 more annotations...
  • 4. Manage your social media settings
  • 8. Take measures to help protect yourself against identity theft
  • 6. Talk to your children about the internet
  • 7. Keep up to date on major security breaches
  • 5. Strengthen your home network
  • guard your personal data. A VPN — short for virtual private network — can also help to protect the data you send and receive online, especially when accessing the internet on public Wi-Fi.
  • 9. Know that identity theft can happen anywhere
  • 10. Keep an eye on the kids
  • 11. Know what to do if you become a victim
  • Contact the companies and banks where you know fraud occurred. Place fraud alerts and get your credit reports. Report identity theft to the FTC.
  •  
    In a way, fighting cybercrime is everybody's business. Think of it as an obligation to do your part in the fight against cybercrime. For most people, that means following a few simple, common-sense steps to keep yourself and your family safe. It also means reporting cybercrimes to relevant officials at the appropriate time.
lavendersheshe

Cybercriminals are capitalizing on coronavirus fears, security firm warns - CBS News - 0 views

  • A leading cyber security firm says criminals and a group affiliated with China are capitalizing on growing fears over the coronavirus, leading to a spike in malicious online activity.
  • "They've been sending people emails to prey on people's fears and open attachments
    • lavendersheshe
       
      It is important to be careful on opening suspicious emails and rely on watching the news to learn about the coronavirus updates. Opening such emails and downloading attachments can launch a harmful virus into your system and lead to your computer being hacked
  • China-based adversary known as PIRATE PANDA uses major news events as a lure to implant malware that allows remote access to a victim's computer network
  • ...3 more annotations...
  • Another group, identified by CrowdStrike as MUMMY SPIDER, is using the coronavirus theme in an "email thread-hijacking technique" that "ultimately led victims to download malware
  • The security firm said the strategy can be used to steal financial information or login credentials, and expanded to other targets
  • CrowdStrike also reported a surge in queries from companies who anticipate employees will work from home over the next three months, which can leave company data more vulnerable
    • lavendersheshe
       
      If employees work from home then an organization has less control over the security of online systems and exposes the company to more risk.
  •  
    Cybercrime has been on the rise since the outbreak of the coronavirus and hackers are capitalizing on the fact that people are now more concerned about protecting themselves and their loved ones. It is important to be more aware now as an organization in making sure that employees are informed on safety measures on using systems when there at home, using the needed resources in increasing cyber security and backing up important information.
teresaricks

Cyber Security In The Hotel Industry | protel - 4 views

  • And phishing isn’t the only strategy these computer thugs use, either. Just about every hotel in the world could be vulnerable to malware, ransomware, spam, hacking and social engineering. 
  • The argument for educating staff on cybersecurity is a simple one: if staff don’t know how to recognize a security threat, how can they be expected to avoid it, report it, or remove it?
  • the 2019 State of IT Security Survey found that email security and staff training were listed as the top problems faced by IT security professionals.
  • ...16 more annotations...
  • Yet, more than 30% of staff surveyed by Wombat Security Technologies didn’t even know what phishing or malware was. This is probably why scams like the Business Email Compromise (BEC) result in whopping losses of over $3 billion (according to the FBI).
  • But as humans, hoteliers make mistakes, they’re trusting of fake identities, tempted by clickbait, and vulnerable to other sneaky tactics used by criminals to gain access to company information.
  • Staff need cybersecurity training to protect themselves and the hotel against cyberattacks.
  • By making employees aware of security threats, the impact they might have on your business, and what procedures to follow when a threat has been identified, you’re strengthening the most vulnerable links in the chain.
  • The World Economic Forum in their latest report, The Global Risks 2019, puts cyber-attacks and data theft into the higher-than-average likelihood bracket during 2019.
  • To achieve these record levels of data breaches and cyber-threats, cybercriminals are focusing their attention on the manipulation of human behavior.
  • So how do we counter these threats? Education, education, education. 
  • Security awareness training is not a point event or solution, it is a process. Security awareness comes out of a series of ideas, thoughts, and preparations that are used to develop a holistic security awareness training program.
  • Identify the Specific Cybersecurity Needs of the Hotel/Property   
  • Include Cybersecurity Awareness Training During Onboarding
  • Cover Relevant Topics
  • Make Staff Cybersecurity Training An Ongoing Process
  • We all make mistakes and occasionally slip up. It is really important that staff know that they can come to you and that they are free to report problems without there being a risk of them losing their jobs. This will come from your personal management style. 
  • Cybersecurity is everyone’s responsibility, whether you are C-level, management, accounting, housekeeping, maintenance, or reception, it does not matter. Everyone needs to be made aware of the hotel’s individual cybersecurity policies, attitude, and culture. 
  • Continuously send reminders via email, Slack, or any other messenger your hotel may be using with reminders to change passwords, to update anti-virus programs, and with information about the latest phishing techniques.
  • If you create a culture of cybersecurity awareness within your organization, then the chances of your organization becoming a victim are greatly reduced.
  •  
    This article stresses the importance of providing cybersecurity training to staff in the hospitality industry.
azephyr

Cybersecurity in Hospitality Industry - Types of Threats - Logsign - 0 views

  • implementation of electronic devices and similar conveniences also pose serious threats regarding the security of our sensitive information. That is why cyber security practices gain much more importance in the hospitality industry. I
  • The term cyber security is used to refer to the methods and practices that aim to defend devices, networks, servers, electronic systems and all kinds of data from ill intended attacks.
  • Cyber security professionals aim to keep such malicious intended individuals away from your systems.
  • ...7 more annotations...
  • Cyber security practices often involve the use of a tool or software such as antivirus programs, firewalls, anti malware software and such. In accordance with the needs and vulnerabilities of your organization, various cyber security solutions can be employed and configured. You can opt for getting professional help and/or hiring a team of cyber security professionals for this task.
  • In the past years, we have witnessed many hotels being victims of cyber criminals. Such incidents lead serious data leakages and hurt the reputation of the organization.
  • Customer Data/Identity Theft: When booking a hotel room, we share some of the most sensitive pieces information regarding us: Our name, address, payment information. That is why most hackers try to steal customer information from the hotels using malware, computer viruses and social engineering methods.
  • he term phishing refers to the techniques used to deceive and convince professionals to leak information. The most popular phishing techniques include fake web pages, phone calls, text messages and e-mails.
  • Darkhotel hacking: This technique involves hacking the hotel WiFi and steal information from the visitors.
  • If you want to protect your organization from cyber threats, first you need to inform your employees.
  • Secondly, you must invest in some bullet-proof cyber security software including but not limited to antivirus, antimalware and firewalls. You must also hire a team of IT specialists to ensure that your organization is protected 24/7.
  •  
    This article talks about the type of threats the hospitality industry can face, an explanation of cybersecurity, and how to protect your organization from cyber threats, especially phishing.
dbake008

How to keep guests safe from a point-of-sale system data breach | Hotel Management - 0 views

  • many all-in-one point-of-sale systems are vulnerable to a wide variety of attack scenarios because they leave card data in plain text within the memory of the system, there are systems and additional technologies that can mitigate a data breach.
  • Hackers heavily target POS systems because they typically hold consumer’s personal and financial data
  • The fact that POS systems are the largest attack vector makes it the obvious starting point for businesses to lock down
  • ...6 more annotations...
  • “If your business is the victim of an attack, early discovery can limit the extent of the damage,
  • are performance.
  • Malware attacks often leave indicators or evidence through diminished softw
  • Mobility is now absolutely essential in POS systems,
  • From a food-and-beverage perspective, hoteliers, with the help of tablets, can expand the footprint of their restaurant by extending service to outdoor patios and poolside.
  • The consumer’s expectation is to lower transaction time and increase self-sufficiency when purchasing in any environment
  •  
    A food and beverage point of sale system is more likely to get hacked than any other technology, because it stores customer payment information.
jorgeegutivav

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Modern Restaurant Management | The Business of Eating & Restaurant Management News - 0 views

  • With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • permeable security in the hospitality sector threatens consumer privacy, shareholder value, and national security.
  • ...15 more annotations...
  • many hospitality companies are reconsidering their cybersecurity infrastructure. However, industry specific challenges like high employee turnover continue to expose the sector.[6]Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Are newly introduced technologies simply bolstering traditional methods of cybersecurity, or are they being used for methods of cybersecurity that are new and innovative, instead of simply faster or more efficient versions of the same product?
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.”
  • Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks. 
  • The problems with this approach are twofold:
  • someone has to be a victim first so that IOCs can be derived and shared with others; additionally, blocking IOCs has a very short half-life.
  • All an adversary has to do is come from a new IP address or recompile their malware so that it has a new hash value (both of which are extremely trivial) and their attacks will sail through defenses that depend on IOCs.
  • As hackers repeatedly gain access to valuable systems and data using the same methods, cybersecurity teams continue to chase after them to secure compromised systems.
  • Very little cybersecurity effort is put towards addressing the methods used by adversaries; instead, security teams are locked in a pattern of waiting for inevitable attacks, trying to minimize the damage they cause, ensuring that remediation occurs as quickly as possible, and blocking only exactly identical attacks.
  • Incident response only helps prevent attacks that exactly replicate past ones.
  • a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale.
  • Instead of seeking discrete, static IoCs based solely on what has already occurred, proactive cybersecurity analysts can instead use the intelligence they have derived about adversaries’ methodologies – commonly referred to as tactics, techniques, and procedures (TTP). 
  • From these TTPs, analysts can identify the general form and components of an adversary campaign. In addition, they can determine abstract indicators like how the adversary is attempting to hide his actions. 
  •  A proactive cybersecurity tool would be able to recognize possible adversary TTPs and indicators that describe a threat (or threatening behavior) in general terms. The system would then act on any traffic which met this pattern before it reaches inside a network, as the attack occurs, and do so in a way invisible to adversaries.
  • Using this basic model, a cybersecurity tool could truly prevent common exploits before they were executed, and could even predict and protect against future, not yet seen exploits.
  •  
    In the wake of the Marriott International cyberattack, the article presents the issues with the current issues in the methodology of cybersecurity; first explaining the data of how popular they are in the hospitality industry, and what it means for the industry, before going into the process of how a cyberattack happens and the measures taken to prevent it. Traditional cybersecurity is one of an "incident response" which can only be implemented once a cyberattack occurs and can only prevent it temporarily as a hacker can do similar tasks with different IP addresses and new malware. In order to circumvent this failure of cybersecurity, the article offers a new method in which TTPs (tactics, techniques, and procedures), are used to identify certain components of a hacker and identify how they would carry out an attack, before acting on it before the attack would "reach the network".
  •  
    This article discusses one of the largest fears of most hospitality firms, and that is keeping their client's personal information private. Most large companies in this industry have become giant data centers for the personal information of millions of people. Breaches of this type of information place the lives of many people at stake. For example, Marriott International had a security breach of over half a billion of its clients which began in 2014 and was not detected until September of this year. Keeping an individual's information away from malignant forces is just plain business sense and any more attacks of this manner will severely hurt the reputation of the business experiencing it.
aguar024

Hotels, Technology, & the Cybersecurity that Protects Them - Armor - 0 views

  • Hotels, Technology, & the Cybersecurity that Protects Them
  • introduction of virtual assistants like Alexa in hotel rooms
  • biometrics for guest access into their rooms instead of the standard room keys
  • ...9 more annotations...
  • The 2018 Trustwave Global Security Report listed the hospitality industry as one of the top five industries subjected to network breaches each year. The more technology added to help guests also means the industry needs to think harder about how they store and protect their guests’ data. If a hacker compromises the technology or infrastructure environment where guest data resides, guests could have their personal data compromised.
  • mobile keys
  • hat’s most worrisome is the amount of information collected and stored by Internet of Things (IoT) devices, like these virtual assistants and the mobile keys solution. After all, personal data has always been a prized target of cybercriminals.
  • register your fingerprint at the front desk
  • the balance between usability and security for their apps and software is critical.
  • Consumers, who are most likely to be victims, have their share of responsibilities.
  • osting on social media about how fun a vacation is could notify attackers that your valuables are sitting at home unprotected
  • it’s the hotel’s IT infrastructure that’s usually the targe
  • Unfortunately, most hotels do not have a dedicated on-site cybersecurity staff (or even IT staff for that matter).
nellyvero71

Twitter accounts of Joe Biden, Barack Obama, Elon Musk, Bill Gates, and others apparently hacked - CNN - 0 views

  • Twitter (TWTR) accounts belonging to Joe Biden, Bill Gates, Elon Musk and Apple, among other prominent handles, were compromised on Wednesday and posted tweets that appeared to promote a cryptocurrency scam.
  • Twitter's support account said: "We are aware of a security incident impacting accounts on Twitter. We are investigating and taking steps to fix it. We will update everyone shortly."
  • A little more than an hour after the attack began, Twitter apparently moved to prevent holders of verified accounts from tweeting.
  • ...2 more annotations...
  • A hack like this is particularly concerning not just because of any financial scam that can be run, but because so many world leaders use Twitter -- and some, like President Donald Trump, use it to announce major policy decisions. A hack that took over an account belonging to one of those leaders could have devastating consequences.
  • "We are aware of today's security incident involving several Twitter accounts belonging to high profile individuals," the FBI's San Francisco field office said in a statement. "The accounts appear to have been compromised in order to perpetuate cryptocurrency fraud. We advise the public not to fall victim to this scam by sending cryptocurrency or money in relation to this incident."
  •  
    The article is about what was happening today with some Twitter accounts, such as Former President Barack Obama, Mike Bloomberg, Bill Gates, Kanye West, Kim Kardashian West, Warren Buffett, and Jeff Bezos. Apparently the accounts were hacked and were asking people for money. It is a clear example of cyber attack with Twitter's account.
blevi022

Biden, Gates, Musk and Other V.I.P. Twitter Users Are Hacked in Bitcoin Scam - The New York Times - 0 views

  • A Brazen Online Attack Targets V.I.P. Twitter Users in a Bitcoin Scam
  • In a major show of force, hackers breached some of the site’s most prominent accounts, a Who’s Who of Americans in politics, entertainment and tech.
  • Dozens of the biggest names in America — including Joseph R. Biden Jr., Barack Obama, Kanye West, Bill Gates and Elon Musk — posted similar messages on Twitter: Send Bitcoin and the famous people would send back double your money
  • ...6 more annotations...
  • It was all a scam, of course, the result of one of the most brazen online attacks in memory.
  • But soon after, the list of victims broadened to include a Who’s Who of Americans in politics, entertainment and tech, in a major show of force by the hackers.
  • Twitter’s investigation into the breach revealed that several employees who had access to internal systems had their accounts compromised in a “coordinated social engineering attack,” a spokesman said, referring to attacks that trick people into giving up their credentials
  • the attack was concerning to security experts because it suggested that the hackers could have easily caused much more havoc
  • Security experts said that the wide-ranging attacks hinted that the problem was caused by a security flaw in Twitter’s service
  • Cybersecurity experts said the attack showed how vulnerable social media remains to attacks
  •  
    While this story isn't directly about hospitality it shows that poor security by technology companies like Twitter can lead to compromised access social media accounts of prominent figures. The Social Media Hospitality could be and used scam their customers.
cjdearmas

How hotel chains are tackling the cybersecurity challenge - 1 views

  • With customers getting increasingly tech-savvy and looking for better deals, smarter platforms, and intelligent options when traveling, the hospitality industry is struggling to protect margins.
  • As a result, the industry is undergoing a period of consolidation.
  • This is exactly how Marriott International became the world’s largest hotel chain — it acquired Starwood Hotels & Resorts Worldwide for US$13.6 billion.
  • ...8 more annotations...
  • However, at the time, due diligence failed to discover that Starwood had fallen victim to a data breach prior to the deal which exposed customer data of 500 million guests and subjected the hotel to penalties from regulatory authorities.
  • For those in the hospitality industry, looking to acquire properties or not, cybersecurity should be something to pay attention to — after all, the risks of not defending against cyberattacks could be catastrophic with regulators tightening the noose on those that fail.
  • Given Marriott’s size and cash reserves, it was able to weather the hit it took in the stock market, compensate (loyal) customers, and cough up the fines levied on it. Others might not.
  • “The hotel industry is at risk of attacks, such as malware and ransomware, where criminals try to either steal data or exploit organizations for a pay-off. The majority of these threats come through over email, often in malicious links.
  • The incident, of course, hasn’t dampened spirits at Marriott.
    • tcale003
       
      When Mariott bought other smaller hotels and added them to their inventory, they were not careful about their cyber-security and there was a data breach. The hotel industry is at risk of being attacked by things such as malware and ransomeware. Hotels need to pay attention to Cyber-security or risk having criminals steal valuable information.
  • Hotels house banks of sensitive
  • Hotels house banks of sensitive
  •  
    email security is a good defense against cyberthreats in the hospitality space because it not only helps fend off attacks but also sensitizes staff to risks in cyberspace and provides them with basic awareness and education.
  •  
    Mariott learned the hard way about the importance of cyber security! By inquiring a hotel for their boutique hotel line, it wasn't until after the fact that they realized that the hotel had been hit by a huge data breach in their system. Luckily, Marriott has the resources and reputation to deal with the issue. But a lot of these smaller hotels do not, so the damage to them could be catastrophic.
  •  
    "The hotel industry is at risk of attacks, such as malware and ransomware, where criminals try to either steal data or exploit organizations" Majority of threats come through over email, often in malicious links. deploying email security is a good defense against cyberthreats in the hospitality space because it helps fend off attacks.
yijingyang

Marriott is victim of another massive data breach - 1 views

  • 攻击是利用特许经营物业中两名雇员的登录凭证来访问万豪酒店品牌经营和特许经营的酒店所使用的财产系统
  • According to the company, the attack was made using the login credentials of two employees at a franchise property to access a property system used by hotels operated and franchised under Marriott’s brands.
  • The stolen data covers approximately 5.2 million guests and includes contact details such as mailing address, email and phone number; loyalty account information; personal details such as gender and birthday; linked loyalty programs and numbers; and stay preferences.
  • ...5 more annotations...
  • “ ATO攻击是对任何企业的主要威胁。
  • 在2018年11月,万豪表示,它已经发现了数据泄露的喜达屋预订系统影响5分亿的记录。
  • ATO attacks are a major threat to any business.
  • In November 2018, Marriott said it had uncovered a data breach impacting 500 million records in the Starwood reservation system.
  • Marriott has sent an email to the guests impacted by this breach and has set up a dedicated website with additional information.
  •  
    Marriott suffered a massive data breach, affecting approximately 5.2 million customers. "ATO attacks are a major threat to any business." This is the second time Marriott has suffered a massive data breach in the past two years. Marriott has responded accordingly to this incident.
atutt002

Restaurant Theft: Close the LOOP for a more complete deterrence program - 0 views

  • 2016 was the first year ever that 100% of retailers said they were victims of organized retail theft.
  • 75% of employees steal from the workplace at least once, and half will steal repeatedly
  • Internal employee theft is responsible for 75% of inventory shortages
  • ...10 more annotations...
  • stand out from their peer group for one reason (too many discounts, voids, cancels, overrings, etc.)
  • Many systems today, like Mirus, are good at Monitoring events
  • to either support (RESOLVE) or deny whether the reported exception has meri
  • Training Required / Scheduled, Terminated, Warning
  • This added visibility raises the level of accountability and ensures that action is being taken in a timely manner to follow up on any / all reported fraudulent activity.
  • Measurement
  • Fraud graphs and charts help spot trends
  • Increased Accountability
  • Minimize Fraudulent Activity
  • Improved Customer Service
  •  
    This article features an automated data gathering system that measures patterns in employee/personnel returns, refunds, etc. that can help identify misbehavior. As discussed in our discussion board about Restaurant Fraud, this type of software could absolutely assist with monitoring and accountability for employees of any level, including management. An added bonus is customer data to increase and improve service
davidclark33

Coronavirus cybercrime can attack your restaurant system, too | National Restaurant Association - 0 views

  • Protecting your business from a data breach is a constant struggle, and it’s even more important during a disaster.
  • Eliot, director of education and strategic initiatives for the NCSA, says cyber incidents and attacks, such as coronavirus-themed email phishing scams, increased as much as 300% to 350% in the first quarter of 2020 and adds that cyber scammers are now trying to target restaurant companies in particular.
  • Cybercriminals have mostly directed malicious emails at telework employees or people donating time and money to those impacted by coronavirus. “We're seeing a huge increase of cyber-related scams promoting coronavirus information or relief efforts. “It’s a big issue.”
  • ...4 more annotations...
  • The PCI Security Standards Council claims that since March, malicious virus-related reports are up 475%. The reason for the uptick is that cybercriminals are trying to take advantage of rapid changes to the payment-card data environment. In addition, 41% of small businesses have said they’ve suffered breaches costing more than $50,000 to fix.
  • Contactless payment is one of the big changes within the payment data environment. Several restaurant companies – from chains to independents – are offering it because it reduces customers' physical interaction with the restaurant's POS system. As part of this move, some businesses have eliminated credit-card PIN numbers.
  • Eliot says malicious email is usually the easiest way for cybercriminals to access your networks. The emails typically show up as urgent requests for sensitive information, often pretending to be from the Small Business Administration or the Centers for Disease Control and Prevention. When the intended victim types in his or her credentials and clicks on a specific link or downloads an attachment, criminals are in.
  • Anyone looking for easy-to-implement security tips can try these six to start. Reduce areas where payment-card data is stored. The best way to protect against a data breach is to avoid storing any card information at all. With many small operators offering curbside pickup and accepting payment over the phone instead of through face-to-face transactions, it’s important they train employees not to write down payment card details. Instead, have them enter numbers directly into a secure terminal. Use strong passwords. Using weak and default passwords is one of the leading causes of payment data breaches among businesses. Effective passwords must be strong and updated regularly. The most recent guidance is: the longer, the better. Think of it almost as a “passphrase” rather than a password. Use it in the form of a sentence, but mix in different characters within the phrase. It’s much harder to break a long passphrase than it is a short, complex password. Weak and vendor default passwords often result in small business data breaches. Also, don’t repeat your passwords. Update your software often. Criminals look for outdated software to exploit flaws in unpatched systems. Timely installations of security patches are crucial to minimizing the risk of a breach. Whenever updates are available, use them. They will improve performance and close out some of the vulnerabilities cybercriminals are searching for. Enable two-factor authentication. It's so important for restaurateurs, especially where their POS systems or any of their sensitive databases are concerned, to have two-factor or multi-factor authentication enabled. If an instance where credentials are stolen occurs, there will be a second layer of verification the operator can rely on to potentially reduce the chances that information will be breached. Segment your networks. If you are going to store payment data, make sure your POS system has its own separate, secure network. Do not store sensitive documents on public cloud services such as Google Docs or DropBox. If you’re going to store sensitive documents, house them in an encrypted, locked down location.   Be hyper-vigilant. Criminals are going to try to take advantage of this pandemic situation as much as possible. You can protect yourself by not giving out sensitive information, especially within unsolicited emails. Don’t click on links you’re not expecting and do everything in your power to protect all sensitive information.
  •  
    This article is about data breaching and cyber crime in the restaurant business. The article specifically talks about the increase in cyber crime during a crisis, and in this case, a pandemic. It talks about contactless payment as a great form of protection for restaurants as well as customers. At the end of the article, it lists six easy to implement security tips.
xrive007

Cyberattack hits world's largest meat supplier - 0 views

  • It might be days before production resumes after an “organized cybersecurity attack” affected IT systems in North America and Australia
  • The world's largest beef supplier has been hit with a ransomware attack, threatening some of the U.S. meat supply.
  • The hack came less than four weeks after a similar one by Russian criminals against Colonial Pipeline
  • ...16 more annotations...
  • JBS, one of the world's largest international meat processors, was hacked
  • forcing the company to take systems offline and stop work
  • 11 beef processing facilities in Australia and 26 chicken processing plants in the U.S
  • The company told the White House on Sunday that it was a ransomware attack,
  • JBS notified the administration that the ransom demand came from a criminal organization, likely based in Russia.
  • Ransomware, an extremely lucrative type of cybercrime, is malicious software that lets hackers encrypt a victim's files and demand a ransom to make them functional again.
  • he hackers will steal and threaten to publish those files if their demands aren't met.
  • Ransomware attacks have grown rapidly in recent years.
  • Criminal hackers,
  • often based countries like Russia where they are largely protected from U.S. law enforcement
  • have targeted practically every major industry to shake down victims for payment.
  • about 40 food and beverage companies around the world have had confirmed ransomware attacks since May 2020.
  • Colonial's hackers, an established ransomware gang called DarkSide, shut down its website amid international attention from that attack, but not before receiving a $4.4 million payment from Colonial.
  • regularly hit manufacturers, school systems and city governments.
  • ransomware attack had already affected the cattle market.
  • If this goes beyond a week, you start to really worry about these animals building up on farm sites where they just don't have the capacity to hold them
  •  
    An example of a cyber attack or ransomware, in a manufacturer. Shows some effects of a ransomware and what a consumer may experience.
‹ Previous 21 - 40 of 46 Next ›
Showing 20 items per page