Skip to main content

Home/ Hospitality Technology/ Group items matching "card" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
obena010

Top 3 Ways You Can Fight Theft at Your Restaurant - 1 views

  • How to Combat Theft in Your Restaurant
  • Employee theft and customer theft in restaurants can become a massive problem if left unchecked.
  • From colluding bartenders and cocktail servers to theft tactics as complex as Ponzi schemes, restaurant theft can occur in a million ways. 
  • ...18 more annotations...
  • False orders, credit card fraud, and comping
  • are some of the most common issues
  • Employee Theft Prevention
  • and theft can account for up to 4% of restaurant sales.
  • liquor lost due to spill or waste – can account for about 25% of alcohol sales.
  • Inventory management:
  • Comping policy:
  • So how can you protect yourself? Enter chip and pin, also known as “smart card” technology
  • Dine-and-Dash Prevention for Restaurants
  • the heroics of dealing with dining-and-dashing should actually be left to restaurant policy.
  • But you can mitigate risk in other ways. Ways to dissuade dine-and-dash theft include:
  • Video surveillance:
  • A host at the front door:
  • The use of a single entrance:
  • Request a credit card:
  • Credit Card Fraud Prevention for Restaurants
  • POS security settings and controls:
  • Restaurant theft prevention starts with establishing a culture that encourages loyalty among staff and policies that protect financial interests.
  •  
    Talks about different ways to prevent fraud in different areas of the restaurant.
  •  
    This article mainly focused on ways restauranteurs can avoid theft. For employee theft, inventory management, complimentary control and a POS system that can track the whereabouts of the items are good ways to deal with it. For dine-and-dash, the restaurant will be safer if adding surveillance and using a single entrance. Also, using credit cards is a nice way. For credit card fraud, preferring to use a "smart card" technology will be a vital way.
sdavi111

7 Steps to Securing Your Point-of-Sale System | PCMag - 0 views

  • Consider how the Target store hack in 2014 was one of the biggest point-of-sale (POS) system data breaches in United States history that exposed more than 70 million customer records to hackers, and cost the retailer's CEO and CIO their jobs. It was later revealed that the attack could have been avoided if Target had just implemented the auto-eradication feature within its FireEye anti-malware system.
  • the reality is that most POS attacks can be avoided.
  • be sure your company has a virtual private
  • ...18 more annotations...
  • network (VPN) in place to safeguard data that's traveling back and forth on your company's
  • network.
  • Most of the aforementioned attacks have been the result of malware applications loaded into
  • the POS system's memory.
  • important point to note here is that a second app must be running (in addition to the POS app),
  • This is why iOS has traditionally facilitated fewer attacks. Because iOS is only able to fully run one app at a time, these types of attacks rarely occur on Apple-made devices.
  • otherwise the attack can't occur.
  • Companies such as Verifone offer software that's designed to guarantee your customer's data is
  • never exposed to hackers.
  • These tools encrypt credit card information the second it's received on the POS device and once again when it's sent to the software's server. This means that the data is never vulnerable, regardless of where hackers might be installing malware.
  • install endpoint protection software on your device.
  • Employees can steal devices with POS software installed on them, or accidentally leave the device at the office or in a store, or lose the device. If devices are lost or stolen, anyone who then accesses the device and the software (especially if you didn't follow rule #2 above) will be able to view and steal customer records.
  • Systems that connect
  • to external networks are more susceptible to attacks from hackers
  • Consider keeping things internal and secure, use a corporate network to handle critical tasks like payment processing.
  • you'll want to comply with the Payment Card
  • Industry Data Security Standard (PCI DSS) across all card readers, networks, routers, servers, online shopping carts, and even paper files. The PCI Security Standards Council suggests companies actively monitor and take inventory of IT assets and business processes in order to
  • detect any vulnerability.
  •  
    Even though this article is from 2019 it is still extremely relevant today. POS systems are found in most hospitality outlets and the chances for a security breach are high. I have often thought when I had my credit card to a waiter and they are gone for 10 minutes are they copying the number, is it being added to a database that can then be hacked? The importance of having the proper securities in place, the proper malware and security software is really important. Having had a catering company for 20 years I had to do PCI compliance tests every 6 months and for years I just handed it over to my IT to do the test. He would suggest things to make us safer and since it usually cost money I would shake it off. It wasnt until the credit card processing company i was using had a security breach that I realized how important these PCI rules were. It is something going forward I will always pay attention to!
Nicole Stevens

After Starbucks Deal, Square Now Powers Point Of Sale And Mobile Payments For Boutique Coffee Chain, Blue Bottle | TechCrunch - 0 views

  • According to a release, customers will initially be able to pay with Square Wallet at Blue Bottle’s Oakland, Brooklyn, and San Francisco Mint Plaza locations, with the company rolling out Square to its remaining stores in the coming months.
  • Blue Bottle will use Square Register as its full point-of-sale system (Starbucks does not use Square Register) to accept cash and credit card payments, track inventory, and monitor daily reports. Customers will also be able to use Square Wallet to make purchases just by saying their names.
  • While Blue Bottle is certainly not at the same scale as Starbucks, small to mid size chains still represent a huge opportunity for Square. A number of small, regional chains are using Square Register and payments including, Pitango Gelato in DC and Baltimore (5 locations), Cafe Grumpy in NYC (4 locations) Amy’s Ice Cream (13 locations) and Cartel Coffee Lab in Phoenix and Tucson (5 locations).
  • ...2 more annotations...
  • As part of the Starbucks deal, 7,000 Starbucks stores in the U.S. accept Square Wallet, and Square readers are also sold at company-owned Starbucks stores. Square also began selling its readers at Verizon stores a few weeks ago, bringing its total number of retail locations where the payments dongle is sold to 30,000.
  • Starting with a free credit card reader for the iPhone, iPad, and Android devices, Square Reader allows anyone to accept credit cards anywhere, anytime, for a low transaction rate of 2.75 percent per swipe, with no hidden fees. Square Register serves as a full point-of-sale system for businesses to accept payments, manage items, and share menu and location information.
  •  
    I myself have a Square and swear by it. I use it to sell homemade goods and trinkets and fairs, as well as sell baked goods at fundraising events. The Square app and unit are free (after registry refund) and are simple to use. Just connect it to a bank account and you are off. You can take and keep track of both cash and credit card payments. Plus inventory tracking is easy. The Square turns any iPad, iPhone, iPod or android device into a traveling POS system. Plus there is no paper involved so it's a great first step to running a Green business. Square is the POS solution for small businesses. 
Catherine Gibson

New 'Dexter' malware strikes point-of-sale systems | Security & Privacy - CNET News - 0 views

  • Rather than targeting thousands of individual machines through traditional Trojans or phishing emails, the custom-made malware targets specific POS systems. The malware injects itself into the file iexplore.exe in Windows servers before hijacking process lists, stays active through rewriting in the registry key, and then scrapes sensitive credit card data from the server -- before transferring it through a remote command and control (C&C) system.
  • Rather than targeting thousands of individual machines through traditional Trojans or phishing emails, the custom-made malware targets specific POS systems. The malware injects itself into the file iexplore.exe in Windows servers before hijacking process lists, stays active through rewriting in the registry key, and then scrapes sensitive credit card data from the server -- before transferring it through a remote command and control (C&C) system.
  •  
    This article is about a new and advanced malware called Dexter that is targeting POS systems. The article reports that 30% of the infections are in the US (world wide). When the virus attacts the POS it steals credit card information that can be used to make duplicate credit cards to be used. There is software to help fight off the virus however people have never seen this kind of virus because of the power it was to attack the system, so this is something to be on the look out for.
Katie Gallagher

POS System Pay Off - 0 views

  •  
    Point of sales systems have been increasing popular in all retail and service industries. POS systems help companies integrate their accounting systems, track inventory, cut operating costs and more, while keeping all their company information in one place. Having a dated system in place could potentially cause frustration with the stores customers. Having an older system or cash register in place could cause long lines and inaccurate register transactions like it did for Golden Spoon Frozen Yogurt. Before using a POS system it would take even the most experienced worker 2 minutes or more to process a credit card, now it take 20 seconds. This keeps the lines shorter and the customers happy. There are issues that still arise from POS systems, for example security. One retail store based out of New York City had issues with people hacking into their DSL routers and accessing 3 months of credit card information. This company didn't seem to have any real security in place as far as accessing the system, as all employees used the same password to log in. The company used password policies and tougher procedures with credit cards to beef up security. Another company, also based out of NYC, has seen a faster and easier way to control inventory through the use to POS systems. This system can tell the managers what needs to be repurchased if an item is popular, or what's still sitting on the shelves and not being sold. This helps controls losses at the end of the season with less merchandise needed to be sold at discounted prices. Whether it's a hotel, retail store, or restaurant, POS systems help organize a company's most important and valuable information.
Kassandra Baumgardner

HowStuffWorks "How are point-of-sale systems going mobile?" - 0 views

  • Wireless connections are in the process of altering the way we shop. And the trend continues to grow.
  • Retailers and service companies can make employees more productive and lower labor costs
  • Also, accuracy is increased by eliminating written orders. Customers may receive speedier service and error-free, detailed receipts on the spot.
  •  
    This article does a great job of showing the history of the point of sales system and looking at the future of the POS System. Point of sales, or retail transactions, have been around since humans were created. Cash transactions took place between consumers and merchants, and the cash was kept in a box. The cash register, a mechanical cash box, was the first real POS System that kept track of revenues. It wasn't until businesses started using barcodes that the POS really started to change. Merchants could process sales more quickly and accurately. Restaurants were among the first to use mobile POS systems. Staff could process credit cards at the table, and place orders without ever having to write an order down. Apple, for example, eliminates the cash register altogether and handles all transactions from hand-held devices. These new systems of POS reduce labor costs and increase productivity. The elimination of written orders increases the accuracy of servers and gives customers a better quality of service. The future of the POS System is bright. Restaurants have created iPhone apps that allow customers to place their orders before they even reach the restaurant, while others let servers carry around a small computer that allows them to process transactions from wherever they are. Even more advancements are beginning to take place. Encrypted card readers and contact less payment methods will increase the security of mobile POS systems. Eventually a person's cell phone will be able to be passed over a terminal and act as a credit card. These advancements are ultimately to create more time for the guest and the business as well as make shopping more automatic. In today's society where people are controlled by the need to shop, a more automatic type of transaction is the best invention.
alexgold12

Staying Green: Hotels Step Up Their Sustainability Initiatives - Scientific American - 1 views

  • 150-room hotel can conserve 72,000 gallons of water and 480 gallons of laundry soap every year by placing the cards in its guest rooms.
  • Green Hotels Association
  • 500 laminated copies of the group’s best selling card (asking guests to consider not having sheets changed every day) costs hoteliers just $200.
  • ...3 more annotations...
  • World Travel & Tourism Council (WTTC)
  • Another positive trend is the Four Seasons’ 10 Million Trees Initiative. The hotel chain is celebrating its 50th anniversary by planting 10 million trees across the 34 countries in which it operates with the hope that the effort will help combat deforestation and global warming and attract more customers concerned about the state of the planet.
  • and not be tempted to pillage their region’s natural resource base.
  •  
    This short article briefly discusses some of the ways in which hotels are taking more initiatives to be eco friendly and practice sustainability. This article also lists a number of statistics to support its claims. For example, according to the article, "150-room hotel can conserve 72,000 gallons of water and 480 gallons of laundry soap every year by placing the cards in its guest rooms". The cards that the article is referring to are the little "to save the planet" cards you may see when you check into a hotel in your bathroom, usually near your towels. In fact, the "green cards" are so important to hotels that some companies actually provide them for you so you don't have to make them yourself (for a small fee of course) such as the Green Hotels Association that the article discusses. One of my favorite parts of the article is the "10 Million Trees" initiative taken on by the Four Seasons. According to the article, "The hotel chain is celebrating its 50th anniversary by planting 10 million trees across the 34 countries in which it operates with the hope that the effort will help combat deforestation and global warming and attract more customers concerned about the state of the planet". This concept is truly amazing to me and it definitely should be an aid to help others in learning why "going green" is such a major deal and how seriously it effects not only our futures, but our everyday lives. The article wraps up talking about eco lodges in partnership with natives and why that is important when travelers are passing by.
  •  
    Hotels are going beyond just encouraging guests to reuse linens and towels. The WTTC and Green Hotel Association are making an effort to implement green initiatives in the industry.
anonymous

Fast Food Chain Arby's Acknowledges Breach - Krebs on Security - 0 views

  • Sources at nearly a half-dozen banks and credit unions independently reached out over the past 48 hours to inquire if I’d heard anything about a data breach at Arby’s fast-food restaurants.
  •  
    In recent news, Arby's acknowledge a data breach within its restaurants. "Arby's said the breach involved malware placed on payment systems inside Arby's corporate stores, and that Arby's franchised restaurant locations were not impacted." Once figured out the company hired security experts to solve the problem. The initial sign of breach came from a service organization that serves more than 800 credit unions called PSCU. An alert was sent to all cardholders that a fast food chain had been compromised, but no specifics were mentioned. This article points out that, "point of sale malware has driven most of the major retail industry credit card breaches over the past two years." Monitoring your credit/debit card transactions is the best way to be safe in this situation- as long as you report the fraudulent charges you aren't liable. While IT has many positives for any organization, it's not risk adverse. Once a system is hacked all information of company and past users is up for grabs, and credit card companies are forced to take the blow.
Ted Rood

FTC Sues Wyndham Hotels Over Data Security Failures - Security - Privacy - Informationweek - 0 views

  • The Federal Trade Commission Tuesday announced that it had filed a suit against global hospitality company Wyndham Worldwide Corporation, as well as three of its subsidiaries
  • failing to institute a robust information security program, even in the wake of a major exploit.
  • exposure of over 600,000 credit card accounts and $10.6 million in fraudulent credit card charges, the FTC alleged.
  • ...5 more annotations...
  • More Security Insights Webcasts Malware from B to Z: Inside the threat from Blackhole to ZeroAccess Remove Administrator Rights Without Disrupting End User Productivity More >>White Papers
  • Valentino said the company overhauled its information security practices in the wake of the attacks, and also dismissed claims that anyone had been harmed by the breaches. "At the time of these incidents, we made prompt efforts to notify the hotel customers whose information may have been compromised, and offered them credit monitoring services," he said. "To date, we have not received any indication that any hotel customer experienced a financial loss as a result of these attacks."
  • "unfair and deceptive
  • The FTC accused Wyndham of failing to address the security vulnerabilities highlighted by the first breach, as well as failing to implement technology that could have detected unauthorized access to its networks. As a result, the agency said, in March 2009 attackers--"using similar techniques as in the first breach"--again
  • gained access to the Wyndham Hotels and Resorts network.
  •  
    This article describes one of the worst situations that could occur when operating a hotel. According to the text, Wyndham Hotel Group failed to implement a strong enough security system, resulting in hackers breaching the network and stealing over 600,000 credit card numbers and over 10 million dollars in fraudulent charges. The FTC is suing Wyndham Corporation for failing to take the proper security measures to guarantee the security of the most important customer information. The FTC also states that Wyndham used improper software configurations that presented credit card information in a manner that was clear and easy to read. Michael Valentino, spokesman for Wyndham Worldwide, the company made prompt efforts to notify those whose information had been compromised and according to Valentino, no hotel customer had experienced a financial loss as a result of the attacks.  Despite Valentino's claims, the FTC is suing Wyndham for unfair and deceptive practices in failing to protect the privacy and personally identifiable information about guests. The FTC claims that Wyndham failed to address the security failures that occurred after the first breach in 2008 and did not implement technology that could have detected unauthorized access to networks. In 2009, hackers used similar techniques to break into the network again as steal as much personal information as they could. 
angelamenoher

Point of Sale Technology: New Developments - 0 views

  •  
    This article provides a brief overview of the emerging trends for hotel management information systems. The trends focus on easy mobile access, unattended point of sale, radio frequency identification and near field communications. An increasing number of hotel are using the the cloud for on the go mobile connectivity to their POS systems and revenue management software SaaS. You can manage your hotel from anywhere and be up to date instantly. This trend and the next eliminates the need for desk or office time. Lilipad has created an I-product that allows guests to perform their own transactions at I-Pad kiosk which eliminates time at the front desk. The other large emerging trend is tracking devices that can be implanted in phones or even loyalty cards that link to bank and credit card accounts replacing the traditional wallet. While other articles say there is no rush to cellphones replacing wallets just yet, hotels like Aloft are using RFID's in there loyalty cards eliminating the issue of room keys. Notice in all these trends that the face to face contact with guests that we hospitality students enjoy and train for is decreasing with every new technology.
diana morales

Biometrics Lend a Hand to Hotel Security / Feb 2002 - 1 views

  • especially in public places like Hotels and airports
  • Since September 11, there has been heightened security awareness
  • Biometrics is a term used to describe a measurement of uniqueness of a human being such as voice, hand print or facial characteristics.
  • ...1 more annotation...
  • Card-based access systems have been around for a long while and control access using authorized pieces of plastic, but not who is in actual possession of that Card
  •  
    This article makes me see in a way how biometrics is actually a better idea than keycard systems or just old fashioned keys. Only the person who booked the room will be able to open it because you never know who is in possession of they card key or the key. With biometrics, you can either tell the guest to tap 2 or 3 fingers or a whold hand. I think that is respecting their fingerprinting privacy, It could be dangerous in away if anyone wants to fake finger prints but that is why a system should be set up in which the guest chooses what finger they want to use. I think its a better idea. Working in a hotel I see alot of key cards being lost and its a hassle just to get them to show their ID or they might be in the room but not registered. If they loose the key and the room number is on the envelope it is easy access for whomever found the keycard. ith Keys, they are always loosing keys. The safe keys in our hotel is always getting lost. I think its better to use biometrics for unique access only
YU CHEN

PCI compliance: A best defense against hackers - 0 views

  • The Payment Card Industry Data Security Standard, or PCI DSS, is a set of comprehensive requirements for enhancing payment account data security
  • Every hotel that stores, transmits or processes credit card data must be compliant with PCI DSS, which comprises 12 specific requirements outlined in six specific goals.
  • Compliance becomes mandatory 1 July 2010, he said.
  •  
    This is part 3 of a 7-part series about hotel IT security) This article discusses The Payment Card Industry Data Security Standard, or PCI DSS which is "a set of comprehensive requirements for enhancing payment account data security... which fosters a consistent and uniform set of standards among the five major credit brands (Visa, MasterCard, American Express, Discover, and JCB). It lists the 12 requirements and six goals which are mandatory for hotels as of July 2010 which include building and maintaining a secure network; protecting Cardholder data; having a vulnerability management program; implementing access control measures; and regularly monitoring and testing networks. As a consumer and as a hospitality professional, it is good to know that there has been a data security standard developed, and that it is required for hotels (and other merchants) to implement and develop compliance programs at every property. Also discussed are six goals for making data security decisions, such as "If you don't need it, don't store it." Upon reading these it is refreshing to see such common sense advice and no pretentiousness in the documentation guidelines. The article finishes stating that data security should not be bothersome or inconvenient, that data security is essential in light of hotel liability consequences should a guest's payment and identification data be compromised.
  •  
    This article talks about the PCI DSS which has been a mandatory standard since 2010. Every credit card processes by hotel has to conpliant with PCI DSS, or the hotel will be fined up to USD$500,000. The PCI DSS has six specific goads with 12 specific requirements. Those are: Build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks, and maintain an information security policy.
angelamenoher

New Age CCTV Systems, Now With Brains - The Shout, Hotel News, Liquor News, Bar Club News - 0 views

  •  
    Security and POS wrapped up in one tight little bow. Vectron has came out with a new cctv system that integrates to the hotel or bars POS system. Now the security system time stamps all images linked up to transactions. GM's can set up alerts to be sent to their mobiles or emails. Why is this important? Incidents like employee theft, fraudulent credit card use, guest intoxication, credit card disputes and underage service can all be tracked, imaged and time stamped to serve as evidence. This can help in insurance claims, police reports, reporting credit card fraud or dismissal of employees. There are many times where customers dispute there bills after they have received services in Miami and linking the POS to the security system would be a tool in fighting for payments deserved. Too bad this is a Australian Device and not in America.
Yudika Claude

Uber and Foursquare Co-Founders Lead $15M Investment in Dining App Reserve | Street Fight - 0 views

  • Uber and Foursquare Co-Founders Lead $15M Investment in Dining App Reserve
  • Expa, the startup accelerator founded by Uber co-founder Garrett Camp and Foursquare co-founder Naveen Selvadurai, has led a $15 million venture investment in Reserve, a startup that wants to combine reservations and payment into a seamless end-to-end dining experience.
  • The company, which currently operates in New York, Boston, Los Angeles and San Francisco, equips merchants with an iPad pre-loaded with the company’s application. Restaurants use the application to accept or decline reservations, and then process the check when a diner who made a reservation with Reserve finishes a meal.
  • ...5 more annotations...
  • a person uses the Reserve app to schedule a reservation at a participating restaurant, they store their credit card information and tipping preferences. At the end of a meal, a server simply selects the reservation, processes the payment, and provides the diner with a small business card reminding them that they paid via Reserve. The company charges diners a flat $5 rate for all transactions.
  • app eliminates the need to wait for a check
  • muted take on surge pricing
  • allows restaurants to accept bids for highly-sought-after reservations, creating a more organic way for businesses to profit on moments of intense demand
  • the company has focused on working with higher-end restaurants as a way to diminish the impact of the startup’s relatively small fee but also as a way to ensure the product was used correctly by restaurants
  •  
    Introducing the new dining app Reserve. It creates a seamless dining experience by storing a customer's credit card info upon reservation and immediately charging it once the meal is completed, also charging the customers' preferred tip. That way customers do not have to wait for the back and forth that occurs once they are done with their meal and servers collect payment. While the idea seems amazing, I am worried about the safety of storing people's credit card information on this app.  I also think that with the tipping already pre-included, the incentive on the wait staff's part to deliver great service is diminished. It is also a negative for the client because even if they are not satisfied with the service (or on the other hand if they feel that their server went above and beyond), they are not able to adjust the pre-arranged tip accordingly.  I do think that it is a great way for restaurants to make a nice profit through bids for "highly-sought-after reservations" because people will be more willing to spend a lot to to ensure they get a table at fancier restaurants. 
anonymous

Cybersecurity Tactics for a Hotel Industry that's Under Siege - 0 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar. Just ask Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel Collection, all of which were victims of highly publicized, major breaches in the hospitality industry last year. 
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • In the breaches mentioned above, point-of-sale (POS) systems were attacked and malware launched to acquire cardholder names, credit card numbers and expiration dates.
  • ...7 more annotations...
  • It can be difficult and expensive to hire and retain an IT security team
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required.
  • personal details for hotel guests are frequently stored in a variety of locations, including billing, facilities, restaurants, etc.
  • otels are made even more vulnerable thanks to POS system provider breaches
  •   Phishing remains a particularly popular tactic used by hackers everywhere, including those that are targeting the hotel industry to trick both prospective guests, who give up credit card and personal details, and insiders, who then give up valuable login credentials.
  • File Integrity Monitoring (FIM), Unified Threat Management (UTM), and Security Information and Event Management (SIEM) should also be considered
  •  
    This article talks about how there is a serious concern in the hotel industry when it comes to credit card and identity theft. They talk about how all the major brands in the hotel industry were all victims of highly publicized, major breaches in the last year alone. Also, including airline and banks, hotels maintain a wealthy amount of database of personal and financial data. For example, with new technology systems being created, POS systems are a weak security point for many networks because they are constantly in use and are not always updated or even protected from vulnerabilities. The article talks about personal details for hotel guests are frequently stored in a variety of locations including restaurants, facilities, and government buildings, so hackers have a greater possibility to access your personal information. The bigger hotels are in more danger because of the volume of guests that come in and out of the location. Smaller hotels should be concerned not just about their security but also by ransomware, an increasingly favorable tactic to extort hoteliers by hackers who encrypt the hotels data making it inaccessible until ransom is paid for. I believe hotels need a toolbelt of various securtiy technologies that can be used to prevent future malicious attacks. I think by managing and implementing a firewall is essential which helps get rid of dangerous traffic from coming onto the network and preventing sensitive data from being hacked.
  • ...1 more comment...
  •  
    This article talks about the weakness and vulnerability of POS systems involving safety. It mentions the security breach that few companies, such as Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel, faced last year (2016) involving credit card fraud and identity theft through their POS systems. It mentions how point-of-sale (POS) systems are not complete safe and how vulnerable they are because they are constantly in use and aren't always patched, updated, or protected from vulnerabilities as frequently as required. It suggests that enterprises should outsource their cyber security management to minimize costs, considering that is extremely expensive to hire and retain IT security team.
  •  
    MOD 10: This article discusses the main tactics of cyber hackers that target hotels. Point of sale (POS) systems are easy targets for hackers due to their constant use during operation hours and because of that their security measures aren't always up to date. Hotels have large data banks since they're storing consumer profile information such as home addresses, phone numbers and credit card numbers. There's a large risk when it comes to security breaches within franchises because they have access to their parent company's regional, national and global systems. If their systems are hacked and breached, then that puts the whole system of the brand at risk. Security breaches within a system can also damage a brands reputation with the public. According to the article, "Recent major breaches at Fortune 500 companies and household names across the retail, restaurant and hotel sectors demonstrate that anti-virus, anti-malware and firewalls alone are not enough to secure businesses from the ever-evolving threat landscape." Smaller properties are even at a greater risk because not only do they have to monitor their compliance with PCI but also monitoring their security systems for their database and PMS system. Some of the recommended software's that should be used by hotels looking to be proactive with their company's cyber security is File Integrity Monitoring(FIM), Unified Threat Management(UTM), and Security Information and Event Management(SIEM).
  •  
    This article explores the different tactics hotels should use after a cyber attack. The article mentions several different type of attacks such as Phishing when hackers trick customers into giving up their login credentials. Ransomware, when hackers encrypt data making it unusable and inaccessible for the hotel. Not one solution but rather companies should be equipped with a series of technologies from firewalls to file monitoring programs. Some of these technologies, like SIEM requires an intelligent IT team to have the capabilities of analyzing and monitoring the reports produced. This may be more difficult for smaller businesses to implement and maintain.
cmogu001

Identifying 9 Solutions Hotel Security Concerns | 2014-07-22 | Security Magazine - 0 views

  • Business and recreational travelers demand safe and secure hotel accommodations and responsive and friendly customer service.
  • A single act of crime on your property could diminish your brand.
  • Maintain Security-Minded Customer Service
  • ...13 more annotations...
  • While maintaining friendly, responsive interactions with customers is crucial, it is also important to vigilantly follow all security protocols.
  • Key Card Access Review
  • Hotels need to ensure that their key card access systems are not vulnerable to hacking or unlawful access.
  • Establish Evergreen Background Screening Protocol–
  • Assess Location and Local Crime Statistics–
  • Control After Hours Access– For maximum safety, posting security personnel at front entrances and other access points is vital
  • When your guests feel that they are both welcome and watched-over, they will feel more comfortable.
  • When private security works in partnership with law enforcement to respond to these issues, police officers have more time to focus on solving crimes and enforcing the law.
  • Maintain Emergency Response Plan and Team–
  • Proactive security efforts and emergency planning initiatives should also involve everyone with a vested interest in safety and security.
  • Commitment to Ongoing Training–
  • Security professionals should be able to access training in a way that benefits their lifestyle whether it is online or classroom training. 
  • Ensuring that all public spaces are continually monitored by staff and security personnel is crucial in maintaining a hospitable environment. 
  •  
    This article expounds how hoteliers can ensure that their property provides a secure environment, while maintaining friendly customer service. This article goes into further detail about implementing key card access reviews in order to prevent the possibility for a criminal to gain undetectable entree to millions of keycard-protected hotel rooms. According to this article, establishing evergreen background screening protocols and controlling after hours access was also crucial in Hotels ensuring that their key card access systems are not vulnerable to hacking or unlawful access. Above all else, this article goes into great depth about maintaining an emergency response plan and team that would allow hotels to proactively implement prevention and response plans for everything from workplace violence to natural disasters.
anonymous

5 Technology Trends Driving The Hospitality Industry - 1 views

  • Technological advancement should be aligned with guest expectations to stand out from your competitors.
  • Technological advancement should be aligned with guest expectations to stand out from your competitors.
    • anonymous
       
      I think that this is a very important key point within technological advancement because the best way to stand out amongst other businesses is to always please and satisfy your customers and if you work around them and make improvements to better the quality of your services matching their needs then your business will thrive.
  • Swipe cards have been replaced with smartphones and apps to ease check-ins and reduce loss of key.
    • anonymous
       
      I think that replacing the swipe cards with smart phone apps is a very convenient solution for both the customers who lose their key cards. It is even better for them to have the key to their rooms in their phones because that is the one thing that everyone carries with them wherever they go, whereas the swipe cards can be easily forgotten inside the room.
  • ...4 more annotations...
  • So how can NFC work for a hotel? Well to begin with, NFC can reduce the load of work at the front desk by enabling faster check-ins and check-outs. Moreover, it provides the function of making secure payments and shields against theft or loss.
    • anonymous
       
      NFC would be a great technological advancement for hotels as it would make things quick, easier and even safer for both the hotel and the customers.
  • But what is NFC? NFC enables seamless transmission of data from compatible devices over a short range with the help of radio waves
  • With the emergence of thousands of apps, due to space constraints, guests are reluctant to download an individual brand app.TrilyoBot in actionBuilt on messenger apps like Facebook, Slack, Kik, amongst others, chatbots are an automated response system, which through machine learning can be trained and made to perform specific tasks. Trilyo, launched this element for hotels to ease customer engagement and create more loyal customers.
    • anonymous
       
      This again is another very important thing for hotels to note when thinking about creating their own specific app for customers to have and in turn make things like accessing hotel room services much easier because not every customer is going to like the idea of having to download an app to access hotel services. I think that built on messenger apps is a great alternative because almost everyone has at least of these messengers in their phones and could easily just download the add on and then access hotel services much faster and easier.
  • The LED light notifies you whenever an object is near the sensor by automatically bouncing back into the light sensor.Making these door cards almost redundantIf you’re looking to install infrared sensors in your hotel, think no further. These can also detect body heat and thereby alert you whether or not a room is occupied. Instead of having ‘Do Not Disturb’ door cards or disturbing jet lagged guests, these help your staff know if they need to come back later to clean the room.
    • anonymous
       
      This is another advancement that would really help improve guest services. I myself have been in the uncomfortable situation in which I am sleeping and housekeeping comes in because I forgot to put the 'Do Not Disturb' sign on the door. I think that having this feature would make the stay at the hotel more comfortable for the guests and it would be less annoying for them to not have someone knock or just straight up walk into the room while they're still sleeping or getting dressed/ready.
  •  
    The article talks about a couple of technological advancements within the industry that could help improve the customers' stay at the hotel. This advancements would not only benefit the customers but also the workers.
kakaboshi

Council Post: New Pay Trends: How Today's Workforce Is Reshaping Payroll - 0 views

  • It’s been over 40 years since direct deposit was introduced, arguably the last major development in the payroll world. It’s amazing to think that, with the speed of technological innovation these days, you have to go so far back to find the most recent payroll innovation that had such a significant impact on both employees and employers.
  • technology has infiltrated the payroll landscape in recent years, innovating time reporting and flexibility in pay. Payroll is also being forced to adapt to a workforce comprised heavily of two types of employees: those who require immediate income, and millennials and Generation Z workers.
  • Paycards According to a 2017 FDIC national survey, 25.2% of U.S. households are “unbanked” or “underbanked.” Those who are “unbanked” do not have any traditional banking relationship (i.e., a checking or savings account), while those who are “underbanked” have a financial institution account but also obtain services from providers outside the banking system.
  • ...13 more annotations...
  • 78% of Americans who are living paycheck to paycheck and who are financially unprepared for an unexpected expense. They are often hourly employees in service-based industries, such as health care, hospitality, quick service restaurants, retail or nursing.
  • Direct deposit of earnings for unbanked and underbanked populations isn’t a viable option, which has made the rise in the use of paycards (debit cards to which an employee’s wages are transferred) an increasingly popular alternative.
  • Research by Aite Group shows the use of paycards is expected to increase through 2022. For employers, these cards, backed by Visa or Mastercard, can provide benefits such as reduced payroll processing costs and the ability to move to fully electronic payment mechanisms.
  • Artificial Intelligence For Time Management
  • Workers increasingly expect employers to be okay with them working on a personal device, rather than a work-issued system. This adds a level of complexity for companies trying to verify payroll hours. Fraud and forgetfulness can lead to inaccurate records and added overhead.
  • To combat this, many companies are implementing artificial intelligence (AI) for predictive timekeeping, rapid detection of irregularities, and even “smart” time verification based on video feeds and facial recognition. 
  • Payroll Platforms
  • Fragmented systems and data have always plagued the fintech industry, but payroll platforms are helping address these problems. They are making seamless integration a reality and combining features in a single platform. Having a fully integrated system provides a single set of data and a flow that reduces complexity, facilitates changes and ensures consistency across all system components. 
  • Daily Pay
  • A daily pay benefit lets workers track and access their earned wages prior to their next payday.
  • Provides the flexibility to transfer earned wages to paycards (or other payment platforms). • Incentivizes employees to perform accurate and efficient time reporting, as employees can see their available balance increase at the end of each shift. • Integrates with other payroll platforms, providing “plug-and-play” functionality.
  • Challenges Ahead
  • All of these new technologies will face skepticism about whether they can deliver on their promises. In some cases, these technologies will have to win over decision makers who are reluctant to change their ways.
  •  
    This is an interesting article that describes some of the new technology being implemented to improve how employees are getting paid based on the current workforce's spending habits. These include the ability to be paid by debit cards, ability to be paid daily and have the flexibility to move the money around, AI intelligence to keep track of the employees' work hours on their own devices, and integration of many payroll functions into one platform. With so much technological advancement, it seems that payroll management is one that is still behind with many companies still working with the old clock in and out method which is time consuming.
irinatroitskaya

Hospitality: Shelter Your Business from Advanced Cyber Threats | Hospitality Technology - 0 views

  • According to Verizon’s 2017 Data Breach Investigations Report, accommodation was the top industry for point-of-sale intrusions.
  • Hospitality, whether hotels or restaurants, transact more credit cards than almost any other industry, making them an extremely attractive target.
  • The hospitality industry’s rapid push to digitalization means that it is still playing catch-up on the security front.
  • ...7 more annotations...
  • The 2017 Lodging Technology Study by Hospitality Technology found that 74% of hotels do not have breach protection and less than half use end-to-end encryption for cardholder data or use tokenization at the card swipe.
  • PoS systems are a weak security point for many networks as they are in constant use and often are not patched or updated.
  • Denial-of-Service attacks make up approximately 20% of hospitality cyber incidents.
  • Early detection is key to controlling attack costs and reputation damage.
  • Host- and network-based firewalls should be used as the first part of a layered security approach.
  • A good endpoint prevention stack consists of an antivirus solution to handle known threats and a prevention layer that effectively prevents unknown, advanced attacks.
  • No technology, however, can substitute for an overall culture of security.
  •  
    The article describes the main cyber threats that the hospitality companies face. Over past few years, nearly every major hotel group has been attacked. The same is true for the F&B industry. One of the reasons for that is that the hospitality companies are the ones that process credit card information more than in any other industries. Moreover, hotels and restaurants have many access points for the malware: from wifi networks to POS's. The attackers may also use the third party suppliers (for example, OTA's) to access the hotels' systems. Verizon 2017 Security Payment Report states that less than a half of all hospitality businesses have full credit card payment security compliance. The main type of the attack is POS intrusion. Denial-of-Service Attacks constitute about 20% of the total number. Although they are not so dangerous in terms of sensitive information, they can disturb the company's operations causing significant losses as well. Thus, the hotels and restaurants need to invest in early detection protection provided by the effective firewalls and antiviruses. However, it is also very important to understand that no technology may ever fully substitute the security culture of the company's employees. Many attacks are conducted due to the personal weaknesses of the associates answering the calls, for example. So, in my opinion, in addition to the cyber security systems, there should be appropriate personnel training as well as well elaborated procedure protocols.
Maria Zuniga

Hyatt Hotels discovers card data breach at 41 properties - 0 views

  • it had discovered unauthorized access to payment card information at certain Hyatt-managed locations worldwide
  • Hyatt said the incident affected payment card information, such as, cardholder name, card number, expiration date and internal verification code, from cards manually entered or swiped at the front desk of certain Hyatt-managed locations
  • cyber security team discovered signs of the unauthorized access in July and launched an internal investigation, completed on Thursday, that resolved the issue and took steps to prevent this from happening in the future.
  •  
    This article is very interesting because it shows that the accounting in hospitality industry is never safe. It is crucial to have POS system that are secure as well as having managers that are on top of their duties. The article stated that a total of 41 properties were affected by this and that it hasn't been the first time. This is a call to action for Hyatt as well as other hotels to be more aware of their money.
« First ‹ Previous 61 - 80 of 624 Next › Last »
Showing 20 items per page