Skip to main content

Home/ Hospitality Technology/ Group items matching "card" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
11More

Improving data security in the hotel industry lets guests sleep peacefully | Hotel Mana... - 1 views

  • The hospitality industry is quickly growing as a favored target of hackers and cybercriminals. In fact, according to the 2016 Trustwave Global Security Report, hospitality is the vertical industry with the second-highest number of data breaches, behind only the retail industry.
  • Hotels are high-value targets for cybercriminals because they not only hold payment card information on guests, but also a wealth of other sensitive personal data that can be used to steal their identity.
  • The fallout from a widespread data breach that compromises guests’ payment card data or personally identifiable information can be disastrous for a hotel chain. The average cost of a data breach in 2016 was $4 million. This figure encompasses everything from breach mitigation to crisis team management costs, business losses and even the more intangible consequences: damages to brand reputation.
  • ...6 more annotations...
  • However, with more countries migrating to chip cards and EMV-compliant POS systems, attackers have shifted their focus to card-not-present fraud and are targeting industries where consumers are making their payments and reservations over the phone—such as hotel contact centers.
  • If guests aren’t convinced that the hotel is keeping their personal and financial data secure, they will take their business elsewhere. In order to protect their brand reputation and their business, hotels need to create a culture of security throughout their entire organization that focuses on protecting guests’ digital property in addition to their physical property. One of the best places to start is their contact center.
  • In an era of increasing cyberattacks, hotels can make themselves less of a target by adopting technology to ensure that payment card data and other personally identifiable information is kept secure and segregated from the contact center.
  • With such an approach, customers calling to make a reservation or order additional services discreetly type their card numbers into the telephone keypad, rather than reading them out loud to the agent on the phone line. The data is securely routed to the payment gateway or a more secure server so it is never shared with the agent and is not held in the contact center infrastructure. This ensures that there is no possible spillover of the data to the unsecured or unmonitored areas of the business. It also reduces the number of individuals with access to the sensitive data, and makes the hotel contact center a less attractive target for cybercriminals. As an added benefit, this approach makes it easier for the hotel to comply with Payment card Industry Data Security Standards by reducing the scope of compliance. By keeping payment card data out of the contact center, hotels can significantly reduce the high costs and extensive time associated with maintaining PCI DSS compliance.  
  • With stronger security practices for handling guests’ sensitive data, the hotel industry as a whole can transform itself from being one of the most likely targets for data breaches to becoming a model for data security, thereby ensuring that fewer customers ever have to go through the experience
  • Guests can sleep peacefully knowing that their data is secure, and the hotel can rest assured that its name won’t be making headlines as victim of a costly data breach.
  •  
    The hospitality industry is a major target for cyberattacks, resulting in sensitive guest information being compromised. When these attacks happen it leaves guests restless, because they know or believe their information is not safe. This article discusses this issue and how security can be improved to avoid these attacks.
  •  
    The article titled, "Improving data security in the hotel industry lets guests sleep peacefully" shows how the breach of data security can be anywhere. As technologies improve, so do ways in which cyber security can become at stake. According to this article, "Hotels are obligated to maintain the physical security of guests and their belongings during their stay-if guests don't feel safe staying in their room or leaving their belongings there, they won't continue to patronize that hotel brand. The same thinking applies to data security: If guests aren't convinced that the hotel is keeping their personal and financial data secure, they will take their business elsewhere". Thus, hotels need to make sure they are safeguarding information such as their payment information as well as other confidential information. Hackers are becoming even more sophisticated, where they can target specific industries, such as hotel industries since guests speak with hotel representatives over the phone to provide payment information. In the even that a hotel's data has been compromised, what is its responsibility? First, they should send the client a letter of apology, and then handle the complete process efficiently, so the client can at least feel they re supported. The avoidance and handling of data breach is becoming even more common nowadays with the rise of technology.
5More

Amazon Developing Hand-Scanning Payment System | HYPEBEAST - 0 views

  • Amazon is reportedly in the process of developing a system that scans users’ hands to receive payment instead of a physical credit card, cash or phone system.
  • This method would be particularly useful for shops users frequent often, like their local grocery store.
  • “Customers might insert cards into a terminal and then let the terminal scan their hands.
  • ...1 more annotation...
  • Initial reports in 2019 stated that Amazon was planning to roll out the new technology at Whole Foods locations, as it now owns the supermarket chain
  •  
    This article is about the future of POS systems and what we as consumers can look forward to in the near future. In this article, Emily Engle discusses the current talks Amazon has to implement scans of user's hands to receive payment instead of a physical credit cards, cash or phone systems during your point of sale transaction. Although, just an idea for some retail giants, some retailers in other markets such as China and India use biometric features during point of sale transactions. To get things started, Amazon believes that customers will enter their credit/debit card and scan your print during this initial process. After that you will never need your card again. It is said that since Amazon owes Whole Foods, they will begin the testing period there. Using this new method of shopping, if it comes to fruition, could useful for frequent visitors.
25More

My Head in the Clouds (computing): A Case Study of a Restaurant Group Embracing Off-Sit... - 0 views

  • These applications simplify daily tasks for management teams and staff, which will ultimately leverage senior management down to focus on the bigger picture
  • he year was 2010 and the impending doom of PCI Compliance was upon us.  At best, our network infrastructure was dated and we needed to act quickly to get it into compliance.
  • CI Compliance is an almost unachievable set of network security standards designed to protect the credit card giants, who already charge them way too much for credit card processing and continually squeeze them with a plethora of monthly fees. 
  • ...21 more annotations...
  • The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit Card information maintain a secure environment
  • he restaurant industry is also plagued with security breaches, including large chains such as Darden (Cheddar’s), Panera Bread, Sonic and Arby’s.
  • Operators must identify network vulnerabilities, physical vulnerabilities, and operational vulnerabilities that could result in a credit card breach and fix them.  In summary, it is a painfully tedious, extremely time consuming, and potentially expensive process
  • It is extremely important for the security of our guest’s payment information, both for ensuring trust with our customers and limiting legal liabilities
  • PCI DSS is mandatory for any and all businesses that accept credit cards.  It involves a process of assessment, remediation and reporting.
  • egacy systems such as Positouch, Micros, and Aloha are bulkier, more expensive, and much harder to program and implement.
  • In a nutshell, PCI DSS forced us to upgrade our network, which ultimately allowed us to operate in the cloud.  This unintended outcome to a painful requirement was truly a blessing in disguise and it pushed us into new territory – the cloud!
  • IBM defines cloud computing as “the delivery of on-demand computing resources — everything from applications to data centers — over the internet on a pay-for-use basis.”[iii]
  • ud computing can streamline our operation.
  • The first order of business was to get our network infrastructure in order.
  • Toast
  • It is extremely intuitive, like using a smartphone, thus needing very little training. As wireless POS solutions evolve, legacy systems will eventually be phased out.  It is only a matter of time.
  • EMV (Europay, MasterCard and Visa) is another set of regulations that are coming to the restaurant industry. “EMV is a global standard for Cards equipped with computer chips and the technology used to authenticate chip-Card transactions.”
  • Pay My Tab will fully integrate with our POS system and eliminates many bulky PCI DSS requirements.
  • llows for remote access, allowing management to check flow of service, identify unique reservations, and make sure that waitlists are being managed appropriately. 
  • good communication is key for making sure work-life balance is maintained.
  • An area which the cloud has really saved our restaurants time is with food & beverage inventories. 
  • This has greatly improved productivity and allowed our management teams to communicate in real time.
  • Our office hardware now consists of much less expensive “Network Computers”, which do not require expanded memory for giant program
  • Although the solutions highlighted above create efficiency and save time, they do not serve guests and they don’t understand the art of hospitality
  • It is imperative that as restaurateurs we continue to create a positive environment, embrace innovation, and engage and train our employees in the art and skill of hospitality.
  •  
    This article is an case study on how one restaurant group could use cloud computing to improve their business. By not only securing the companies information by the customers as well. Reviewing the key points of sales interactions between customers and the restaurant, like the POS, Tableside payments, reservations and management assistants.
8More

Cloud Computing in the Travel Industry | Accenture - 0 views

  • Before the pandemic, companies were managing under legacy on-premise technology, hesitant to make big investments in cloud due to concerns about cost, time and security. But in a world after the pandemic, the travel industry must adapt fast to survive
  • The value it delivers goes beyond technology to organizational transformation, making the journey through cloud in travel a key CEO priority.
  • Airlines and airports reinventing airport experiences: From contactless, smooth passage, through bag drop and security to airside shopping for travelers who have pre-filled biometric data
  • ...4 more annotations...
  • Travel companies must future-proof their businesses built upon living systems and processes enabled by agility and scale. They need to take a deep relook at strategy, organization, practices, technology and talent functions.
  • Compete for investment capital Cloud-related investments drive business changes needed for increased productivity, smoother traveler experience, vertical integration & resilience.
  • Rehost scalable functions Rehost high-volume, scalable functions on Infrastructure-as-a-Service (IaaS).
  • Cloud is central to the travel industry’s survival and future growth. There’s no time for delay. Companies must use this crisis as a springboard to scale up cloud adoption, improve resilience and innovation capabilities, and create the seamless, contactless and effortless experiences travelers demand
  •  
    Before the pandemic, companies were afraid to invest in cloud due to the concerns of the cost, time, and security. But in today's world technology is something companies need to adopt. It's time for travel companies to see the cloud for what it is, the passport to future value. All sections can benefit from this technology including hotels, airlines, and airports. This is the best time to invest into technology to benefit the industry by taking a deep relook at strategy, organization, practices, technology, and talent function. As travel is being rebuilt, cloud-related investments will deliver higher returns on capital than investment in new aircraft, new hotels, and new ships. This is the perfect time to invest into cloud adoption.
7More

Walmart and Target Have a Big Problem They Don't Want to Fix - TheStreet - 0 views

  • Retailers and restaurants love to push work off on consumers under the guise that it's somehow better for them. It's like when you order a bagel and a cup of coffee at Panera Bread and you get handled, a blank bagel, frozen butter or cream cheese packets, and an empty coffee cup.
  • Letting me customize my coffee in an app as Starbucks (SBUX) - Get Free Report does is customer service. Handing me an empty cup and pointing me toward a carafe with a milk and sugar station is the exact opposite.Self-checkout is the same principle. If Target (TGT) - Get Free Report or Walmart WMT offers a few stations where people in a hurry can opt to check themselves out, that's very different than replacing your cashiers with automated checkout stations. That's not about convenience, it's about saving money.
  • And, yes, self-checkout has increased shoplifting, but it has also gone from being a convenience offered to customers to a cost-saving method for stores. It's automating an area where people do a better job in a lot of ways.
  • ...3 more annotations...
  • sacrificed a chance to connect with your customers.
  • Human interaction and connection building can't be automated. Some tools may aid in that relationship, but ultimately people matter.
  • Automate the things people can't see and put as many human beings into helping customers and building connections as possible
  •  
    This article discusses the controversial self-checkout model in major chain stores such as Target and Walmart and the cause and effect of labor issues and how other scenarios appear to be encouraging a time when this model replaces human checkout entirely. It was reported that Walmart loses 3 billion every year to customer and employee theft. For the most part, retailers have been thinking about self-checkout through a financial-savings and customer-experience perspective. But inherently, that means there's going to be less eyes on a transaction, less human interaction and more opportunity for shrink.
31More

What is RFID Technology? (+Use Cases in the Hotel Industry) - 2 views

  • It’s no surprise that hospitality businesses want to take advantage of RFID technology too, especially when it offers speed, security, and a high-tech touch.
  • Seeing an opportunity to meet all of these objectives, Coachella Valley Music & Arts Festival rolled out an RFID wristband solution that allows faster entry into the festival and eliminates the risk of counterfeiting.
    • jblan183
       
      Coachella took the RFID wristband one step further than smart cards by placing the chips on wristbands, issuing RFID chips with unique identifiers to festival-goers. Instead of security scrutinizing every paper ticket upon entry, attendees simply scan their wristbands at RFID readers at the festival entrances to gain access, allowing them to get to their favorite stages faster.
  • One of the most popular use cases for RFID technology is guestroom entry. Compared to a traditional keycard, RFID-equipped cards offer hoteliers more control over security. Front desk staff can activate and deactivate cards remotely and review logs to see where and when a card was used.
    • jblan183
       
      Con: Keeping them near phones, wallets, or purses will demagnetize the cards, especially inconvenient should a hotel not have a complimentary card holder.
  • ...23 more annotations...
  • If guests have RFID-enabled keycard that contain payment information or room-charge information, guests can simply pay with their keycard
  • Besides granting entry to guestrooms, hoteliers can also use RFID technology to control access to amenities, parking, event spaces, and more
  • RFID tags on minibar items can alert hotel staff to low stock rather than tasking housekeeping staff with monitoring stock levels.
  • Most hoteliers have a line item in their budget to account for replacement of stolen items like pillows, hair dryers, and dishes. RFID chips on these frequent “souvenirs” can tell hotel staff when an item has left the building and give them the opportunity to recover the stolen item.
  • An RFID system is simply a cost- effective technology that uses radio waves to send a signal from a chip to a receiver.  RFID stands for radio-frequency identification, and this type of wireless technology involves two parts: a tag and a receiver.
  • Tags can be either passive (no battery, activated by the receiver) or active RFID tags (battery-power source, emits a signal that the receiver picks up).
  • RFID is a key component for IOT (internet of things) connectivity.
  • The tag contains a microchip with a unique code, and the receiver contains components to process the signal transmitted by the tag.
  • There are different types of RFID tags writes the RFID journal, "In general, low-frequency and high-frequency range tags are read from within three feet (1 meter) and UHF RFID tags (ultra-high frequency) are read from 10 to 20 feet. Readers with phased array antennas can increase the read range of semi-passive RFID tags to 60 feet or more."  Read range can also vary depending on environmental factors that effect the strength of radio signals.
  • its popularity has skyrocketed in recent years as the technology became cheaper and more applications were developed.
  • RFID wristbands at Coachella
  • Paper tickets for Disneyland are a thing of the past thanks to the RFID-powered “MagicBand” system that Disney rolled out in 2013.
  • Besides pure functionality, Disney also turned the MagicBand into a marketing vehicle; Disney fans can purchase MagicBands in their favorite color or emblazoned with their favorite animated character.
  •  Hotel and travel businesses usually begin by leveraging technologies like RFID for access control systems and asset tracking.  Due to the pandemic, contactless guest journeys have increased uptake of RFID, Bluetooth and NFC (nearfield communication) technology.
  • Festival-goers are issued wristbands embedded with RFID chips that each have a unique identifier, meaning that it’s essentially impossible to copy them. Instead of security staff scrutinizing every paper ticket upon entry, attendees simply scan their wristbands at RFID readers at the festival entrances to gain nearly instantaneous access.
  • Due to its relatively low cost, ease of use, and potential for operational efficiency, RFID technology can be an attractive solution for hoteliers looking to elevate their guest experience.
  • Door locks
  • RFID cards can also be more cost-effective in the long term as they don't get demagnetized.
    • earagon22
       
      My property uses RFID tech for room keys and it is so convenient as the wristbands don't get demagnetized when placed by phones or credit cards.
  • Controlled amenity access:
  • On-site payments
  • Outlets like restaurants, bars, and spas can use RFID technology to streamline the payment process.
  • Inventory management
  • Theft prevention
  •  
    Radio Frequency Identification or RFID continues to appeal to leaders in the hospitality industry as it allows for so many opportunities. RFID is a cost-effective technology. It utilizes radio waves to send signals from a chip to a receiver somewhere. Due to the COVID-19 pandemic, RFID technology usage has increased because of the consumers' desire to have contactless options. This article provides quite a few great examples of RFID technology in the industry. It mentions Disney and Coachella as they have switched to using RFID wristbands. Hotels, as mentioned in this article, can use RFID technology for a multitude of things. Some examples include: for door locks, on-site payments, controlled amenity access, inventory management, and theft prevention.
  •  
    The RFID is a very interesting and powerful system. Many industries have been using such system for a long period of time. In the aviation industry, the RFID helps to track and sort checked baggage at the airport by reading several inlays at one. Airlines that use such system has a higher customer satisfaction rate.
6More

POS Hackers Sentenced for Multi-Million Dollar Payment Card Data Theft | News | Hospita... - 0 views

  • “The Subway case is a clear indication that privileged and administrative accounts are increasingly targeted and used by criminals to steal sensitive information,”
  • “In this case, the attackers were able to simply do an Internet search for remote desktop applications that were used by the restaurants, and through simple password cracking techniques, they were able to gain administrative access to the systems.  This enabled them to easily steal sensitive financial information from unsuspecting customers.”
  • Two Romanian nationals have plead guilty for participating in an international, multimillion-dollar scheme to remotely hack into and steal payment card data from hundreds of U.S. merchants’ computers, including a great number of Subway restaurants. Federal prosecutors noted that the conspiracies involved more than 146,000 compromised cards and more than $10 million in losses.
  • ...1 more annotation...
  • Bosnian continues, “The reality is that anyone with an Internet connection can search for, identify and target  remote applications that businesses rely on – the problem facing the industry is that there is not sufficient security and protection around the entry points to these applications. Once inside, attackers have free reign on the network. If you examine the list of the recent, high-profile data breaches that have plagued organizations, including Global Payments, the U.S. Chamber of Commerce, the Utah healthcare breach, etc…, the common denominator is that the attackers focused on gaining access to the privileged or administrative accounts.” 
  •  
    According to the article, two Romanian nationals have plead guilty for participating in an international, multimillion-dollar scheme to remotely hack into and steal payment card data from hundreds of U.S. merchants' computers, including a great number of Subway restaurants. The reality is that anyone with an Internet connection can search for, identify and target remote applications that businesses rely on. This case is a warning to operators utilizing POS systems to shore up their security by taking steps to make their accounts more difficult to breach and therefore less attractive hackers.
  •  
    This article discusses the security issues with restaurants using remote desktop applications that are easily accessed by hackers trying to steal stored credit card information. The relative simplicity in which these hackers were able to steal the numbers should pose a real concern for restaurant owners in making sure their systems are properly secure from theft. They were able to crack simple password protected applications to gain access to private information. These remote applications used by restaurants are a not provided with enough security and therefore are easy targets for hackers.
16More

Technology Could Help Enhance Security At Hotels | By Suresh John - 0 views

  • In a day and age of increasing insecurities, it is time that we take proactive measures to protect our guests, our own selves, our industry and our world. Technology comes to the rescue, yet again.
  • There are simple ways in which each one of us can ensure that our surroundings are secure.
  • Upon entry into the property, it is vital that a guest’s baggage is scanned and the baggage count is added to his data for cross verification during the check-out,
  • ...9 more annotations...
  • Guest history modules
  • a special report
  • The House Keeping module
  • In addition, all employees must be allowed access only into their areas of work.
  • The next step would be to have a stringent recruitment procedure in place.
  • CCTV surveillance
  • an online central passport and ID card verification mechanism must be introduced,
  • A communication engine can be further used to send out pre-defined messages,
  • simple technology put to effective use,
  •  
    Terrorism attacks on international hotels have turned the industry's focus on security issues. No doubt about it, both government and hospitality entrepreneur pay more attentions on security after September 11, 2001. It is important for hotels enhance security by using technology. Hotels use Vehicle Management System to tab all vehicles entering the property. This VMS also can be tagged with the guest information, drivers' information and vehicle number. Hotel should use the guest history modules to store the information about every guest especially for those 'first time guest'. The information includes the copy of passport detail of the international guests, guests' flight detail, an emergency contact number and copy of photo registration cards. The house keeping module makes report of Sleep-out guest. This system can share the occupancy reports and nationality wise occupancy report automatically with local police. Also the incoming call can be tracked. Hotel should have a stringent recruitment procedure in place. Hotel can use biometric access to restrict employees only allowed access their working place. The gate-pass system, vehicle management system and biometric access control system ensure only authorized staff and vehicles are allowed into the property. The online central passport and ID card verification mechanism can automatically verify the document against data available with the security agencies. The communication engine can send message to stuff, supervisors, in house guests and authorized external security bodies about the emergency like suspicious guest, fake passport and so on. Effective use these technology can save the hotels from the worse that can happened.
  • ...1 more comment...
  •  
    Hospitality industry was affected by terror attacks. This article pointed out how new technology increased security in a property. For instance, having an able Vehicle Management System can keep a tab on all vehicles entering the property. This can also be tagged with your Guest History data, enabling tagging of vehicles with in-house guests. The Vehicle Management systems also have room for adding Driver and Vehicle number details to the database. Upon entry into the property, it is vital that a guest's baggage is scanned and the baggage count is added to his data for cross verification during the check-out, in order to ensure that no undesired material is left behind. Guest history modules in a property management system would also prompt for extra information to be noted for a first-time guest. On check-in, a photo registration card must be printed and handed over to the guest. The photo can be stored in the database and also compared with the central list of criminals / suspects identified by the authorities through an online module that should be made available to all the hotels by the central bodies. a biometric access control can be interfaced with the property management system, restricting a front office executive from entering into the Kitchen area. Also, only authorized supplier staff and vehicles must be allowed into the property.
  •  
    This article gives us some tips on how technology could help enhance security at hotels. By summary the article, we can find out that the technology can help enhance security at hotels in maintaining copy of passport or ID card of all guests, noting an emergency contact number always, storing data at an off-site location for easy access in case of mishap, installing a biometric access control system for in-house and supplier staff, scanning baggage and maintaining baggage count of each guest and cross-verify on check-out, and monitoring sleep-out guest report closely. By using these simple technology, hotels can save a lot, and make hotels secure.
  •  
    The hospitality industry is hassled by the terror attacks at luxury properties, so it is important to use technology to protect the guests. A Vehicle Management System can be used to keep watch on all vehicles entering the property. The property management system is used from check-in to check out to verify the baggage and guests. A stringent recruitment such as biometric access can prevent unauthorized staff or guests step into the specific area. Also, there is an online central passport and ID card verification can verify the guests' identification and give an alert on a fake ID or passport. All these measures can help to prevent worst things from happening.
8More

Hacker Will Expose Potential Security Flaw In Four Million Hotel Room Keycard Locks - F... - 5 views

  • The next time you stay in a hotel room, run your fingers under the keycard lock outside your door. If you find a DC power port there, take note: With a few hacker tricks and a handful of cheap hardware, that tiny round hole might offer access to your room just as completely as your keycard
  • Using an open-source hardware gadget Brocious built for less than $50, he can insert a plug into that DC port and sometimes, albeit unreliably, open the lock in a matter of seconds. “I plug it in, power it up, and the lock opens,”
  • The ability to access the devices’ memory is just one of the two vulnerabilities Brocious says he found in Onity’s locks
  • ...1 more annotation...
  • he company also uses a weak encryption scheme that allows him to derive the “site code”–a unique numerical key for every facility–from two cards encoded one after another for the same room
  •  
    A security researcher discovered that he could unlock certain electronic key card entry devices used at millions of hotels by inserting a plug into the small port in the bottom of the key card device and unlocking the door. When he inserts the plug and turns on his device it triggers the mechanism inside that key card device and opens the door in seconds. Granted when he tested this at a conference he was only able to open 1 of 3 doors but it was still enough to show the flaw in the system. It doesn't sound likely after reading the article that there is an easy or cost effective fix to this problem because so many hotels across the world use these devices supplied by Onity. I think the lesson here is to always be vigilant in securing your valuables in any hotel room. Any time new technology is installed there is going to be someone right behind trying to hack it or find the security breaches.
  • ...1 more comment...
  •  
    Dawn, I wrote about the follow-up article regarding this issue. I can not believe that it has taken Onity this long to correct the issue. I can't imagine why Marriott and other companies haven't address their guests regarding this concern. I understand the negative impact this could have to the business, however the companies should keep in mind safety.
  •  
    Nelson, I went back and read your article, very interesting to see the follow up but I am surprised that it has taken this long to come out. I wonder if this would have been more publicised if it would have put more pressure on Onnity to fix the problem without putting financial burden on the hotel owners? I am curious now to see if my own company has been effected by this issue.
  •  
    That is scary that you can think you are secure and anyone can hack the system and open your hotel room door. Now paranoid people that think they may be robbed by hotel staff, also have to think of outsiders, not even staying at the hotel. Anyone can enter hotels now a days and start opening doors like a lottery system, until they strike gold. The moral, be vigilant while on vacation, because there may also be someone eyeing your stuff. Also, if you have an in room safe use it.
4More

Point of Sale Technology: New Developments - 0 views

  • Hotel
  • A hotels Point of Sale (POS) system is vital to the running of the business and crucial to how a hotelier monitors things like sales, bookings and staff performance. Recent advances in technology have helped to revolutionise the hospitality sector, decreasing service times and increasing the efficiency of sales when completing transactions.
  • The growing trend of a new technology called Near Field Communications (NFC) is hoped to eliminate the necessity for customers to carry money or credit/debit cards to pay their bills. This NFC technology allows consumers to use mobile devices to process all their transactions, for instance by swiping their smartphone across a special kiosk at the counter, with all the information sent to a central processing system for payment.
  •  
    This article was very enlightening on the recent advances of POS technology in the hospitality industry and the new developments that keep evolving. The article presents areas were recent advances have helped to improve the "effectiveness of a business and relationship with their customers". As stated in the article with the use of "cloud-based systems, the latest i-trends and the growth of Near Field Communications", the hospitality industry POS technology will move very far. Three key areas were discussed; "Point of Sale on the move" which referred to using a browser on any mobile device to obtain necessary information while you are on the move or away from the business. The second area was using a POS system on a tablet or smartphone that would be able to provide more useful information than tradition POS systems in a lightweight manner with more flexibility. I can attest to the real need for this advancement because working in an establishment that has the traditional POS systems has proven when there is a problem trouble shooting can be very difficult. A process as simple as getting your technical support team to make changes in your POS system can be a nightmare, when your system does not have updated software. We experienced that issue this week, when technical support attempted to access the system and could not locate the license agreement after hours of searching for a key we found a device that was attached to the printer cable in the back of the CPU. All of the unnecessary time spent on that one event could have been eliminated if some of this new technology was in place. The last area the article referred to is "Marrying POS and NFC". This new development is hoping to eliminate the need for carrying money or credit/debit cards and enable consumers to use mobile devices to process all transactions. I believe this would be very beneficial in the hospitality industry not only from the point credit card fraud but also it eliminate
16More

Opera Property Management System - 0 views

  • Reservations ― features are integrated with other functionality such as profiles, cashiering and deposits. This property management software module provides a complete set of features for creating and updating individual, group and business block reservations, including deposit handling, cancellations, confirmations, wait listing, room blocking and sharing.
  • Reservations ― features are integrated with other functionality such as profiles, cashiering and deposits. This property management software module provides a complete set of features for creating and updating individual, group and business block reservations, including deposit handling, cancellations, confirmations, wait listing, room blocking and sharing.
  • Reservations ― features are integrated with other functionality such as profiles, cashiering and deposits. This property management software module provides a complete set of features for creating and updating individual, group and business block reservations, including deposit handling, cancellations, confirmations, wait listing, room blocking and sharing.
  • ...11 more annotations...
  • Reservations ― features are integrated with other functionality such as profiles, cashiering and deposits. This property management software module provides a complete set of features for creating and updating individual, group and business block reservations, including deposit handling, cancellations, confirmations, wait listing, room blocking and sharing.
  • Profiles ― complete demographic records for guests, business accounts, contacts, groups, agents and sources. Profiles include addresses, phone numbers, membership enrollments, stay and revenue details, guest preferences and additional data that make reservations handling and many other activities faster and more accurate.
  • Back Office Interface ― revenue transfers, market statistics transfers, daily statistics transfers, and city ledger transfers can be easily made from OPERA Property Management System to a back office system.
  • Rooms Management ― handles all facets of room supervision including availability, housekeeping, maintenance and facility management. The Queue Rooms feature of the property management software coordinates Front Office and Housekeeping efforts when guests are waiting for rooms which are not immediately available for assignment.
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Your front desk often makes the difference between ‘never agains’ and ‘long-term relationships.’ At the core of the OPERA Enterprise Solution is our premier property management software, the OPERA Property Management System (PMS). Designed to meet the varied requirements of any size hotel or hotel chain, OPERA PMS provides all the tools a hotel staff needs for doing their day-to-day jobs – handling reservations, checking guests in and out, assigning rooms and managing room inventory, accommodating the needs of in-house guests, and handling accounting and billing. The property management software is configurable to each property’s specific requirements and operates in either single-property or multi-property mode, with all properties in an enterprise sharing a single database
  •  
    SUMMARY OPERA Property Management System is fully integrated with all the OPERA modules and offers the most extensive list of certified interfaces in the industry. FEATURES: Reservation, rate management, profiles, front desk management, back office interface, room management, cashiering, account receivables, commissions, reporting, fully configurable, global perspective, hospitality system interface, opera express, tailored to fit hotel's operational business needs, scalable to suit the size of the hotel, helps operators to become more productive, profitable and professional, and delivers fast, accurate and online information on property
  •  
    A lot of hotels use OPERA as their property management system. I have never personally worked in a hotel so I am not familiar with PMS's but from everything that I have read and heard from people is that OPERA is very efficient with everything. This system seems as though it can do everything for your property just the way that you would like it to. OPERA is customizable to your company's needs which seems great. This is a great website that you posted as it informs all of us exactly what this PMS is capable of.
5More

Westin Hotel's POS Hacked - eSecurity Planet - 0 views

  • Travelers who checked in to the Westin Bonaventure Hotel & Suites in Los Angeles between April and December last year are being advised to review their credit card statements and credit reports this week after hotel officials warned of yet another security breach.
  • So far, Westin Bonaventure officials have isolated the source of the security breach to four bars and eateries on the property, as well as the valet parking station. The venues in question include the Lake View Bistro, the Lobby Court Bar, the Bonavista Lounge, and LA Prime
  • Nonetheless, the company is providing free credit-monitoring services for anyone who used their credit or debit cards at those establishments during the nine-month period.
  •  
    Travelers who checked in to the Westin Bonaventure Hotel & Suites in Los Angeles between April and December last year are being advised to review their credit card statements and credit reports this week after hotel officials warned of yet another security breach.
  •  
    The Westin Bonaventure Hotel and Suites in Los Angeles had a security breach where their point of sale system for processing debit and  credit card transactions have been hacked. Data such as guests name, cedit and debit numbers and expiration date were jeopardized. Hackers had not been able to access information from the Hotel's computer system and neither did they affect guest room charges. The Director, Michael Czarcinski apologized and offered free credit monitoring services for those who used their cards during that nine month period.
4More

Hotel chain lawsuit MUST BE a security wake-up call for the travel industry | Tnooz - 0 views

  •  authorities in the US filed a lawsuit against Wyndham Worldwide, claiming the company and three subsidiaries failed to protect sensitive customer credit card data.
  • almost 600,000 credit card numbers including expiry and security codes, were stolen over a three year period in three separate data breaches, resulting in over $10 million in fraudulent losses to cardholders, banks, and credit card companies.
  • Weak passwords and a laissez faire attitude towards property management system usernames and passwords should never be an excuse for a compromise.
  •  
    Last year a law suit was filed against Wyndham Worldwide because the company did not protect their customer credit card data efficiently on their PMS. The company caused over $10 million in fraudulent losses. In this case, Wyndham had be allegedly using weak login credentials in their property management systems. This is the key vector for data breaches. "According to the FTC, Wyndham Worldwide had many points of weakness in their security chain including; storing credit card information in plain text, storing sensitive security codes (aka CVV/CVS/CVC data), not using firewalls, not enforcing strong passwords, not using updated operating systems, and not having adequate logging.'
1More

8 Benefits of Using RFID Wristbands for Resorts and Attractions - US Blog - 0 views

  •  
    As technology is advancing, the hospitality industry must also stay on top with the latest trends. Hotels and theme parks using RFID wristbands have gone in the last few years. "RFID Systems are advancing, and more companies than ever are offering these solutions to the leisure industry. This helps drive prices down for operators looking to take the plunge into RFID." The article mentioned 8 benefits of using RFID Wristbands in the hospitality industry. The 8 benefits are: improve guest check- in and entry, go cashless, a hands-free experience, family freedom, security and control, make a social splash, one wristband to rule them all, and lastly, data and insight. As mentioned in the article, Disney World released their wristbands, MagicBand, in 2013 and they have been a hit ever since. I personally worked at the main entrance of Disney's Magic Kingdom and it was much easier and quicker for the guest to enter the theme park with their band rather than an actual ticket. Those guests with wristbands already had them out and were ready to tap the band and touch their finger on the glass. Versus other folks where the parents had the ticket cards for their whole party and once they got to the entrance they had to look for the tickets, pass them out to their kids, and then collect them from everyone once they entered the park. Not to mention, they would have to pass the tickets back out o everyone if they are going to use a FastPass for one of the rides. RFID systems are not new to the industry, as they have actually been used for hotel key cards for many years, however, now they have given them a better use. RFID wristband users may use their band to enter theme parks, hotel rooms, and music festivals, and they can use them as a credit card to pay for things on the property. It's a huge advantage to use these wristbands because it is much easier to wear a band than having to carry around a room card, ticket and a credit card, especially at theme parks o
9More

Data Security in Hospitality: Risks and Best Practices | By Limon Wainstein - Hospitali... - 0 views

  • Information security is a pivotal aspect of many industries, not least the hospitality industry due to the nature of the data collected by companies operating within hospitality.
  • hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data.
  • ...5 more annotations...
  • Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which theres a franchisor, an individual owner or group of owners, and a management company that acts as the operator.
  • A vital part of protecting data is training staff to securely gather and store personal information.
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • Industry and political regulators are becoming stricter in governing how organizations process and store personal data.
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them.
  •  
    Information security is absolutely crucial within the Hospitality industry. There is so much important guest and customer information that is submitted via technology. This includes, credit card details, addresses, and phone numbers, with so much of this information being sensitive companies need to install security systems. The hospitality industry depends strongly on credit card as a form of payment which is why the POS needs to be secure. It is also extremely important that staff members are trained to gather and store guests personal information. The industry overall has become stricter in the ways that information gets gathered and processed in order to avoid cyber attacks. The last thing that companies must keep an eye on are insider threats, a lot of the time it's the employees from the company that are giving away valuable and confidential information to third parties. This is why I believe that technology has had a great impact on this industry but there needs to be strong security systems in order to avoid cyber attacks.
12More

Data Security in Hospitality - Why Is It So Important? - 0 views

  • The hospitality industry has one of the highest numbers of security breaches.
  • As a result, the hospitality sector seems to be an ideal target for cybercriminals looking to carry out credit card fraud and identity theft crimes.
  • Having well-trained staff is invaluable for ensuring the secure collection and storage of sensitive data. However, the hospitality industry has a very high turnover rate due to the fact that it largely involves seasonal work.
  • ...8 more annotations...
  • These criminals infect point-of-sale systems with malware that scrapes card information. 20 out of the top 21 high-profile breaches that have occurred since 2010 have been a result of this strategy.
  • One of the more recent data breaches in 2019 - the Earl Enterprises data breach involved the theft of over 2 million credit card numbers. It is believed that the breach was the result of malware installed on POS systems at the popular restaurants run by the company.
  • Such complex ownership structures could result in breaches as in the case of the Wyndham Worldwide breaches which occurred back in 2008 and 2010
  • Just one untrained individual can give cybercriminals easy loopholes to gain access to sensitive customer data.
  • It involves employees selling customer data to third parties unknown to the management of their organization
  • High profile breaches such as the recent Marriott International data breach which resulted in the leakage of the personal data of over 500 million guests continue to drive up awareness levels.
  • Failure to provide adequate data protection can have catastrophic consequences for hospitality companies
  • Organizations in the hospitality sector can protect the data of their customers by implementing a number of best practices for mitigating the risks associated with data collection.
  •  
    According to this article, the hospitality industry has one of the highest numbers of security breaches. Due to the nature of the business, credit card fraud and identity theft crimes seem to be an ideal target for cybercriminals. Humor error, high turnover rate, and insider threats are just a few primary factors for security breaches within the hospitality sector. The consequences of data breaches can have a long lasting impact on the company, including, customer trust, tarnished brand reputation and legal and financial problems. As we all know, hotel owners and operators do not want anything to impact their revenue. Encryption of credit card information, operating a continuous training program in cybersecurity, adhering to relevant regulations, using firewalls, and a detailed response plan in the event that a data breach should occur are a few practices the hotel sector can implement to mitigate a cyber attacks.
27More

11 Tips to Improve Your Restaurant's Cyber Security in the COVID-19 Era | FSR magazine - 0 views

  • wealth of client data on tap from places with lax security
  • unknowingly serve credit card data to hackers. Due to the volume of credit card transactions and CRM data available, restaurants need to take cybersecurity seriously before a criminal gets wind of the vulnerability
  • A hacker only needs to gain access to a restaurant's POS system and install malware to steal customer credit card details.
  • ...20 more annotations...
  • Take Chipotle, for example. The company got devalued by about $400 million after they suffered a data breach.
    • anonymous
       
      Major consequences for restaurants if discovered as the link
  • because most go belly up six months after an attack.
  • Unprotected WiFi
  • Criminals pretend to be from the U.S. government and inform targets their COVID-19 stimulus check is ready, but they would need to verify the details of the recipient first before they can send it.
    • anonymous
       
      Low level scammer
  • CRM software data, which may include names, addresses, and even birthdays. One of the most common ways to achieve this sort of attack is via malware (malicious software). Hackers find a vulnerable backdoor to a restaurant's network to install malware on the POS system. Malicious code then records every transaction and every detail, sending it back to the criminal's server over the internet.
  • GrubHub drivers scam both the restaurants and the customers by marking the deliveries as complete and pocketing the tip money, without bothering even to pick up the order from the establishment.
    • anonymous
       
      AHHHH
  • Businesses are scrambling to find suppliers amidst the chaos, and criminals have been taking advantage of the confusion
  • Scammers are posing as representatives from the World Health Organization (WHO), the Center for Disease Control (CDC), and other public health agencies
  • social engineering on the restaurant staff to pull off phishing attacks.
  • PCI compliant.
  • conduct a risk analysis
  • hiring a security expert either full time or as a consultan
  • Secure your network and always change the free WiFi access point's password with a strong one every day.
  • latest operating system updates
  • Force multi-factor authentication
  • strong passwords
  • Ensure sensitive data encryption
  • web-filter to secure your WiFi network
  • Install a robust security software program on all computers and devices to block, detect, and clean malware.
  • Conduct regular cybersecurity training
  •  
    Restaurants have always been an easy target for cyber security hackers, in particular, hackers who are looking for credit card and ID information. Restaurants provide hackers with a "wealth of client data" due to the high "volume of credit card transactions and CRM data available." Once given access, a hacker could simple install malware and duplicate all customer information. Already facing critical financial issues during Covid 19, restaurants large and small need to take a stronger presence in the protection of their data. If discovered to be the start of a breach, customers will tend to avoid that business. "Chipotle, for example...got devalued by about $400 million after they suffered a breach," and many small restaurants "go belly up six months after an attack." Below is a summary of the types of attachs restaurants face: 1. Unprotected Wifi 2. Social engineering and phishing attacks. This is actually the one that stood out to me the most because of how sophisticated these attacks can be. It is a reminder that we are all at risk, both the technologically challenged and gifted. 3. Malware 4. Covid 19 Scams 5. Grub hub scams 6. Supply chain scams *A particular issue for restaurants and commercial businesses right now as companies scramble to find new vendors who can supply them with the products they require. 7. Public Health scams 8. Government Stimulus scams 9. Technical support scams How can we fight against these? Here are the recommendations: 1. PCI compliance 2. Hire and IT security professional to conduct a risk analysis and if possible, keep on as a consultant or full time 3. Keep a secure network and change free passwords daily 4. Use the latest operating systems, force multi-factor authentication, strong passwords, and use encryption services for data storage and transfers 5. Install and use robust web-filters and security software programs 6. Maybe most important!!! Train your employees. 5.
19More

Data Security in the Hospitality Industry | CSU-Global Blog - 0 views

  • Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there’s a franchisor, an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. In fact, it was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • Well-trained staff also know how to recognize social engineering attempts, and they understand an organization’s compliance requirements. The risk is that the hospitality industry involves a great deal of of seasonal work in which people might move on after only a few months, or they might be transferred.
  • ...14 more annotations...
  • This type of data risk is more subtle, and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests’ data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data.
  • the job turnover rate in hospitality is as high as 90 percent
  • High Staff Turnover
  • From the perspective of cyber criminals, hospitality appears to offer an ideal target for conducting crimes, such as identity theft and credit card fraud, due to the existence of multiple databases and devices containing both Payment card Information (PCI) and Personally Identifiable Information (PII).
  • Here are five of the biggest data security concerns in the hospitality industry:
  • Complex Ownership Structures
  • Reliance on Paying By Card
  • Information security is a pivotal aspect of many industries
  • Compliance
  • Insider Threats
  • Best data-protection practices for companies in the hospitality sector include… Always encrypting payment card information.Operating a continuous training program in cybersecurity to maintain a well-trained workforce.Always adhering to relevant regulations, such as PCI DSS.Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats.Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker.Know where your data is and enforce the principle of least privileges to limit acce
  • ss to sensitive information.
  • organizations in the hospitality sector are better placed to implement a comprehensive information security strategy that entails the necessary procedures, processes, and people to improve cybersecurity within the hospitality industry.
  •  
    The article talks about cyber security threats in the hospitality industry. Threats range from high staff turn over so staff isn't trained thoroughly, to insider threats where employees can sell information to third parties, to Cyber-criminals who infect POS systems with credit cards.
  •  
    Data information security is very important to a business development.In my opinion, I think the relationship is inversely proportional. In other words, the more effective cyber security budget is invested, the less potential impact there is of customer information being stolen (being hacked). Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
4More

RFID Hotel, LAS Hospitality Supply Introduce Antimicrobial Key Card Tech - 2 views

  • RFID Hotel and LAS Hospitality Supply, has announced that it has acquired the exclusive right and license to manufacture and distribute a patented and proprietary antimicrobial plastic key card to hotels and resorts in the United States.
  • These key cards contain New Antimicrobial Layer (NAML) technology to inhibit the growth and transmission of germs, viruses and dangerous pathogens that thrive on the surfaces of intensely circulated products such as hotel key cards.
  • Antimicrobial agents are added during manufacture of the hotel key card to inhibit up to 99.99% of germ, virus and bacteria regeneration. The effect is long-lasting with no adverse reactions to anyone interacting with the antimicrobial surface.
  •  
    Now more than ever, introduction of products that help preserve the health of staff and guests are an imperative for hotels and resorts. This article introduces this patented antimicrobial hotel key card technology to the hospitality industry.
37More

How technology is transforming hotel point-of-sale systems | Hotel Management - 3 views

  • Technology has transformed point of sale into point of experience
  • elf-ordering via their smartphone by the pool or wherever they happen to be and increased guest satisfaction with guest payment
  • Because the staff members have appropriate intelligence readily in their hands, personalization can happen
  • ...21 more annotations...
  • easy to summon service in “non-F&B” areas
  • The card data is processed only by the payment gateway to/from the acquiring bank and only the final transaction approval code is passed to the POS, without the card data
  • The hotel F&B space continues to show growth, with overall consumer spending increasing 4.9 percent in 2017 and showing a robust 5.5-percent annual growth since 2011
  • associated mobile apps have the potential to increase top-line [food-and-beverage] sales in hotels by 5 [percent] to 10 percent without significant costs
  • hotel food-and-beverage revenue per occupied room increased 1.6 percent during 2017. F&B RevPOR reached $105.56, up from $103.93 in 2016, according to STR.
  • POS vendors have moved away from storing card data on their application and network. Many vendors no longer pass through or process any card data on their POS systems. Rather, they link and integrate to certified payment gateways. Payment devices are encrypted and secured, and client card data is always encrypted and totally separated from the POS terminal.
  • Technology is allowing for an extreme and pronounced change in point-of-sale systems
  • Mobile POS provides several benefits for hotels and guests alike. With mobile POS, the speed of service is dramatically increased because the staff can bring mobile ordering directly to guests, anywhere on property
  • POS technology has been a great partner in these efforts by making POS systems easier than ever to use, and mobility plays a role in impacting the increase in consumer spending, Wisell said
  • Call-for-service technology, deployed tableside and in under-serviced areas such as lobbies, coupled with mobile ordering apps, offer hotels an opportunity to increase sales
  • Mobile POS also lays the groundwork for future integration with artificial intelligence or customer-relationship-management systems.
  • “Hotels can spend millions of dollars on a remodel but if they don’t have the right point of experience, it can still result in a one- or two-star rating,” he said.
    • cleon087
       
      This shows that importance of POS, and how it can transform a business for the good or bad.
  • Mobile is now
    • cleon087
       
      People are starting to expect this, they even want more of a variety of different ways to pay that can be determining if you get business or not.
  • Hinojosa said
    • cleon087
       
      Were always looking for a way to make the experience more personalized and this is one way.
  • with
    • cleon087
       
      When guest get their food quicker and accurately this helps the experience and revenue.
  • they are the face of the property
  • u recognize them and are honored they are here with you again.”
  • “Whenever a guest is seated in the lobby and wants a take-away coffee, they can order one and not only when a staff member notices the guest in a restaurant,
    • cleon087
       
      This is really good because it is hard as a front desk agent to give attention to the guest since the moment they step in but with this they can request their snack or drink that they want.
  • While there is interest in the potential of AI and chatbots for roomservice and self-service ordering, these are not yet ready for a widespread rollout at this time, Wisell said.  
  • “Data scientists can be used in the back of the house on the kitchen side, too—optimizing the production line,” he said. “Looking at the analytics behind the performance will reduce the wait times in the front of the house.”
    • cleon087
       
      This will optimize performance
  • hotels don’t want to cross the line into creepy.
  •  
    Mobile POS has boosted F&B growth due to the ability to complete sales much faster and from non-F&B serviced areas of the property. The mobility contributes greatly to the increase in customer spending. With this mobility, companies must ensure compliance with PCI standards, and ensure that no credit card information is stored directly on the POS terminal. The article also touches on the subject of tokenization, and the usage of technology to secure a "token" rather than actual card data aids in reducing security risks.
  • ...4 more comments...
  •  
    This article was about how technology has had a great influence on point of sale systems within the hospitality industry. According to a senior director of product manager at Agilysys, Mike Hinojosa, he states that technology has transformed point of sale into point of experience. I personally agree with this because lately I expect hotels to have the latest in technology when it comes to POS and when I encounter a poor POS I automatically think they lack in providing the best for their guests. This article talks a lot about how mobile POS provide benefits for both parties and how it has increased guest satisfaction. "With mobile POS, the speed of service is dramatically increased because the staff can bring mobile ordering directly to guests, anywhere on property." According to this article, POS systems help boost F&B spending growth and they have become more secure throughout the years. "The hotel F&B space continues to show growth, with overall consumer spending increasing 4.9 percent in 2017 and showing a robust 5.5-percent annual growth since 2011, according to Technomic". It's said that mobile POS has helped F&B growth because it gives users the ability to into quicker sales and in different areas throughout the properties. For example, a waiter walking around a pool taking orders instead of having the guests walk to the poolside bar to place an order. Collecting payment has also become safer and easier with POS systems because of the PCI standards.
  •  
    Technology is allowing for an extreme and pronounced change in point-of-sale systems. The speed of service for the guest in a hotel has dramatically went up because of point of scale systems. It is more convenient and quicker for guests to get things or to order things.
  •  
    This article is about the employment of technology in the hospitality industry.
  •  
    This article is about how technology is transforming the POS experience by providing a more advanced security solution and a mobile platform. The article highlights how this new technology supports both the client and staff experience. The technology also provides a financial benefit in increasing sales by 5% and reducing cost by 10%.
  •  
    POS Technology has developed majorly over the past years. Growing developing offering mobile devices that can help workers pace themselves and generate more sales. These programs also offer extra data security to protect the clients information against fraud. This device is perfect for sport arenas, bar, golf course and more open outdoor and large venues that cater to voluminous crowds.
  •  
    This article is about the benefits of technology in POS systems. It shows how the technology can personalize the experience of the guest by having them be able to order from the moment they step into the lobby. The article also discusses how all the technology is good but in the hospitality we are walking on a fine line that we don't want to cross to creepy with biometrics. Technology offers efficiency in speed and will give a better experience. Not only this but it talks about how POS is becoming more secure, and how people want to pay in different ways.
« First ‹ Previous 41 - 60 of 624 Next › Last »
Showing 20 items per page