Skip to main content

Home/ Hospitality Technology/ Group items matching "networking." in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

Reflecting on the Future for B2B Email | ClickZ - 0 views

  • email certainly remains the king of the digital channels, with an installed base of email accounts growing to 3.1 billion in 2011 and expected to grow to nearly 4.1 billion accounts by 2015.
  • corporate email accounts will increase faster than consumer email accounts because of the growth of affordable cloud-based email services.
  • Subscribers have begun to expect you to keep the conversation going via social media and mobile channels. Witness the increased activity for B2B users on LinkedIn, Twitter, and other social networks and likely on your own corporate blog, too.
  • ...1 more annotation...
  • Emailing without permission can taint their impression of your brand. They can slam you and your brand in social media channels even if you meet legal minimum standards.
  •  
    It is clear that email is one of the most effective and efficient ways of reaching out to your consumers directly, however there are always the ups and downs to this form of marketing. It is predicted that by 2015 there will be an increase of nearly 4.1 billion email accounts compared to the 3.1 billion email accounts as of 2011.   The most common form businesses used email marketing was to send out newsletters, coupons, ads, alerts, etc., now consumers also are looking for more interaction with the business through social media. They want instant responses through Twitter, LinkedIn, blogs and other social networks.  With using all the social networking sites in relation to the business, consumers can also see other consumer reviews.  Using these forms of communication for the business and client, helps to build their customer relationship with each other. As businesses track the movement of their website and emails by monitoring what the consumer clicks on, they gather information on what the consumer is looking for and can then cater to their needs. As positive as social media can be for a company, it can also be negative with bad user reviews and complaints.  Word of mouth is the fastest marketing tool for consumers when they have a bad review.  
2More

Electrical Contractor: Hotel Automation Goes Wireless - 1 views

  • “We have wireless and hardwired versions, making it easy for both new construction and retrofitting existing hotels,” Sobieski said. The intelligent thermostats can communicate over a ZigBee wireless network, giving the hotel’s engineering team full control and monitoring of every room in the hotel. “With our EcoCentral remote management platform, shutting down a wing for maintenance is as simple as a mouse click. Built-in alerting also gives them the ability to catch problem HVAC systems before a guest call comes in.”
  •  
    Article speaks about hotel automation systems by vendors, that allow hotels to reduce energy and utility costs that impact the bottom line. The EPA estimated that in 2004 the hotel industry spent more than $5 billion on energy and that the number was likely to increase. Items such as occupancy based thermostats communicate over wireless networks and allow hotel staff to perform maintenance tasks such as detect issues with in-room HVAC systems before guests call in to report the items. Other systems use energy monitoring systems that allow for the hotel to detect room temperatures. This is significant as those rooms temperature and lighting systems can know whether the occupant is in the room and adjust lighting and temperature settings accordingly. Energy waste in hotels is an issue that affects the bottom line so the potential for ROI is great. Implementation of many of these systems is flexible as many are built on wireless networks that do not require heavy physical installation of wiring. Interested in the groups thoughts on this?
1More

New Social Network Connects Travelers with Destinations, Experts - 0 views

  •  
    Touristlink is new online network that has been created as a means to connect tourists with other tourists as well as experts in the travel and tourism field. This type of network allows users to access the entire website by connecting them with travel agents, hoteliers, tour guides and many other people from all over the world. I personally believe that the Touristlink network facilitates planning a vacation because it centralizes all of the travelers questions and concerns to one particular location. It also puts the traveler in contact with the right people for planning a vacation.
1More

Microsoft gives details on mobile broadband improvements in Windows 8 - 0 views

  •  
    This is a kind of a new improved software for connecting to wi-fi and mobile broadband networks of Microsoft 8. The user need to be installed required drivers and software to connect to mobile broadband networks of Win7, while, Windows 8 has been designed to simplify the process of connecting to mobile broadband networks and of managing those connections, including monitoring data usage and controlling costs. Prior to Windows 8, you needed these applications to compensate for functionality not provided natively in Windows. This additional software confused and frustrated users by conflicting with the Windows connection manager, showing different networks, network status, and a separate user interface. Also, this software can read user`s action and reconnect more faster.
7More

IPads Change Economics, and Speed, of Hotel Wi-Fi-On the Road - NYTimes.com - 3 views

  • broad use of iPads and other mobile tablets, which are heavy users of video streaming, the guest room Wi-Fi networks that most hotels thought they had brought up to standard just a few years ago are now often groaning under user demands
  • Hotels, he said, now must choose “either to not increase the amount of bandwidth, so everybody will get much slower service to the point where you’ll think you’re on a dial-up connection,” or upgrade and essentially put in a metered fee-based system.
  •  
    Ipads changing our life is absolute. In fact, if there is no ipad, something electronic products can also bring revolution in hotel Wi-Fi networks. To tell the truth, free hotel Wi-Fi is too slow.....last year, I had a internship in Holiday Inn Central Plaza Beijing. There had two kinds of Wi-Fi networks. Free network was cover the whole hotel but the speed was slow. The other that must be paid was faster. Some people had video session prefered the faster one. In addtion, hotels should upload their Wi-Fi networks. It can be an attraction of the hotels.
  • ...2 more comments...
  •  
    I've encountered this issue at numerous hotels in my travels. I would be up for paying an increased fee for better wi-fi if I had assurances that that was indeed what I was getting. I think that is the direction most properties will end up going as more people invest in data heavy machines such as tablet pc's, macbook air's and similar products. When I travel I need wi-fi access in my room as well as the conference or meeting rooms, and its hit or miss most times. You would think that they would have an idea of what level of bandwith is needed for 200+ internet marketing professionals but often times that is not the case. I am looking to invest in mobile hotspots such as mi-fi's or similar services provided by AT&T or Verizon, as the convenience of knowing there is a connection I can trust is well worth the investment.
  •  
    All I want to say is that...every innovation or something new to use must go through so many tests! I post my bookmark about 5 hours ago,but it didn't work! Until now, after so many times I tried, it suddenly appears and I do not know why... besides, about the Ipad, nowadays is an information era, we obtain and use information during our daily life, some free wi-fi is really helpful for us. I used to connect the internet with lines. If more computers want to go to the internet, it must be use the route, it is so inconvenience..however wi-fi makes us to use the internet wherever we want.
  •  
    For a hotel the WiFi system is really important because guests prefer the hotel with WiFi system. The guests even willing to pay a small premium to stay at a WiFi equipped lodgings. As the rise of smart phones and ultra-lightweight laptops case the bandwidth problems. I think the hotel can deal with this problems by create various account levels for guests, stuff and visitors. The hotel can allow the visitors to use free WiFi and provide high level account to overnight guests.
  •  
    I personally prefer to use WIFI in my own room when I visit a hotel because I have more privacy. Some hotels they may offer free/complimentary WIFI in the public area, for example, the lobby, the lounge, etc. At the same time, to limit the overuse of public WIFI, the WIFI in the guests' room are charged by different time period and the length of using the WIFI. It seems to be not fair to those business people who require internet all day long. However, it lowers the expense of the WIFI service and improves the guests' satisfaction of the internet service.
5More

Hospitality Technology Solutions Provider FCS Announces Partnership With Quoc Khoa Netw... - 0 views

  • Quoc Koa focuses on the hospitality industry and, through the new agreement, will now offer the full suite of FCS solutions to international hotel chains and local properties in the Cambodian market.
  • The new partnership between Quoc Khoa Networks and FCS will strengthen the positions of both companies as providers of leading world-class hospitality solutions that are designed to help area hoteliers cope with this tremendous growth.
  • “The partnership with Quoc Khoa Networks enables FCS to expand our business horizons in the region, as part of our global strategy to provide the best hospitality solutions that enhance guest experiences while maximizing hotel operations and productivity,”
  • ...1 more annotation...
  • In addition, we are committed to enhancing guest satisfaction with guaranteed quality of service via FCS’ innovative and reliable hospitality products.”
  •  
    With tourism increasing in Cambodia, the partnership between FCS and Quoc Khoa Networks is expected to enhance guest satisfaction. FCS is the a top provider of hotel technology products and services.
5More

The impact of E-Commerce and Social Networking on the Hotel Industry - 0 views

  • Reservations through third party internet booking companies exploded in the early 2000's as the industry struggled with the effects of the September 11th downturn.
  • Social Networking sites such as Facebook and Twitter are the latest phenomenon in the hotel industry.
  • PPC (Pay per Click) advertising campaigns that are now widely used throughout the industry.
  • ...1 more annotation...
  • Several hotel operators have cited returns of around 8:1 on average for branded properties from PPC advertising offsetting the influence of booking at lower rates with the additional induced demand as a result of the advertisement.
  •  
    E-marketing has had a tremendous on customer service, efficiencies and overall profitability within the hospitality industry. Social networking has also an added feature to marketing. Marketing over the internet has given hotel operators the opportunity to create a positive image and reach more potential customers at a lower price. As a result of e-marketing many hotels are now realizing a profit from an area that was operating as a loss. This phenomena has cause many traditional marketers to be out of business, if they do dot reinvent themselves. In conclusion, e-marketing a a strategic way for hotels to reach a wider cross section of a population with minimum cost associated.
6More

SuccessFactors Gets Social With HRIS Offering - 0 views

  • SuccessFactors continued its expansion in HR software in early June with a product that aims to blend employee data management with social networking.
  • But the move raises questions about how far talent management specialists should stretch from their roots and about the need for yet another Facebook-like tool.
  • The new product is designed to aggregate basic employee data
  • ...2 more annotations...
  • there’s a risk of being spread too thin by branching into human resource information systems.
  • HR is going to need to have a social networking strategy,
  •  
    The article released the newest devleopment of HRIS of SuccessFactors. They successfully blend employee data management with social networking. As some executives said, new product wasn't merely a phone number and adress any more, it could include more information about an employee's hobbies, performance and so forth. The new developmen of HRIS enables HR departments to keep insight of their employees, how they are working and think about the job so that they can carry out a more satisfy strategy regarding to both employees and companies. However, some professionals doubt this new product. They questioned that if there are enough space to keep so much information, which may not necessary. Therefore there is stll lots of risky factors to enhance its application of this new developed HRIS.
2More

What you need to know about GDS in the hotel industry - SiteMinder - 0 views

  •  
    This article is all about Global Distribution Systems (GDS) in the hotel industry. The author defines GDS as an "advanced network of travel agents who specialize in selling and booking travel products, including hotel rooms and packages." The purpose of GDS in hotels is to broadcast their rates, availability and packages onto the network that way everyone is viewing the same thing, it is smart of the GDS operator is within the industry that way they have a better understanding on how to manage different properties. The article mentioned a few reasons why a hotel needs a GDS, some are to help increase revenue and to market other markets. In my opinion as a manager it is very important to know your audience and what your target market is. Many hotels outsource marketing teams and you need to be sure that you are proving them with the correct marketing and you have to be open to branching out to another market if you are not doing well with sales. When selecting a GDS, the article recommends that it have the following requirements: pooled inventory, commission-free structure, integration capabilities, comprehensive reporting, and the ability to target specific markets. I believe these are all very important especially being able to access booking data reports and having the ability to target specific markets. As a manager, you know always know how your occupancy rate of the hotel is and why it is suffering. Could it be because of different crowds that are coming in? Is it a new hotel in the area that is cheaper? You must know all of this in other to compete and be successful in this industry. The benefits of partnering with a hotel GDS are "your exposure will increase significantly, connecting to agents if quick and affordable, you no longer have to deal with manual booking entries, you can make better decisions for your hotel, and you will be able to discover interested travelers from every location around the world." I believe this is very important because a
  •  
    GDS also knows as global distrbution system is an advanced netwrok that us used by travel agents who sell and book travel products such as hotel rooms and packages for customers. Pretty much, when a hotel operator connects with a GDS, the operator will have access to all agnets within the GDS network such as, Booking.com, Expedia, Hotes.com, and so much more. Hotels that partner with GDS, will be able to promote their rates availability and packages to the GDS network which will then allow travel agent to finalise all reservations to their clients by having the accessibility to the GDS network. Hotels should and need GDS as their distribution strategy because, the number of bookings generated through a GDS generally outpaces that of direct bookings, revenue increases largely because the GDS places the hotel's information, availability and rates in prominent locations where it is easy for travel agents to find this valuable information, the GDS can help hotel managers uncover new market segments to promote their products to, and so much more.
13More

Who takes responsibility for cyber security in a hotel? - 0 views

  • it is vital that franchisors and their corporate security teams communicate franchisees’ contractual duties;
  • It’s you who may need to ensure all policies are upheld, that’s why it pays to provide incentives that will make it worth franchisees’ while to comply.
  • The study also reported that the cost for each lost or stolen record containing sensitive and confidential information increased from an average of $154 to $158.
  • ...9 more annotations...
  • And, while there’s no definitive answer to who owns cyber security in a hotel franchise, hotel owners or franchisees can take measures, such as investing in cyber insurance and maintaining updated systems, to prevent a cyber attack.
  • there have been multiple data breaches in some of the biggest hotel chains, with 55% of data compromises resulting from a corporate/internal network breach.
  • If the lines are still blurred come May 2018 – when GDPR is implemented – hotels may not be compliant and will face strict penalties.
  • Last year’s Ponemon study found the average total cost of a data breach is $4 million.
  • Adding to the cyber security difficulty: most franchisees have multiple properties, each with their own brands and contracts, making it even more important for cyber security policies to be implemented and upheld.
  • However, currently, too many hotel owners rely heavily on central reservation systems; thus, they don’t have much, if any, involvement in data collection or storage. That makes it difficult to implement an effective cyber security policy.
  • Many of the vulnerabilities are due to a gap in hotel franchise’s cyber security responsibility.
  • Unfortunately, this industry is a popular target for attack, because of the type of data it holds – credit card data, frequently used throughout the hotel either at check-in, in bars, restaurants, or shops – as well as relatively poor cyber security.
  • According to a recent Trustwave 2016 Global Security Report, the hospitality industry accounted for the second largest share of data compromises among any other last year.
  •  
    This article discusses the liability for a cyber breach at various branded hotels between the franchise owner or the corporation. The Trustwave 2016 Global Security Report stated that the hospitality industry had the second largest amount of data breaches. Additionally, more than half of the breaches are from a corporate/internal network breach. According to a Ponemon study, the average cost of a data breach is $4 million. While this is alarming, it is a surprise since hotels store numerous amounts of personal customer data including guest's credit card information. The article states that cyber hacks are largely due to the gap in not knowing who is responsible for the cyber security. There is an issue of control of data versus franchise network requirements. The hotel brand places individual franchisees in control of their own cyber security. However; they must rely on many centralized corporate owned reservation systems that could be possible access point for cyber attacks. The article suggests that the individual franchisee should make more effort in protecting their customers information as the hotel brand will take most of the blame. This does not help either side. Also, it mentions that in order to protect the hotel franchise it is important to have updated systems and should consider investing in cyber insurance.
1More

Client Server Network Technology Explained - 5 views

  • The client-server model of networking was originally developed to share access to database applications among larger numbers of users. Compared to the mainframe model, client-server networking gives better flexibility as connections can be made on-demand as needed rather than being fixed. The client-server model also supports modular applications that can make the job of creating software easier. In so-called two tier and three tier types of client-server systems, software applications are separated into modular components, and each component is installed on clients or servers specialized for that subsystem.
8More

SiteMinder Brings GDS Representation In-House as Hotel Customers More Than Triple in On... - 1 views

  • Almost 900 hotels located in the world’s top destinations are poised to receive personalized GDS sales and marketing representation from the global hotel industry’s leading cloud platform.
  • GDS by SiteMinder’, gain its own chain code and more than triple in hotel users.
  • Through sales and marketing representation, those hotels can now access a network of GDS experts based in New York, Los Angeles, London, Hong Kong, Paris, Munich and Sydney that will work with travel buyers on their behalf to increase hotel brand exposure and revenue.
  • ...4 more annotations...
  • Over the past year, GDS by SiteMinder powered nearly 200,000 reservations worth over $60 million in hotel revenue, showing how effective global distribution systems are in bringing guests hotels wouldn’t otherwise attract, especially from Monday to Friday when properties need business most.
  • Mr Lewis-Purcell has spearheaded SiteMinder’s dedicated GDS function over the last 12 months, growing the total number of GDS by SiteMinder hotel users from 250 to almost nine hundred.
  • GDS by SiteMinder uniquely brings cloud-based technology together with legacy GDSs that are as relevant today as they were thirty years ago, to provide hotels an incomparable total distribution platform. It’s now used by about sixty percent more hotels than our industry’s most renowned soft brands.
  • GDS by SiteMinder provides hotels a single point of entry to the world’s major global distribution system providers – Sabre, Amadeus and Travelport – and travel agent network. In addition to sales and marketing representation, hotel users of the GDS connection receive free consortia advice, account management and local customer support.
  •  
    Site Minder by GDS experience, serves as good example to better understand the impact of a GDS's impact on the hotel industry. GDS by SiteMinder provides a single point of entry to over 500 000 travel agents across the globe, which means that hotels can target many type of travelers in multiple geographic regions. By connecting hotels directly to the world's major GDS providers - Sabre, Amadeus, and Travelport - and travel agent network, GDS by SiteMinder offers a major convenience to participating hotels. Through this service, hotels don't have to worry about signing up with each one of these providers. Another advantage of SiteMinder is its affordability; there are no commission fees, rather, just one flat transaction fee per reservation. The company offers free services from GDS experts and free technical account management advice which are other benefits. For instance, in another article, in mid-2013, South Beach Group who has boutique hotels in the heart of Miami Beach, decided to switch its 12 hotels to GDS by SiteMinder. After moving to GDS by SiteMinder, South Beach Group representative highlights the significant increase in bookings leading to a growth in annual revenues by17% in 2013. In essence, GDS by SiteMinder advertises participating hotels to more customers globally within an incomparable distribution platform, with real-time and two-way GDS connectivity. As we can see in the article, in 2016, just within 12 months the total number of users of GDS by SiteMinder increased from 250 to almost 900. This article underlines the importance of GDS for the growth of travel industry. With Site Minder by GDS, one can realize how GDS helps increase hotel bookings by placing hotels on more virtual channels (an analogue of supermarket shelves) globally.  
6More

Jury sides with US Airways against Sabre in GDS antitrust trial of the century - Tnooz - 0 views

  • The jury has returned its verdict in US Airways’s $134 million antitrust lawsuit against travel technology giant Sabre.
  • The airline’s lawyers successfully argued that Sabre had threatened it, saying that it had to accept a contract on Sabre’s terms or else be cut off from a network of thousands of travel agents worldwide who depend on the inventory that the tech giant provides via desktop software.
  • During contract negotiations, Sabre never offered a deal for less than full-content, the airline said. Full-content contracts typically require an airline to provide the same fares it offers via any other channel, such as its own website, to Sabre, too.
  • ...2 more annotations...
  • full-content contracts are widespread between major airlines and the three major global distribution systems (Sabre, Amadeus, and Travelport), who act as middlemen for plane ticket sales worldwide.
  • Sabre argued that its fees are justified relative to the cost an airline would incur to distribute its fares comparably by other methods. It said consumers benefited by agents having a full array of options for price comparison.
  •  
    The role of GDSs in the travel industry has a major impact on revenue, competition, and reservations. In this article, Sabre, one of the largest known GDSs was sued by US Airways for failing to provide a fair contract to the airline. The lawyers from US Airways claimed that Sabre threatened to "cut off the airlines from a network of thousands of travel agents worldwide who depend on inventory that the tech giant provides via desktop software". The jury concluded that Sabre indeed violated antitrust law. Sabre, apparently, charged US Airways increased fees though their cost per transaction decreased because of the advances in technology. According to the article, Sabre argued that the fees were justified relative to the cost that an airline would incur to distribute its fares by other methods. This helped the agents have access to a plethora of information regarding price comparison. In my opinion, this is just a messy situation. However, it goes to show how important and how much of an impact that GDSs have on airline companies. They determine what consumers or agents readily see on the site. They determine how much of a presence a company has. The GDSs provide company information to a worldwide network that markets to consumers. Having a GDS system hold back or increase fees has proved to be detrimental. Ethical issues have come into play. The fact cannot be ignored that the technology being used by Sabre is helping lower cost for transactions. This decrease in cost should have resulted in a decrease in fees for the airlines. Nevertheless, the key to this article is that GDSs have the power (though Sabre did illegally) to determine which avenue a company goes through in regards to apparent competition and markets. The advancement of GDSs is resulting in lower cost transactions and giving agents and consumers "more bang for their buck". So it is important that the relationship between GDSs and airline companies remain ethical in all ways, especially dealing with
3More

10 Reasons Why Networking Is Essential For Your Career - 0 views

    • kcamp110
       
      " no man is an island"
  • Avenue for newer opportunities When people start noticing you, it opens the door for newer opportunities. Business and career-minded individuals who have networked over time have been able to expand with minimal effort because of the avenue of newer opportunities opened to them through networking. Opportunities like meeting the right clients or even meeting people that are superior to your career path could be a stepping stone that could change your life for the better
    • kcamp110
       
      10 Reasons Why Networking Is Essential For Your Career
27More

11 Tips to Improve Your Restaurant's Cyber Security in the COVID-19 Era | FSR magazine - 0 views

  • wealth of client data on tap from places with lax security
  • unknowingly serve credit card data to hackers. Due to the volume of credit card transactions and CRM data available, restaurants need to take cybersecurity seriously before a criminal gets wind of the vulnerability
  • A hacker only needs to gain access to a restaurant's POS system and install malware to steal customer credit card details.
  • ...20 more annotations...
  • Take Chipotle, for example. The company got devalued by about $400 million after they suffered a data breach.
    • anonymous
       
      Major consequences for restaurants if discovered as the link
  • because most go belly up six months after an attack.
  • Unprotected WiFi
  • Criminals pretend to be from the U.S. government and inform targets their COVID-19 stimulus check is ready, but they would need to verify the details of the recipient first before they can send it.
    • anonymous
       
      Low level scammer
  • CRM software data, which may include names, addresses, and even birthdays. One of the most common ways to achieve this sort of attack is via malware (malicious software). Hackers find a vulnerable backdoor to a restaurant's network to install malware on the POS system. Malicious code then records every transaction and every detail, sending it back to the criminal's server over the internet.
  • GrubHub drivers scam both the restaurants and the customers by marking the deliveries as complete and pocketing the tip money, without bothering even to pick up the order from the establishment.
    • anonymous
       
      AHHHH
  • Businesses are scrambling to find suppliers amidst the chaos, and criminals have been taking advantage of the confusion
  • Scammers are posing as representatives from the World Health Organization (WHO), the Center for Disease Control (CDC), and other public health agencies
  • social engineering on the restaurant staff to pull off phishing attacks.
  • PCI compliant.
  • conduct a risk analysis
  • hiring a security expert either full time or as a consultan
  • Secure your network and always change the free WiFi access point's password with a strong one every day.
  • latest operating system updates
  • Force multi-factor authentication
  • strong passwords
  • Ensure sensitive data encryption
  • web-filter to secure your WiFi network
  • Install a robust security software program on all computers and devices to block, detect, and clean malware.
  • Conduct regular cybersecurity training
  •  
    Restaurants have always been an easy target for cyber security hackers, in particular, hackers who are looking for credit card and ID information. Restaurants provide hackers with a "wealth of client data" due to the high "volume of credit card transactions and CRM data available." Once given access, a hacker could simple install malware and duplicate all customer information. Already facing critical financial issues during Covid 19, restaurants large and small need to take a stronger presence in the protection of their data. If discovered to be the start of a breach, customers will tend to avoid that business. "Chipotle, for example...got devalued by about $400 million after they suffered a breach," and many small restaurants "go belly up six months after an attack." Below is a summary of the types of attachs restaurants face: 1. Unprotected Wifi 2. Social engineering and phishing attacks. This is actually the one that stood out to me the most because of how sophisticated these attacks can be. It is a reminder that we are all at risk, both the technologically challenged and gifted. 3. Malware 4. Covid 19 Scams 5. Grub hub scams 6. Supply chain scams *A particular issue for restaurants and commercial businesses right now as companies scramble to find new vendors who can supply them with the products they require. 7. Public Health scams 8. Government Stimulus scams 9. Technical support scams How can we fight against these? Here are the recommendations: 1. PCI compliance 2. Hire and IT security professional to conduct a risk analysis and if possible, keep on as a consultant or full time 3. Keep a secure network and change free passwords daily 4. Use the latest operating systems, force multi-factor authentication, strong passwords, and use encryption services for data storage and transfers 5. Install and use robust web-filters and security software programs 6. Maybe most important!!! Train your employees. 5.
11More

Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer - 0 views

  • Internet-connected technology, also known as the Internet of Things (IoT), is now part of daily life, with smart assistants like Siri and Alexa
  • But of much greater concern, enterprises are unable to secure each and every device on their network, giving cybercriminals hold on their network hostage with just one insecure device.
  • There's no better example than Mirai, the botnet malware that knocked the world's biggest and most popular websites offline for few hours over a year ago.
  • ...7 more annotations...
  • Nicole Eagan, the CEO of cybersecurity company Darktrace, told attendees at an event in London on Thursday how cybercriminals hacked an unnamed casino through its Internet-connected thermometer in an aquarium in the lobby of the casino.
  • he hackers exploited a vulnerability in the thermostat to get a foothold in the network. Once there, they managed to access the high-roller database of gamblers and "then pulled it back across the network, out the thermostat, and up to the cloud."
  • compelling reminder that the IoT devices are theoretically vulnerable to being hacked or compromised.
  • Manufacturers majorly focus on performance and usability of IoT devices but ignore security measures and encryption mechanisms, which is why they are routinely being hacked.
  • Therefore, people can hardly do anything to protect themselves against these kinds of threats, until IoT device manufacturers timely secure and patch every security flaws or loopholes that might be present in their devices.
  • The best way you can protect is to connect only necessary devices to the network and place them behind a firewall.
  • educate yourself about IoT products.
  •  
    I found this article fascinating. It shows that no matter how much security we think we have, there will always be someone who is smart enough to hack you. We bring Smart devices into our homes and businesses to make our lives easier, yet these devices make us vulnerable to cyberattacks. In this article it details how a hacker(s) used a Smart thermostat located inside a fish tank to access and pull sensitive data out of a casino. I'll never look at the fancy aquariums in resorts/restaurants the same.
20More

Top Cybersecurity Tools for Business - 0 views

  • All cyber threats are not equal. Some may hold your data for ransom, while others may destroy your information for good.
  • Digital tech analysis firm Juniper Research predict that the cost of data breaches will rise from $3 trillion annually to over $5 trillion in 2024.
  • organizations should look to Next Generation Anti-Virus solutions (NGAV) to protect their assets. NGAV takes traditional AV and then adds advanced analytics, behavioral analysis powered in real-time by large scale cloud back-ends to thwart known and unknown attacks. Leading NGAV solutions include Sentinel One, Carbon Black, and CrowdStrike.
  • ...16 more annotations...
  • The National Institute of Standards and Technology (NIST) offers cybersecurity guidelines for best practices to manage cyber risk. These include identify, protect, detect, respond and recover. Another resource is the NCSA’s national program, CyberSecure My Business.
  • Firewall Often referred to as a company's "first line of defense," a firewall is a security control that filters and screens network traffic entering and exiting your corporate network.
  • People can rely on the password manager to create and store dozens of passwords in an encrypted database without having to remember them.
  • Password managers are quite helpful, and some are even free.
  • store the first part of sensitive site passwords
  • but keep the last few digits memorized and fill them manually.
  • This way, if there is ever a compromise of the password database, hackers don't have those full passwords.
  • You should also consider implementing multi-factor authentication (MFA). MFA authentication uses more than one thing or "factor" to log you in
  • , biometrics is part of this last category
  • SPAM & Malware filters screen email for unwanted and dangerous elements, blocking them before they ever reach your users.
  • In the world of cybersecurity, there's a phrase, "humans are the weakest link." An employee who accidentally clicks on the wrong link or email attachment can put in motion a chain of events that results in a cyber breach. Security awareness training is an anti-phishing tactic all organizations should employ.
  • RDP access must be protected by a VPN connection.
  • reduce the risk of getting hacked is to ensure your systems and software are updated regularly, or "patched.
  • patching shouldn't end with the operating system. Your patch program should also look to patch all other applications running on your systems
  • regardless of the security tools implemented to prevent a data breach, you should plan for a compromise occurring.  
  • That's where 24/7/365 network and endpoint monitoring comes in
  •  
    Cyber attacks open more and more often and varied since cybercriminals are becoming more cunning and their methods more challenging to detect. This article introduces some types of strategies implemented to protect companies' businesses from cyber threats and cybercriminals. Including using Anti-virus software, firewalls, password managers (very useful while some even free), VPN, patch management program which not only for operating program but also for other applications running on your system, consider the email SPAM/Malware filters and security awareness training for the employee since "humans are the weakest link." An employee who accidentally clicks on the wrong link can put in motion a chain of events that results in a cyber breach. Finally, plan a 24/7/365 network and endpoint monitoring.
22More

7 Steps to Securing Your Point-of-Sale System | PCMag - 0 views

  • Consider how the Target store hack in 2014 was one of the biggest point-of-sale (POS) system data breaches in United States history that exposed more than 70 million customer records to hackers, and cost the retailer's CEO and CIO their jobs. It was later revealed that the attack could have been avoided if Target had just implemented the auto-eradication feature within its FireEye anti-malware system.
  • the reality is that most POS attacks can be avoided.
  • be sure your company has a virtual private
  • ...18 more annotations...
  • network (VPN) in place to safeguard data that's traveling back and forth on your company's
  • network.
  • Most of the aforementioned attacks have been the result of malware applications loaded into
  • the POS system's memory.
  • important point to note here is that a second app must be running (in addition to the POS app),
  • This is why iOS has traditionally facilitated fewer attacks. Because iOS is only able to fully run one app at a time, these types of attacks rarely occur on Apple-made devices.
  • otherwise the attack can't occur.
  • Companies such as Verifone offer software that's designed to guarantee your customer's data is
  • never exposed to hackers.
  • These tools encrypt credit card information the second it's received on the POS device and once again when it's sent to the software's server. This means that the data is never vulnerable, regardless of where hackers might be installing malware.
  • install endpoint protection software on your device.
  • Employees can steal devices with POS software installed on them, or accidentally leave the device at the office or in a store, or lose the device. If devices are lost or stolen, anyone who then accesses the device and the software (especially if you didn't follow rule #2 above) will be able to view and steal customer records.
  • Systems that connect
  • to external networks are more susceptible to attacks from hackers
  • Consider keeping things internal and secure, use a corporate network to handle critical tasks like payment processing.
  • you'll want to comply with the Payment Card
  • Industry Data Security Standard (PCI DSS) across all card readers, networks, routers, servers, online shopping carts, and even paper files. The PCI Security Standards Council suggests companies actively monitor and take inventory of IT assets and business processes in order to
  • detect any vulnerability.
  •  
    Even though this article is from 2019 it is still extremely relevant today. POS systems are found in most hospitality outlets and the chances for a security breach are high. I have often thought when I had my credit card to a waiter and they are gone for 10 minutes are they copying the number, is it being added to a database that can then be hacked? The importance of having the proper securities in place, the proper malware and security software is really important. Having had a catering company for 20 years I had to do PCI compliance tests every 6 months and for years I just handed it over to my IT to do the test. He would suggest things to make us safer and since it usually cost money I would shake it off. It wasnt until the credit card processing company i was using had a security breach that I realized how important these PCI rules were. It is something going forward I will always pay attention to!
21More

Cyberattack on Luxury Resort Should Put Hospitality Industry on High Alert | Fisher Phi... - 0 views

  • Cyberattack on Luxury Resort Should Put Hospitality Industry on High Alert
  • Cybercriminals are finding new ways to hold their victims hostage
  • a recent cyberattack on a luxury resort should serve as a warning for your business.
  • ...17 more annotations...
  • The Allison Inn & Spa, recently fell prey to a ransomware attack that left its employees’ and guests’ personal information exposed
  • the stolen information – which includes data from 1,500 employees and more than 2,500 guests, including dates the guests stayed at the hotel as well as employees’ birthdays, phone numbers, and Social Security numbers – was posted on the public internet in easily searchable form.
  • Typically, stolen confidential information such as this is only published on the “dark web” and is not as easily retrieved through any type of online searches.
  • New Tactic Reveals New Dangers
  • If affected devices cannot be removed from the network (or if the network cannot be temporarily shut down), secure the network by powering down infected devices to avoid any further spread of the ransomware infection;
  • the public release of the confidential guest and employee data may have been an “experiment” to see whether it could further ratchet up pressure on the business to pay out the ransom.
  • this new tactic may be a trend we see from cybercriminals looking to extort their victims in future ransomware attacks.
  • they were hoping to force the business to pay them a ransom.
  • be prepared to implement comprehensive cybersecurity risk management processes.
  • Determine what systems were impacted and immediately isolate them
  • What Should Your Business Do?
  • Triage impacted systems for restoration and recovery
  • Engage your internal and external stakeholders
  • Retain legal counsel to provide guidance
  • Retain a third-party incident response provider
  • Report the incident to law enforcement
  • companies should consider deploying multifactor authentication in order to gain access to company networks, provide robust cybersecurity training to all employees on an annual basis, and maintain offline, encrypted backups of all internal data.
  •  
    Cybercriminals are constantly coming up with novel schemes to kidnap their victims. A recent cyberattack on a five-star resort should act as a cautionary tale for your company. In Oregon, the Allison Inn & Spa recently became the target of a ransomware assault that revealed the personal data of its staff and visitors. The stolen data was published in easily accessible form on the public internet and includes details from 1,500 employees and more than 2,500 guests, including dates of the guests' hotel stays as well as employee birthdays, phone numbers, and Social Security numbers. The "dark web" is typically the only place where stolen private information like this is released, making it harder to find through regular online searches. The goal of the cybercriminals was to coerce the company into paying a ransom. The public disclosure of the private visitor and staff information seems to have been an "experiment" to see if it would increase pressure on the company to pay the ransom. Cybercriminals may use this new strategy frequently in the future to demand ransom from their victims. The implementation of thorough cybersecurity risk management procedures should be considered by resorts. In the event of a cybersecurity attack, determine which systems were affected by the attack and immediately isolate them. Then, prioritize those systems for restoration and recovery. After which, involve internal and external stakeholders and retain legal counsel for advice. It is crucial that you hire a third-party incident response provider and notify law enforcement. Multifactor authentication should be used by businesses to protect network access, and they should also annually train all staff in cybersecurity best practices and keep offline encrypted backups of all internal data.
19More

Hospitality unions have spent a decade fighting to protect workers, bu - 1 views

  • cheap gadgets might bring new problems
  • The hospitality industry is in the process of introducing remote panic buttons in an effort to address the widespread issue of violence and sexual assault against hotel staff
  • 20,000 hotel properties in Canada and the United States have committed to providing an estimated 1.2 million employees with Employee Safety Devices
  • ...15 more annotations...
  • all housekeeping staff to carry a panic button device on them at all times
  • low-quality versions of the technology that pose significant privacy and security risks to the people who carry them. Weak password protections and a lack of encryption leave users vulnerable to cyberattacks, which could render the devices unusable—or, worse, be used to invade hotel employees’ privacy
  • 58% of hotel workers and 77% of casino workers have been sexually harassed by a guest. Nearly half have had guests answer the door naked or expose themselves, and nearly 15% have been cornered.
  • casino giants MGM Resorts International and Caesars Entertainment agreed to equip nearly 38,000 hotel staff with safety devices during contract negotiations
  • the CEOs of a number of major hotel chains—including Hilton, Hyatt, IHG, Marriott, and Wyndham—joined the pledge
  • Safe but insecureThe discovery of vulnerabilities in certain versions of this technology may pose a potential challenge
  • lack of encryption that compromised the device’s security
  • the software powering the tracker was hosted on a cloud-based service, which it used to communicate with a mobile application. But the cloud software didn’t require any authorization. A hacker could connect to the service and “instruct any tracker in the world to do things,” he explains.
  • Among the vulnerabilities a hacker could exploit are the ability to see the real-time location of users and to gain access to built-in microphones and cameras
  • That poses a problem for the hotel industry, Hron believes, because establishments not  bound by union or legislative requirements may buy inferior devices without vetting them properly, merely to satisfy new regulations. “Each hotel is buying these devices themselves—it’s not like some central authority is giving these devices to hotels,” he says. “My guess is [some are] going to buy a cheap device, and in this case, it’s pretty reasonable to think that there aren’t any analysts doing security checks on them.”
  • The lack of clear legislation also leaves workers vulnerable in jurisdictions that don’t explicitly ban employers using the devices to track the movements of hotel staff
  • technology isn’t capable of real-time tracking because it runs on WiFi and Bluetooth Low Energy, or BLE, and only transmits a signal when activated. Other devices that utilize GPS or WiFi connectivity, however, have the ability to transmit real-time location data on an ongoing basis
  • “The technology has to work every time, but the product only works if the right policies, procedures, and personnel are put in place that allow the system to function as a system
  • While the initial reason for the solution was to address sexual assault, there are other things that happen to housekeepers in hotel rooms as well,” says Ogle. “We’ve had team members that have had medical issues themselves, or found guests in rooms with medical conditions that were asking for assistance
  • Providing precise location data to first responders in the event of an emergency actually has the potential to save lives, but the technology will only be adopted if users believe it is being used appropriately
  •  
    The major hotel chains are influencing legislation and also now requiring employee safety devices (ESDs) to make the workplace safer for employees (i.e. room service attendants or housekeepers) who find themselves alone in guest rooms with ill-intentioned guests. ESDs can also be appropriate for large resorts with beach personnel, activities personnel, or other positions that find themselves in enclosed, or remote areas with less security. Not every hotel has a security department that can constantly monitor cameras and ESDs. Will these devices present more strain on hotel wireless networks? That depends. Hoteliers need to consider whether these devices will be provided by or monitored through their keylock vendor, through their guest room entertainment vendor, or through a wireless provider. Could there be a benefit to an ESD interface with the PMS? I'm not finding an obvious answer. Hotels, varying in room count, are providing ESDs that range from whistles to wireless to BLE or RFID enabled. Hotel owners and management companies have the responsibility to research the most appropriate solution for their hotel without undermining the safety and privacy of their employees and their hotel networks.
« First ‹ Previous 121 - 140 of 768 Next › Last »
Showing 20 items per page