Skip to main content

Home/ Hospitality Technology/ Group items matching "hacker" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Disney shuts down Playdom forums after suffering data breach, over 350,000 users' data ... - 0 views

  •  
    This article is about the 2016 disney security breach that attached their Playdom platform and exposed thousands of people personal data.
1More

Mickey Mouse Club had Mickey Mouse security: Disney's Playdom forum pours out passwords... - 0 views

  •  
    The article deals with the 2016 cyber attach on disney
1More

The Likely Reason Disney+ Accounts Are Getting 'Hacked' | WIRED - 0 views

  •  
    This article deals with a disney cyber security breach that occurred in 2019.
10More

How to keep guests safe from a point-of-sale system data breach | Hotel Management - 0 views

  • many all-in-one point-of-sale systems are vulnerable to a wide variety of attack scenarios because they leave card data in plain text within the memory of the system, there are systems and additional technologies that can mitigate a data breach.
  • Hackers heavily target POS systems because they typically hold consumer’s personal and financial data
  • The fact that POS systems are the largest attack vector makes it the obvious starting point for businesses to lock down
  • ...6 more annotations...
  • “If your business is the victim of an attack, early discovery can limit the extent of the damage,
  • are performance.
  • Malware attacks often leave indicators or evidence through diminished softw
  • Mobility is now absolutely essential in POS systems,
  • From a food-and-beverage perspective, hoteliers, with the help of tablets, can expand the footprint of their restaurant by extending service to outdoor patios and poolside.
  • The consumer’s expectation is to lower transaction time and increase self-sufficiency when purchasing in any environment
  •  
    A food and beverage point of sale system is more likely to get hacked than any other technology, because it stores customer payment information.
11More

Three Basic Steps to Security | Hospitality Technology - 0 views

  • mind the three Ps: patches, people and passwords
  • A lot of breaches occur because software is not up to date
    • anonymous
       
      Patches It is always important to keep systems up to date that way you can keep tabs on everything and know exactly what is going accurately. It also makes it more efficient.
  • It is good policy to change a passcode every 30 days, but it gets confusing. People revert to things easily hacked and guessable
    • anonymous
       
      Pass-codes Although people want to keep their passwords easy and simple sometimes this isn't the best strategy. It works best if you think of something that most people wouldn't be able to guess so easily. Pass codes should definitely contain numbers and words, but most importantly they should be something that YOU will always remember that way you won't forget it.
  • ...4 more annotations...
  • using a pass phrase that is from something easy to remember, such as a line from a favorite song or nursery rhyme plus some numbers
  • More than half of users reuse the same password on different systems
  • How do you off board someone properly? You go through and change all things to make sure they’re locked out and to make sure they can’t do anything tricky” such as copy files or create a backdoor
    • anonymous
       
      People Making sure those who leave leave properly is equally as important as making sure those who enter enter the business the right way. You have to make sure that the people who leave are not gonna be planning anything against your business. Take the proper precautions and be aware of anything and everything.
  • These basics are a good starting point and can help deter hackers
  •  
    The article discusses three key points to keep in mind for a better security within a hotel according to Russ Schrader from NCSA.
12More

Hotels, Technology, & the Cybersecurity that Protects Them - Armor - 0 views

  • Hotels, Technology, & the Cybersecurity that Protects Them
  • introduction of virtual assistants like Alexa in hotel rooms
  • biometrics for guest access into their rooms instead of the standard room keys
  • ...9 more annotations...
  • The 2018 Trustwave Global Security Report listed the hospitality industry as one of the top five industries subjected to network breaches each year. The more technology added to help guests also means the industry needs to think harder about how they store and protect their guests’ data. If a hacker compromises the technology or infrastructure environment where guest data resides, guests could have their personal data compromised.
  • mobile keys
  • hat’s most worrisome is the amount of information collected and stored by Internet of Things (IoT) devices, like these virtual assistants and the mobile keys solution. After all, personal data has always been a prized target of cybercriminals.
  • register your fingerprint at the front desk
  • the balance between usability and security for their apps and software is critical.
  • Consumers, who are most likely to be victims, have their share of responsibilities.
  • osting on social media about how fun a vacation is could notify attackers that your valuables are sitting at home unprotected
  • it’s the hotel’s IT infrastructure that’s usually the targe
  • Unfortunately, most hotels do not have a dedicated on-site cybersecurity staff (or even IT staff for that matter).
8More

Is the Future of Hotel Property Management Systems in the Cloud? | By Dean Minett - Hos... - 1 views

  • The internal server has been a standard fixture of hotels for a few decades now
  • The majority of hotels continue to operate internal servers today. Why? Convenience, security and economy are the main reasons. In many cases, these systems continue to perform reliably and the case for adopting a new way of doing things is simply not compelling enough..
  • Cloud-based property management systems know that a major security breach would be fatal to their business, so they have to invest constantly in security upgrades. Overall, their servers are better equipped to protect against viruses and security breaches.
  • ...2 more annotations...
  • given all the other benefits of cloud computing, it's difficult to argue that in-house software is a better solution.
  • Internet is a must for any cloud-based PMS. If your connection goes, so will your ability to use the PMS. Investing in a PMS before you invest in rock solid data infrastructure is therefore not the best decision.
  •  
    Cloud computing is ever-evolving and I wonder if it's just today's hype and a trend. As this article shows, cloud computing has a huge impact on PMS. Imagine this: If your hotel is using a cloud-based PMS and you lose your internet connection. What do you do? Hoteliers need a strong case indeed before they entrust their valuable operations and data into these cloud computing providers. In the perspective of a hotelier, I'd be worried.
  •  
    I found this article interesting for this week because it is about Property Management Systems being on the cloud. The author states that many hotels chose to use internal servers because of the convenience, security and the economy. "Cloud-based property management systems know that a major security breach would be fatal to their business, so they have to invest constantly in security upgrades." As a future manager, this is comforting to know because at least these companies know the amount of hackers out there and how important security is for hotels. Another important concern mentioned on the article, is the maintenance and updates. Whenever, the internet goes away and you are on a cloud system, there goes your system. "Investing in a PMS before you invest in rock solid data infrastructure is therefore not the best decision." In conclusion, the cloud based systems are slowly increasing but they have a lot of pros and cons, especially due to the hacking and chaos it may cause a hotel if the internet goes down.
  •  
    Having the property management system in the cloud might be a useful concept but it does bring up a lot of security concerns. Maybe the change should be implemented once a security software has been created that can withstand a breach. But then we know that is not something most companies would wait for. Especially when using the cloud would save them money in the long run.
3More

The Future of the Hotel Industry in 2020: A session with Peter O'Connor - 0 views

  • linked to this lack of integration is data protection and privacy. Hotels have been a prime target for hackers and therefore there are severe limitations in place with regards to what can be stored on the guest. This limits any guest-centric, data focused development
  • Direct bookings are more expensive to obtain than ever before. Why? Hotels are simply not getting enough direct business to water down the costs of driving the traffic, developing websites and converting the customer
  •  
    The Future of hotel industry on 2020 reflecting the growth of peer to peer such as AirBNB, Hotels need to use all this data to be hand of the game or keeping up other industries. 
12More

MGM Resorts falls victim to data breach | PhocusWire - 1 views

  • MGM Resorts International is the latest travel brand to suffer a security attack involving customer details, in an incident that took place last summer.
  • Details of the incident were uncovered last week by ZDNet, which says the personal details of more than 10 million customers were shared on a hacking forum.
  • “unauthorized access to a cloud server.”
  • ...6 more annotations...
  • He adds that companies should also monitor for leaks of the data.
  • a dark web monitoring specialist, says this kind of incident can be avoided by regularly checking who has access to cloud-based servers:
  • “confident that no financial, payment card or password data was involved in this matter."
  • “This incident also highlights the importance of speed when mitigating digital risk; watermarking data with unique synthetic identities can enable organizations to detect these threats immediately and be the first to find out if their data is available online, before someone else does. Setting up email listeners for these watermark identities can detect a breach before the data is shared online, if the hacker is testing for valid addresses.”
  • advises that the same security levels for data on premise need to be in place for what is stored in the cloud.
  • It’s a near-universal challenge for enterprises: the move to hybrid environments and more complex, fragmented networks makes it even harder to keep control. Without consistent policies you can pretty soon have a tangle of security gaps and compliance violation
  •  
    MGM Resorts falls victim to data breach last summer, more than 10 million customers' information were leaked out. It was took place through "unauthorized access to a cloud server." However, specialist said this breach can be avoided by regularly checking and monitoring. Also, specialist advised that MGM also need to take same security levels for data on premise in their could.
  •  
    It was reported that MGM Resorts fell victim to a data breach on a cloud server but not much critical guest information was leaked out. Experts said that this kind of breach can be avoided by checking who was able to access the server regularly. Also, the company needs to monitor data to find out the leakage earlier than anyone else. Monitoring the data stored on the cloud should also be as important as those stored on-site.
  •  
    the article gives details about a data security breach that the company was a victim of and how information of 10 million customers were shared .
9More

Survey Shows US Cybersecurity Attacks Costing Orgs More Money - 0 views

  • Survey Shows US Cybersecurity Attacks Costing Orgs More Money
  • Cybersecurity attacks are leading to estimated financial losses of an average of $884,000, according to an IDG survey.
  • "As organizations prepare for various attacks and breaches, hackers continue to be savvier in their approaches,”
  • ...6 more annotations...
  • “Resilient organizations must have all employees embrace security practices, from awareness training to behavior monitoring to gap protections."
  • Firewalls, spam filtering, network-based antivirus tools, access controls, and encryption were listed as the most effective solutions for detecting or deterring external threat factors.
  • The top three types of cybersecurity incidents also differ depending on whether it was an insider or outsider threat. The report found that outsider threats tend to consist of the following: Unauthorized access to/use of information, systems, or networks Customer records compromised or stolen Confidential records (trade secrets or intellectual property) compromised or stolen
  • The average cost of a data breach is $3.62 million globally, according to the 2017 Cost of a Data Breach Study: Global Overview sponsored by IBM Security and conducted by Ponemon Institute.
  • "Data breaches and the implications associated continue to be an unfortunate reality for today's businesses," Ponemon Institute Chairman and Founder Dr. Larry Ponemon said in a statement. "Year-over-year we see the tremendous cost burden that organizations face following a data breach.”
  • Cybersecurity incidents stemming from insider threats will include private or sensitive information being unintentionally exposed, customer records being compromised or stolen, and employee records being compromised or stolen.
19More

Council Post: Cybersecurity As We Know It Is About To Change - 0 views

  • the global cybersecurity market is set to increase to $270 billion by 2026. This signals the priority boardrooms have placed on cyber risk management even as digital transformation takes place en masse.
  • COVID-19 has become the catalyst to trigger change in the ways we manage and operate technology.
  • Virtual desktops emulate a computer system so that IT can control access as such adding input/output devices as well as software and applications. This could become an important control point when remote workers are operating outside the safety of a corporate network.
  • ...15 more annotations...
  • Telecommuting Is The Only Way Of Working For Many
  • With swift digitalization, security controls will shift to data sources, similar to the trend witnessed in IoT.
  • With millions of employees working from home, hackers’ focus has shifted from enterprise to remote working individuals. To handle the menace that exists in cyberspace, decentralized cybersecurity will rise where greater emphasis will be placed on data sources such as actual remote employees themselves.
  • User access controls have largely revolved around single or two-factor authentication. These methods rely on “something you know (username)” and “something you have (password).”
  • This means identity protection will be a top priority, and the best defense should involve building authentication systems that focus on “who you are.” This would require advanced biometric solutions such as fingerprint/thumbprint/handprint, retina, iris, voice and other facial recognition technologies.
  • The current state of privacy regulations is designed around the enterprise network and building the proverbial wall to keep sensitive data out of prying eyes.
  • With the remote working concept taking center stage, re-evaluation of these policies is needed to address the new cyberthreats.
  • From a risk management perspective, global privacy policies will need to encapsulate standard operating procedures regarding BYOD, GDPR compliance and state privacy laws.
  • The shift to cloud services offers employees, customers, suppliers and everyone else across the ecosystem a seamless and frictionless way to access data and applications. Remote access by various users would compound security challenges and present many new potential attack vectors. In the post-pandemic world, IT resources could shift toward data, particularly keeping data secure across cloud platforms.
  • This will facilitate cybersecurity teams to apply varied access controls and demarcate data storage to minimize the risk of cyber intrusion and data breach.
  • Innovative technologies such as ML/AI and AR/VR will see greater adoption. As we have already witnessed, video conferencing applications will continue to rise as non-contact interactions surge.
  • Sectors such as retail, hospitality and manufacturing will layer their adoption of robotics with added AR/VR capabilities.
  • Cybersecurity teams that are saddled with an events-based approach will be overly burdened with triages when a cyber breach occurs. By embracing an intelligence-driven approach, businesses can digitalize confidently with external threat intelligence as the guiding beacon.
  • Social engineering techniques to trick untrained and unsuspecting employees, third parties and contractors into releasing confidential information or letting an intruder into a corporate network will also intensify accordingly.
  • Cybersecurity awareness training for people across the entire supply chain and ecosystem will prevail.
  •  
    By 2026, the investment in cybersecurity will increase to $270 billion globally. After the COVID-19 pandemic companies will need to reevaluate their cybersecurity systems to adapt to telecommuting as many companies will have some of their employees working from home. Biometric security such as a fingerprint or iris scan will become more common as the typical password will no longer be as secure as it once was.
5More

The Features and Benefits of Hotel Property Management Systems | by Onix-Systems | Medium - 2 views

  • A centralized computer system allows to organize, schedule, and perform the day-to-day functions and transactions in hospitality accommodations and residential and commercial rental properties.
  • All hotel PMS include the critical modules of reservation, front-desk operations, and housekeeping. On top of all that, modern hotel PMS solutions include a range of features that promote the delivery of flawless personalized guest experiences.
  • A good hotel PMS should allow reservations for large groups, meetings, incentives, conferencing, and exhibitions, activity booking, and adding hotel amenity packages. Ideally, it should support mobile booking as well.
  • ...1 more annotation...
  • The POS function of hotel operating systems helps manage all payments accepted through multiple point-of-sale terminals smoothly, automates transactions, and keeps the data in one location.
  •  
    Hotels implementing PMS into their day-to-day operations is the key for a successful and smoothly operating system. Having a PMS system allows for hotels to includes modules for their guests giving them the ultimate experience. For example, reservations, front desk operations, housekeeping, and a range of other features that allows each guests experience to be personalized to themselves. PMS is essential when it comes to hospitality, as it allows for everything to continuously run like a well-oiled machine.
20More

Top Cybersecurity Tools for Business - 0 views

  • All cyber threats are not equal. Some may hold your data for ransom, while others may destroy your information for good.
  • Digital tech analysis firm Juniper Research predict that the cost of data breaches will rise from $3 trillion annually to over $5 trillion in 2024.
  • organizations should look to Next Generation Anti-Virus solutions (NGAV) to protect their assets. NGAV takes traditional AV and then adds advanced analytics, behavioral analysis powered in real-time by large scale cloud back-ends to thwart known and unknown attacks. Leading NGAV solutions include Sentinel One, Carbon Black, and CrowdStrike.
  • ...16 more annotations...
  • The National Institute of Standards and Technology (NIST) offers cybersecurity guidelines for best practices to manage cyber risk. These include identify, protect, detect, respond and recover. Another resource is the NCSA’s national program, CyberSecure My Business.
  • This way, if there is ever a compromise of the password database, hackers don't have those full passwords.
  • People can rely on the password manager to create and store dozens of passwords in an encrypted database without having to remember them.
  • Password managers are quite helpful, and some are even free.
  • store the first part of sensitive site passwords
  • but keep the last few digits memorized and fill them manually.
  • Firewall Often referred to as a company's "first line of defense," a firewall is a security control that filters and screens network traffic entering and exiting your corporate network.
  • You should also consider implementing multi-factor authentication (MFA). MFA authentication uses more than one thing or "factor" to log you in
  • , biometrics is part of this last category
  • SPAM & Malware filters screen email for unwanted and dangerous elements, blocking them before they ever reach your users.
  • In the world of cybersecurity, there's a phrase, "humans are the weakest link." An employee who accidentally clicks on the wrong link or email attachment can put in motion a chain of events that results in a cyber breach. Security awareness training is an anti-phishing tactic all organizations should employ.
  • RDP access must be protected by a VPN connection.
  • reduce the risk of getting hacked is to ensure your systems and software are updated regularly, or "patched.
  • patching shouldn't end with the operating system. Your patch program should also look to patch all other applications running on your systems
  • regardless of the security tools implemented to prevent a data breach, you should plan for a compromise occurring.  
  • That's where 24/7/365 network and endpoint monitoring comes in
  •  
    Cyber attacks open more and more often and varied since cybercriminals are becoming more cunning and their methods more challenging to detect. This article introduces some types of strategies implemented to protect companies' businesses from cyber threats and cybercriminals. Including using Anti-virus software, firewalls, password managers (very useful while some even free), VPN, patch management program which not only for operating program but also for other applications running on your system, consider the email SPAM/Malware filters and security awareness training for the employee since "humans are the weakest link." An employee who accidentally clicks on the wrong link can put in motion a chain of events that results in a cyber breach. Finally, plan a 24/7/365 network and endpoint monitoring.
19More

New Hotel Technology Likely to Bring Sticker Shock - 3 views

  • The need for a new generation of computers, data centers and security equipment for the nation’s hotels is driving up the expense of technology in the hospitality industry,
  • The average [technology] cost for a 400-room hotel has been about $50,000 a year. That   cost is going to go up as the brands start implementing new technology to take the place of systems that have been in place for quite some time,” says Shah.   “That cost could be significant. It could be several hundred thousand dollars in additional costs over the next three, four or five years.“
  • “The average [technology] cost for a 400-room hotel has been about $50,000 a year. That   cost is going to go up as the brands start implementing new technology to take the place of systems that have been in place for quite some time,” says Shah.   “That cost could be significant. It could be several hundred thousand dollars in additional costs over the next three, four or five years.“
  • ...15 more annotations...
  • The hotel industry hasn’t kept up with the state of the art to the degree other industries have, says Shah, particularly with regard to pricing and customer convenience.
  • significant. It could be several hundred thousand dollars in additional costs over the next three, four or five years.“
  • The need for a new generation of computers, data centers and security equipment for the nation’s hotels is driving up the expense of technology in the hospitality industry, says Mitesh Shah, chief executive officer at
  •  The average [technology] cost for a 400-room hotel has been about $50,000 a year. That  cost is going to go up as the brands start implementing new technology to take the place of systems that have been in place for quite some time,” says Shah.   “That cost could be  significant. It could be several hundred thousand dollars in additional costs over the next three, four or five years.“
  • The upgrades involve both communications that make life more convenient for travelers, and the unseen hardware that makes hotels function more smoothly.
  • Hackers are more aggressive than ever, and the cost of protecting hotel systems has risen accordingly
  • cost is going to go up as the brands start implementing new technology to take the place of systems that have been in place for quite some time,” says Shah. 
  • Traditionally, too many hotel managers focus on the condition of the carpets and walls  — whether they need painting or new pictures, or fresh plants in the lobby, rather than scrutinizing their technological infrastructure.
  • Examining how people buy and use media shows that bandwidths are growing more sophisticated, and the trend in a hotel experience is to become more connected,
  • And too many hotels are unable to provide that level of technical response.
  • Costly upgrades don’t always translate into higher rates, however. “The question really is, can you charge more for it? Or is it part of the experience?”
  • high-speed Internet, for instance, it’s an amenity that customers demand, but they’re not necessarily willing to pay extra for it.
  • Another expense involves business intelligence technology — the detailed analysis and tracking of a hotel’s daily, weekly, monthly, and quarterly performance.
  • Operating teams then analyze the results and plan their financial strategy on a day-to-day basis, says Shah.
  • When it comes to creature comforts, travelers don’t want to compromise, says Shah. They want the same comforts on the road that are available at home
  •  
    The Hotel Industry has not kept up with the state of the art technology to the degree other industries have. It's at a point where a great investment is needed to upgrade technology they use both in communications as well as the unseen hardware that make hotels function on a day to day basis. The cost of replacement and and expansion of business data centers and security is very large. But who bears the cost?, since guests have come to expect ammenities such as high speed internet, but aren't necessarily willing to pay for it. This is an inevitable cost hotel corporations are going to have work in to their budgets in order to stay relevant and competitive
15More

Why cybersecurity matters | Hotel Management - 0 views

  • Cybersecurity is not just a buzzword. In today’s technology-abundant world, it has become a critical undertaking for companies across all industries—including hospitality.
  • Trustwave’s "2018 Global Security Report" lists hospitality as one of the top three industries most vulnerable to payment card breaches. Other estimates project that hotels are the unwelcome recipients of around 20 percent of all cyberattacks.
  • Additional anecdotal evidence supports these numbers. One need not look further than Marriott International’s Starwood Hotels & Resorts Worldwide group, which recently disclosed the theft of more than 25 million passport numbers and 380 million unique guests’ personal information.
  • ...9 more annotations...
  • After all, the industry has been and continues to be focused on cultivating a user-friendly atmosphere. Unfortunately, for hackers this combination is nothing short of a gold mine.
  • Since a businesses' hard-earned reputation relies heavily on instilling confidence in its customer base, a breach of trust is sure to compromise that relationship. If an attack affects millions and is publicized to millions more, the impact on brand equity can be difficult to recover. 
  • Marriott, for instance, was criticized not only for the breach, but also for responding inadequately and unprofessionally.
  • In short, as more and more consumers become aware of the importance of reliable cybersecurity, a hotel that neglects this pain point is compromising the strength of its product among its competitive set. 
  • Considering that the annual frequency and severity of cyberattacks are only rising, the time is now to establish organizationwide security operations, recovery plans and budget allocations.
  • a cohesive top-to-bottom strategy is required and often is best delegated to a trusted strategic advisor with depth of experience in cybersecurity breach prevention and resolution.
  • Next, the goal becomes full-scale protection. From the technical side, this includes setting up firewalls and securing weak points (such as point-of-sale terminals).
  • There needs to be an efficient method for detecting the attack and mitigating any damages. Lastly, to avoid the pitfalls noted above, a predetermined plan to address this worst-case scenario is vital. From reviewing insurance policies to preparing for impending litigation, recovery is a process best started with a go-to advisor before it is needed. 
  • The only way to avoid being another statistic in future Internet crime reports is by staying as ahead of the looming threats as possible.
  •  
    This article talks about how cyber security is very important to the safety of the personal information.
  •  
    Author, Lena Combs, discusses why hospitality has become vulnerable to cyber attack. Ranging from the failure to secure POS systems and credit card data. To hotels' inability to detect and effectively respond to potential cyber threats. Combs outlines the steps involved in implementing a cohesive top- to bottom strategy that will effectively address these dilemmas. More importantly, why doing so protects a hotel's bottom line and brand positioning.
  •  
    The following article highlights the importance of cybersecurity in general and why it is especially important in the hotel industry. This highlights many facets, one being the fact that the hotel industry is one of the most vulnerable to cyber-attacks, therefore, needing to have top-notch cybersecurity.
19More

Data Security in the Hospitality Industry | CSU-Global Blog - 0 views

  • Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there’s a franchisor, an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. In fact, it was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • Well-trained staff also know how to recognize social engineering attempts, and they understand an organization’s compliance requirements. The risk is that the hospitality industry involves a great deal of of seasonal work in which people might move on after only a few months, or they might be transferred.
  • ...14 more annotations...
  • This type of data risk is more subtle, and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests’ data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data.
  • the job turnover rate in hospitality is as high as 90 percent
  • High Staff Turnover
  • From the perspective of cyber criminals, hospitality appears to offer an ideal target for conducting crimes, such as identity theft and credit card fraud, due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • Information security is a pivotal aspect of many industries
  • Complex Ownership Structures
  • Reliance on Paying By Card
  • Here are five of the biggest data security concerns in the hospitality industry:
  • Compliance
  • Insider Threats
  • Best data-protection practices for companies in the hospitality sector include… Always encrypting payment card information.Operating a continuous training program in cybersecurity to maintain a well-trained workforce.Always adhering to relevant regulations, such as PCI DSS.Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats.Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker.Know where your data is and enforce the principle of least privileges to limit acce
  • ss to sensitive information.
  • organizations in the hospitality sector are better placed to implement a comprehensive information security strategy that entails the necessary procedures, processes, and people to improve cybersecurity within the hospitality industry.
  •  
    The article talks about cyber security threats in the hospitality industry. Threats range from high staff turn over so staff isn't trained thoroughly, to insider threats where employees can sell information to third parties, to Cyber-criminals who infect POS systems with credit cards.
  •  
    Data information security is very important to a business development.In my opinion, I think the relationship is inversely proportional. In other words, the more effective cyber security budget is invested, the less potential impact there is of customer information being stolen (being hacked). Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
9More

Highly connected hotel industry continues to be vulnerable to cyber attacks | PhocusWire - 0 views

  • cyber threats in hospitality, which claims there have been 13 “notable data breaches” in the industry in the past three years.
  • PwC’s Hotels Outlook report 2018 to 2022 which says hospitality has the second-largest number of cybersecurity breaches after the retail sector.
  • factors which make them attractive to fraudsters such as the volume of financial transactions that hotels carry out, the sensitive and valuable personal data collected, use of loyalty programs and their national and international spread.
  • ...5 more annotations...
  • dark web “chatter’ breakdown reveals Hilton had a 31% share of mentions on hacker forums followed by Marriott at 28% and IHG at 19%
  • Marriot recently revealed that its data security breach had cost the company $28 million.
  • It’s unsurprising that as the aviation industry grows and airlines look to adapt their distribution models, cyber attacks and other fraudulent activity also increases.
  • Air Europa says that as it went through its digital transformation, it needed to handle fraud more efficiently.
  • the airline industry saw a 29% decrease in fraud attacks in 2018, but the company attributes that the large data hacks involving passport details have not yet “been reused to commit air travel fraud.” 
  •  
    This article talks about how the hospitality industry has become more susceptible to cyber-attacks. Hotel companies like the Marriott have faced costly fraudulent cases online and have implemented new programs to ensure safety and security.
7More

What Have Hotels Done on Cybersecurity Since the Marriott Hack? - Skift - 0 views

  • Faced with the possibility of such intrusions, hotels are now turning to outside companies to protect their customers’ data
  • Hilton in 2017 had to pay $700,000 to New York and Vermont to resolve two data breaches that resulted in more than 363,000 credit card numbers being compromised.
  • California law that is intended to protect consumers from having their data sold without their consent or knowledge. The law was passed in 2018 after Cambridge Analytica got access to private information from Facebook. The California Consumer Privacy Act goes into effect Jan. 1.
  • ...3 more annotations...
  • “Companies are still struggling somewhat in finding a budget for this effort,” she said. “It’s not something that many businesses want to spend money on. Compliance is pretty thankless.”
  • Hyatt Hotels earlier this year launched a “public bug bounty” program with cybersecurity company HackerOne that allows ethical Hackers to test its websites and mobile apps for vulnerabilities.
  • Joe Saracino, CEO of Cino, said that the hotel industry is starting to be more proactive to prevent more breaches.
  •  
    This article talks about Marriott's data breach. It talks about what other companies that have also been affected are doing. California has passed an act that protects guest information. The new law is a bit challenging for smaller businesses that dont typically have any IT onsite.
53More

Technology in the Hospitality Industry - Have We Gone Too Far? | By Court Williams &amp... - 3 views

  • The hospitality industry is changing, and is rapidly becoming super high-tech.
    • kaylaabad
       
      The hospitality industry is changing, and is rapidly becoming super high-tech.
  • On arrival at their destination, guests no longer need to wait in line for the key to their room. They can now check in and out using electronic kiosks, online and mobile check-ins. Automated payments and the use of smartphones for keyless entry, making requests, online purchases, or even placing room service orders makes self-service an attractive option.
    • kaylaabad
       
      Arrival technology - On arrival at their destination, guests no longer need to wait in line for the key to their room. They can now check in and out using electronic kiosks, online and mobile check-ins. Automated payments and the use of smartphones for keyless entry, making requests, online purchases, or even placing room service orders makes self-service an attractive option.
  • With the advent of technology, however, many activities previously performed by live humans have been replaced by automated methods, mainly in the attempt to streamline functionality and improve service
    • kaylaabad
       
      With the advent of technology, however, many activities previously performed by live humans have been replaced by automated methods, mainly in the attempt to streamline functionality and improve service
  • ...23 more annotations...
  • With the rising popularity of online reviews, hospitality guests now have the ability to research any venue to see what others have posted.
    • kaylaabad
       
      Pro:With the rising popularity of online reviews, hospitality guests now have the ability to research any venue to see what others have posted.
  • Both review websites and social media platforms have become active gateways to global opinion, and travelers use these extensively to help them decide where to book
    • kaylaabad
       
      Pro:Both review websites and social media platforms have become active gateways to global opinion, and travelers use these extensively to help them decide where to book
  • Technology is shaping how lodgings and restaurants are found and booked
    • kaylaabad
       
      Technology is shaping how lodgings and restaurants are found and booked
  • Improving a guest's experience depends on the ability to identify the individual guest's preferences. The best way to determine these is by collecting data from first-, second- and third-party sources, combining and analyzing it effectively.
    • kaylaabad
       
      Data has enhanced guest experience: Improving a guest's experience depends on the ability to identify the individual guest's preferences. The best way to determine these is by collecting data from first-, second- and third-party sources, combining and analyzing it effectively.
  • Theoretically, it should improve the customer experience, particularly through the use of data collected by using the various technologies
    • kaylaabad
       
      Theoretically, it should improve the customer experience, particularly through the use of data collected by using the various technologies
  • We have also seen the emergence of cost-saving technologies that not only focus on guest loyalty but also reduce fixed costs and overheads.
    • kaylaabad
       
      Pro: We have also seen the emergence of cost-saving technologies that not only focus on guest loyalty but also reduce fixed costs and overheads.
  • statistics that show an undoubtedly positive response to technology,
    • kaylaabad
       
      Technology in the industry is well received
  • Biometric authentication offers the most secure method of proving identity that's currently available, and the hospitality industry has been quick to realize the need for this level of safety.
    • kaylaabad
       
      Technology has improved security: Biometric authentication offers the most secure method of proving identity that's currently available, and the hospitality industry has been quick to realize the need for this level of safety.
  • guests can now control all the functions of the room from a single device
    • kaylaabad
       
      Pro: guests can now control all the functions of the room from a single device
  • two-thirds of U.S. hotel guest respondents felt it was either "extremely important" or "very important" for hotels to continue investing in technology to enhance the guest experience.
    • kaylaabad
       
      two-thirds of U.S. hotel guest respondents felt it was either "extremely important" or "very important" for hotels to continue investing in technology to enhance the guest experience.
  • it seems travelers of all ages are keen to make the most of online hotel reservations and reviews
  • hey understand the need for (and value of) using technology to support the guest experience, and although they are rapidly embracing many aspects of this brave new world, they still need to be able to consult with a human being if required.
    • kaylaabad
       
      They appreciate t hey understand the need for (and value of) using technology to support the guest experience, and although they are rapidly embracing many aspects of this brave new world, they still need to be able to consult with a human being if required.
  • it seems travelers of all ages are keen to make the most of online hotel reservations and reviews
    • kaylaabad
       
      it seems travelers of all ages are keen to make the most of online hotel reservations and reviews
  • he experience is now facilitated by technological factors,
    • cleon087
       
      The key word is facilitates, I think that technology has enhanced experience but should never replace the hospitality warm feeling aspect.
  • Baby Boomers who look set to remain the most prolific travelers for the next two to three years, and see if the numbers support the theory that technology has improved the hospitality experience.
    • cleon087
       
      I think that technology is becoming a necessity in the hospitality industry. There is a need to be up to date. Especially if you want to attract the new generation of travelers.
  • But is it really an improvement, or has the industry gone too far? Do these changes enhance the guest's experience, or have we forfeited the true meaning of the word "hospitality" in the process?
    • cleon087
       
      I think that the industry is just simply evolving with the times.
  • how much is it taking away from the guest's personal experience?
  • shows the reviews for companies in the hospitality industry are considered 48% more important and valuable than in other industries, which indicates the target audience takes online reviews exceptionally seriously
    • cleon087
       
      I think that this just leads to different opportunities. Now you can show off on your social media how great your hotel is and its advantages. The only negative is how easily someone can write a negative review that might not even be true.
  • from notifications about special deals to managing their loyalty program account.
    • cleon087
       
      Investing in a well designed app for your company is crucial now.
  • The benefits of automation will soon become crystal clear.
    • cleon087
       
      This just helps improve the service and you will still need someone at the front desk.
  • Guests can stream SHOWTIME shows for free through the app, without needing to input credentials or create a subscription. Anyone who prefers not to download the app can operate the same controls using a simplified, in-room remote device.
    • cleon087
       
      I feel like this just enhances the experience and makes it more personal.
  • These have taken off extensively, with research showing one half of millennials, 26% of Gen Xers and 12% of Baby Boomers consider themselves "travel hackers," which means they believe they know all the best ways to use technology for good deals. Chatbots on booking websites enable the user to ask questions without even getting up from the sofa.
    • cleon087
       
      People are spending more time looking for the perfect hotel and for the best price. I know I do this whenever I travel and most of the time becoming a member for something like the Marriott, will end up being the best deal.
  • e, for example, the system can automatically send the conference itinerary and a map of the meeting spaces to his or her device.
  •  
    The Hospitality industry have been greatly impacted over the years by the advancements made in technology. Customers have everything assessable by the click of a button or utilization of an app. Various software is being created to provide for quick and easy service but in turn takes away from the personal experiences.
  • ...1 more comment...
  •  
    "All of this indicates that while a hotel offering a truly connected experience is likely to be full of very happy, empowered guests, we can't quite replace the human touch completely just yet." Though technology is taking over the industry, it is important that we not lose or completely replace the humanity of the industry. While technology has enhanced the employee experience and guests do appreciate it, they also like to know that they have a human waiting for them should they have any issues. All in all, technology has improved the industry by enabling a more personalized and empowering experience and increasing the safety of the guests and employees.
  •  
    This article is about the new advances in technology and investing whether it has been taken too far. It analyzes the new advancements such as apps where reservations are made. These new technologies have been made to enhance experience but not replace the warm feeling that hospitality gives you. The article concludes that we haven't taken it too far, instead it has made guest experience better. Especially when it comes to checking in, and not having to wait a huge line when you just want to get to your room.
  •  
    As we learned this week, technology is impacting the hospitality industry. As the article states- "improving a guest's experience depends on the ability to identify the individual guest's preferences." This reminded me of the Smart Bar video we watched this week. Technology can enhance the quality of experience. However, depending on the businness/ company- most people would be unwilling to put a an investment into tech unless they see a significant uptake from the technology. Even though technology plays a major role in the industry, it has not completely took over human interaction.
« First ‹ Previous 161 - 180 of 196 Next ›
Showing 20 items per page