Skip to main content

Home/ Hospitality Technology/ Group items matching "attacks" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
anonymous

Insiders suspected in Saudi Aramco cyber attack | SciTech | GMA News Online | The Go-To Site for Filipinos Everywhere - 0 views

  • Hackers from a group called "The Cutting Sword of Justice" claimed responsibility for the attack. They say the computer virus gave them access to documents from Aramco's computers,
  • The hacking group that claimed responsibility for the attack described its motives as political
  • the group said Saudi Aramco was the main source of income for the Saudi government, which it blamed for "crimes and atrocities" in several countries, including Syria and Bahrain.
  • ...9 more annotations...
  • According to analysis of Shamoon by computer security firm Symantec, the way the virus gets into networks may vary, but once inside it tries to infect every computer in the local area network before erasing files to render PCs useless.
  • Yet those sources say such protections could not prevent an attack by an insider with high-level access.
  • insiders were implicated in just 4 percent of cases last year.
  • Saudi Aramco has said that only office PCs running Microsoft Windows were damaged. Its oil exploration, production, export, sales and database systems all remained intact as they ran on isolated and heavily protected systems.
  • Because the virus wiped the hard drives, it is difficult for Saudi Aramco to determine exactly what information the hackers obtained.
  • The Shamoon virus is designed to attack ordinary business computers
  • . It does not belong to the category of sophisticated cyber warfare tools
  • The hackers behind the Shamoon attack siphoned off data from a relatively small number of computers, delivering it to a remote server
  • It is standard industry practice to shield plant operating networks from hackers by running them on separate operating systems that are protected from the Internet.
  •  
    Saudi Arabias national oil company, Aramco, was attacked by a computer virus, Shamoon, and it is suspected that an insider or employee assisted the hackers. The virus spread through the network and infected about 30,000 PC business computers and wiped their hardrives. This is one of the worst attacks against a single business. The hackers who claimed responsibility, The Cutting Sword of Justice, were politically motived. The companies more important documents including plant operating networks were not affected by the virus because they were on a separate and higher security network. Recently, other Middle Eastern natural gas firms with relations to Saudi Arabia have been hit by cyber attacks. Because the Aramco hackers admitted their motives against the Saudi Arabian government income sources, I think that all the cyber attacks may be politically motivated. As a Middle Eastern oil company with relations to Saudi Arabia, this is a major indication to take precautionary measures and increase network security. This attack demonstrates that no matter how much security you have in place, if an insider is willing to assist hackers or provide hackers with necessary information, you are no longer protected. It would seem imperative that employees with this access are chosen carefully or network access is very limited.
cleon087

Cybersecurity at Hotels: 6 Threats For Hotels to Manage - 0 views

  • hishing att
  • Ransomware
  • Point of sale/ payment card attacks
  • ...21 more annotations...
  • DarkHotel hacking
  • Customer data/ identity theft 
  • Over that past few years, the industry’s most well-known brands have all been victims of cybercrime.
    • kaylaabad
       
      The hospitality industry is a huge target for cybersecurity breaches
  • Cybersecurity for hotels should always include a process to mitigate any compromised systems should they go down in a DDoS attack.
    • kaylaabad
       
      distributed denial of service attack
  • intends to convince the recipient that he/she should share information
    • kaylaabad
       
      Goal of phishing: to be information from recipients
  • In recent years, this threat has become increasingly sophisticated, with attacks targeting those in authority. The aim is to take over a user’s email account to send bogus emails to colleagues. These emails often attempt to persuade recipients to authorize transactions, which are ordered from above.
    • kaylaabad
       
      Phishing example in the industry: In recent years, this threat has become increasingly sophisticated, with attacks targeting those in authority. The aim is to take over a user's email account to send bogus emails to colleagues. These emails often attempt to persuade recipients to authorize transactions, which are ordered from above.
  • Hotels that have fallen foul to this crime have in the past paid more than $17,000 to be able to let guests into their rooms and create electronic keys.
    • kaylaabad
       
      Ransomware - Hotels that have fallen foul to this crime have in the past paid more than $17,000 to be able to let guests into their rooms and create electronic keys.
  • Phishing refers to the sending/receiving of emails that appear to be from a genuine source.
    • kaylaabad
       
      Phishing: Phishing refers to the sending/receiving of emails that appear to be from a genuine source.
    • cleon087
       
      It is important to know about what this means
  • Cybersecurity issues of this nature, often result in customers being out of pocket, and the media getting involved. Which, of course, means bad press for a hotel. Furthermore, there could be financial implications for the business.
    • kaylaabad
       
      POS attacks: Cybersecurity issues of this nature, often result in customers being out of pocket, and the media getting involved. Which, of course, means bad press for a hotel. Furthermore, there could be financial implications for the business.
  • Protecting the identity and information of a customer is paramount to the success of any business and hotels ar eno exception.
    • kaylaabad
       
      Protecting the identity and information of a customer is paramount to the success of any business and hotels ar eno exception.
  • The attacks use forged digital certificates to convince victims that a software download is safe.
    • kaylaabad
       
      DarkHotel hacking: The attacks use forged digital certificates to convince victims that a software download is safe.
  • That is often passwords and financial information; this scam is one of the oldest on the internet.
    • cleon087
       
      It is important to be informed of this type of attack as a hotel owner because your holding sensitive information.
  • taking information and certain systems hostage. The purpose of this attack was to gain financially from those who paid the demanded figure to free their data/systems.
    • cleon087
       
      A lot of times that ask for a ransom and you pay and still you don't get access back to your computer. Also they can take credit card information and use guest credit cards.
  • Every day regular items such as sprinkler systems to security cameras are vulnerable to hijack. After which, entire computer systems can be made to come crashing down.
    • cleon087
       
      Having access to cameras is concerning because this is sensitive information. They can get access to private areas of the hotel and use it to their advantage.
  • And that means somewhere there is a weakness in the system which has been revealed by human error.
    • cleon087
       
      This is why it is important to invest in the security because you don't want your guest to experience this.
  • criminals use a hotels Wi-Fi to target business guests.
    • cleon087
       
      This is scary because people go to hotels to get a vacation and they trust the hotel.
  • ncourage guests to use virtual private networks (VPN) if they plan on conducting business with sensitive data.
  • Especially when there are criminals from all over the world trying to steal identities, and credit card data.
  • his crime is forever changing.
  • for hotels, an almost perpetual arms-race to secure both data and networks.
    • cleon087
       
      This is why it is important to be up to date.
  • Phishing refers to the sending/receiving of emails that appear to be from a genuine source
  •  
    This article lists of some common security breaches that hoteliers need to be aware of and prepare the hotel system for.
  •  
    This article talks about how cybersecurity can critically affect hospitality businesses if they are not careful about what ways could attack their business.
  •  
    As the article states, "Protecting the identity and information of a customer is paramount to the success of any business and hotels are no exceptions." Quite unfortunately, cybersecurity issues are some of the biggest obstacles that hotels are experiencing nowadays. With hacking attacks such as phishing and ransomware, hotels need to invest in increasing their cybersecurity as any breach can lead to a downfall in business loyalty and brand.
frank rodriguez

Hospitality Industry Hit Hardest By Hacks - Dark Reading - 1 views

  • Trustwave report on data breach investigations shows hotels were breached more than financial institutions last year, and nearly all attacks were after payment-card data
  • not surprisingly, a whopping 98 percent of targeted data was payment card information
  • Nicholas Percoco, senior vice president of Trustwave's SpiderLabs, announced at Black Hat DC this week these and other findings the company compiled in 218 data breach investigations in organizations across 24 countries. Financial services companies accounted for about 19 percent of the breaches, but that was far fewer than in the hospitality industry, where 38 percent of all breaches took place
  • ...1 more annotation...
  • Percoco outlined the three main steps in a typical data breach and how attackers mostly operate at each level: initial entry, data harvesting, and exfiltration.
  •  
    The hotel is a perfect place for hackers to attack because they have easy access to retrieve thousands of guest information including credit card information, billing addresses, and much more personal information. Nicholas Percoco, senior vice president of Trustwave's SpiderLabs, mentioned that the credit card and debit card information is the most in demand by hackers because it is easiest to turn into cash quickly. There are three main steps in a typical data breach and how attackers mostly operate at each level: initial entry, data harvesting, and exfiltration. Close to half of these attacks occur via remote access applications, of which 90 percent exploit default or weak passwords. Around 42 percent of attacks occurred via third-party connections; 6 percent via SQL injection; 4 percent via exposed services; and 2 percent via remote file inclusion attacks. Interestingly, less than 1 percent began with an email Trojan. As an IT manager of the hotel, it is crucial to recognize how serious the consequences are for the hotel should the data not be protected well. 
  •  
    Hey all, here is an article I found that talks about hackers taking over the hospitality industry. It mentions how hackers main objective is to gain access to debit accounts and gain access to customer cash. Also, hackers are also able to infiltrate POS systems along with other valuable technology with in the hospitality industry. Nearly half of these attacks occur via remote access applications, of which 90 percent exploit default or weak passwords, according to the report. Around 42 percent of attacks occurred via third-party connections; 6 percent, SQL injection; 4 percent, exposed services; and 2 percent, remote file inclusion attacks. Interestingly, less than 1 percent began with an email Trojan.
  •  
    hackers are EVERYWHERE!
irinatroitskaya

Hospitality: Shelter Your Business from Advanced Cyber Threats | Hospitality Technology - 0 views

  • According to Verizon’s 2017 Data Breach Investigations Report, accommodation was the top industry for point-of-sale intrusions.
  • Hospitality, whether hotels or restaurants, transact more credit cards than almost any other industry, making them an extremely attractive target.
  • The hospitality industry’s rapid push to digitalization means that it is still playing catch-up on the security front.
  • ...7 more annotations...
  • The 2017 Lodging Technology Study by Hospitality Technology found that 74% of hotels do not have breach protection and less than half use end-to-end encryption for cardholder data or use tokenization at the card swipe.
  • PoS systems are a weak security point for many networks as they are in constant use and often are not patched or updated.
  • Denial-of-Service attacks make up approximately 20% of hospitality cyber incidents.
  • Early detection is key to controlling attack costs and reputation damage.
  • Host- and network-based firewalls should be used as the first part of a layered security approach.
  • A good endpoint prevention stack consists of an antivirus solution to handle known threats and a prevention layer that effectively prevents unknown, advanced attacks.
  • No technology, however, can substitute for an overall culture of security.
  •  
    The article describes the main cyber threats that the hospitality companies face. Over past few years, nearly every major hotel group has been attacked. The same is true for the F&B industry. One of the reasons for that is that the hospitality companies are the ones that process credit card information more than in any other industries. Moreover, hotels and restaurants have many access points for the malware: from wifi networks to POS's. The attackers may also use the third party suppliers (for example, OTA's) to access the hotels' systems. Verizon 2017 Security Payment Report states that less than a half of all hospitality businesses have full credit card payment security compliance. The main type of the attack is POS intrusion. Denial-of-Service Attacks constitute about 20% of the total number. Although they are not so dangerous in terms of sensitive information, they can disturb the company's operations causing significant losses as well. Thus, the hotels and restaurants need to invest in early detection protection provided by the effective firewalls and antiviruses. However, it is also very important to understand that no technology may ever fully substitute the security culture of the company's employees. Many Attacks are conducted due to the personal weaknesses of the associates answering the calls, for example. So, in my opinion, in addition to the cyber security systems, there should be appropriate personnel training as well as well elaborated procedure protocols.
jlewinsky

Hotels: Are Your Cyber Defenses Ready for 2021? | Hospitality Technology - 0 views

  • Two of the top five biggest data breaches made public in 2020 were at hotel chains. Attackers stole personal information including names, emails and addresses from 5.2 million guests at Marriott and 10.6 million guests of MGM Resorts.
  • To ensure a swift recovery from COVID-19, the hospitality industry must shore up its cybersecurity protections — or risk more headline-making breaches in the future.
  • Risk is especially high at hotels because attackers have multiple points of entry.
  • ...14 more annotations...
  • Breaches undermine hospitality brands’ reputations and erode customer trust. Eighty-one percent of consumers will stop engaging with a brand after a breach, according to a 2019 study.
  • Guests may share their credit card numbers with the hotel in advance via a booking app or website, opening up the possibility of web-based attacks. Loyalty programs are another source of online vulnerability, with an estimated $1 billion a year lost to account fraud and related crimes.
  • However, one of the biggest vulnerabilities may be on the hotel grounds themselves.
  • hotels have multiple point of sale (POS) terminals across different locations, from the front desk to restaurants, all of which are connected to each other. If a POS device is not properly secured, attackers can use malware or other attack vectors to steal clear-text credit card numbers and other data.
  • POS attacks remain one of the most common causes of data breaches in accommodations and food services.
  • When it comes to cybersecurity, companies today have two options: Defend the fort or devalue the data. The former is the more traditional approach. By strengthening the digital “walls” around your data — via firewalls, intrusion detection, 24/7 monitoring and other security protections — the defend-the-fort approach works to keep attackers from accessing your systems at all.
  • One important and underutilized aspect of cyberdefense is employee training.
  • Make sure your employees use strong passwords and know how to spot fraud and spear phishing attacks. You may also want to limit employee access to confidential data, so if an account gets hacked, private guest information doesn’t go with it
  • You should also make sure your software is up to date with all security patches, as attackers often exploit known weaknesses in programs. Isolating POS devices from the rest of the network can also limit the damage from malware infections at that entry point.
  • it’s unlikely that even the strongest digital “walls'' will prevent all incursions. Defenses are important, but the ever-changing nature of technology means that new, hard-to-catch vulnerabilities will pop up all the time.
  • important to devalue your data, rendering it unusable to attackers who gain access to your systems. One way to do this is to implement point-to-point encryption (P2PE) by encrypting payment information from the moment it enters your network at the POS
  • Encrypted data is unintelligible to anyone who doesn’t have the right digital key. Implementing P2PE is the only way to ensure that clear-text payment data doesn’t fall into the hands of attackers targeting POS systems with malware.
  • Data that’s stored for the long term, like passport information or credit card numbers saved to a loyalty program, can also be devalued through tokenization. Data that’s tokenized gets replaced with an alphanumeric pseudonym, so the actual sensitive information isn’t stored on your servers. This method helps secure guest information beyond the initial transaction at the POS.
  • Hotels that reckon with their security vulnerabilities now will protect themselves from fines and other fallout from data breaches as business rebounds. They’ll also build deeper, more trusting relationships with customers by keeping their personal information secure. By strengthening security protections and devaluing their data, hotels can set themselves up for a brighter future. 
  •  
    This article describes the vulnerabilities in the security systems of the hotel Industry. The POS system was recognized as one of the most vulnerable areas that are more targeted by hackers. This is due to the multiple stations where the POS systems are located on the premises of the hotel. Likewise having POS systems independent of the hotels security system left the system open to hackers. Two options to defending the cyber-defense, are digital walls and employee training. Digital walls works by keeping hackers from accessing the systems. Although even with a strong firewall it is recommended to implement point-to-point encryption (P2PE), this encrypts payment information of guest. the other is tokenization. This uses alphanumeric pseudonym to protect data stored for long periods of time. Another way to prevent cyberattacks is employee training, encourage the use of strong passwords an dhow to detect fraud and phishing attacks.
erinkieltyka

Suspected Ransomware Attack on InterContinental Hotels Affected Over 4,000 Guests | Spiceworks 1 - 0 views

  • Ransomware generally entails infiltration and compromise, exfiltration of data, and the encryption of data/systems/networks. Hospitality was the eighth most targeted sector by ransomware groups between March 2021 and April 2022.
  • 4,053 ICH users and 15 of its 325,000 employees were compromised in the attack whose perpetrator remains unknown.
  • The company was unable to accept online bookings
  • ...7 more annotations...
  • determine whether the latest cyberattack is more significant than the 2016 breach of the ICH systems. Initially thought to have been a minor breach that affected 12
  • Between September 29 to December 29, 2016, 1,175 properties were infected by malware designed to steal credit card data
  • Marriott International has been breached thrice, resulting in the compromise of the personally identifiable information of up to 338 million guests
  • Marriott was also fined £18.4 million ($23.8 million) by the U.K’s data regulator Information Commissioner’s Office for failing to protect the data of the 338 million guests
  • This is yet another reminder of the damaging impacts of cybercrime. Not only is IHG potentially getting held to ransom for its data access, but it is also losing out on customer bookings
  • Organizations should use this as a warning to never gamble with their cyber defenses. After all, the cost of preparing and preventing an attack is far less than the cost of recovering from one
  • Data breaches, on average, cost organizations $4.25 million in 2022, according to IBM’s 2022 Cost of Data Breach report.
  •  
    This article discusses a recent cyber-attack on ICH that is believed to have been a ransomware attack. It's stated that hospitality is the 8th most targeted sector for ransomware as of recently. The recent attack on ICH 4,053 users and 15 employees were compromised, which is actually far less than their last attack in 2016 that effected 1,175 properties. Hotels must take as much precaution as possible against cyber attacks because not only does it decrease their bookings, but they can also be charged millions in fines for information breaches.
jorgeegutivav

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Modern Restaurant Management | The Business of Eating & Restaurant Management News - 0 views

  • With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • permeable security in the hospitality sector threatens consumer privacy, shareholder value, and national security.
  • ...15 more annotations...
  • many hospitality companies are reconsidering their cybersecurity infrastructure. However, industry specific challenges like high employee turnover continue to expose the sector.[6]Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Are newly introduced technologies simply bolstering traditional methods of cybersecurity, or are they being used for methods of cybersecurity that are new and innovative, instead of simply faster or more efficient versions of the same product?
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.”
  • Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks. 
  • The problems with this approach are twofold:
  • someone has to be a victim first so that IOCs can be derived and shared with others; additionally, blocking IOCs has a very short half-life.
  • All an adversary has to do is come from a new IP address or recompile their malware so that it has a new hash value (both of which are extremely trivial) and their attacks will sail through defenses that depend on IOCs.
  • As hackers repeatedly gain access to valuable systems and data using the same methods, cybersecurity teams continue to chase after them to secure compromised systems.
  • Very little cybersecurity effort is put towards addressing the methods used by adversaries; instead, security teams are locked in a pattern of waiting for inevitable attacks, trying to minimize the damage they cause, ensuring that remediation occurs as quickly as possible, and blocking only exactly identical attacks.
  • Incident response only helps prevent attacks that exactly replicate past ones.
  • a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale.
  • Instead of seeking discrete, static IoCs based solely on what has already occurred, proactive cybersecurity analysts can instead use the intelligence they have derived about adversaries’ methodologies – commonly referred to as tactics, techniques, and procedures (TTP). 
  • From these TTPs, analysts can identify the general form and components of an adversary campaign. In addition, they can determine abstract indicators like how the adversary is attempting to hide his actions. 
  •  A proactive cybersecurity tool would be able to recognize possible adversary TTPs and indicators that describe a threat (or threatening behavior) in general terms. The system would then act on any traffic which met this pattern before it reaches inside a network, as the attack occurs, and do so in a way invisible to adversaries.
  • Using this basic model, a cybersecurity tool could truly prevent common exploits before they were executed, and could even predict and protect against future, not yet seen exploits.
  •  
    In the wake of the Marriott International cyberattack, the article presents the issues with the current issues in the methodology of cybersecurity; first explaining the data of how popular they are in the hospitality industry, and what it means for the industry, before going into the process of how a cyberattack happens and the measures taken to prevent it. Traditional cybersecurity is one of an "incident response" which can only be implemented once a cyberattack occurs and can only prevent it temporarily as a hacker can do similar tasks with different IP addresses and new malware. In order to circumvent this failure of cybersecurity, the article offers a new method in which TTPs (tactics, techniques, and procedures), are used to identify certain components of a hacker and identify how they would carry out an attack, before acting on it before the attack would "reach the network".
  •  
    This article discusses one of the largest fears of most hospitality firms, and that is keeping their client's personal information private. Most large companies in this industry have become giant data centers for the personal information of millions of people. Breaches of this type of information place the lives of many people at stake. For example, Marriott International had a security breach of over half a billion of its clients which began in 2014 and was not detected until September of this year. Keeping an individual's information away from malignant forces is just plain business sense and any more attacks of this manner will severely hurt the reputation of the business experiencing it.
agrie013

Hospitality Upgrade | Online Skimming Threatens Hospitality E-Commerce Sites - 0 views

  • Attacks against the hospitality industry to gain payment information continue. There is a growing threat to all e-commerce websites called Web-based or Online Skimming. These Attacks infect e-commerce websites with malicious code, known as sniffers or JavaScript (JS) sniffers and are very difficult to detect. Once a website is infected, payment card information is “skimmed” during a transaction without the merchant or consumer being aware that the information has been compromised.
  • Today two industry cybersecurity organizations, PCI Security Standards Council (PCI SSC) and the Retail and Hospitality ISAC, joined forces to highlight this growing threat.
  • By exploiting vulnerable plugins, brute force login attempts (credential stuffing), phishing and other social engineering techniques, the hackers attempt to gain access and inject malicious code.  “These attacks are either directly into e-commerce websites or often into a third-party’s software libraries that merchants rely upon.  These service providers may not be aware of the risk they create for their customers if they are not focused on security and the potential threats targeting them
  • ...1 more annotation...
  • The ability to detect these threats before they can cause damage is significantly important. Examples of PCI DSS Requirements providing ”detection” controls include: Reviewing code in order to identify potential coding vulnerabilities (Req. 6) Use of vulnerability security assessment tools to test web applications for vulnerabilities (Req. 6) Audit logging and reviewing logs and security events for all system components to identify anomalies or suspicious activity (Req. 10) Use of file-integrity monitoring or change-detection software (Req. 11) Performing internal and external network vulnerability scans (Req. 11) Performing period penetration testing to identify security weaknesses (Req. 11) Alerting on posts to newly observed domains in proxy logs can further provide additional avenues of detection for future phishing attacks as well as the initial reconnaissance phases of an attack on a thirdparty JavaScript library. 
  •  
    This article goes in to detail that attackers have targeted information that is acquired on websites such as credit card and other personal information. This writing does tell how PCI and Retail and Hospitality ISAC joined forces to help prevent such attacks from happening on these websites. Now PCI and ISAC are the standard when it comes to protecting information. These attacks are easily undetectable by these websites because they are only skimming for the information. this article does give tips for prevention and detection. PCI is the industry standard and by them teaming with ISAC it will make these websites and your information more safe.
kyleemcroberts

5 Key Lessons Learned from Critical Infrastructure Cyber Attacks - 0 views

  • 5 Key Lessons Learned from Critical Infrastructure Cyber Attacks
  • Cyber criminals are highly motivated, creative, and nimble
  • Consider the rise of cryptojacking, which uses mining malware to hijack computers to mine cryptocurrency.
  • ...8 more annotations...
  • Don't be complacent — limit Internet access points with silos.
  • The attackers were just trying to look for unused processing power that they could use for their benefit."
  • finding the time to consistently audit and always be improving security is critical too
  • Keeping the critical infrastructure efficient and effective is challenging enough.
  • Train your humans.
  • This example underlines the importance of educating employees to always be vigilant and raising awareness of potential threats.
  • Stay current.
  • Concerns that new operating systems or software updates might destabilize crucial infrastructure can inhibit the best practice of always updating.
  •  
    There have been many cyber-attacks in many different nations and that is for many different reasons, such as outdated, human error, and all software being in one vulnerable spot. It is important to always update your programs, use cloud computing, and to educate your personal on all cyber-attacks. It is also important for your teams to understand the "why" behind updating and cloud computing and this is to always keep an upper edge on cyber-attacks. Cyber criminals are always changing their ideas and new ways to take over networks and workday and night to find someone to slip up and it can cause the complete down fall of a company or nation.
asant318

Ransomware: One of Hospitality's Biggest Threats in 2017 | News | Hospitality Magazine (HT) - 0 views

  • attack made headlines for locking guests out for their rooms
  • discuss how ransomware can affect the hospitality industry and what hotels and restaurants should consider to protect themselves from future cyber attacks.
  • Travelers may be annoyed, but for the hotel, ransomware can be a major business disruption.
  • ...10 more annotations...
  • The cyber threat has been used to target a variety of businesses from hospitals to retailers and now the hospitality industry
  • , businesses need to always be ready for a breach. Every business should have an action plan in place to prevent their company from being the next victim of ransomware or any other cyber security threat.
  • pirated software, file attachments, web links, and suspicious emails.
  • keep additional devices from being infected.
  • best practices for any company to employ are regular backups and a tested disaster recovery plan
  • Using anti-malware software is a necessary start, but it will not stop everything – especially rogue software downloaded by employees
  • important to act quickly by segmenting portions of the infected network and removing devices to try and prevent the problem from spreading.
  • install ransomware protection
  • malicious software will continue to rise as businesses and consumers become more dependent on the internet for everyday needs.
  • it’s important that businesses take proactive steps to protect not only company data, but the overall integrity of the company network from hackers.
  •  
    The article discusses ransomware attacks on hospitality properties. A 2016 attack left guests locked out of their rooms but the threat could affect different areas of a hospitality business and cause significant disruption to their business. Properties need to be prepared for a security breach with an action plan to prevent cyber-attack. The article points out that it's important to act quickly to segment the network and try to prevent any new devices from being infected. Best practice recommends regular backups and a recovery plan, using anti malware software and being cautious with employee installed software. The most important thing a company can do is to be proactive and prepared for an attack.
msbode

Ensuring Software Integrity in IoT Devices - 3 views

  • oT is defined as the Internet of Things. The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems
  • Gartner predicts that there will be 20.4 billion connected Internet of Things (IoT) devices by 2020, with 5.5 million new things getting connected every day
  • more than half of major new business processes and systems will include an IoT component by 2020
  • ...9 more annotations...
  • Manufacturers are rushing products to market with little or no thought to security, often including hardcoded passwords or known vulnerable software libraries. While this problem is most obvious in the consumer space (which gets the most news coverage), vulnerable IoT devices are present in every business sector as well
  • The TPM stores secret keys, passwords, and digital certificates in its secure internal storage protecting them from software and physical attacks. The TPM acts as a root of trust for checking platform integrity at boot time (i.e., check against any malicious change). A cryptographic hash value of the platform configuration is calculated and compared against the precomputed hash value of the platform. Access to the platform is denied if the integrity check fails [4]. This is the beginning of the “chain-of-trust” for software modules that are subsequently initiated. This transitive trust mechanism is one of the important security features in trust computing. It uses the trust root as a starting point to establish a chain of trust model, in the order of trust root, boot loader, OS, and Application.
  • Secure boot provides the foundation for Trusted Boot, which extends the trust boundary to the boot process and eventually the operating system.
  • software attestation attempts to achieve a dynamic root of trust without specific hardware support. This method has the advantage of not requiring any stored secrets (cryptographic keys or passwords) and allows applications or modules to be updated, which may not be possible if hash values are stored in immutable formats, such as a TPM chip
  • While Secure Boot validates the platform and firmware, Trusted Boot is generally defined as verifying each software module before execution and extending the chain-of-trust to the entire operating system. During the boot sequence, the digest of each executing program is recorded before it executes. A TPM (Trusted Platform Module) is used to store all these records and then report on them securely.
  • It is important to note that Trusted Boot requires a TPM chip so the operating system can see the chain of execution, thus it may not be an option for some IoT devices. Lack of trusted boot support would allow an attacker with physical access, or using a software vulnerability during run time, to potentially modify the stored code and compromise the device.
  • There are many other attack possibilities to consider with IoT devices. For example, existing TPM architectures do not support runtime integrity checking and this allows attackers to exploit vulnerabilities to modify the program after it has been verified (at time of check or TOC) but before the time of its use (at time of use or TOU) to trigger unintended program behavior, such as the execution of malicious code or the leaking of sensitive data
  • Physical attack is a viable method of compromising the integrity of a device. Modifying and replacing firmware by an attacker may be worth the effort, depending on the perceived value of the device or the data it may access (such as a video camera or ATM). Attackers can go as far as removing memory and reading its contents.
  • a device built today can become a major problem tomorrow
  •  
    The purpose of this article was to review the available literature on the subject of ensuring software integrity for IoT (Internet of Things) devices, focusing on detecting and preventing modification of the original software, so that the device cannot be used for unintended purposes. The literature reviewed; secure boot, trusted boot and runtime security. Concluding that no one single control is going to adequately protect a device the solution based upon 25 years of experience is to create a multi-layered approach to security that starts at the beginning when power is applied, establishes a trusted computing baseline, and anchors that trust in something immutable that cannot be tampered with. Additionally, because a device built today can become a major problem tomorrow, due to them having hardcore keys "set and forget", the internet will then have literally billions of obsolete hosts in the coming years. Therefore it is important for MIS Managers/ Consultants investigate how to change the game in order to mitigate the damage or economic value of new systems being breached and by asking questions such as 'Can we even in the presence of a malicious attacker offer some limited form of security for the most valuable transactions (such as e-banking) or assets?' and 'Can we make the 'business' of the attackers less attractive by applying security technologies that are particularly tailored towards destroying the business model of the attackers?'
anaslip

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Hospitality Technology - 0 views

  • Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector
  • Marriott International revealed that a massive cyberattack compromised personal information for up to half a billion individual guests of its properties.[1] The data breach ranks as the second largest known theft of sensitive personal records to date.
  • This marks the second major cybersecurity failure for Starwood, the Marriott division affected. Before being acquired by Marriott in 2016, the company’s cash register system was penetrated by malware looking to steal credit card information. [3] Other major organizations in the hospitality industry, including Hilton and Hyatt, have reported similar attacks. In 2017, for example, Holiday Inn parent company InterContinental Hotels discovered a breach lasting three months and affecting 1,200 properties. With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • ...5 more annotations...
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • However, industry specific challenges like high employee turnover continue to expose the sector.[6] Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.” What this means is that an adversary—commonly referred to as a “hacker”—finds some way to gain access to a target and compromises it. The target can be accessed through vulnerabilities in web frameworks, internet browsers, or internet infrastructure such as routers and modems. Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks.
  • Rather than rely solely on the incident response and recovery methods that have been used for many years, a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale. This kind of approach, when paired with incident response tactics, could provide true security to vulnerable, critical networks.
  • A TTP-based cybersecurity tool would work in concert with existing incident response, internally-focused cybersecurity efforts, adding a layer of prevention over the top of this vital but flawed process.
  •  
    In today's world no business entity is impervious to cyber-attacks. Marriot, Hilton and InterContential Hotel Groups were all recently affected by such acts. The traditional cyber-attack method which the hospitality industry employs is oftentimes simply a reaction to the attack- "incident responses". Instead, the industry needs to shift its focus and allocate resources to aid prevention of future of attacks. This new focus was be surrounding tactics, techniques and procedures (TTP) - the ability to identify adversary and implement the necessary processes to hinder attacks.
  •  
    This article tells us about the importance of having a good cybersecurity. There are some big hospitality companies like Marriott and Hilton which have revealed that many cyberattackes compromised personal information for many guests and that cybersecurity has to be improved.
xrive007

Cyberattack hits world's largest meat supplier - 0 views

  • It might be days before production resumes after an “organized cybersecurity attack” affected IT systems in North America and Australia
  • The world's largest beef supplier has been hit with a ransomware attack, threatening some of the U.S. meat supply.
  • The hack came less than four weeks after a similar one by Russian criminals against Colonial Pipeline
  • ...16 more annotations...
  • JBS, one of the world's largest international meat processors, was hacked
  • forcing the company to take systems offline and stop work
  • 11 beef processing facilities in Australia and 26 chicken processing plants in the U.S
  • The company told the White House on Sunday that it was a ransomware attack,
  • JBS notified the administration that the ransom demand came from a criminal organization, likely based in Russia.
  • Ransomware, an extremely lucrative type of cybercrime, is malicious software that lets hackers encrypt a victim's files and demand a ransom to make them functional again.
  • he hackers will steal and threaten to publish those files if their demands aren't met.
  • Ransomware attacks have grown rapidly in recent years.
  • Criminal hackers,
  • often based countries like Russia where they are largely protected from U.S. law enforcement
  • have targeted practically every major industry to shake down victims for payment.
  • about 40 food and beverage companies around the world have had confirmed ransomware attacks since May 2020.
  • Colonial's hackers, an established ransomware gang called DarkSide, shut down its website amid international attention from that attack, but not before receiving a $4.4 million payment from Colonial.
  • regularly hit manufacturers, school systems and city governments.
  • ransomware attack had already affected the cattle market.
  • If this goes beyond a week, you start to really worry about these animals building up on farm sites where they just don't have the capacity to hold them
  •  
    An example of a cyber attack or ransomware, in a manufacturer. Shows some effects of a ransomware and what a consumer may experience.
artandmer

Are hotels and outdoor concerts any safer since the Las Vegas attack? | PBS NewsHour - 0 views

  • By now, many details of that October evening in Las Vegas are well known: the lone gunman in a 32nd floor suite atop the Mandalay Bay Hotel, the arsenal of firearms, the terrified concertgoers below.
  • In a 2017 Gallup poll, 38 percent of U.S. adults said they were less willing to attend events with large crowds out of concern the events could become a terrorist target.
  • A separate Gallup poll taken days after the Las Vegas shooting found that 39 percent of Americans are “very” or “somewhat” worried that they, or a loved one, will be a victim of a mass shooting.
  • ...7 more annotations...
  • The Las Vegas attack was, however, the first mass shooting at a hotel in the U.S., and it served as a reminder that attacks on entertainment events are a worldwide emerging threat
  • The attack Paddock carried out — from a hotel with robust security and a state-of-the-art surveillance system — left many industry insiders and security experts stunned.
  • For the first time in Coachella’s 19-year history, organizers used surveillance drones to monitor the vast grounds of the festival.
  • For months ahead of the festival, a security company called Emergence also trained Goldenvoice security and police officers in “predictive threat analysis,” a security technique that focuses on spotting signs of trouble and disrupting attacks before they take place.
  • And as security costs for hotels and event promoters increase, concertgoers in the U.S. may see slightly higher ticket prices
  • Police say Stephen Paddock planned his attack in Las Vegas at least a year in advance. In the days leading up to the shooting, Paddock was able to bring more than 23 rifles into his hotel room, set up a hidden camera in the hallway outside of his room, and drill L-brackets into the 32nd floor stairwell door and his suite to delay police from entering.
  • After the shooting, Wynn Resorts, Hilton and Disney Resorts all changed their internal policies regarding do-not-disturb signs
  •  
    High profile hotels near large events have had to respond to events such as mass shootings since the 2017 Las Vegas attack where a guest used as hotel room to carry out the shooting. Concert venues and large hotels are now using surveillance drones and predictive threat analysis to enable their staff to recognize patterns that could indicate signs of trouble. Security costs at large venues are expensive, and they are being passed on via ticket prices. Hotels need to evaluate their need for an active shooter plan and evaluate their "do not disturb" policies and train their staff to alert management when they are unable to enter a guest room, or when they recognize something out of the ordinary.
natalieemmanuel

Point-of-sale malware has now infected over 1,000 companies in US | Ars Technica - 0 views

  • According to the US-CERT advisory, the group behind the Backoff malware operation scanned the Internet to find potential victims by detecting installations of the remote-desktop software frequently used by service providers to manage the point-of-sale systems of their retail clients. The attackers look for remote desktop solutions like Microsoft’s Remote Desktop, Apple's Remote Desktop, Chrome Remote Desktop, Splashtop 2, Pulseway, and LogMeIn, according to the advisory. Once a potential target is identified, the group uses the equivalent of a digital sledgehammer, attempting to break into the system using a list of common passwords.
  • Such techniques are a common threat to small retail businesses, according to Trustwave, who helped the government agencies in their analysis of and response to the 'Backoff' program. A third of cybercrime attacks on businesses focused on the point-of-sales systems in 2013, according to the company's 2013 Global Security Report. In 31 percent of incidents, attackers exploited weak passwords to gain access to targeted systems
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
jiayi017

Stopping Data Breaches in Hospitality | Impact Networking - 0 views

  • Nearly half of all cyberattacks target SMBs, a number which is expected to increase.
  • Human error is the number one cause of data breaches from cyberattacks, with 52% of incidents directly attributable to them.
  • The majority of attacks that occur within businesses happen because somewhere along the line, someone made a mistake. Perhaps they opened an attachment they shouldn’t have or visited a risky website.
  • ...7 more annotations...
  • 93% of companies without a disaster recovery plan who suffer a major data disaster are out of business within one year.
  • SMBs simply don’t have the resources to survive breaches and are risking their entire business by not fully preparing against attacks.
  • Research suggests that 70% of consumers would stop doing business with a company if it experienced a data breach.
  • even for businesses who can survive a breach and save their data, long-term consequences can be dire.
  • Consider a true next-gen antivirus for everyone under your network to minimize the potential for attack.
  • By keeping all your data periodically backed up in secure data centers, you can rest a lot more easily knowing that should the worst happen, you can respond quickly and effectively.
  • One of the most effective ways of counteracting the dangers of cyberthreats is by training employees and establishing policies around a security strategy.
  •  
    This article describes the destructive effects of cyber attacks on enterprises, especially small and medium-sized enterprises. Because it does not have sufficient prevention and sufficient resources for disaster recovery. The most direct cause of current cyber attacks is that people open some risky websites or emails in the wrong place. For the hospitality industry, there is a large amount of customer privacy and sensitive information. Once attacked, its destructiveness is unimaginable. And to protect consumer data, most service industries just comply with local state laws, but most state laws have not made greater progress in information protection. Therefore, enterprises should protect themselves and their customers from cyber threats from the three aspects of their own network endpoints, disaster recovery and education.
anonymous

11 Tips to Improve Your Restaurant's Cyber Security in the COVID-19 Era | FSR magazine - 0 views

  • wealth of client data on tap from places with lax security
  • unknowingly serve credit card data to hackers. Due to the volume of credit card transactions and CRM data available, restaurants need to take cybersecurity seriously before a criminal gets wind of the vulnerability
  • A hacker only needs to gain access to a restaurant's POS system and install malware to steal customer credit card details.
  • ...20 more annotations...
  • Take Chipotle, for example. The company got devalued by about $400 million after they suffered a data breach.
    • anonymous
       
      Major consequences for restaurants if discovered as the link
  • because most go belly up six months after an attack.
  • Unprotected WiFi
  • Criminals pretend to be from the U.S. government and inform targets their COVID-19 stimulus check is ready, but they would need to verify the details of the recipient first before they can send it.
    • anonymous
       
      Low level scammer
  • CRM software data, which may include names, addresses, and even birthdays. One of the most common ways to achieve this sort of attack is via malware (malicious software). Hackers find a vulnerable backdoor to a restaurant's network to install malware on the POS system. Malicious code then records every transaction and every detail, sending it back to the criminal's server over the internet.
  • GrubHub drivers scam both the restaurants and the customers by marking the deliveries as complete and pocketing the tip money, without bothering even to pick up the order from the establishment.
    • anonymous
       
      AHHHH
  • Businesses are scrambling to find suppliers amidst the chaos, and criminals have been taking advantage of the confusion
  • Scammers are posing as representatives from the World Health Organization (WHO), the Center for Disease Control (CDC), and other public health agencies
  • social engineering on the restaurant staff to pull off phishing attacks.
  • PCI compliant.
  • conduct a risk analysis
  • hiring a security expert either full time or as a consultan
  • Secure your network and always change the free WiFi access point's password with a strong one every day.
  • latest operating system updates
  • Force multi-factor authentication
  • strong passwords
  • Ensure sensitive data encryption
  • web-filter to secure your WiFi network
  • Install a robust security software program on all computers and devices to block, detect, and clean malware.
  • Conduct regular cybersecurity training
  •  
    Restaurants have always been an easy target for cyber security hackers, in particular, hackers who are looking for credit card and ID information. Restaurants provide hackers with a "wealth of client data" due to the high "volume of credit card transactions and CRM data available." Once given access, a hacker could simple install malware and duplicate all customer information. Already facing critical financial issues during Covid 19, restaurants large and small need to take a stronger presence in the protection of their data. If discovered to be the start of a breach, customers will tend to avoid that business. "Chipotle, for example...got devalued by about $400 million after they suffered a breach," and many small restaurants "go belly up six months after an attack." Below is a summary of the types of attachs restaurants face: 1. Unprotected Wifi 2. Social engineering and phishing attacks. This is actually the one that stood out to me the most because of how sophisticated these attacks can be. It is a reminder that we are all at risk, both the technologically challenged and gifted. 3. Malware 4. Covid 19 Scams 5. Grub hub scams 6. Supply chain scams *A particular issue for restaurants and commercial businesses right now as companies scramble to find new vendors who can supply them with the products they require. 7. Public Health scams 8. Government Stimulus scams 9. Technical support scams How can we fight against these? Here are the recommendations: 1. PCI compliance 2. Hire and IT security professional to conduct a risk analysis and if possible, keep on as a consultant or full time 3. Keep a secure network and change free passwords daily 4. Use the latest operating systems, force multi-factor authentication, strong passwords, and use encryption services for data storage and transfers 5. Install and use robust web-filters and security software programs 6. Maybe most important!!! Train your employees. 5.
nbakir

Hospitality industry more prone to cyber attacks | TravelDailyNews International - 1 views

  •  
    The article by, a financial policy author, explains in detail the extent of cyber-attacks in the hospitality industry. The article explains that the hospitality industry is more prone to cyber-attacks, given the nature of information most of the organizations generate daily in their operations. The article explains that most organizations in the hospitality industry may not be aware that they have already been hacked. The article emphasizes the importance of internal audits and the critical evaluation of cyber footprints in hospitality organizations to minimize cyber-attacks. The author of the article delves into the cybersecurity risk factors in the hospitality industry and reports about the UAE IAA members' seminar which was aimed at sharing information and networking with a focus on building cyber-resilience against cyber-attacks. The article shows the prevalence of cyber-attacks in the hospitality industry noting that each stolen data record costs an average of $148 with the average cost of a cyber-attack being valued at over 3 million dollars (Karantzavelou, 2020). The article quotes a statement by the Jumeirah group chief internal audit officer who asserts that protection against cyber threats should be the DNA of every organization, and they should be continuously on the lookout for potential threats and ensure adequate protection. Members in the seminar advised on the importance of having internal auditors to provide assurance, suitable frameworks, and to set up controls to mitigate key cybersecurity risks. The article explains that hotels are prone to Cyber-attacks since they collect varied, valuable and sensitive customer information. The article also cites a cyber-breach in 2018 where up to 500 million customer details and passport information was compromised in an international hotel chain for up to four years continuously without detection (Karantzavelou, 2020). At the bottom line, contributors in the seminar explain the importance of cybe
ldevaul

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
llibe010

The Top Five Cyberthreats Hotel Brands and Franchisees Need to Know About | Netsurion - 0 views

  • ay for guests, it also opens hotels to digital threats perpetrated by malicious actors. Consequently, hotel operators should be aware of the types of cyber attacks, which can significantly hurt their brand reputation and bottom line, not to mention the safety and welfare of employees and guests.
  • In January, for example, cyber criminals took over a luxurious Austrian hotel’s computer-controlled key-card system, locking 180 guests out of their rooms until hotel managers paid a nominal ransom
  • A ransomware attack may disable or alter performance of hotels’ computer-driven systems such as air conditioning and lighting, putting guests’ comfort and, worse yet, safety at risk. In addition, booking systems are extremely vulnerable to ransomware attacks because they process information belonging to the hotels, third-party applications and their customers.
  • ...18 more annotations...
  • 1. Ransomware:
  • hey present further ransomware opportunities to hackers by using computers to automate functions.
  • distributed denial of service, or DDoS
  • One of the largest data breaches in history was conducted through a third-party vendor when hackers stole data from 70 million credit cards by gaining access to a mega-retailer’s network through credentials belonging to an HVAC contractor.
  • 3. Phishing scam targeting customers and hotels:
  • 4. DDoS attacks on the hotel network:
  • 2. Remote hacking through third-party vendors:
  • 5. Theft of personal information over public Wi-Fi.
  • Statistics indicate that such incidents will become more frequent, so it is not a matter of if but when the next cyber attack will occur.
  • Integrate a managed SIEM. Hotels should bring on a managed security information and event management (SIEM) platform for their remote locations to be warned right away of cyber attacks. They may also want it for inside the perimeter if they lack the expertise and resources to properly use SIEM internally.
  • Maintain PCI compliance. The Payment Card Industry Security Standards Council (PCI SSC) has put forth a set of stipulations, the Payment Card Industry Data Security Standard (PCI DSS), in response to rapid PCI expansion. Hotels should make sure they are compliant with these regulations, which require businesses to send credit-card information in a secure environment, to prevent paying heavy fines and losing data, revenue, and customer trust.
  • Install antivirus on all devices. Hotels should ensure they have reliable anti-virus and anti-malware software installe
  • Train employees. Hotels should train employees to not open suspicious emails or links inside them as they may contain malware.
  • According to the FBI, the number of cyber threat occurrences quadrupled to 4,000 per day last year from 1,000 per day in 2015
  • In addition, there are large volumes of payment card transactions between restaurants, on-site shops, spas, parking, and the front-desk, ensuring there is plenty of customer data for a hacker to compromise.
  • The number of cybersecurity incidents worldwide increased 38 percent in 2015 from 2014, according to the Global State of Information Security Survey 2016 by PwC, CIO, and CSO.
  • Hotels are especially vulnerable to this type of attack where a type of malware disrupts access to a system until a ransom is paid. This is because they often use integrated POS systems
  • Hackers can break into hotels’ payment systems through a remote access point belonging to one of its vendors, so they should closely monitor third-party access to their networks
  •  
    This article outlines some of the main cyber attacks on the Hospitality industry. It exposes the threats due to the wealth of data stored in PMS, POS and CRM and suggests steps to take to protect against malware and randsomeware. The article further highlights the necessity for antivirus software on all devices.
  •  
    The article describes the five most common cybersecurity risks for hotel brands such as ransomware, remote hacking and DDoS attacks. The operational elements of each risk have also been discussed. It also covers best practices that hotels and other hospitality organizations can adopt to curb breaches.
1 - 20 of 256 Next › Last »
Showing 20 items per page