Skip to main content

Home/ Hospitality Technology/ Group items matching "attacks" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
11More

Security Expert Exploits Hotel Network Vulnerabilities | Top Stories | Hospitality Maga... - 0 views

  • IP Telephone
  • unplugged the IP Phone and plugged the phone's Ethernet cable into his laptop. It booked up to his Backtrack Live CD
  • Jason Ostrom, Vigilar senior security consultant, was given access to a hotel room and told to find out if he could break into their corporate network through the IP TelephoneÃÆ’Æ'Æ'ÃĥÂ.ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¡Ãĥ¬ÃÆ’Æ'Â.ÃÆ’.Ã.•¬Ã…¾ÃĥÂ.s network connection
  • ...7 more annotations...
  • Jason was able to penetrate through to the data network by using a combination of techniques he calls VoIP Hopping. This type of VLAN hopping attack is just one of the attack vectors being used by attackers today
  • As traditional voice and data networks converge, more avenues of attack open up
  • A regular PC should never have access to the Voice VLAN
  • Defense methodologies are in their infancy and are sure to improve in the near future
  • protect against VoIP attacks Ostrom recommends putting a firewall between the Voice and Data VLANs. By putting the Voice VLAN on a separate DMZ of a firewall, many current attacks can be thwarted. It is important to lock down the firewall so that only protocols used by IP Telephony are allowed to flow
  • Intrusion Prevention System (IPS
  • VoIP Hopper is available at http://voiphopper.sourceforge.net.
  •  
    An unssuspecting person check into a hotel like any normal person would. The ever so common exchange, credit card for room key took place. The only difference was that the person that checked had done so with other intentions. The "guest" utilized an IP Telephone that was in this hotel room to hack into the hotel credit card database and steal credit cards, transmit them to a foreign country and then have money transferred to his offshore bank account. This happened but at the hands of Jason Ostrom, aa Vigilar senior security consultant. Ostrom was able to unplug teh telephone in his room, plug in the phone's ethernet canle into his laptop and hack away. Of course, he did this as part of his job in testing a company's security agaisnt viral hackers. His company offers free security testing using a downloadable software called VolP Hopper This article was extremely interesting because as a frequrnt traveler as well as a perosn in the hospitlaity industry I was very shocked at the ease that the credit card information could be stolen. When it comes to credit card security it is of the utmost importance for companies to be PCI compliant and spend whatever it is necessary to safeguard the information of their customers. The detrimental damage that a security breach can have on a person can be debilitating as leaders in the hospitality industry we must do everything possible to prevent attacks like this from happening. made me become extra cautious about using my credit cards.
4More

Hospitality's Hidden Threat: POS | News | Hospitality Magazine (HT) - 0 views

  • POS breaches remain one of the most difficult to protect against based on historic vulnerabilities at the device end-points
  • In a POS attack, the attacker spends the vast majority of time inside the network in the “post infection” phase, which occurs after the system has been compromised.
  • once the attacker is inside the network, he can move “low and slow” to mount his attack and remain undetected.
  •  
    In contrary to most of the articles that state the advantages of POS in the hospitality industry, this article is focused on the cybersecurity threats that the usage of POS imposes to the hotels and restaurants. It is said that hospitality became the attractive target for the hackers and accounted for 14% of all breaches. Most of the attacks happen through the POS's. Additional security measures such as encryption to transaction data are usually difficult to apply to POS systems making it easier for the breacher to enter the system. Moreover, once they are inside they act slowly to get access to the key asset, the payment processing center, but traditional prevention security solutions are not designed for post-infection detection. Also, many POS are still operating on Windows XP or even DOS meaning that new vulnerabilities can be easily exploited. This all should be taken into consideration by the hospitality organizations while building their security systems. Deception-based detection that sets traps that make the attacker reveal himself becomes a popular solution. So in my opinion, the security issues of using POS should be the priority for the hospitality industry. Creating of effective mechanisms of customers' personal data protection is crucial for maintaining their trust and loyalty.
14More

Attacked by Ransomware, Many Companies Opt to Pay Up - CFO - 1 views

    • emmajeenie
       
      The demanded ransom is often a moderate amount that would pale in comparison to the recovery and reputational costs for a company that refuses to pay.
  • Hospitals, for instance, are frequent targets of these kinds of attacks, in part because people’s lives are on the line so they have to make quick decisions.
  • , in a ransomware attack the data isn’t released or leaked or sold. On the contrary, in most cases, data and infrastructure aren’t compromised at all; its owner just can’t access them.
  • ...11 more annotations...
  • y rose 41% from 2018 to 2019 to more than 205,000 globally, according to newly published data.
  • the security firm Coveware estimates the average payout for those that did was about $85,000 during last year’s fourth quarter, and more than $190,000 in December.
  • its leaders give in — and pay the ransom.
  • Organizations have more to lose financially from the inability to conduct business than they do from just paying the ransom
  • It’s like the plot of a James Bond movie: Hackers take control of a global organization’s computer systems and threaten to destroy its records, steal its intellectual property, and drain its bank accounts unless a hefty ransom is deposited into an untraceable offshore bank account by the end of the day.
  • ” the ransom is likely a significantly smaller amount than what it may cost to address a threatening public issue or the time and money necessary to rebuild the confidence in a brand or company.
  • Experts suspect that the actual number of ransomware attacks is much higher than the reported number, citing reasons ranging from fear of job loss, investor withdrawal, and reputational damage
  • Moreover, while public companies are required to report cyberattacks to regulators, private organizations are under no such mandate. Reporting attacks to law enforcement often may cause lengthy investigations
  • A hacker can keep repeating a ransomware attack until the security flaw is fixed or they are caught or reported.
  • Organizations can undertake a few basic defensive actions to mitigate the impact of a ransomware attack. Frequently backing up data and storing it on different networks is one way,
  • reducing the number of outside apps the system uses, fixing software vulnerabilities immediately, and properly training and educating employees on what to look for and whom to alert if something appears suspicious.
10More

Biden, Gates, Musk and Other V.I.P. Twitter Users Are Hacked in Bitcoin Scam - The New ... - 0 views

  • A Brazen Online Attack Targets V.I.P. Twitter Users in a Bitcoin Scam
  • In a major show of force, hackers breached some of the site’s most prominent accounts, a Who’s Who of Americans in politics, entertainment and tech.
  • Dozens of the biggest names in America — including Joseph R. Biden Jr., Barack Obama, Kanye West, Bill Gates and Elon Musk — posted similar messages on Twitter: Send Bitcoin and the famous people would send back double your money
  • ...6 more annotations...
  • It was all a scam, of course, the result of one of the most brazen online attacks in memory.
  • But soon after, the list of victims broadened to include a Who’s Who of Americans in politics, entertainment and tech, in a major show of force by the hackers.
  • Twitter’s investigation into the breach revealed that several employees who had access to internal systems had their accounts compromised in a “coordinated social engineering attack,” a spokesman said, referring to attacks that trick people into giving up their credentials
  • the attack was concerning to security experts because it suggested that the hackers could have easily caused much more havoc
  • Security experts said that the wide-ranging attacks hinted that the problem was caused by a security flaw in Twitter’s service
  • Cybersecurity experts said the attack showed how vulnerable social media remains to attacks
  •  
    While this story isn't directly about hospitality it shows that poor security by technology companies like Twitter can lead to compromised access social media accounts of prominent figures. The Social Media Hospitality could be and used scam their customers.
10More

This is personal: Cybersecurity and the hospitality industry | HLB - 1 views

  • The hospitality industry has been a prime target for cyberattacks in recent years. From ransomware to data breaches, hotel chains and other businesses in the hospitality industry have experienced a variety of attacks
  • First, hospitality businesses deal with large amounts of Personally Identifiable Information (PII), including credit card information and contact details of customers.
  • Second, the hospitality industry relies heavily on technology, creating additional attack surfaces for criminals to exploit. For example, many hotels use electronic key cards that can be easily hacked
  • ...6 more annotations...
  • Finally, the hospitality industry is often slow to adopt new security measures, leaving it behind the curve in protecting against emerging threats and scams.  
  • One type of attack is known as malware injection. This occurs when malicious software is injected into a hotel's or restaurant's computer system. The malware can then be used to steal customer data or take control of the system
  • Fortunately, there are steps that the hospitality industry can take to protect itself from these types of attacks, including investing in robust cybersecurity solutions, educating employees about cybersecurity risks and best practices, which can help reduce employee mistakes that could lead to an attack, and staying up-to-date on cybersecurity threats and trends
  • To protect themselves, these businesses need to follow GDPR guidelines (General Data Protection Regulation), a set of regulations that European Union member states must implement to protect digital data privacy
  • The most important thing you can do is to use a unique password for each account. This may seem like a lot of work, but it's the only way to ensure that your data is safe
  • This ensures that if an attack does occur, critical information can be recovered quickly. Additionally, it is important to keep software updated with the latest security patches. Many attacks exploit known vulnerabilities, so by staying up-to-date, businesses can make it more difficult for attackers to access their systems
  •  
    The article discusses the relevance of cybersecurity for hotels in light of more and more people working from home after the pandemic. Common risks and their safeguards have been described along with a set of best practices that hotels should adopt to prevent breaches.
3More

Hotel Security in an Insecure World | Past Issues | Past Issues - 0 views

  • For the last nine years, the concept of heightened security has guided our nation ever since we witnessed the terrorist attacks of 9/11.
  • With the violent November 2008 hotel attacks in Mumbai, India, the September 2008 attacks in Islamabad, Pakistan, and the July 2009 Jakarta, Indonesia, bombings of American-branded hotels, the need for a new security awareness is now finding widespread acceptance across the U.S. lodging industry.
  •  
    The cases of terrorist attacks of hotels increasing. To reflect this situation, the American Hotel & Lodging Association (AH&LA) cooperate with Department of Homeland Security to classify the security situation and work on security environment of lodging. To improve the security environment, the AH&LA had meetings discussing about attacks alert, security apparatus, and practical and logistical aspects to hotel security. For many years, AH&LA provided e-mail notices to its members alerting hoteliers improve the immediate security environment. With more and more terrorism and tremendous risks, AH&LA coordinated media and government, and produced security training to help hoteliers to protect and guard the hospitality industry.
3More

The Hospitality Industry Under Attack - 0 views

  • According to a study by the Ponemon Institute, the average consolidated total cost of a data breach is now $3.8 billion, representing a double-digit increase in recent years. In the United States, the country hardest hit by cybercrime, the average cost of a computer breach is now $6.5 million, well ahead of the global average.
  •  
    In order to combat cyber attacks within the hospitality industry, the National Restaurant Association and PCI Security Standards Council have partnered. They have created.. "Small Merchant Taskforce, which raises payment card security awareness for the hospitality industry." With cybercrime increasing it is a necessary step to take, not all businesses, especially small, can afford the "best" cyber security systems. This task force will help educate various members and help find solutions to protect businesses and customers. "A study by Verizon stated that 99 percent of breaches in 2014 were caused by known vulnerabilities with fixable patches." That being said, all business operators need to take the initiative and be proactive when it comes to handling customers' private information.
  •  
    I think one the biggest issues related to cyber attacks is that owners are not aware of the issue. So it is important to educate them and help them understand the importance to budget cyber security into their expenses. I am glad that the task force is taking that step to help protect business owners and customers from cyber attacks.
14More

Cybersecurity Tactics for a Hotel Industry that's Under Siege - 0 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar. Just ask Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel Collection, all of which were victims of highly publicized, major breaches in the hospitality industry last year. 
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • In the breaches mentioned above, point-of-sale (POS) systems were attacked and malware launched to acquire cardholder names, credit card numbers and expiration dates.
  • ...7 more annotations...
  • It can be difficult and expensive to hire and retain an IT security team
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required.
  • personal details for hotel guests are frequently stored in a variety of locations, including billing, facilities, restaurants, etc.
  • otels are made even more vulnerable thanks to POS system provider breaches
  •   Phishing remains a particularly popular tactic used by hackers everywhere, including those that are targeting the hotel industry to trick both prospective guests, who give up credit card and personal details, and insiders, who then give up valuable login credentials.
  • File Integrity Monitoring (FIM), Unified Threat Management (UTM), and Security Information and Event Management (SIEM) should also be considered
  •  
    This article talks about how there is a serious concern in the hotel industry when it comes to credit card and identity theft. They talk about how all the major brands in the hotel industry were all victims of highly publicized, major breaches in the last year alone. Also, including airline and banks, hotels maintain a wealthy amount of database of personal and financial data. For example, with new technology systems being created, POS systems are a weak security point for many networks because they are constantly in use and are not always updated or even protected from vulnerabilities. The article talks about personal details for hotel guests are frequently stored in a variety of locations including restaurants, facilities, and government buildings, so hackers have a greater possibility to access your personal information. The bigger hotels are in more danger because of the volume of guests that come in and out of the location. Smaller hotels should be concerned not just about their security but also by ransomware, an increasingly favorable tactic to extort hoteliers by hackers who encrypt the hotels data making it inaccessible until ransom is paid for. I believe hotels need a toolbelt of various securtiy technologies that can be used to prevent future malicious attacks. I think by managing and implementing a firewall is essential which helps get rid of dangerous traffic from coming onto the network and preventing sensitive data from being hacked.
  • ...1 more comment...
  •  
    This article talks about the weakness and vulnerability of POS systems involving safety. It mentions the security breach that few companies, such as Starwood Hotels & Resorts Worldwide (including their Westin, Sheraton and W Hotel brands), Hilton, Hyatt and the Trump Hotel, faced last year (2016) involving credit card fraud and identity theft through their POS systems. It mentions how point-of-sale (POS) systems are not complete safe and how vulnerable they are because they are constantly in use and aren't always patched, updated, or protected from vulnerabilities as frequently as required. It suggests that enterprises should outsource their cyber security management to minimize costs, considering that is extremely expensive to hire and retain IT security team.
  •  
    MOD 10: This article discusses the main tactics of cyber hackers that target hotels. Point of sale (POS) systems are easy targets for hackers due to their constant use during operation hours and because of that their security measures aren't always up to date. Hotels have large data banks since they're storing consumer profile information such as home addresses, phone numbers and credit card numbers. There's a large risk when it comes to security breaches within franchises because they have access to their parent company's regional, national and global systems. If their systems are hacked and breached, then that puts the whole system of the brand at risk. Security breaches within a system can also damage a brands reputation with the public. According to the article, "Recent major breaches at Fortune 500 companies and household names across the retail, restaurant and hotel sectors demonstrate that anti-virus, anti-malware and firewalls alone are not enough to secure businesses from the ever-evolving threat landscape." Smaller properties are even at a greater risk because not only do they have to monitor their compliance with PCI but also monitoring their security systems for their database and PMS system. Some of the recommended software's that should be used by hotels looking to be proactive with their company's cyber security is File Integrity Monitoring(FIM), Unified Threat Management(UTM), and Security Information and Event Management(SIEM).
  •  
    This article explores the different tactics hotels should use after a cyber attack. The article mentions several different type of attacks such as Phishing when hackers trick customers into giving up their login credentials. Ransomware, when hackers encrypt data making it unusable and inaccessible for the hotel. Not one solution but rather companies should be equipped with a series of technologies from firewalls to file monitoring programs. Some of these technologies, like SIEM requires an intelligent IT team to have the capabilities of analyzing and monitoring the reports produced. This may be more difficult for smaller businesses to implement and maintain.
5More

Budgeting for Cybersecurity: Risk vs Reward - NuData Blog - 0 views

  • Companies are facing an onslaught of cybercrime – everything from DDoS attacks to breaches to insider theft – and the numbers are staggering. Cyberattacks typically cost large businesses $861,000 and small business on average about $86,500, according to Kaspersky Labs. Jupiter Research is estimating that the cost of data breaches will reach $2.1 trillion globally by 2019. It is the frequency of attacks and the cascade of numbers which now makes this a CEO and Boardroom issue as cyberattacks could cause some major damage or even take whole businesses down.
  • IT Security budgets are set to grow 14% on average over the next three years with small business spending as little as a $1,000 all the way to a million dollars for large companies. While some analysts like Cybersecurity Ventures predict that there will be a burst of spending – 12-15% year over year growth through 2021, Gartner Research reports that IT security spending will account for less than 5% of worldwide IT spending.
  • You can also get more budgeting dollars by leveraging bottom line increases such as incentives for VIP customers, revenue increases, and spend increases throughout the customer lifecycle.
  • ...1 more annotation...
  • Security spending does not equal security effectiveness
  •  
    I found with this article that cyber attacks are becoming alarmingly more common than we have prepared ourselves for. Businesses now need to invest in their own cyber security department or, as the article suggests, apply a cyber security budget to each department. With security budgets predicted to increase 14%, money should be collected through the customers over a lifetime of the customer so that the budget is continually there. I found this article to stand out to me because I never thought of cyber security being so crucial, but it easily makes sense. I think a lot of business lack in providing the proper amount of security to prevent cyber attacks. Personally, I never heard of a cyber security department so this was new for me to read about.
24More

What is Network Redundancy and Why Does It Matter? - 0 views

  • Network redundancy is the process of adding additional instances of network devices and lines of communication to help ensure network availability and decrease the risk of failure along the critical data path.
    • jalilahst
       
      Defines Network Redundancy.
  • Redundancy in networks helps to eliminate single points of failure to ensure better network stability and uptime in the face of events that would otherwise take th
  • e network offline
  • ...11 more annotations...
  • A fault-tolerant redundant system provides full hardware redundancy, mirroring applications across two or more identical systems that run in tandem
    • jalilahst
       
      1 form of redundancy that data centers use.
  • fault-tolerance redundant systems are complex and often expensive to implement.
    • jalilahst
       
      Disadvantage to fault tolerant redundant systems.
  • If something goes wrong with one server, the backup servers take over and restart applications that were running on the failed server.
    • jalilahst
       
      How high availability works, the 2nd form of redundancy that data centers use.
  • it does tolerate a certain amount of downtime in that there is a brief loss of service while the backup servers boot up applications.
    • jalilahst
       
      Disadvantage to high availability software based redundant system.
  • create a network strategy that reviews existing infrastructure.
    • jalilahst
       
      First steps of network redundancy plan.
  •  Well-maintained UPS systems can ensure that servers can switch over from electrical power to backup generator power without losing any data or applications.
  • the best places to replicate and store data so it can be easily accessed in the event that other redundant systems fail and the main network goes down. By using more than one data center, companies can ensure that even if some disaster occurs, they will be able to carry on with minimal disruption.
    • jalilahst
       
      The importance of backing up data offsite.
  • They can test different connections by physically disconnecting hardware to make sure failover occurs as anticipated. If things do not go as planned during testing, data center managers then create an after-action report that lists the items they need to fix as a result of the testing.
  • creating incident response plans that can counter them is crucial for ensuring network resiliency in the face of modern cyber threats. Network redundancy can be a crucial aspect of many cyber incident response plans.
  • attacks are a type of cyberattack where the goal of the attacker is to render a target network or service unusable
    • jalilahst
       
      DDoS definition
  • By blending a variety of ISPs, data centers can leverage their connectivity to help reroute network services when a DDoS attack is underway. vXchnge’s vX\defend, for instance, uses diverse traffic routing options to identify and bypass volumetric attacks without compromising bandwidth or increasing network latency.
    • jalilahst
       
      prevent DDoS attacks by implementing redundant networks with flexible internet access.
  •  
    Network redundancy is the process of enhancing network devices and lines of communication to help safeguard network availability and decrease the risk of failure along the critical data path. Redundancy in networks purpose is to help eliminate specific areas of failure to guarantee better network stability and availability when the network would otherwise be offline. Optimize network redundancy by backing up data offsite and conductions frequent test to measure its durability and maintain it. Protect the network from malicious attacks is also important. By creating plans for when attacks occur by rerouting network services.
15More

Protecting the Hospitality Sector With Security Intelligence - 1 views

  • A decade ago in 2009, hospitality was — by some reports — the most widely attacked industry of all. And while other industries have now surpassed it, a 2019 report by Trustwave still ranks hospitality as the third most-breached industry, accounting for 10% of all breaches.
  • the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it
  • attacks targeting the hospitality industry are mostly aimed at stealing payment card data.
  • ...10 more annotations...
  • Why Is Hospitality So Hard to Secure?
  • 1. They often have large, complex networks.
  • 2. Customers are onsite — and attackers could be too.
  • 3. Staff churn.
  • 4. Franchising.
  • 5. Third-party risk.
  • Protecting the hospitality industry from cyber threats isn’t an easy job. Security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce. On top of all of that, they have limited security resources to work with.
  • Comprehensive security intelligence helps security teams identify unknown threats to the organization, and make informed decisions about how and where to allocate time and resources for maximum effect.
  • Threat intelligence provides the context analysts need to quickly distinguish between valuable alerts and false positives, drastically improving their ability to respond to genuine cyber threats.
  • Threat intelligence can help security teams drastically reduce the time needed to identify and contain a breach by alerting them the moment stolen assets (e.g., guest or passenger data) are made available for sale via the dark web.
  •  
    (1 of 2) "The hospitality sector has always been a popular target for cyberattacks." This is the first line of this Recorded Future article published in January. The article discusses breaches that happened for both Marriott and British Airways and how this is a regular occurrence in the industry as it is such a big target with so many possible points that can be attacked. While the statistics for the hospitality industry have improved greatly in the last decade, in 2019, they were still accounting for 10% of all breaches. Not only does a breach affect the way an organization operates, but also it also severely effects their bottom-line and takes quite a but of time for them to recover. "According to Ponemon's 2019 Cost of a Data Breach Report, the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it." The article continues by stating that hackers are typically seeking payment card data when compromising the hospitality industry.
  •  
    (2 of 2) The article then discusses the many reasons why it is so difficult for hospitality-oriented companies to secure their assets versus other organizations of similar stature. Some of these reasons include the large, complex networks which are typically publicly accessible and contain many customers in the databases, the fact that customers are always onsite and so are attackers, the high turnover leading to inconsistent training and sharing of credentials, franchisers owning the responsibility of security yet not knowing much about it, and the risk associated with all of the various third parties the hotels do business with. While intelligence has come a very long, "security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce… [AND] they have limited security resources to work with." Comprehensive security intelligence systems are now capable of protecting many aspects of the organization. Some of these updated features include responding rapidly to security incidents, blocking online brand abuse and impersonation, managing third-party risk, reducing breach containment times, and better allocating security resources. Property data security is so important to the hospitality industry. If a business does not take the proper precautions to protect their systems and their customers, then it could lead to a devastating event for the business. While security intelligence has progressed within the last decade, a business needs to make sure that they have chosen a reliable agent to partner with who will produce consistent service. If the business keeps up with their system updates and protections, they should not have to worry about their security system failing.
22More

7 Steps to Securing Your Point-of-Sale System | PCMag - 0 views

  • Consider how the Target store hack in 2014 was one of the biggest point-of-sale (POS) system data breaches in United States history that exposed more than 70 million customer records to hackers, and cost the retailer's CEO and CIO their jobs. It was later revealed that the attack could have been avoided if Target had just implemented the auto-eradication feature within its FireEye anti-malware system.
  • the reality is that most POS attacks can be avoided.
  • be sure your company has a virtual private
  • ...18 more annotations...
  • network (VPN) in place to safeguard data that's traveling back and forth on your company's
  • network.
  • Most of the aforementioned attacks have been the result of malware applications loaded into
  • the POS system's memory.
  • important point to note here is that a second app must be running (in addition to the POS app),
  • This is why iOS has traditionally facilitated fewer attacks. Because iOS is only able to fully run one app at a time, these types of attacks rarely occur on Apple-made devices.
  • otherwise the attack can't occur.
  • Companies such as Verifone offer software that's designed to guarantee your customer's data is
  • never exposed to hackers.
  • These tools encrypt credit card information the second it's received on the POS device and once again when it's sent to the software's server. This means that the data is never vulnerable, regardless of where hackers might be installing malware.
  • install endpoint protection software on your device.
  • Employees can steal devices with POS software installed on them, or accidentally leave the device at the office or in a store, or lose the device. If devices are lost or stolen, anyone who then accesses the device and the software (especially if you didn't follow rule #2 above) will be able to view and steal customer records.
  • Systems that connect
  • to external networks are more susceptible to attacks from hackers
  • Consider keeping things internal and secure, use a corporate network to handle critical tasks like payment processing.
  • you'll want to comply with the Payment Card
  • Industry Data Security Standard (PCI DSS) across all card readers, networks, routers, servers, online shopping carts, and even paper files. The PCI Security Standards Council suggests companies actively monitor and take inventory of IT assets and business processes in order to
  • detect any vulnerability.
  •  
    Even though this article is from 2019 it is still extremely relevant today. POS systems are found in most hospitality outlets and the chances for a security breach are high. I have often thought when I had my credit card to a waiter and they are gone for 10 minutes are they copying the number, is it being added to a database that can then be hacked? The importance of having the proper securities in place, the proper malware and security software is really important. Having had a catering company for 20 years I had to do PCI compliance tests every 6 months and for years I just handed it over to my IT to do the test. He would suggest things to make us safer and since it usually cost money I would shake it off. It wasnt until the credit card processing company i was using had a security breach that I realized how important these PCI rules were. It is something going forward I will always pay attention to!
10More

Data Security in the Hospitality Industry: Post-COVID Era | LoginRadius Blog - 0 views

  • The frequency of cyberattacks against business databases can be attributed to the fact that the hospitality industry largely depends on credit cards as a medium of payment. This may increase the chances of a hacker receiving access to sensitive information. Investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  • databases in the hospitality industry also happen to be the most vulnerable to data breaches.
  • The aforementioned reliance on payment cards can greatly increase the chances of information leaking. However, other virtual methods of payment like online payment and more can create the potential for cyber attacks.
  • ...6 more annotations...
  • The data collected and the people who can access it differ from country to country.
  • Staff training is restricted to the service aspect of the business. However, training employees to carry out processes in maintaining data security in hospitality like data collection and storage in the right manner is overlooked.
  • This process can involve the addition of two-factor authentication that will protect the data from being accessible to non-employees. This encryption can prevent identity theft.
  • : Employees will require thorough vetting regarding the importance of proper data storage. This training can also work towards reducing the chances of insider attacks as only a few employees will have access to the databases.
  • This includes the addition of firewalls, traffic filters, and network monitors to guard against malware present online.
  • , investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  •  
    Personal information collected can range from generic data like names and phone numbers to sensitive data like bank accounts. Databases in the hospitality industry are the most vulnerable to data breaches. Reliance on payment cards or virtual payments can increase the chances of information leaking or potential for cyber attacks. Staff training in maintaining data security is overlooked. two-factor authentication, Employees training to reduce insider attacks, and cyber security measures such as adding of firewalls, traffic filters, and network monitors to guard against malware present online can ensure data security for consumers and the business.
2More

Hotel sector faces 'cyber crime wave' - 0 views

  • Hilton Hotels, Starwood Hotels & Resorts, Mandarin Oriental and the Trump Collection have all admitted that their payments systems were compromised this year as hackers hunting for credit card details switch their attention to the leisure industry. This week Hilton and Starwood said guests’ personal details had been taken after hackers gained access via payment systems.
  •  
    Hotel industries have been under attack from excessive hacking, as seen with Hilton being targeted for private financial information from guests. In 2014, it was noticed that hackers had been targeting Hilton throughout the course of 17 weeks. They state that the industry itself has not really focused budgeting on cyber security. It seems that the process is done by integrating a virus into these hotels POS system. The virus was actively attacking the Micros program, which was being used in more than 300,000 hotels and resorts. An ultimate treasure chest for information, some of which was not even encrypted. In addition, the virus appears in the system as a legitimate software, and then it obtains over 90 percent of stored information. This hacking is being conducted by organized groups, who moved from the retail industry because it had indeed improved its cyber security. With hotels it seems that the concept has not been taken as seriously. There are many hotels susceptible to such an attack. As long as there is a sales software, then someone is looking to get into it. A person could be sitting inside of your location, and infiltrating a guests' wireless internet, and they would not even know. In order to engage this threat, locations must be proactive in attempting to stop what is occurring. The only question is, how much are they willing to invest in cyber security?
31More

Why Cybersecurity Isn't Only a Tech Problem - 0 views

  • By now, most accept that they need to invest significant cash and resources into cybersecurity capabilities
  • ather than the full C-suite and board.
  • we’re failing at cybersecurity
  • ...27 more annotations...
  • today as comparable to trench warfare in World War I.
  • First, no company has all of the resources to fix every cybersecurity issue, and not all fixes are equally important.
  • starting with a company’s most critical business activities and how cyber attacks could disrupt them that one can start to prioritize this whole process of risk mitigation.
  • skip the ste
  • focusing on individual technologies t
  • without ever addressing the fundamental issue, which is protecting the business activities for which the computers were procured.
  • hey translate in their minds being compliant with requirements as equivalent to being adequately protected.
  • nds up actually diminishing the security of these companies, as opposed to achieving its goal of increasing protection.
  • cybersecurity has been, it’s come out of the technology department.
  • versus one that’s related to any other complex business risk that a company might face.
  • eally large cybersecurity budgets, don’t nearly get the cyber protection benefit that they should, given the dollars that they spend.
  • with r
  • Another avenue that companies can take is, is there anything about the business that the company is in, the way in which it operates, that might attract some sort of attacker.
  • And that really starts with looking at cyber risks as a business risk that could come and occur as a result of a cyber attack.
  • to help quantify what those risks are, and bringing an IT department and your cybersecurity resources to understand what the threat environment might by that might affect those risks in some way or make them to come about.
  • this perception on the part of non-technical business leaders that the cybersecurity field is so complex, so impenetrable that they would never be able to understand
  • And so, the cybersecurity team decided to put the network used for the development of new automobiles inside their corporate network, because they thought, ah, at attacker would need to go through two networks in order to be able to then steal information.
  • cybersecurity people had no idea how the companies that they worked for actually design cars, and so they proposed security mechanisms that both interfered with work and ended up resulting in the company being more vulnerable because all of these outsiders now had complete access to the corporate intranet globally.
  • You know, we’ve found that cybersecurity writ large is full of platitudes that seem obvious and compelling at first read, but if you think about them more thoughtfully, they’re sometimes misinformed.
  • , informing employees about the cybersecurity implications of their own work
  • but also who your adversaries are. H
  • $3 million a year on cyber threat intelligence.
  • In all areas of risk, whether it be financial risk, physical risk, or cyberrisk, there are no guarantees that what you do will be sufficient to fend off the attack that you actually face.
  • , you need to have cybersecurity reviews as you change your business, just like you look at other risks when you’re making changes to your business.
  • Based on our experience, when a company is looking for a home for the cybersecurity organization, they should first look at where their most significant cyber risks reside.
  • A company needs to have the technical capabilities to respond to the most likely forms of cyber attack on their most critical business activities.
  • instead of telling me what vulnerabilities need to be fixed with whatever priority
  •  
    This article talks about how companies make the grave mistake of thinking that cybersecurity is merely an issue that should be addressed by an IT team and that no one else is responsible for addressing risks and understanding them. Most C-suite employees don't understand what the risks are, and usually these risks vary from company to company. It is not that you should only consider that you can get hacked, but you should consider and identify what kinds of information can get hacked and why. The article denotes an example of an Asian automobile company that needed to implement a new system to mitigate security risks and in the process, ended up locking up other companies who needed to use their systems to find out about their products. So those companies started to create fake profiles to try and access the information -- all so that they could just do their job. This showed that people are more interested in just getting their job done than understanding cybersecurity and why certain systems are in place. The way of thinking up security systems should be creative and involve all parts of an organization. Departments won't know what their role is until they identify what information is important to them, what their purpose is in the company, and what is valuable to them. By identifying this, they can come up with ways to secure this information and monitor its delivery. Businesses don't look at cybersecurity as a risk of their business just as a shipping company would look at weather risks as a potential threat to their revenue. It is looked at as more of an abstract concept and this stops people from implementing successful strategies to keep their information safe. Cybersecurity shouldn't be viewed as "so impenetrable" that no one would ever understand it. This requires everyone to get involved and understand the implications of cybersecurity on their own work, specifically, and identify who their main adversaries may be.
12More

4 Cyber Security Insider Threat Indicators to Pay Attention To | Ekran System - 0 views

  • Insiders can target a variety of assets depending on their motivation.
  • they focus on data that can be either easily sold on the black market (like personal information of clients or employees) or that can be crucial to company operations (such as marketing data, financial information, or intellectual property)
  • Usually,
  • ...8 more annotations...
  • he most frequent goals of insider attacks include data theft, fraud, sabotage, and espionage.
  • Detecting a malicious insider attack can be extremely difficult, particularly when you’re dealing with a calculated attacker or a disgruntled former employee that knows all the ins and outs of your company.
  • Of course, behavioral tells that indicate a potential insider threat can vary depending on the personality and motivation of a malicious insider.
  • 1. Disgruntlement
  • 2. Unusual enthusiasm
  • 3. Unusually frequent trips and vacations  
  • 4. Unexplained changes in financial circumstances  
  • Insider threat detection is tough. There are no ifs, ands, or buts about it. However, every company is vulnerable, and when an insider attack eventually happens, effective detection, a quick response, and thorough investigation can save the company a ton of money in remediation costs and reputational damage.
  •  
    "Insiders can target a variety of assets depending on their motivation. Usually, they focus on data that can be either easily sold on the black market (like personal information of clients or employees) or that can be crucial to company operations (such as marketing data, financial information, or intellectual property). Frequent targets of insider attacks include:  Databases"
12More

Cybersecurity Best Practices for Restaurants | QSR magazine - 0 views

  • In the case of a restaurant, a cyber attack would likely be seeking;Employee details stored by the restaurantCustomer bank details obtained by the restaurantThe restaurant’s business bank account details
  • A restaurant’s POS system could see hundreds of different bank account details every day
  • Internal software used by restaurant staff is likely to contain sensitive information such as employee details (on an HR system), as well as accounting information for the restaurant
  • ...8 more annotations...
  • Restaurant owners and/or accountants who use online banking facilities must be aware of the possibility of this being targeted
  • Shoulder-surfing is a very real security concern, and hackers have been known to place recording devices in computer rooms, enabling them to physically see passwords being entered
  • Restaurants that use a website on which customers can order food need to consider its security. If cybercriminals manage to hack into the site, they will be able to obtain customers’ personal information such as addresses and bank details
  • Create a human firewall by educating your staff
  • Use reputable, recommended providers and suppliers
  • Keep computers away from the front of house
  • Carry out background checks on employees
  • Introduce unique identification numbers for staff
  •  
    The focus of this article is to point out why restaurants are targets for cyber attacks, what information hackers are looking to obtain and to identify what steps can be taken to protect consumer information. Hackers target a restaurant's POS system for the large amount of bank data it may record as well as any online banking occuring in the restaurant. The personal information from employees as well as any app or website utilized by guests, is prone to cyber attacks. The most important solutions rely on conducting background checks on employees and making sure that they are trained on what to look for. Restaurants can also put practices in place that involve using unique employee numbers, keeping computers out of guests' view, and using vendors with a stellar reputation.
9More

Highly connected hotel industry continues to be vulnerable to cyber attacks | PhocusWire - 0 views

  • cyber threats in hospitality, which claims there have been 13 “notable data breaches” in the industry in the past three years.
  • PwC’s Hotels Outlook report 2018 to 2022 which says hospitality has the second-largest number of cybersecurity breaches after the retail sector.
  • factors which make them attractive to fraudsters such as the volume of financial transactions that hotels carry out, the sensitive and valuable personal data collected, use of loyalty programs and their national and international spread.
  • ...5 more annotations...
  • dark web “chatter’ breakdown reveals Hilton had a 31% share of mentions on hacker forums followed by Marriott at 28% and IHG at 19%
  • Marriot recently revealed that its data security breach had cost the company $28 million.
  • It’s unsurprising that as the aviation industry grows and airlines look to adapt their distribution models, cyber attacks and other fraudulent activity also increases.
  • Air Europa says that as it went through its digital transformation, it needed to handle fraud more efficiently.
  • the airline industry saw a 29% decrease in fraud attacks in 2018, but the company attributes that the large data hacks involving passport details have not yet “been reused to commit air travel fraud.” 
  •  
    This article talks about how the hospitality industry has become more susceptible to cyber-attacks. Hotel companies like the Marriott have faced costly fraudulent cases online and have implemented new programs to ensure safety and security.
13More

The biggest cyber attacks of 2022 | BCS - 0 views

  • In a year of global inflation and massive rises in energy costs, it should come as no surprise that the cost of a data breach has also reached an all-time high.
  • average total cost of $4.5m
  • Amongst the 550 companies that IBM contacted that had experienced a data breach, a disappointing 83% had experienced more than one in the same period
  • ...9 more annotations...
  • common attack vector remains credential theft (19%) then phishing (16%), misconfigured cloud (15%) and vulnerabilities in third-party software (13%).
  • Russia has, for many years, attacked Ukrainian infrastructure such as power grids, internet infrastructure and banks. Since the outbreak of physical hostilities, this has extended to systems related to government administration and the military.
  • The Russia-linked cyber gang known as Conti managed to cause major disruption to financial operations throughout Costa Rica in April.
  • Ransomware, while not the overwhelming headline grabber it was a year ago, is still a major and terrifying threat to many companies
  • A group known as Lapsus$ began 2022 with a string of high profile targets including Nvidia, Ubisoft, Samsung and Microsoft. In each case, data was stolen and in many cases leaked online. Their operating model is extortion where access is most often gained through phishing and then they seek out the most sensitive data they can find and steal it. Often, they do not deploy encrypting software at all.
  • Hacking back is where offensive security experts will attempt to compromise attacker’s machines. This can be legally murky as often the attacking machines are compromised third parties.
  • June this year, a former Amazon employee, Paige Thompson, was convicted for her role in the 2019 Capital One breach. While working for Amazon Web Services (AWS), she exploited her knowledge of cloud server vulnerabilities and stole personal information of over 100 million people.
  • cripple Costa Rica’s import/export business.
  • The main attack vectors continue to be credential theft and phishing emails so it is vital to continue to raise awareness through corporate training and public ad campaigns. Finally, the conflict in Ukraine is showing how effective cyber weapons can be in disrupting command and control in a war.
  •  
    To summarize, this article states that, it should not come as a surprise that the cost of a data breach has also increased to an all-time high in a year marked by significant increases in energy prices and worldwide inflation. According to IBM's Cost of Data Breaches Report 2022, the average overall cost is $4.5 million. Additionally, even if ransomware isn't garnering as much attention as it did a year ago, it still poses a serious danger to many businesses. Credential theft and phishing emails are still the major threat vectors, therefore it's critical to keep spreading awareness through public awareness campaigns and business training. Finally, the situation in Ukraine is demonstrating the potency of cyber weapons in sabotaging command and control in a fight.
19More

PCI and PSD2 Compliance: Why Are Hotels on the Hook? - 0 views

  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should
  • Established in 2006, PCI stands for the Payment Card Industry Data Security Standard, which contains guidelines for accepting, storing, and processing credit card information
  • ...12 more annotations...
  • These days, cyber security and regulatory compliance aren’t just necessary skills for the IT team. Every hotel manager - even the “non-tech savvy” ones - must understand these crucial components of data protection in order to protect their businesses.
  • A few rules of thumb include using PCI-compliant POS and PMS providers, storing both digital and paper data securely, and limiting access to sensitive data to only the employees who truly need it.
  • Examples of these guidelines include using an online checkout/payment page controlled by a licensed 3rd-party service provider, storing credit card data via a 3rd-party “vault” provider rather than in your own system, and masking the full credit card number on receipts, showing only the last 4 digits instead.
    • earagon22
       
      As an example, if guests book through a 3rd-party like Expedia then I at the front desk see an Expedia card not the guest's card. The card I see is pre-loaded with the amount of the stay ONLY. Even then, I cannot see the 3rd party's full cc number. I only see the last 4 digits just like guest credit cards.
  • “The attack on Marriott was hapless and still has many gaps to fill on what actually happened. A popular entry point for adversaries is through email spoofing. This tactic is used in phishing in order to get malware onto a target network to then move laterally across all systems,” Ryan Cornateanu, Application Security Engineer @ CrowdStrike.
    • earagon22
       
      This attack mentioned compromised cc details, passport numbers, and dates of birth for 300 million guests in their database. This happened in 2014. https://hoteltechreport.com/news/marriott-data-breach#:~:text=And%2C%20the%20financial%20burden%20is,the%20largest%20data%20breaches%20ever.
  • because of increased payment security, the amount of chargebacks will likely become much lower, which is something all hoteliers can celebrate.
  • In September 2019 the Payment Services Directive 2 (PSD2) went into effect and applies any businesses who could potentially engage with European customers. Even businesses with little international business should still comply, since regulations like these are often mirrored in the United States and other countries soon after.
  • PSD2 includes enhanced guidelines for online payments and the handling of sensitive data to reduce the risk of credit theft, fraud, and security breaches. One major change is the requirement of Strong Customer Authentication (SCA) for online transactions. With SCA, rather than simply typing in a credit card number and clicking “pay,” consumers will need to provide a second layer of authentication, which could be a PIN code or an SMS verification code, before the payment can go through.
  • Guests book nearly three-quarters of hotel reservations online, so PSD2 will likely impact every hotelier as Strong Customer Authentication (SCA) becomes a requirement for payment processing.
  • Are any charges processed after the guest has checked out, such as minibar chargers? To prevent any hiccups with payment after check-out, charge an authorization on the guest’s card for the full incidental amount and have the guest provide two-factor authentication in person, such as chip-and-pin, when the guest checks in.
    • earagon22
       
      A property rule where I work is that each guest must insert or tap their cc at check-in in order to follow this rule and we take an incidental hold each night. Guests that have not traveled for years are surprised by incidental holds which makes sense based on when this was implemented.
  • The key takeaway here is that transactions initiated by the hotel at a time when the guest isn’t present won’t comply with PSD2 requirements.
  • protect consumers’ sensitive data, and, as a result, every merchant that uses credit card information must follow these rules, from small businesses to large corporations.
  • By partnering with a trusted technology solution and investing in PCI and PSD2 compliance now, hoteliers can prevent the potential catastrophe that could come with the theft of sensitive data.
  •  
    PCI compliance is a crucial and necessary set of guidelines that all hotels must follow. The Payment Card Industry Security Standard was created in 2006 and outlines rules regarding accepting, storing, and/or processing card information. These rules were put into place to protect consumers sensitive information. For example, in 2014 Marriott hotels was attacked and 300 million guests information was compromised. This attack led to new regulations being put into place, the Payment Services Directive 2 (PSD2). These regulations take into account international customers and enhanced guidelines for sensitive data.
‹ Previous 21 - 40 of 256 Next › Last »
Showing 20 items per page