Skip to main content

Home/ Hospitality Technology/ Group items matching "files" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
17More

Benefits of Human Resource Information System | Mitrefinch Inc - 0 views

  • With new systems available to enhance productivity and streamline operations, those in human resources can achieve greater success with the benefits of human resource information system choices.
  • refer to those systems that assist business owners, HR departments, and employees be more productive.
  • your company could see benefits ranging from cost and time savings to increased employee engagement and better adherence to compliance and regulations.
  • ...13 more annotations...
  • hey can be split into two groups:
  • benefit the business owner and HR department
  • those that benefit the employees.
  • Some small to medium businesses find that they are hiring on a near constant basis either due to turnover or growth.
  • An HRIS can make the onboarding process an efficient and consistent one.
  • an HRIS can turn a disjointed process into one that runs smoothly.
  • If your files are located in a storage room or a disorganized filing cabinet, you could be losing hours of productivity. These files are also subject to loss or compromise.
  • When you can automate payroll by integrating it with your HRIS, you take hours of work off your HR team’s shoulders.
  • With biometric timekeeping, your HR team knows in real time where employees are in case they are needed.
  • Employee self service tools allow your employees to clock in and out with their personal smart device, making it easy for them to work from remote offices or from home.
  • With an HRIS, employees can communicate with each other, your HR team, and leadership in an easy and consistent way.
  • This not only allows employees to talk with colleagues about ongoing projects, but also request shift changes, explain absences, and put in for annual leave or vacation.
  • By choosing the right system, you can save time and money and provide a cutting edge work environment that your entire team will benefit from.
  •  
    This article talks about the ease of using an HRIS not only for the HR department and other departments in the hotel but for employees as well. The article is divided into these two separate groups and lists the benefits for each group and how those benefits could be implemented. The use of an HRIS for the HR department would assist with adding new hires to the system, automating reoccurring tasks such as payroll, and keep track of employees (i.e. if they are at work of off and where they are within the hotel). For employees the HRIS could assist in keeping track of when employees clock in from remote locations and communicating with the HR department in a singular way to perform certain tasks such as requesting time off.
9More

Cybersecurity Tactics for a Hotel Industry that's Under Siege | News | Hospitality Maga... - 1 views

  • Credit card fraud and identity theft should remain high on the hotel and lodging industry’s radar.
  • n addition to airlines and banks, hotels maintain a rich database of personally identifiable and financial data on file.
  • POS systems are a weak security point for many networks because they are constantly in use — and aren’t always patched, updated or protected from vulnerabilities as frequently as required. As a result, they can be exploited for the credit card data held on the POS terminals.
  • ...4 more annotations...
  • Reputational damage and revenue loss from a breach headline not only impact individual edge locations, but the corporate brand as well.
  • Hotels need a ‘toolbelt’ of various security technologies that can be used to prevent malicious attacks. A managed firewall is essential, blocking dangerous traffic from coming onto the network and preventing sensitive data from being exfiltrated, or sent, to the hackers.
  • One way to implement these advanced toolsets includes outsourcing to a managed security firm specializing in this type of service
  • If used correctly, hotels could see anomalies that could lead to breaches prior to any damage being done — allowing them to halt hackers in their tracks.
  •  
    Hotels POS systems are at risk for customers. Hackers are using tactics like Phishing and ransomware. Hotels must take action and arm themselves with a "toolbelt" of security options to combat the hackers.
  •  
    This article explores the issues with cyber security in the hotel industry. it is to be taken seriously because customer information is on the line and so is the company's reputation and revenue. Hotels must look into their POS systems because, according to the article, is a weak security point. However, it holds much of the consumer's information like credit card numbers, expiration dates, and etc. The POS system is vulnerable so the secuiry put in place to protect it must be updated. Personal details for hotel guests are stored in many different places in a hotel's many systems. This includes the restaurant, gift shops, billing, facilities, and etc. According to the article, hotels needs a "toolbelt" of various security technologies to prevent malicious attacks. The three mentioned in the article are File Integrity Monitoring, Unified Threat Management, and Security Information and Event Management. Please look into the article to read what each of these systems can do in regards to cyber secuity for the hospitality industry. A good way to implement these tools is to look into outsourcing a managing security firm that specializes in cyber security. This can help minimize and even diminish things that can cause breaches in systems. In my opinion, this article gives solutions to hotels in regards to cyber security. Sometimes installing a firewall or antivirus is simply not enough. A security firm that specializes in this area can be considered. It may be expensive depending on the business to do that, however, it will be even more expensive to have a tarnished reputation for not securing customer information and to deal with lawusuits.
8More

Physical Structure of Management Information System - 0 views

  • The physical components of an MIS include hardware, software, database, personnel and procedures
  • Related How to Create a Master Calendar Learn More → A management information system (MIS) is an organized combination of people, hardware, communication networks and data sources that collects, transforms and distributes information in an organization
  • Important components include the central processing unit, input/output devices, storage units and communication devices.
  • ...4 more annotations...
  • For users of MIS it is much more important to understand the software than the hardware. Software maintenance can take 50 to 70 percent of all personnel activity in the MIS function. When the organization moves to implement an advanced information system the hardware and software environment becomes more complex.
  • The database improves efficiency of storage by elimination of redundant files and improves efficiency of processing by providing all required data in a single file rather than separate files.
  • Three types of procedures are required for an MIS to operate effectively: user instructions, instructions for input preparation and operating instructions for MIS personnel who maintain the MIS.
  • The quality of MIS personnel is a key factor in its effectiveness. An MIS manager needs a combination of both managerial and technical skills.
  •  
    This article describes with components of an MIS, specifically the physical ones. It explain what each component is used for and how they differ. I think this is important to understand first, to understand the purpose the hardware, software, database, personnel and procedures.
20More

Cyberattack hits world's largest meat supplier - 0 views

  • It might be days before production resumes after an “organized cybersecurity attack” affected IT systems in North America and Australia
  • The world's largest beef supplier has been hit with a ransomware attack, threatening some of the U.S. meat supply.
  • The hack came less than four weeks after a similar one by Russian criminals against Colonial Pipeline
  • ...16 more annotations...
  • JBS, one of the world's largest international meat processors, was hacked
  • forcing the company to take systems offline and stop work
  • 11 beef processing facilities in Australia and 26 chicken processing plants in the U.S
  • The company told the White House on Sunday that it was a ransomware attack,
  • JBS notified the administration that the ransom demand came from a criminal organization, likely based in Russia.
  • Ransomware, an extremely lucrative type of cybercrime, is malicious software that lets hackers encrypt a victim's files and demand a ransom to make them functional again.
  • he hackers will steal and threaten to publish those files if their demands aren't met.
  • Ransomware attacks have grown rapidly in recent years.
  • Criminal hackers,
  • often based countries like Russia where they are largely protected from U.S. law enforcement
  • have targeted practically every major industry to shake down victims for payment.
  • about 40 food and beverage companies around the world have had confirmed ransomware attacks since May 2020.
  • Colonial's hackers, an established ransomware gang called DarkSide, shut down its website amid international attention from that attack, but not before receiving a $4.4 million payment from Colonial.
  • regularly hit manufacturers, school systems and city governments.
  • ransomware attack had already affected the cattle market.
  • If this goes beyond a week, you start to really worry about these animals building up on farm sites where they just don't have the capacity to hold them
  •  
    An example of a cyber attack or ransomware, in a manufacturer. Shows some effects of a ransomware and what a consumer may experience.
12More

Ransomware attack on chip supplier causes delays for semiconductor groups | Financial T... - 0 views

  • Disruption from a ransomware attack on a little-known supplier to the world’s largest semiconductor equipment manufacturers will continue into March, in a new setback to chip production after years of coronavirus-related delays.
  • first identified on February 3,
  • MKS’s customers include many of the largest companies that produce semiconductors and the specialised equipment necessary to manufacture them, including TSMC, Intel, Samsung and ASML.
  • ...8 more annotations...
  • The company had revealed on Monday that it could still take “weeks” more to restore operations and would cost hundreds of millions of dollars in lost or delayed sales. Most ransomware victims are able to recover in about three weeks, according to industry estimates.
  • The attack affected “production-related systems
  • , the company has now told the US stock market regulator that it is unable to file its annual report on time
  • the final impact on quarterly sales could total as much as $500mn — more than half what Wall Street had previously predicted
  • The semiconductor supply chain, which in many places relies on components made by only one provider, has faced repeated shortages over the past two to three years due to production and logistics delays.
  • However, demand for smartphones and other consumer electronics has waned in recent months as coronavirus lockdowns eased and consumer spending has been squeezed by inflation.
  • , it is unclear if MKS will be encouraged by US law enforcement to resolve the issue by paying a ransom.
  • Shares in MKS fell by about 15 per cent between February 3,
  •  
    The article "Ransomware attack on chip supplier causes delays for semiconductor groups," discusses the affects on a company due to a cyberattack that occurred February 3rd. The company is believed to have setbacks into March and that it would cost hundreds of millions of dollars in lost or delayed sales. The company also believes they will be unable to file its annual report on time and possibly have to resolve the issue by paying a ransom. This also cost a 15% decrease of shares for the Company.
1More

Enhancing Resident Care Through Technological Advancements - 0 views

  •  
    The following article is from the ALFA Update, its a case study from Senior Living Executive, and audio files from ALFA's conference sessions. Building and Technology articles focus on  ideas, best practices and solutions to problems related to green living, physical plant, space planning, and security. For instance in this particular article 
1More

Senior Housing Design for the Future Involves "As Much Flexibility As Possible" - Senio... - 0 views

  •  
    The following articles are from the ALFA Update, case studies from Senior Living Executive, and audio files from ALFA's conference sessions. Building and Technology articles focus on  ideas, best practices and solutions to problems related to green living, physical plant, space planning, and security.
8More

Lost Tree Club Turns to ClubPay as Payroll, HR Partner | News | Hospitality Magazine (HT) - 2 views

  • It is designed to help the make the club's human resource and employee administrative work fast, efficient and, most importantly, accurate.
  • The Lost Tree Club of North Palm Beach, FL will begin using ClubPay's payroll and HR management solutions.  In addition to biometric time clocks, real time labor management and payroll processing, Lost Tree Club will benefit from ClubPay's new "HR and Benefit Essentials" online portal .  It is designed to help the make the club's human resource and employee administrative work fast, efficient and, most importantly, accurate
  • In addition to biometric time clocks, real time labor management and payroll processing, Lost Tree Club will benefit from ClubPay's new "HR and Benefit Essentials" online portal
  • ...3 more annotations...
  •  ClubPay will assume responsibility for processing payroll, printing checks, accurately managing deductions, ensuring compliance with payroll policies and filing payroll taxes
  • ClubPay will assume responsibility for processing payroll, printing checks, accurately managing deductions, ensuring compliance with payroll policies and filing payroll taxes
  • Lost Tree will have unlimited access to over 180 standard payroll and HR reports and the ability to easily create any custom reported needed for proactive decision making. 
  •  
    The Lost Tree Club of North Palm Beach, FL chose ClubPay for payroll and HR management solutions. ClubPay will help processing payroll, printing checks, accurately managing deduction, ensuring compliance with payroll policies and filling payroll taxes so that HR staff can focus on more centric activities. 
  •  
    This article talks about The Lost Tree Club that is located in North Palm Beach will be using ClubPay's payroll and HR management solution. Lost Tree Club will benefit from The ClubPay's new" HR and Benefit Essentials" online portal it designed to help the club's human resource and employee administrative work fast, efficient and, mostly importantly, accurate. It will help with processing payroll, printing check, accurately managing deductions, ensuring compliance with payroll policies and filling payroll taxes.
3More

New 'Dexter' malware strikes point-of-sale systems | Security & Privacy - CNET News - 0 views

  • Rather than targeting thousands of individual machines through traditional Trojans or phishing emails, the custom-made malware targets specific POS systems. The malware injects itself into the file iexplore.exe in Windows servers before hijacking process lists, stays active through rewriting in the registry key, and then scrapes sensitive credit card data from the server -- before transferring it through a remote command and control (C&C) system.
  • Rather than targeting thousands of individual machines through traditional Trojans or phishing emails, the custom-made malware targets specific POS systems. The malware injects itself into the file iexplore.exe in Windows servers before hijacking process lists, stays active through rewriting in the registry key, and then scrapes sensitive credit card data from the server -- before transferring it through a remote command and control (C&C) system.
  •  
    This article is about a new and advanced malware called Dexter that is targeting POS systems. The article reports that 30% of the infections are in the US (world wide). When the virus attacts the POS it steals credit card information that can be used to make duplicate credit cards to be used. There is software to help fight off the virus however people have never seen this kind of virus because of the power it was to attack the system, so this is something to be on the look out for.
4More

Why Implement a Human Resource Information Software (HRIS) System? - 0 views

  • Running a business will generate a lot of information, both related to the business and related to your employees.
  • , a human resource information software (HRIS) system is a wise choice because it will reduce the amount of paper generated, organize your data, streamline processes, and help your company's bottom line.
  • Providing benefits for ineligible employees or their dependents. Cost of training new employees. Documenting why people leave the organization because the cost of terminations is high, and if you can track why people leave, then changes can ensue. Not properly recording vacation or sick leave taken. Time and attendance creates a loss of productivity, so having a way to track it to ensure there is not abuse of the system or employees taking time they don't have will help to reduce the risk of losing productivity and, ultimately, revenue. Reduce potential legal expenses in an employee dispute. Accurate and complete records can help build your case or diffuse a situation before it even gets in the courts.
  •  
    A HRIS in hotel industry could help you improve data management. Keep all employee information in one place with Staff Files! And manage time-off accruals. Easily track time off in the Accrual tab. Also, set up and enroll employees in Auto Accrual Policies to allow auto calculations for vacation, sick, and holiday time. Evaluate employee performance, complete thorough performance evaluations by scoring employees on the evaluation categories you select or define and add comments for each category.
1More

The Importance of a Human Resource Information System | Business & Entrepreneurship - a... - 1 views

  •  
    The Hospitality industry is known to have very high attrition rates. This makes it all the more critical to have a robust HR information system (HRIS) in place. HRIS has emerged as among the most crucial aspects of hospitality IT. No hospitality management system can be considered complete without an effective HRIS system. An efficient HRIS system manages the recruitment, staff-shifts, time & attendance, and many other aspects of your hospitality HR requirements. It should be able to drill down to history files and provide e-leave application & training management. Organizations must look for ways to manage their internal processes efficiently while preserving the integrity of each practice. In human resources, this involves many transactions affecting people, including the benefits they receive and the ways they are treated by the organization. Tracking HR activities through a human resources information system is efficient and effective for many business organizations. For the owner, it's usually a matter of which system is affordable and suited to the organization's needs.
2More

Optima Go Green - Green PMS for Hotels - 0 views

  • Optima Go Green allows the hotels using Optima Hotel Management Solution to go the extra mile and reduce the total amount of paper used by implementing Optima green solutions. The solution meets two valuable targets by helping the environment and saving costs of operations.
  • Optima Green Check In – advance check in that can be done on the Internet or Smart-phones up to 24 hours before check in, saving the need to print registration cards and speeds up the checkin process at the hotel. Optima Green Check Out that includes presentation of guest folio on an iPad, or similar device, instead of printing folio statement and sending the invoice to the guest or company directly by email. Optima Fax and files attachment allowing attachment of faxes and other documents to the reservation and view them at any given time. The files attached to the reservations ad folios can be vied even years after the guest has checked out. Optima passports and IDs scanning allowing scanning of various IDs and insert the details directly into the Guest Profile information, including picture of the guest (when using Optima CRM) and attach the scanned document to the reservation. Paperless night process – all the statistics and financial information is stored in the database and can be viewed at any time. No need to print anything. Optima Managers’ Snapshots – daily reports sent daily to selective managers and owners saving the need to print these reports to managers who do not have access to Optima. Optima Mobile – allowing managers and sales people to view availability and prices online on their smart-phones instead of relying on reports that may be outdated
1More

Thriving online firm keeps growing its event-planning business | The Charlotte Observer - 0 views

  •  
    "When you go to SignUpGenius.com, you'll find services catering to the needs of eight different groups. There are schools, looking for help with organizing parent-teacher conferences, class volunteers, and events such as book fairs. Churches and temples can get help with scheduling nursery workers and greeters. Nonprofits can organize donations and fundraisers. Other groups are clubs and groups, sports, business, family and college. The idea is to attract a range of users, from parents organizing car pools to businesses coordinating employee training schedules. "By going broad, we still haven't scratched the surface," said Angel Rutledge, who is married to Dan and is the chief marketing officer. SignUpGenius' users are 78 percent female, and 80 percent are between the ages of 25 and 54. "Our primary user is a mom with kids," says marketing strategist Kate White. "Most people tend to find us through their kids' activities." Monthly fees range from free to $49.99, where users can get additional features such as cloud file storage and access by multiple administrators. These subscription services were significant, Dan Rutledge says, "because we jumped into the organizational level, from coach to league, from teacher to school." While the Rutledges don't disclose specific financial information of the private company, other numbers illustrate its growth. Revenue in August 2015 increased 225 percent over August 2014, according to the company. Between 120,000 and 190,000 events are organized per month, with a groundswell in August and September, when the school year begins. In 2014, SignUpGenius says 1.4 million new sign-up pages were created. Traffic rose 35 percent last year, to 39.9 million visitors. And the company has grown from 13 employees this spring, to 20 now." This article illustrates the idea of on the event planning and I.T. programs working handing in handing. As an example, the article uses the company SignUpGenius wh
1More

Why your IT project may be riskier than you think - 0 views

  •  
    This article is focussed on the risk involved if the proper impact study is not undertaken prior to implementation of extensive IT projects. Several multinational companies were referenced in the article, highlighting failures with smooth implementation resulting in the loss of millions and sometimes billions. Below is a summary of some companies referenced in article and the impact of IT implementation gone wrong: 1. Levi Strauss: In 2003 Levi Strauss examined its technological capabilities and concluded that its systems were inadequate for its multi-national corporation operation within 110 countries. A budget of US$5 million was created for a system upgrade. Many challenges along the way resulted in the inability to sufficiently report financials resulted in three distribution canters in the USA closing for a week. As a result of this, the company lost US$200 million and the termination of the chief information officer in 2008. 2. Hong Kong Airport: IT problems resulting in glitches in flight information system and database for tracking cargo shipment resulted in a US$600 million loss between 1998 and 1999. 3. Hershey: About 10 years ago Hershey wanted to implement a new order taking system. Problems with implementation resulted in the inability of the company shipping US$100 million worth of candy in time for Halloween thus impacting the company's bottom-line of an 18.6% loss in earnings during the quarter. 4. Kmart: in 2000 Kmart embarked on aUS$1.4 billon IT modernization project. In the midst of the project Kmart discovered that the project had too many customized application which would result in an exorbitant maintenance costs. An additional US$600m was spent on integrating a supply chain management system. Failure of this project led to bankruptcy filing by Kmart in 2002. This resulted in the closure of 600 stores and the loss of over 60,000 jobs in the USA. 5. Auto windshield (UK): Auto windshield was considered to be the second largest auto glass c
5More

Apple iCloud: What it is, and What it Costs | PCWorld - 0 views

  • iCloud does not replace local storage on iPhones, iPads and iPod Touches
  • iCloud also remembers your device's settings, apps, home screen layouts, ring tones and text messages, so all of that information is available if you upgrade or replace your iPhone or iPad.
  • Third-party apps will be able to use iCloud as well
  • ...1 more annotation...
  • Apple will provide 5 GB of iCloud storage for free, but iTunes music, apps, books and Photo Stream don't count against that total.
  •  
    This article mainly talks about icloud basics and the cost of icloud. Icloud has lots of benefit for the customer who uses apple devices. Icloud do not replace local storage on iPhones, ipads and iPod touches. Icloud keep data in sync between any apple device and PC that you own. Every data are available across devices from Iphone to ipad. All the documents can be shared in any apple devices and people do not need e-mail or USB to store and transfer files. It brings lots of conveniences to the customers. Also, icould provide excellent backup function for customers. Another advantage of apple devices is that third party apps are able to use icloud as well. The cost of this service is not really expensive and apple will provide 5GB I cloud storage for free. Apple charges some extras money for additional storage, but it is not very expensive. Icloud will help apple not only enhance current market, but also can expand the future PC and other digital devices market. People who own multiple iOS devices will get the most out of iCloud, because it saves the hassle of manually transferring data between iPhones, iPads and so on. Therefore, more and more people will purchase apple devices in order to get the most out of icloud.
24More

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
1More

It's No Longer Just a Personal Threat: Businesses have Become the Newest Target for Ide... - 0 views

  •  
    Many organizations in the hospitality industry underestimate the risk and consequences of business identity theft and they should be more concerned with the risk of personal identity theft. A study by the Ponemon Institute demonstrates that a data breach could cost organizations an average of $7.2 million. This does not even include indirect costs such as lost customers or damaged reputations. To prevent identity theft, companies need to be aware that fraud can occur in many unexpected ways. This article gives a few examples that can help firms to reduce the risk of personal identity theft below.  Instituting a shred-all policy to ensure unneeded files are regularly and safely destroyed Restaurants employee should give their receipts directly to staff rather than leave anything on the table or counter Hotels employee should be instructed to store all sensitive documents in a safe place until they can be securely shredded On the cloud, Businesses should conduct a full security audit of any cloud computing company before storing documents on the cloud Identity theft is the fastest growing crime in the hospitality industry. Just being careful isn't enough to protect customers' identity. If the data is spilled, customers will have a less favorable view of your company or may be angered to the point of never allowing you to serve them again. Any amount of loss of trust and loyalty is harmful to your business.
7More

POS Systems for Hotels and Inns - 0 views

  • A Point of Sale system is effective in hotels because it is a way in which hotel and inn owners would be able to record all transients while at the same time record all the services rendered per room.
    • TIANJIAN ZHANG
       
      POS System is convenient and easy for management to control. Actually, POS System connects almost every corner of a hotel. In my opinion, POS is simply the location where the sale is conducted, money changes hands and a receipt is given, which can also occur on a smart phone, tablet, laptop, or mobile POS device when the right hardware and POS software is combined with the mobile device. And actually, nowadays, modern POS systems have stations created for the customer to check themselves out by scanning and bagging their own items, then paying with a debit or credit card. It is much faster.
  • Most POS systems can also be connected to the kitchen so that the chef would be able to deliver the products at a fast pace and there would be no confusion in delivering the food.
  • The key to Point of Sale Applications is the use of various operating systems for recording and registering the items rendered per room.
  • ...1 more annotation...
  • Today, most hotels have even applied a membership connection through internet so that hotel customers would be able to register to a room that they want simply by accessing the hotel's website.
  •  
    Hospitality point of sales systems are computerized systems incorporating registers, computers and peripheral equipment, usually on a computer network. Like other point of sale systems, these systems keep track of sales, labor and payroll, and can generate records used in accounting and book keeping. They may be accessed remotely by restaurant corporate offices, troubleshooters and other authorized parties. Point of sales systems have revolutionized the restaurant industry, particularly in the fast food sector. In the most recent technologies, registers are computers, sometimes with touch screens. The registers connect to a server, often referred to as a "store controller" or a "central control unit." Printers and monitors are also found on the network. Additionally, remote servers can connect to store networks and monitor sales and other store data. Newer, more sophisticated, systems are getting away from the central database "file server" type system and going to what is called a "cluster database". This eliminates any crashing or system downtime that can be associated with the back office file server. This technology allows 100% of the information to not only be stored, but also pulled from the local terminal. Thus eliminating the need to rely on a separate server for the system to operate. The efficiency of such systems has decreased service times and increased efficiency of orders. Another innovation in technology for the restaurant industry is Wireless POS. Many restaurants with high volume use wireless handheld POS to collect orders which are sent to a server. The server sends required information to the kitchen in real time.
  •  
    Nowadays, the Point of Sales system is very important not only in hotels but also in any kind of business. The popular reason is that the POS is convenient, fast and promptly. The POS could be changed neatly. It will make the cashier compute for the expenses and costs more efficiently. The data used by the POS has been applied connection through the Internet. The customers could register by their private computer quickly. The POS also connect many kinds of service aspects that include restaurant, housekeeping, receiption and so on. It will make the whole system operate more integrate.
4More

Hotel Cyber-Security | Past Issues | Past Issues - 0 views

  • Hotel cyber-security is facing increasing scrutiny from federal regulators.
  • last June the Federal Trade Commission sued Wyndham Worldwide hotels after apparently unsophisticated hackers allegedly stole the credit card information of more than 600,000 customers leading to a more than $10.6 million fraud loss
  • The FTC has claimed that Wyndham did not maintain appropriate firewalls, did not configure security software to protect credit card information, did not remedy known security vulnerabilities, and failed to use complex passwords allowing hackers to infiltrate through “brute force” – essentially by guessing the password of the administrator.
  •  
    This article discusses the Federal Trade commission's actions against Wyndham Worldwide Hotels. Unsophisticated hackers breached the hotels system and obtained the credit card records of 600,000 guests, causing the FTC to claim that the hotel group did not maintain proper system security. However, several groups file a Amicus Brief that the FTC is not clear as to what security standards they require. Currently the FTC requirements "will depend on the size and complexity of the business, the nature and scope of its activities, and the sensitivity of the information at issue". This means to many in the industry that company does not know if they are maintain proper security in the eyes of the FTC until they are sued by the FTC. The article goes on to say that a company should "Review your privacy policy immediately to insure it is compliant with the most recent standards and that the data security systems in place are actually consistent with the stated policy".
22More

10 Event Apps Every Event Planner Needs - 0 views

  • We’ve put together a list of 10 apps that every event planner needs to stay afloat.
  • . Evernote 
  • Think of this Evernote as your mobile filing event app; organize your venue research notes, coordinate travel itineraries, and quickly share notes with members of your team
  • ...18 more annotations...
  • Boomset
  • Easily check attendees in with their QR scanner. Event organizers can also use this event app to print badges, or create wristbands. It also has integrations with other event management platforms so that event registration is as painless for organizers as possible. (click to tweet)
  • Bizzabo 
  • Use the Bizzabo platform to manage all aspects of your event.
  • Heytell -
  • Blend old school cool with new school tech with Heytell, an app that turns your smartphone into a walkie-talkie. When you need something even snappier than texting or email, get the app, choose a contact and start talking. Over! (click to tweet)
  • ScannerPro 
  • This system allows you to scan documents with a snapshot, convert them to PDFs and email them right away. (click to tweet)
  • Dropbox -
  • Store all your paperless goodies with Dropbox to access it from any device and even edit on the spot. (click to tweet)
  • Hootsuite 
  • o easily manage all your social channels, use Hootsuite to create streams and stay up to speed with the buzz surrounding the event content.
  • - Managing real life and conference life can be overwhelming. An app like 24me can help you manage your day-to-day responsibilities outside of the workplace with a smart calendar and automated to-do list. Reminders to pay your bills and wish your Aunt Martha a Happy Birthday can be real lifesavers, especially when you’re super stressed with an event around the corner. (
  • 8. 24me 
  • . Asana -
  • Keep track of all the details and orchestrate teamwork directly from your phone while creating a good workflow amongst those assisting you.
  • 10.Super Planner 
  • Super Planner offers calculators for venue capacity, staffing, and catering to avoid these kinds of issues. Use this app to stay on budget and execute all the details to perfection. (click to tweet)
  •  
    The following article details the top 10 apps for Event Planners in 2015. These apps incorporate social media, financial planning and event success rates all in one. 
‹ Previous 21 - 40 of 152 Next › Last »
Showing 20 items per page