Skip to main content

Home/ Hospitality Technology/ Group items matching "insider" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
augu010

5 Best Practices to Prevent Insider Threat - 0 views

  • Insider threat continues to be a problem with approximately 50 percent of organizations experiencing at least one malicious Insider incident per year, according to the 2017 U.S. State of Cybercrime Survey.
  • While intellectual property (IP) theft, IT sabotage, fraud, and espionage have continued to appear as the primary forms of malicious insider threats, new research has led us to understand the patterns related to unintentional insider threats. These threats represent a significant risk for organizations and potential attack vectors for malicious insiders and external adversaries.
  • Know and protect your critical assets Develop a formalized insider threat program Deploy solutions for monitoring employees actions and correlating information from multiple data sources Clearly document and consistently enforce policies and controls Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees
  • ...18 more annotations...
  • The trust that organizations place in their workforce can leave them vulnerable to malicious insiders, who often use particular methods to hide their illicit activities.
  • Current technology allows seamless collaboration, but also allows the organization's sensitive information to be easily removed from the organization. A complete understanding of critical assets (both physical and logical) is invaluable in defending against attackers who will often target the organization's critical assets.
  • Critical assets can be both physical and logical and can include facilities, systems, technology, and people. An often-overlooked aspect of critical assets is intellectual property.
  • Formalized and Defined Program:
  • Organization-wide Participation:
  • versight of Program Compliance and Effectiveness:
  • Confidential Reporting Mechanisms and Procedures:
  • Insider Threat Incident Response Plan:
  • ommunication of Insider Threat Events:
  • Protection of Employees' Civil Liberties and Rights:
  • Policies, Procedures, and Practices that support the InTP:
  • Data Collection and Analysis Techniques and Practices:
  • Prevention, Detection, and Response Infrastructure:
  • Insider Threat Practices Related to Trusted Business Partners:
  • Insider Threat Integration with Enterprise Risk Management:
  • Organizations should ensure policies and controls provide: concise and coherent documentation, including reasoning behind the policy, where applicable consistent and regular employee training on the policies and their justification, implementation, and enforcement Organizations should be particularly clear on policies regarding acceptable use and disclosure of the organization's systems, information, and resources use of privileged or administrator accounts ownership of information created as a work product evaluation of employee performance, including requirements for promotion and financial bonuses processes and procedures for addressing employee grievances
  • wareness training for the unintentional insider threat should encourage employees to identify potential actions or ways of thinking that could lead to an unintentional event, including level of risk tolerance--someone willing to take more risks than the norm attempts at multi-tasking--individuals who multi-task may be more likely to make mistakes large amounts of personal or proprietary information shared on social media lack of attention to detail
  • Our intent was to develop a single definition for insider threat that covers malicious and non-malicious (unintentional) insider threats covers cyber and physical impacts applies to both government and industry is clear, concise, consistent with existing definitions of 'threat', and broad enough to cover all insider threats
  •  
    This article goes into detail about various safe practices that can prevent cyber threats. Policies and procedures must be created in order to protect us from cyber crimes. Governments have worked hard to protect data from being hacked.
nunes305

4 Cyber Security Insider Threat Indicators to Pay Attention To | Ekran System - 0 views

  • Insiders can target a variety of assets depending on their motivation.
  • they focus on data that can be either easily sold on the black market (like personal information of clients or employees) or that can be crucial to company operations (such as marketing data, financial information, or intellectual property)
  • Usually,
  • ...8 more annotations...
  • he most frequent goals of insider attacks include data theft, fraud, sabotage, and espionage.
  • Detecting a malicious insider attack can be extremely difficult, particularly when you’re dealing with a calculated attacker or a disgruntled former employee that knows all the ins and outs of your company.
  • Of course, behavioral tells that indicate a potential insider threat can vary depending on the personality and motivation of a malicious insider.
  • 1. Disgruntlement
  • 2. Unusual enthusiasm
  • 3. Unusually frequent trips and vacations  
  • 4. Unexplained changes in financial circumstances  
  • Insider threat detection is tough. There are no ifs, ands, or buts about it. However, every company is vulnerable, and when an Insider attack eventually happens, effective detection, a quick response, and thorough investigation can save the company a ton of money in remediation costs and reputational damage.
  •  
    "Insiders can target a variety of assets depending on their motivation. Usually, they focus on data that can be either easily sold on the black market (like personal information of clients or employees) or that can be crucial to company operations (such as marketing data, financial information, or intellectual property). Frequent targets of Insider attacks include:  Databases"
anonymous

Insiders suspected in Saudi Aramco cyber attack | SciTech | GMA News Online | The Go-To Site for Filipinos Everywhere - 0 views

  • Hackers from a group called "The Cutting Sword of Justice" claimed responsibility for the attack. They say the computer virus gave them access to documents from Aramco's computers,
  • The hacking group that claimed responsibility for the attack described its motives as political
  • the group said Saudi Aramco was the main source of income for the Saudi government, which it blamed for "crimes and atrocities" in several countries, including Syria and Bahrain.
  • ...9 more annotations...
  • According to analysis of Shamoon by computer security firm Symantec, the way the virus gets into networks may vary, but once inside it tries to infect every computer in the local area network before erasing files to render PCs useless.
  • Yet those sources say such protections could not prevent an attack by an insider with high-level access.
  • insiders were implicated in just 4 percent of cases last year.
  • The hackers behind the Shamoon attack siphoned off data from a relatively small number of computers, delivering it to a remote server
  • Because the virus wiped the hard drives, it is difficult for Saudi Aramco to determine exactly what information the hackers obtained.
  • The Shamoon virus is designed to attack ordinary business computers
  • . It does not belong to the category of sophisticated cyber warfare tools
  • Saudi Aramco has said that only office PCs running Microsoft Windows were damaged. Its oil exploration, production, export, sales and database systems all remained intact as they ran on isolated and heavily protected systems.
  • It is standard industry practice to shield plant operating networks from hackers by running them on separate operating systems that are protected from the Internet.
  •  
    Saudi Arabias national oil company, Aramco, was attacked by a computer virus, Shamoon, and it is suspected that an insider or employee assisted the hackers. The virus spread through the network and infected about 30,000 PC business computers and wiped their hardrives. This is one of the worst attacks against a single business. The hackers who claimed responsibility, The Cutting Sword of Justice, were politically motived. The companies more important documents including plant operating networks were not affected by the virus because they were on a separate and higher security network. Recently, other Middle Eastern natural gas firms with relations to Saudi Arabia have been hit by cyber attacks. Because the Aramco hackers admitted their motives against the Saudi Arabian government income sources, I think that all the cyber attacks may be politically motivated. As a Middle Eastern oil company with relations to Saudi Arabia, this is a major indication to take precautionary measures and increase network security. This attack demonstrates that no matter how much security you have in place, if an insider is willing to assist hackers or provide hackers with necessary information, you are no longer protected. It would seem imperative that employees with this access are chosen carefully or network access is very limited.
cbespinel

Microsoft and Harrah's unveil high-tech interactive bar table - USATODAY.com - 1 views

  • A program called Mixologists lets patrons play bartender by creating and ordering concoctions of whatever cocktails and mixers they click on. The system is able to remember users' drink orders and, one day, may be able to offer customers the same drink at other Harrah's locations, such as when they play a slot machine. Another program lets users watch YouTube videos, either by searching or choosing from a list of popular videos. Harrah's officials said they reached a licensing deal with YouTube on Wednesday. The table also includes a program called Flirt, which lets customers sitting at any such table in the lounge see and chat with each other, take and e-mail pictures and even trade cellphone numbers. "In a different point in my life, I might use Flirt a lot," Stanley said. Other programs let users play video games or get information about restaurants, shows, nightclubs and other Harrah's attractions. Pete Thompson, Microsoft's general manager of surface computing, said the table's computer was designed so businesses can customize it to meet their needs. "This is very open. There's no scripting," Thompson said. "People feel a sense of freedom." Thompson said the computer uses a camera behind the screen to detect hand movements, which become visible to the camera like silhouettes once users press their fingers on the table. That lets the table display high resolution images but still function as a table, he said. Unlike a typical computer monitor, you can still set drinks on it.
  •  
    This is a great way to collect the preferences of your customers, it definitely gives them new options that were not available before, the hospitality industry is constantly changing, technology becomes more important every day. This technology can also be a tool for management to keep track of sales and minimize theft.
Alexander Suarez

Employers increasingly tapping medical tourism for cost savings - 0 views

  • Recently, 60-year-old Oklahoma resident Dodie Gilmore became one of the first Americans to be sent overseas for surgery by her employer. Gilmore needed hip surgery, but found that the procedure would cost up to $40,000 if performed in the United States, which her privately purchased health plan would likely not cover.
  •  
    Medical tourism has recently skyrocketed due to the fact that procedures done outside of the U.S. are a fraction of the price that they would usually cost inside of the US. Companies inside of the U.S. are also beginning to send their employees to locations outside of the U.S. due to the fact that they're much more inexpensive. However, some companies are beginning to shy away from this practice due to "possible risks".
rebecca Bonet

Keeping hotel locks safe | Hotel Management - 1 views

  • Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • ...18 more annotations...
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate
    • TIANJIAN ZHANG
       
      Nowadays, locks security is an essential issue in hospitality industry. Actually, most hotels upgrate their locks systems with advanced technology. The role of technology in the security sector is fundamental, but despite the rapid technological progress, one thing has remained constant: the importance of trust. Whether hoteliers wising up to the fact that they've bought what could be called a flawed security system will be willing to trust the supplier of said equipment for a fix.
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues. 
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • , preventing
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security
  • “  Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software ,” Shea said. “  When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • For instance, a ‘wandering intruder alert’ warns hotel security personnel when a card is presented to a number of different doors.  Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues.  
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate ,”
  • As with any hotel upgrade, hoteliers understand that renovation and upgrades are a regular part of running their business
  • Looking past RFID solutions for instance, VingCard Elsafe has made our RFID locks compatible with next generation technologies, like Near Field Communications (NFC), providing our customers with an easy upgrade path at reasonable cost.”  
  •  
    This article discusses the security issues with room keys. These hotel locks will not open with cards that are read as duplicates or duplicatable. The locking mechanism has been specifically designed to alert the front desk and secuirty departments in the event these locks are tampered with. I'm sure at one point or another we have all experimented with our room key and tried to open other doors. A system like this will prevent activity like that.
  • ...2 more comments...
  •  
    VingCard Elsafe, the global leader in hospitality security and part of the ASSA ABLOY Group, announces that it has phased out the use of brass metal plating and painting in the manufacture of its locking systems, opting instead to use a more eco-friendly process to color stainless steel. VingCard Elsafe has adopted a new method of metal coloration called physical vapor deposition, or PVD, an environmentally friendly process that involves vaporizing an alloy onto stainless steel within a heated vacuum. PVD requires no chemicals and produces no waste or hazardous materials of any kind, resulting in no environmental impact whatsoever. The PVD process has other added benefits, as well. PVD-treated surfaces have high wear resistance for discoloration, and the stainless steel adds enhanced anti-corrosion properties. Besides eliminating the negative environmental effects of the brass plating process, the move by VingCard Elsafe to simplify its lock manufacturing process has had other related green benefits. By doing away with the need for secondary surface treatments of the locks, new product components are now supplied directly from metal stamping to the point of use in the assembly line. This means less shipping and transportation is required for product manufacture, resulting in a diminished carbon footprint.
  •  
    VingCard Elsafe is a new kind of lock system, which contains RFID technology and is compatible with the Near Field Communications. It has several advantages compared to traditional magstripe locks. First of all, it can add security to the RFID card and prevent cloning, which is much safer than the traditional key card. Another is that it can detect tampering and know when and where staffs use the lock. It can send alert to the front desk. Moreover, the front desk can know when the door is forced open. However, before using the lock system, training program should be provided. So this new kind of lock system brings safety to the guests and to the hotels.
  •  
    This article talk about the issue that hotel are having with their security system lock for guest room. These cards are easy to duplicate. The new system will alert front desk or security if the lock has been tampered with. Other alarms include detecting that a door is forced open 'mule tool' instruction when a door is open from the inside handle without an occupant in the room.
  •  
    This article discusses the current state of hotel lock safety. Monitoring safety has changed as these locks become more automated. The article states that, "Hotel Management corresponded with Tim Shea, president of ASSA ABLOY Hospitality, for ways in which vendors are keeping hotel locks secure." Through VingCard Elsafe's locks, hotel security and safety has increased. VingCard says, "Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software." This is just one of the ways the locks increase security. The article also states that the system is cost-effective for hoteliers.
natashacastro

Disney is expanding its billion-dollar mobile technology to more parks - Business Insider - 0 views

  • will expand in some form to other Disney resorts
  • The $1 billion MyMagic+ program features wristbands and a mobile app that let Walt Disney World visitors unlock hotel room doors, pay for food and merchandise, and book dinner reservations or ride times.
  • The parks unit's earnings have climbed over the past few years as Disney invested billions to add Cars Land at the Anaheim resort, expanded Fantasyland at Walt Disney World, built a new cruise ship and made other improvements. For the six months that ended March 28, operating income rose 22 percent to $1.4 billion. It is Disney's second-largest division.
  • ...2 more annotations...
  • Adding new technology is one way Disney aims to keep the business growing. "We will bring variations on MyMagic+ to our parks and other businesses around the world," Staggs said.
  • that adds projections inside the park
  •  
    The article briefly talks about the MyMagic+ wrist bands that Disney introduced a while back! I decided to use this since I had used this example in our discussion board. The articles explains that with Disneys BILLION dollar technology investments income rose 22% to 1.4 billion. The article identifies that Disney's risks in technology is a huge reason why their business continues to grow (and probably wont decline anytime soon- but thats just my opinion). Another huge investment, which might not seem like a lot is the projections newly introduced in the new fireworks show. By introducing projections inside the park, it allows the nightly entertainment to keep up with new characters and keep the show extremely relevant, for example, Anna and Elsa were just added from the Disney movie, "Frozen". By investing in technology like this Disney will always stay relevant and ahead of the game.
irinatroitskaya

Hospitality's Hidden Threat: POS | News | Hospitality Magazine (HT) - 0 views

  • POS breaches remain one of the most difficult to protect against based on historic vulnerabilities at the device end-points
  • In a POS attack, the attacker spends the vast majority of time inside the network in the “post infection” phase, which occurs after the system has been compromised.
  • once the attacker is inside the network, he can move “low and slow” to mount his attack and remain undetected.
  •  
    In contrary to most of the articles that state the advantages of POS in the hospitality industry, this article is focused on the cybersecurity threats that the usage of POS imposes to the hotels and restaurants. It is said that hospitality became the attractive target for the hackers and accounted for 14% of all breaches. Most of the attacks happen through the POS's. Additional security measures such as encryption to transaction data are usually difficult to apply to POS systems making it easier for the breacher to enter the system. Moreover, once they are inside they act slowly to get access to the key asset, the payment processing center, but traditional prevention security solutions are not designed for post-infection detection. Also, many POS are still operating on Windows XP or even DOS meaning that new vulnerabilities can be easily exploited. This all should be taken into consideration by the hospitality organizations while building their security systems. Deception-based detection that sets traps that make the attacker reveal himself becomes a popular solution. So in my opinion, the security issues of using POS should be the priority for the hospitality industry. Creating of effective mechanisms of customers' personal data protection is crucial for maintaining their trust and loyalty.
svail001

Is This What the Hotels of Tomorrow Will Look Like? | Architectural Digest - 0 views

  • The Hotel of Tomorrow Project, a global think tank spearheaded by Chicago-based hospitality design and consulting firm Gettys Group
  • Technology and personalization continue to play important roles in the 2020 project’s new concepts
  • BedXYZ, which is described by Gettys as an “optimized and gamified sleep platform,” involves a hotel guest room with engineered fabrics that control the bed’s temperature and clean the room’s air
  • ...4 more annotations...
  • Guests will be able to use smartphone apps to program lighting, scent options, sound cancellation, background noise, humidity, temperature, and bed firmness. Other possible features could include guided mindfulness exercises and physical wind-down programs.
  • Robot Alliance, meanwhile, envisions a deconstructed food and beverage experience in which autonomous robots serve guests wherever they choose to dine or drink inside or outside a hotel
  • The Outside In, Inside Out concept aims to convert hotel public spaces, such as meeting rooms or areas outside ballrooms, into “outdoor-feeling wonder-spaces where lighting, sounds, air quality, and smells provide the benefits of being outside,
  • The fourth concept, the Hotel Rover, would be a self-driving adventure vehicle in which one to four guests could work, sleep, socialize, and travel. These would be rented to travelers by individual hotels or brands, replicating their guest room amenities
  •  
    I found this article interesting because it is based on a concept that is spearheaded by a local Chicago design firm where I live. The Gettys Group hosted their second "Hotels of Tomorrow" think tank. Over 300 participants from all aspects of hospitality and tourism participant to generate unique and innovative ideas for the industry's future. This past year's think tank was particularly focused on incorporating technology in a post COVID world. Some ideas include: a customized sleep platform that has special engineered fabrics that can control the bed's temperature and clean the room's air, robots being used to serve guests wherever the choose to dine inside or outside the hotel (no longer confined to your room or restaurant), and a self driving adventure vehicle that is intended to target and compete against the latest RV getaway craze.
obrediajones

6 Restaurant Technology Trends to Look Out for in 2020 - 1 views

  • With 60% of US diners ordering takeout or delivery at least once a week and 31% using online ordering or a mobile app, it’s no wonder that ghost kitchens have continued to pop up. Ghost kitchens—also known as dark kitchens, virtual kitchens, cloud kitchens, or headless restaurants—don’t have a storefront or seating for dine-in customers or takeout orders.
  • ulfill
  • Quick service restaurants are starting to take cues from Alexa and Siri by implementing voice recognition software for ordering.
  • ...7 more annotations...
  • Cloud-based restaurant POS systems are becoming increasingly popular versus old school legacy
  • As for FOH, using robotics and automation has become a hot topic among restaurant industry insiders and consumers alike, many of whom worry they’ll contribute to unemployment rates.
  • While it’s hard to say if a robot could ever replace a human chef, the concept has been gaining traction lately and it’s interesting to think about what mundane tasks a robot in the kitchen could take on, freeing up chefs and cooks for more creative or complex pursuits.
  • Not only are cloud-based systems easier to install (no hard wiring!), the hardware is less expensive, and software upgrades are free and can be done remotely, saving restaurateurs thousands of dollars in start-up and maintenance costs.
  • systems.
  • Arguably
  • Arguably the most valuable restaurant technology tied to a cloud-based POS system is the ability to track sales, server performance, menu trends, and more. Armed with data that can help you make better decisions when it comes to menu planning, staffing, and sales will give you a leg up on competitors who are still lagging behind with a legacy system.
  •  
    This article explores how technological trends such as ghost kitchens, biometeric payment technology, robot chefs, cloud based POS systems, and voice assistant technology will dramatically change the customer experience. Author, Stephanie Resendes, explores how each innovation increases profitability. Additionally, the associated risks and the impact they will have on employment rates within the industry.
wenzheng guo

What Are the Different Types of Key Card Systems? - 2 views

  • Metal keys with a jagged row of teeth are becoming increasingly rare as technology improves.
  • In locations as diverse as hotels
    • wenzheng guo
       
      4 kinds of keys mention in the article.
  • using key cards instead of traditional keys.
  • ...17 more annotations...
  • four types of key card systems: holecards, bar code cards, magnetic strip key cards and radio frequency identification (RFID) cards
  • Holecards are the earliest type of key card systems
  • An individual key card is programmed by a computer with a unique electronic signature.
  • If stolen, magnetic strip cards and RFID cards can have the signatures changed, adding security protection from theft.
  • Key card systems operate on the relationship between a plastic card and electronic access control locks
  • Bar code cards were the next innovation in key card technology.
  • The technology used by this type of card includes microchips and radio technology, so it is considered the most difficult to forge and provides the highest level of security.
  • Sornes devised a system that would punch a series of 32 holes into a plastic card. The card would correspond to a lock and would open a door when it was inserted into a slot in the door.
  • his key card type lost popularity when magnetic strips became more readily available,
  • because bar codes could be forged and the electronic reader easily fooled.
  • Magnetic strip key card systems are widely used in the hotel industry and in workplace security. This card looks like a credit card with a thin metallic strip on the back.
  • This type of card is much more difficult to forge than holecards and bar codes, providing an added layer of security.
  • RFID key card systems are a more recent form of technology than holecards, bar code cards or magnetic strip cards. RFID cards have a radio sensor chip embedded inside the card.
  • When brought into close proximity of a correspondingly programmed reader, the door unlocks.
  • an individual bar code is created to correspond with a particular lock and is printed on a card.
  • The technology used by this type of card includes microchips and radio technology, so it is considered the most difficult to forge and provides the highest level of security.
    • wenzheng guo
       
      Later biological key like facial identification may be the next era of keys.
  • In 1975, inventor Tor Sornes devised a system that would punch a series of 32 holes into a plastic card. The card would correspond to a lock and would open a door when it was inserted into a slot in the door.
    • wenzheng guo
       
      first step of security keys.
  •  
    This article is about the different keys available for hotels to use for their rooms. Metal keys which are like what we use everyday for our homes is an outdated form of security key in the world of technology. The key card system is a plastic card with electronic access. Hole cards seen rarely today is a plastic card with a series of holes to correspond to a specific door in the hotel. Bar code cards is exactly that a card with a bar code, like you see at the supermarket, which is placed under an electronic reader. This type of key has been fazed out due to easily being fooled. The magnetic strip key card are widely used in the hotel industry. They look like a credit card with a metallic strip on the back. It has extra protection unlike other types of keys. The newest system is the RFID key card system, which has a radio sensor chip embedded inside. It works with a programmed reader and when the key is brought in close range the door unlocks and opens. This article was about the security keys being used in hotels.
  •  
    Marilyn, This is an interesting article because I never knew the progression of hotel key cards. I do not think anyone did and we just assume they started somewhere simple and got to where they are at now. Key Cards with RFID seem as though they are the best type of key but also very expensive for the hotels, especially if it is a large property. We only see the one kind of key card now in hotels and to me it seems secure but who knows what information is actually stored on that card. Great article !
  •  
    This article is about the different keys available for hotels to use for their rooms. Metal keys which are like what we use everyday for our homes is an outdated form of security key in the world of technology. The key card system is a plastic card with electronic access. Hole cards seen rarely today is a plastic card with a series of holes to correspond to a specific door in the hotel. Bar code cards is exactly that a card with a bar code, like you see at the supermarket, which is placed under an electronic reader. This type of key has been fazed out due to easily being fooled. The magnetic strip key card are widely used in the hotel industry. They look like a credit card with a metallic strip on the back. It has extra protection unlike other types of keys. The newest system is the RFID key card system, which has a radio sensor chip embedded inside. It works with a programmed reader and when the key is brought in close range the door unlocks and opens. This article was about the security keys being used in hotels.
marilyn diaz

Job Tips - Job Tips for Getting Started in the Meeting and Event Planning - 0 views

  • We all know having contacts can be priceless when exploring a new career.
  • Three industry pros share the wisdom of their years.
  • Volunteer. Just like any other field, the more experience you can bring to the table, the better - and volunteering is the perfect way to test the waters.
  • ...8 more annotations...
  • Network. Greg Jenkins, partner and co-founder of California-based Bravo Productions, cites another important reason as to why volunteering is an ideal place to start, "…it provides opportunities for networking.
  • Join. You don't need to be a full-fledged meeting planner before you can become a member of one (or more) of the many respected associations of the events world.
  • being a part of an association is invaluable.
  • Research. Before you're even hired, it's a good idea to become as familiar as possible with the meetings and events industry.
  • invest in one or two industry guides
  • Carter explains, “For those individuals that would like to explore event planning as a career, you need to know that the hotel event/convention business is a unique industry. It is extremely important to gain a basic understanding of the business including hotel operations, terminology and sales concepts before assuming it is the right career for you.
  • To get started, read a meeting planning primer or concise reference manual to give you an idea of what you will encounter while planning meetings. Industry articles will also give you a feel for what event planners face each day.”
  • Be Real. As Carter advised, know what you're getting into before you jump in. Landing a job you regret is a waste of time and resources, yours and your employer's. Greg Jenkins provides this final bit of caution, "…if you enjoy a 9-5 job, the event and meeting industry is probably not for you. The hours and days are quite erratic and can be long and exhausting."
  •  
    This article is how to be successful in entering the event planning industry. It has tips from insiders on things they did to become successful. It states that networking is key. Volunteer and get to know people in all types of events from school functions to jazz festivals. People interested in the event planning field should join one or more associations in this field. Research should be done, for example read books, articles and learn what you can. If you want to be an event planner in the hotel industry then you should also learn the terminology, sales concepts, and gain a basic understanding into the the hotel/convention business. Last be realistic, this is not a 9 - 5, it is hectic and your schedule will fluctuate from event to event.
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
Jingjia Zhang

Your Mobile Phone As A Door Key | Fast Company - 3 views

  • But Samsung's system actually teaches us a whole lot more about the future of smartphone "keys." Once inside the room, the same phone can be used to order room and laundry service, book other hotel facilities, and act as an in-room phone extension. Because of the Olympics tie-in, the special app also gives localized content to the hotel guest, and Olympic Games information including results. It can also control the hotel room TVs, lighting and AC and other in-room electronics. And it can provide "location based offers."
  •  
    This article describe a new smartphone app based on Android system in Samsung phone. At the first, this article introduce the long history about the room key development. It points out that the physical keys always have a problem that key itself can be stolen, and thus used by someone who doesn't have access privileges. Then the article introduce the  new Samsung's system. What amazing me is the phone is not only can be used as a door key but also a control center in guests' hand. "Once inside the room, the same phone can be used to order room and laundry service, book other hotel facilities, and act as an in-room phone extension. " The app has powerful features and I thought it will become a trend in the future.
  •  
    Jingjia...this is a great article. I agree with you, I am impressed with the functionality of the phone application and how it works. It eliminates the middle man and any room for human error. I wonder how much more we can do with our phones. On this article listed below, it talks about how you can start a car directly from your IPhone (http://www.wired.com/autopia/2009/10/start-your-car-from-your-iphone/). Soon, we will be able to do many things with simply the touch of a button.
Irine Wallace

University Library: How to drive revenue through property-management systems - 1 views

  • "We don't get incremental revenue from using the PMS, but there is information in there you can use if you want to," said Graham Dungey, SVP of ecommerce, revenue and distribution for Concorde Hotels & Resorts. "The theory is fantastic. You identify the people who spend the most money and where they spend it. Some hotels are quite forward-thinking; they'll make a study of the minibar, see who is buying what items, put corner-store food into a dozen minibars and sell it for twice as much. There is so much opportunity inside the PMS to increase incremental spend on property.
  • "We don't get incremental revenue from using the PMS, but there is information in there you can use if you want to," said Graham Dungey, SVP of ecommerce, revenue and distribution for Concorde Hotels & Resorts. "The theory is fantastic. You identify the people who spend the most money and where they spend it. Some hotels are quite forward-thinking; they'll make a study of the minibar, see who is buying what items, put corner-store food into a dozen minibars and sell it for twice as much. There is so much opportunity inside the PMS to increase incremental spend on property.
  • "We don't get incremental revenue from using the PMS, but there is information in there you can use if you want to," said Graham Dungey, SVP of ecommerce, revenue and distribution for Concorde Hotels & Resorts. "The theory is fantastic. You identify the people who spend the most money and where they spend it. Some hotels are quite forward-thinking; they'll make a study of the minibar, see who is buying what items, put corner-store food into a dozen minibars and sell it for twice as much. There is so much opportunity inside the PMS to increase incremental spend on property.
  •  
    Use of property management system PMS cost money in terms of upfront investment or maintenance or fees for using a vendor's system but the money generated by the use of the system outweighed the costs. Hotel rooms are perishable and any empty room means waste of resource and therefore using PMS to fill up as many rooms as possible is wise. Likewise empty restaurant costs the owner money to cover the fixed cost including the minimum labor to keep it open.
David Maggard

VingCard Elsafe Captures the "Essence" of HITEC 2012 with Successful Launch of World´s First Invisible Door Lock - 0 views

  • VingCard Elsafe, the global leader in hospitality security and part of the ASSA ABLOY Group, again captured the attention of hotel technology professionals last month, with the successful introduction of its latest hotel locking innovation
  • Essence not only eliminates a visible lock reader on the door exterior, creating a cleaner aesthetic in the hallway, but also eliminates bulky hardware on the interior of the door, making it more secure and visually appealing from inside the guestroom, as well.
  • “It served to confirm that our projections of where hotel locking technology is heading for the future are accurate, and that the market is continuing to embrace the trend toward minimalism in design, as well as RFID and NFC technologies, which we have incorporated into this new locking platform.”
  •  
    Ok so this is where technology and design are coming together featuring a brand new innovation in the lock world. There is no visible , physical site of a lock on either the outside or the inside of the door. The technology is being run off of RFID (radio frequencies) . No more , hard key or even inserting a key. This technology was just showcased in August 2 at the worlds largest technology show.
Alyssa Westmeyer

Hotel technology trends that are changing how hotels do business - 1 views

  • Choice created the software in 2003 as an inexpensive solution for franchisees of its economy brands.
  • The PMS had a lot of growing pains at first, but eventually it became more and more cloud enabled and was adopted across the company.
  • “A lot of companies had outsourced their IT and now they’re bringing it back in house because they can do almost everything they need on the cloud or through software as a service.
  • ...4 more annotations...
  • Switching to the cloud from a client server platform pays off with a big drop in both the initial capital outlay and the ongoing operating costs for the property management and other systems.
  • pects of a franchisee’s business, from guest check-ins and housekeeping services to billing and finances. Over time new features have been rolled into the software platform making it more robust and useful for hotel owners—it’s currently distributed in eight countries and available in four languages. And while plenty of cloud-based PMS packages are now available from third-party vendors like Micros, Maestro, and RoomKey, Choice’s internal solution has garnered its fair share of attention. “We had been getting knocks on the door from IT vendors at other hotel companies and individual Choice franchisees that own other brands, saying they were interested in our product,” says Pacious, “So we set up a new division so we could take a look at other opportunities we could develop.” This led the company to launch SkyTouch last year, a new division that develops and markets cloud-based software solutions to hotels inside and outside the Choice system. Pages: 1 2 3 4 2013-06-18 Sean Downey !function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })(); (function() { var li = document.createElement('script'); li.type = 'text/javascript'; li.async = true; li.src = ('https:' == document.location.protocol ? 'https:' : 'http:') + '//platform.stumbleupon.com/1/widgets.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(li, s); })(); inShare0 Related Articles attachment-3
  • his led the company to launch SkyTouch last year, a new division that develops and markets cloud-based software solutions to hotels inside and outside the Choice system. Pages: 1 2 3 4 2013-06-18 Sean Downey !function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })(); (function() { var li = document.createElement('script'); li.type = 'text/javascript'; li.async = true; li.src = ('https:' == document.location.protocol ? 'https:' : 'http:') + '//platform.stumbleupon.com/1/widgets.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(li, s); })(); inShare0 Related Articles Hotel Market Insight: Cleveland a
  • This led the company to launch SkyTouch last year, a new division that develops and markets cloud-based software solutions to hotels inside and outside the Choice system.
  •  
    Choice Hotels has been a industry leader in the cloud PMS movement. They identified the opportunity to create their own platform 10 years ago when cloud was barely on the radar and have now successfully distributed it to 5,500 of their properties. Unique functionality built into the system is internet redundancy via cellular data plan, company-wide campaign pop-up messages to staff, interface to Pegasus and revenue management through predictive analytics. The platform has been so successful that, in response to inquiries from other companies who wanted to use Choice's proprietary system themselves, they created an additional revenue stream by establishing a separate company that sells and creates custom cloud PMS systems. One advantage pointed out is that managers no longer need to be on property to access and make changes to their PMS. While this is hugely beneficial to the majority of the industry (who already work long hours and visit the property on their day off), there may be some who take advantage of the situation. If this becomes the case, less oversight at the property means that operations has the potential to slip. It doesn't seem that this is a concern for Choice Hotels but it should be considered.
uhey77

Changi Airport, Accenture create "digital factory" to improve airport experience and operations | PhocusWire - 0 views

  • Singapore’s Changi Airport Group (CAG), which operates the seventh busiest airport for international traffic and has received multiple awards for customer experience, has created a “digital factory” inside the airport to drive continued innovation.
  • “Picture a startup environment where employees begin by thinking about what the customer wants and work backwards from there - experimenting rapidly to develop innovative products and services,”
  • “DIVA is enabling CAG to re-evaluate how the airport operates and develop digital solutions to ensure that it remains a world-class leader.”
  • ...2 more annotations...
  • “By establishing DIVA with Accenture, we hope to continue to foster a culture of innovation and experimentation, by injecting new ways of working within our organization,”
  • “DIVA is helping CAG implement digital innovations, at speed and at scale, at the enterprise level, serving all CAG departments, including commercial, operations, engineering, IT and corporate marketing and communications.”
  •  
    Singapore's Changi Airport Group (CAG), which operates the seventh busiest airport for international traffic and has received multiple awards for customer experience, has created a "digital factory" inside the airport to drive continued innovation. Staff use tools such as artificial intelligence, big data and analytics, the internet of things and digital marketing in tandem with design, prototyping and experimentation to create new solutions to improve both the traveler experience and the airport's operations.
lkastwood

Tablets Are Making Waiters Obsolete - Business Insider - 0 views

  • The casual dining spot has recently introduced tablets in dining rooms nationwide that customers can use to place orders, browse the menu, and entertain otherwise noisy children.
  • As tablets in restaurants go, Chili's has become a standard bearer. They just announced the introduction of 45,000 Ziosk tablets in 800 locations.
  • But Chili's is not alone in this push toward automation. Applebee's announced the installation of 100,000 tablets last December
  • ...5 more annotations...
  • Some major chains have already made the bet. Buffalo Wild Wings announced a big tablet push in March, promising to have them in all North American stores by the end of 2015.
  • E la Carte cofounder and CEO Rajat Suri argued that tablets are designed to work alongside human employees, not replace them.
  • These enhancements are geared toward increasing customer satisfaction and driving up revenue. Patrons are far more like to buy a restaurant gift card or buy dessert if they're pleased with their dinning experience at the end of the meal. 
  • Tablets are also making life better for waiters with the help of some behavioral science.
  • This tablet tsunami suggests waiters might not be getting the job done.
  •  
    Sam Colt wrote an article for Business Insider titled Tablets Are Making Waiters Obsolete - An Chilli's Is Leading The Way. This article bothered me a bit, because knowing what I know about Hospitality we build our brand around customer service and customer satisfaction and how can we do that if we are eliminating the person to person interaction. In his article Colt mentioned Chili's "has recently introduced tablets in dining rooms nationwide that customers can use to place orders, browse the menu, and entertain otherwise noisy children". I understand the thought behind keeping your guests entertain while they wait for service; however, I believe it should be just that, entertainment not self-service. Dine in restaurants should not be treated like a fast food restaurant and guests should expect a reasonable wait time. Having that person to person interaction makes a dining experience more enjoyable. E la Carte co-founder and CEO Rajat Suri argued "if someone does not want to spend time with a server, they're going to ignore the server anyways." My thoughts are why would you dine in a restaurant if you do not want to be severed, why not go to a fast food restaurant. Chili's states the tablets are solely for increasing customer satisfaction and increase revenue and suggests the tablets are making the life of waiters better.
armanyleblanc767

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • challenge to maintain teams of well-trained staff.
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • Reliance on Paying By Card
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Insider Threats
  • Compliance
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
1 - 20 of 178 Next › Last »
Showing 20 items per page