Skip to main content

Home/ Groups/ Hospitality Technology
rhera004

A History of Event Planning (And Why It Matters) | Social Tables - 0 views

    • rhera004
       
      Matchmaking purposes as well
  • Being an event organizer is one of the most stressful careers, but when things come together, there’s nothing like it.
  • 82 percent of small business owners say face-to-face events and in-person meetings are important.
  • ...7 more annotations...
  • 97 percent say that meetings deliver return on investment.
  • 2013, employing 2.3 million Americans and generating $42 billion in tax revenue.
  • But the first CVB wasn’t established until 1896, in Detroit, Mich.
  • International Association of Exhibitions and Events (IAEE), came into being in 1928. The Convention Industry Council (CIC) and Professional Convention Management Association (PCMA) were founded in the 1950s.
  • Now people not only have individual personal and professional email accounts, they multitask, prospect, network and curate content on a variety of social and digital platforms.
  • It’s that the French Revolution began with a meeting on a tennis court.
  • Meetings catalyze change.
  •  
    Quick History of Meetings/ Events info.
ldeur001

How Travel and Tourism Brands Can Leverage Social Media to Attract New Customers - 0 views

  • Social media is one of the most effective ways to attract new customers for any brand, but the travel and tourism industry can leverage it a bit differently.
  • When consumers look for information regarding traveling, hotels, resorts, restaurants, local activities and more, they turn to the internet, specifically social media.
  • The best part is the return because social-media marketing can drive the healthiest ROI out of all your online marketing campaigns when executed correctly.
  • ...4 more annotations...
  • Social media provides an opportunity to showcase a brand’s personality,
  • starting a blog for your business
  • complement your search-engine-optimization strategy when you apply keyword research to new blog topics. 
  • Run paid Facebook and Instagram ads
  •  
    Social media is an incredibly effective way to attract new business. It's cost effective and easy. Your can use apps like tiktok and instagram that are very picture/video driven to showcase your business, but also blog posts can be great to boost your SEO.
dlevine4195

Has COVID-19 Made Hotels More Sustainable? | The Manual - 0 views

  • These changes have largely been in the form of eliminating that most universal embodiment of hotel amenities, single-use plastic bottles for things like shampoo and soap, and reducing water usage.
  • hotels are also being savvier with energy usage, like using LED light bulbs and taking steps to gain environmental certifications like the Leadership in Energy and Environmental Design (LEED) certification from the US Green Building Council.
  • But the pandemic boosted the necessity of being able to do things while having limited contact with other people, and many hotels implemented remote, contactless check-in, room entry, and even food or amenities access.
  • ...10 more annotations...
  • Among its benefits, touchless tech is more energy-efficient and can eliminate the need for paper or the increased usage of non-ecofriendly cleaners. 
  • due to the lack of guests, there was a decline in the use of chemicals from cleaners and a reduction in carbon emissions.
  • This included a “dramatic increase in the use of disposable utensils, packaging, etc.”, that some sustainability initiatives were canceled or put on hold, and that “stronger, more toxic” chemicals were being used for cleaning and sanitizing.
  • Some hotels, though, took the pandemic as an opportunity to switch to more eco-friendly cleaning options
  • 2018, Hilton announced a whole host of environmental and social responsibility goals as part of its Travel with Purpose 2030 Goals
  • setting carbon reduction goals in line with the Paris Climate Accord, reducing water use by half, sending no leftover soap to landfills, and overall cutting its environmental impact in half by 2030.
  • However, that lack of guests allowed Hilton to start implementing other parts of their impact reduction plan, like having some of their hotels switch to using renewable energy. 
  • heir guests. Sustainability and eco-friendliness are more important for travelers and hotel guests than ever.
  • global travelers want to “travel more sustainably in the future,” and their 2019 Sustainable Travel Report highlighted that 70% of travelers are more likely to choose and book accommodations that are eco-friendly. 
  • Although current practices like using non-eco-friendly cleaning products and getting rid of unwanted waste may be cost-effective and save hotels money now, these and other findings show that travelers are willing to pay for hotels that go the extra mile for the planet, which will earn hotels loyalty.
  •  
    This article discusses how the pandemic has strongly impacted many hospitality companies to be more "green" for the future.. From contactless key options, to minimizing food waste, to using technology to reduce unwanted waste like paper, it is helping set new green goals for the our planet and future of the industry.
sdavi111

7 Steps to Securing Your Point-of-Sale System | PCMag - 0 views

  • Consider how the Target store hack in 2014 was one of the biggest point-of-sale (POS) system data breaches in United States history that exposed more than 70 million customer records to hackers, and cost the retailer's CEO and CIO their jobs. It was later revealed that the attack could have been avoided if Target had just implemented the auto-eradication feature within its FireEye anti-malware system.
  • the reality is that most POS attacks can be avoided.
  • be sure your company has a virtual private
  • ...18 more annotations...
  • network (VPN) in place to safeguard data that's traveling back and forth on your company's
  • network.
  • Most of the aforementioned attacks have been the result of malware applications loaded into
  • the POS system's memory.
  • important point to note here is that a second app must be running (in addition to the POS app),
  • This is why iOS has traditionally facilitated fewer attacks. Because iOS is only able to fully run one app at a time, these types of attacks rarely occur on Apple-made devices.
  • otherwise the attack can't occur.
  • Companies such as Verifone offer software that's designed to guarantee your customer's data is
  • never exposed to hackers.
  • These tools encrypt credit card information the second it's received on the POS device and once again when it's sent to the software's server. This means that the data is never vulnerable, regardless of where hackers might be installing malware.
  • install endpoint protection software on your device.
  • Employees can steal devices with POS software installed on them, or accidentally leave the device at the office or in a store, or lose the device. If devices are lost or stolen, anyone who then accesses the device and the software (especially if you didn't follow rule #2 above) will be able to view and steal customer records.
  • Systems that connect
  • to external networks are more susceptible to attacks from hackers
  • Consider keeping things internal and secure, use a corporate network to handle critical tasks like payment processing.
  • you'll want to comply with the Payment Card
  • Industry Data Security Standard (PCI DSS) across all card readers, networks, routers, servers, online shopping carts, and even paper files. The PCI Security Standards Council suggests companies actively monitor and take inventory of IT assets and business processes in order to
  • detect any vulnerability.
  •  
    Even though this article is from 2019 it is still extremely relevant today. POS systems are found in most hospitality outlets and the chances for a security breach are high. I have often thought when I had my credit card to a waiter and they are gone for 10 minutes are they copying the number, is it being added to a database that can then be hacked? The importance of having the proper securities in place, the proper malware and security software is really important. Having had a catering company for 20 years I had to do PCI compliance tests every 6 months and for years I just handed it over to my IT to do the test. He would suggest things to make us safer and since it usually cost money I would shake it off. It wasnt until the credit card processing company i was using had a security breach that I realized how important these PCI rules were. It is something going forward I will always pay attention to!
nashalsiddiqi

Why is it important to keep my IT systems up to date? - 0 views

  • software upgrades are essential for continued operation. On the technical side of things, these upgrades provide fixes for known issues, provide new enhanced features, and often resolve and fix major security flaws or other types of flaws inside of software that could put your company and your company’s data at risk.
  • very important to keep track of updates and test them whenever possible before deploying them to a production environment. On some complicated infrastructures, applying something as small as a small security fix could bring down multiple integrated Line of Business applications. In an event like this it could cause huge problems!
  • ignoring security updates could leave a huge security hole that could be exploited by a virus, or malicious piece of software and infect many of your systems.
  • ...7 more annotations...
  • is when it comes time to do larger upgrades, or migrate systems to new servers, the migration/implementation time could be multiplied 2-10 times just because you haven’t kept your systems up to date.
  • In situations where you do have a valid good warranty from a recommended vendor, you can often have hardware replaced under warranty by the next business day, minimizing downtime.
  • Equipment Age – They need to purchase new equipment, since replacement parts aren’t available anymore, and the equipment’s warranty has expired.
  • Consumer Grade Equipment – Some IT Solution providers, and/or IT staff feel they can build their own servers, or purchase off-the-shelf consumer grade equipment for business use.
  • Vendor Warranty – We are called in to resolve an issue on a new server environment, but it turns out the equipment just came off warranty after 3 months.
  • Security and critical updates need to be applied urgently when possible. Upgrades or updates that increase features, functionalities, and correct software flaws are also important, but not as important as security/critical updates.
  • Hardware should be upgraded when either the equipment is coming off warranty, or when you need to upgrade for performance/capacity reasons.
  •  
    the article emphasizes the importance of conducting constant updates and upgrades on software and hardware, as it will help to protect the company data and systems from any possible hacks or viruses or data loses.
teallemejia

Guest Privacy - It's Your Business | Robert Braun | By Robert Braun - Hospitality Net - 0 views

  • This focus must be seen in the context of two key issues: first, that hotels collect large amounts of data from their guests, both directly and through third parties; and second, that the hospitality industry has a checkered track record in protecting personal information.
  • Trustwave's 2018 Global Security Report reported that nearly 12% of the incidences investigated by Trustwave originated at hotels
  • Almost every breach involving hotels that have been reported over the past several years generated not with core hotel functions - check-in and check-out, reservations, etc. – but from companies engaged by hotels to provide services to the hotel.
  • ...3 more annotations...
  • Hotels use a variety of different systems for operations, ranging from off-the-shelf, commercial programs to specialty programs. Each of these programs presents the potential for breach and, as noted above, a single weakness can create a weak system. Moreover, the transfer of information from one system to another is, in itself, a source of weakness.
  • Take Control. Cybersecurity cannot be relegated to a single party; owners, operators and brands all need to take an active role in reducing cyber risks.
  • The hospitality industry is facing both continuing challenges protecting the personal data of guests, as well as grappling with a new legal landscape. Companies need to recognize that while the trials are great, success will create trust in the industry's most important commodity - its guests. A comprehensive approach can give companies the chance not only to confront these issues, but create brand value in doing so.
  •  
    Hotels collect large amounts of data from guests staying at their hotel directly and through third parties. As hotels continue to invest into technology to improve their guests' experience technology can also lead to more breaches. When guests use their smartphone to customize their stay by ordering room service, planning activities or purchasing upgrades it increases the chances of a breach and allows the hotel to collect more data. Multiple systems that a hotel uses can also create potential risks. Hotels need to take control, prepare for the inevitable, respond to breaches and create a culture of security.
kmill139

Big Brother is watching: Chinese city with 2.6m cameras is world's most heavily surveil... - 0 views

  • The city’s surveillance system scans facial features of people on the streets from frames of video footage in real time, creating a virtual map of the face. It can then match this information against scanned faces of suspects in a police database. If there is a match that passes a preset threshold, typically 60% or higher, the system immediately notifies officers. Three days later the police captured the man, who eventually admitted that he was the suspect.
  • media access control address of users’ smartphone devices, a request sent when a device is searching for a wifi connection, to track their travel journeys precisely. It was only after the media raised awareness of the project that TfL widely informed its passengers.
  • Eight of the 10 most surveilled cities in the analysis are in China. London ranked sixth with 627,707 cameras covering 9 million residents and Atlanta, Georgia, came 10th with 7,800 cameras for 501,178 people.
  • ...11 more annotations...
  • Many crimes committed in a certain area of Chongqing were committed by non-residents, so facial recognition cameras were seen as a way to combat this.
  • But critics warn such widespread surveillance violates internationally guaranteed rights to privacy. To meet international privacy standards enshrined in the International Covenant on Civil and Political Rights, both collection and use of biometric data should be limited to people found to be involved in wrongdoing, and not broad populations who have no specific link to crime. Individuals should have the right to know what biometric data the government holds on them. China’s automated facial recognition systems violate those standards.
  • “These systems are being developed and implemented without meaningful privacy protections against state surveillance. The depth, breadth and intrusiveness of the Chinese government’s mass surveillance on its citizens may be unprecedented in modern history.”
  • Cities elsewhere may not be too far behind China’s mass surveillance.
  • With 2.58m cameras covering 15.35 million people – equal to one camera for every six residents – Chongqing has more surveillance cameras than any other city in the world for its population, beating even Beijing, Shanghai and tech hub Shenzhen.
    • kmill139
       
      In the near future you will be able to find camera anywhere you go
  • “With the rise of things like facial recognition, that is why we need new legislation that decides what is in the public’s interest and the legal structure within which they can be used. We shouldn’t drift there by accident.”
  • And part of that is building trust with the community based on good community information, not on Big Brother technology.”
  • Since then, two more Californian cities, Oakland and Berkeley, have also passed bans on all government use of facial recognition technology. Somerville, Massachusetts, passed a similar law this summer.
  • Some people support facial recognition on the basis that technology has always driven change and is a force for good if used responsibly and proportionately.
  • Omanovic argues that live facial recognition fundamentally threatens free societies. “It might start with the monitoring of just a few thousand people but it definitely won’t end there,” says Omanovic. “Authorities need to permanently ban its roll out now before it’s too late.”
  • “Singapore has plans to install 100,000 facial-recognition cameras on lampposts, Chicago police have asked for 30,000 more, and Moscow intends to have 174,000 by the end of this year.”
  •  
    Super important and relevant article about how big brother is watching us
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
svail001

Cyber Attacks Are Spiking - Is Your Hotel Prepared? | By Jeff Venza - Hospitality Net - 0 views

  • “Thinking of cybersecurity solely as an IT issue is like believing that an entire company’s workforce, from the CEO down, is just one big HR issue.”
  • recent reports reveal at least 16 billion records
  • have been exposed through data breaches since 2019
  • ...11 more annotations...
  • The COVID-19 pandemic was, in many ways, the perfect storm for an influx in cyber exploitation
  • With this in mind, cybersecurity should be viewed as a company-wide initiative, with considerations made across each level of any tech-driven organization.
  • we must also recognize that more sophisticated technology creates an environment for increasingly sophisticated cybercrime
  • studies show that nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks.
  • only 5% of companies’ folders are adequately protected
  • To this effect, global cybercrime damages are predicted to cost up to $10.5 trillion annually by 2025
  • And for hotels, a security breach resulting in compromised guest data can damage a property’s reputation beyond repair
  • Instead, companies today should be leveraging a formal cybersecurity program in conjunction with dedicated technology and resources to effectively protect the information housed within their digital infrastructure.
  • Much like cyber risks are ever-evolving, a hotels’ cybersecurity protocol must also evolve and adapt based on frequent reassessments of risks and vulnerabilities
  • cybersecurity cannot be treated as an afterthought, nor should it be viewed as an optional investment; rather, it’s the cost of doing business in any data and tech-driven landscape.
  • the average cost of a data breach is $3.86 million as of 2020
  •  
    This article stresses the importance of cyber security specifically within the hospitality industry. The author of the article describes how a strong cyber security management system should not be an afterthought for hotels and should be seen as a cost of doing business especially in a tech driven industry. The article lists some key components and areas to focus on for hotels to manage cyber risks and threats
xrive007

Cyberattack hits world's largest meat supplier - 0 views

  • It might be days before production resumes after an “organized cybersecurity attack” affected IT systems in North America and Australia
  • The world's largest beef supplier has been hit with a ransomware attack, threatening some of the U.S. meat supply.
  • The hack came less than four weeks after a similar one by Russian criminals against Colonial Pipeline
  • ...16 more annotations...
  • JBS, one of the world's largest international meat processors, was hacked
  • forcing the company to take systems offline and stop work
  • 11 beef processing facilities in Australia and 26 chicken processing plants in the U.S
  • The company told the White House on Sunday that it was a ransomware attack,
  • JBS notified the administration that the ransom demand came from a criminal organization, likely based in Russia.
  • Ransomware, an extremely lucrative type of cybercrime, is malicious software that lets hackers encrypt a victim's files and demand a ransom to make them functional again.
  • he hackers will steal and threaten to publish those files if their demands aren't met.
  • Ransomware attacks have grown rapidly in recent years.
  • Criminal hackers,
  • often based countries like Russia where they are largely protected from U.S. law enforcement
  • have targeted practically every major industry to shake down victims for payment.
  • about 40 food and beverage companies around the world have had confirmed ransomware attacks since May 2020.
  • Colonial's hackers, an established ransomware gang called DarkSide, shut down its website amid international attention from that attack, but not before receiving a $4.4 million payment from Colonial.
  • regularly hit manufacturers, school systems and city governments.
  • ransomware attack had already affected the cattle market.
  • If this goes beyond a week, you start to really worry about these animals building up on farm sites where they just don't have the capacity to hold them
  •  
    An example of a cyber attack or ransomware, in a manufacturer. Shows some effects of a ransomware and what a consumer may experience.
teresastas

Railroads say they don't need cybersecurity mandates - The Washington Post - 0 views

  • The Biden administration plans to impose new cybersecurity mandates on railroad and rail transit systems.But a leading railroad association insists it's already voluntarily following the practices that are now going to be required by the federal government.
    • teresastas
       
      Biden administration is planning on imposing new cybersecurity mandates on railroad and rail transit systems. This includes passenger rail systems like Amtrak and large subway systems like those in New York. Homeland Security Secretary announced the new proposed regulations under TSA eelier this week. The new regulations came as a surprise to the rail industy who feel that they are already taking cyber security seriously and don't need the government's heavy hand involved. They have three day's to submit feedback.
  • Our freight rail system is essential not only to our economic well-being, but also to the ability of our military to move equipment from ‘fort to port’ when needed,” the secretary said at the virtual Billington Cybersecurity Summit, where he announced the intended new regulations.
    • teresastas
       
      We often forget about Rail when we think about Transportation but it is essential for our military and for our major cities like New York. As well as the transport of goods across country.
  • In fall 2020, ransomware hit the Southeastern Pennsylvania Transportation Authority, which operates Philadelphia’s transit network. And in April, a hacker group believed to be linked to the Chinese government breached the computers of the Metropolitan Transportation Authority (MTA), which operates New York City’s subway system — the country’s largest.
    • teresastas
       
      We often don't hear about the hacks that aren't successful but how awful would it have been if hackers would have breached into MTA and taken over NYC's subway system!
bruss031

Hospitality tech provider Jurny raises $9.5M | PhocusWire - 0 views

  • Los Angeles-based hospitality technology startup Jurny has raised $9.5 million in a round led by Mucker Capital, bringing its total raised to date to $12.45 million.
  • Founded in June 2020, Jurny provides SaaS and hardware solutions for independent hotels and vacation and short-term rental properties. 
  • Jurny Virtual also offers a virtual concierge, access control, guest screening, review management, accounting and 24/7 inquiry support.
  • ...4 more annotations...
  • “Our mission is to help small- to medium-sized operators and hotel owners access a premium ecosystem that offers the benefit of economies of scale, not yet available to even some of the world’s largest hotel chains,
  • “Jurny Virtual is revolutionizing the industry by providing a premier service at a much lower cost
  • Jurny says it has more than doubled the number of units using its platform, with 635 unites in eight cities
  • on average, a 20% increase in revenue, 50% decrease in overhead costs and 2x net operating income (NOI) within the first 30 days of implementation
  •  
    The 2020 created SaaS platform Jurny has raised another 9.5 million dollars to help expand globally and reach more small-medium sized properties looking for enterprise level solutions. The technology comes at a much less significant cost than many competitors already existent in the space and continues to prove why smaller sized properties should consider the software. Many operators are seeing an average 20% increase in revenue and 2x NOI within the first 30 days of implementation.
cingram21

Why Assessing and Mitigating the Security Risks of PMS Data Should be a Top Priority fo... - 0 views

  • here are two components of the puzzle: the booking engine used by hotels, and the actual PMS. Since guest data can be self-hosted by hotels, managed on-property by a third party, or handled entirely off site, it’s up to hoteliers to decide what works best for their property.
  • However, even if your hotel’s data is out of sight, it is a hotel’s responsibility to keep their data partners accountable.
  • To stay informed on the status of your property’s data storage, operators should become familiar with the management at work in their hosting facility. Request information on the hosting facility’s certifications for GDPR, PCA, SOC 2, and others. It will also be useful for learning who oversees rolling updates out to your hotel’s machines, as well as firewall rules, antivirus requirements and more.
  • ...2 more annotations...
  • No matter how a hotel stores its data, operators will always be liable for securing it on some level. This is particularly true for PCI compliance, as hotels still physically handle credit cards properly and store guests’ card data well locally.
  • In general, hosted environments, whether multi tenanted or dedicated, reduce some of the operational load of your IT team in various ways, dependent on the level of interaction coming from your data partner. A fully managed implementation could absolve hoteliers from overseeing updates, watching alerts for threat monitoring, and more. These systems also give operators the benefit of accessing their systems from anywhere, often through and ideally via browser-based user interfaces.
dlevine4195

How 9/11 changed air travel: more security, less privacy - 0 views

  • The worst terror attack on American soil led to increased and sometimes tension-filled security measures in airports across the world, aimed at preventing a repeat of that awful day.
  • The cataclysm has also contributed to other changes large and small that have reshaped the airline industry — and, for consumers, made air travel more stressful than ever.
  • Transportation Security Administration, a force of federal airport screeners that replaced the private companies that airlines were hiring to handle security.
  • ...14 more annotations...
  • The law required that all checked bags be screened, cockpit doors be reinforced, and more federal air marshals be put on flights.
  • Things that clearly could be wielded as weapons, like the box-cutters used by the 9/11 hijackers, were banned. After “shoe bomber” Richard Reid’s attempt to take down a flight from Paris to Miami in late 2001, footwear started coming off at security checkpoints.
  • Clear, which recently went public, plans to use PreCheck enrollment to boost membership in its own identity-verification product by bundling the two offerings
  • The long lines created by post-attack measures gave rise to the PreCheck and Global Entry “trusted-traveler programs” in which people who pay a fee and provide certain information about themselves pass through checkpoints without removing shoes and jackets or taking laptops out of their bag.
  • , PreCheck asks people about basic information like work history and where they have lived, and they give a fingerprint and agree to a criminal-records check.
  • Privacy advocates are particularly concerned about ideas that TSA has floated to also examine social media postings (the agency’s top official says that has been dropped), press reports about people, location data and information from data brokers including how applicants spend their money.
  • Each new requirement seemed to make checkpoint lines longer, forcing passengers to arrive at the airport earlier if they wanted to make their flights.
  • The TSA is testing the use of kiosks equipped with facial-recognition technology to check photo IDs and boarding passes rather than having an officer do it.
  • co
  • “TSA is an effective deterrent against most attacks,”
  • This summer, an average of nearly 2 million people per day have flowed through TSA checkpoints.
  • “They are there for my security. They aren’t there to hassle me,” Gathings said of TSA screeners and airport police.
  • Those incidents highlight a threat that TSA needs to worry about — people who work for airlines or airports and have security clearance that lets them avoid regular screening.
  • “All those folks that have a (security) badge, you’re right, many do have unescorted access throughout an airport, but they also go through a very rigorous vetting process before they are even hired,”
  •  
    After the terrorist attacks of 9/11 was when the TSA was created. Ever since this point in history security in airport sis a lot stricter and requires certain documentation to travel. Lines are longer, leaving travelers to arrive for their flights earlier. Overall, 9/11 heavily impacted the security world we live in today.
ldevaul

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
jblan183

Hotel tech bosses urge better multi-platform integration | PhocusWire - 0 views

  • The independent report (not put in the field by an existing tech brand or hotelier) from hospitality consultant Josiah Mankenzie found that over 80% of chief information officers, chief technology officers and chief operating officers of hotel brands wanted their PMS provider to concentrate on integrations.
  • Other noteworthy items in the survey included some relief for PMS vendors, with around 70% of respondents expressing they are satisfied with their current supplier.
    • jblan183
       
      From the Property System Management Survey website, it is shown in their survey that out of the 56 persons surveyed, most of them were somewhat satisfied with their current supplier; They are satisfied, but most believe they could have gotten an even better value from other vendors.
  • Half of respondents said supporting integration with other vendors, compared to 15% for growing revenue, 11% for time-saving functionality. Other factors such as mobile usage, security and cost all came in 5% or lower.
    • jblan183
       
      To further clarify this, the 56 persons surveyed say that the most important value provided are the integrations provided, highlighting the necessity as the survey was done when COVID-19 had hit the Hospitality and Tourism Industry hard, creating obstacles to the hotel tech bosses.
kesca010

Innovation in event management - a vision of the future - 0 views

  • With video conferencing tools like Zoom and Google Meet quickly becoming part of our daily working lives, speakers have still been able to reach an audience, and conferences have still been able to take place.  
  • Singapore is well positioned to pioneer these new models.
  • “Hybrid events are expected to be the norm in the new Covid-19 environment, with a blend of virtual and physical elements, while retaining the ‘live’ aspect that fulfils the need to connect and network,” says Carrie Kwik, Singapore Tourism Board’s (STB) executive director, Europe.”
  • ...6 more annotations...
  • Therefore, it is critical for our industry to pivot and adapt to new event formats and business models.” 
  • One thing is clear for the events industry: it will not entail jumping right back into pre-Covid norms.
  • According to Singapore’s Economic Development Board, the city state plays host to 59% of the Asian regional headquarters of multinational tech companies.
  • ttendees could be given an RFID token that blinks red when a person breaches safe social distancing guidelines, while movement tracking could take place via beacon or Bluetooth technology. 
  • For this reason, STB is developing a suite of initiatives to help tourism businesses in Singapore build the capabilities they need to succeed in the digital age.  
  • As digital/virtual becomes a key feature of many events in future, a successful venue may be one that can adapt its physical spaces and technological bandwidth to embrace this feature.” 
  •  
    This article covers how Singapore is one of the leading countries in innovation when it comes to event management. It goes into discussing the new normal and how the Singapore Tourism Board's reacted to it. In addition, there is statement explaining how Singapore's largest venue is now being used as a hybrid broadcast studio. They have taken this time during the pandemic to pilot innovative schemes and use it to not only adapt to the current crisis but also think ahead to the future of events. With that said, COVID-19 has pushed for for a flow of disruptive innovators in the event management industry. This is shown in the hybrid version of events.
nixalexa

OPEX or CAPEX for your IT Investment? | TOUGHBOOK Blog - 0 views

  • The “as-a-service” approach also has other benefits when it comes to flexibility. It’s much easier for a business to scale up and down as required. For example, adding new devices and services on a monthly basis or removing them. This flexibility ensures the business only pays for what it needs at the time, rather than having additional tech that is no longer required gathering dust in the warehouse.
    • nixalexa
       
      This approach is more beneficial for smaller companies, as many times they do not have the money to invest in these capital expenditures all upfront. This article explained the relation between Capital Expenditures vs Operational Expenditures as it relates to technology. This article explained how more companies have been taking the operational approach versus the capital approach because technology does not last forever. Almost every 3-5 years companies have to change their technology to stay up-to-date and efficient with their software and devices. Capital expenditures require all of the money upfront while operational expenditures is money spent as it comes in, like utilities, rent and other monthly or quarterly services.
  • Traditionally, if a business wanted to invest in IT equipment, such as new laptops or PCs, they would pay for their technology upfront as a capital expenditure (CAPEX).
ecast038

Disruption Drives the Hospitality Industry to Innovation - Hotel Business - 0 views

  • looks
  • drastic
  • looks
  • ...17 more annotations...
  • As the industry looks to rebound, hotel owners, in particular, are introducing new solutions and services to entice guests, including embracing automation, a once taboo term in an industry used to thinking of service in a very human-centric way. From robot concierges to new marketing strategies, hotel owners are changing the norm to address social distancing measures and lingering travel concerns.
  • Property automation system companies are catering specifically to the accommodations industry to
  • the industry must completely re-evaluate and adjust operations to reduce potential touchpoints, and automation is a crucial component at this time.
  • The entire check-in process can now be done through a smartphone, minimizing staff interactions and reducing exposure to a crowded lobby. Guests can check-in with a single touch and enter their room in minutes without even requiring a physical key card.
  • centric
  • drastic
  • For an industry that has long since relied on its (human) staff to deliver customer service, this is
  • make the integration of smart locks and devices easily accessible.
  • experience
  • shift to a tech-first experience. However, for hotels struggling to open with a skeleton staff to reduce overhead, an automated management system can improve efficiency and the overall guest experience.
  • experience
  • branded apps are a one-stop portal for everything from reservations to room service. Used c
  • orrectly, a branded app can help streamline operations and establish a direct channel of communication between hotels and guests.
  • Smart technology is a key investment for hotels as they look to reduce high touchpoints in rooms. Voice assistants can control nearly everything in a room, including temperature, lighting, alarm clocks, televisions an
  • d to order room service. It also creates an opportunity for hotels to learn guest patterns and personalize the experience even further.
  • And based on the past few months, the industry is rising to the challenge.
  • the pandemic accelerated the need to embrace smart technology and automation urgently, putting more pressure on an industry with slim profit margins to cover the costs of implementing the infrastructure to accommodate these changes. The industry has its back against the wall, forcing change and innovative new thinking to adapt and entice guests back as travel resume
  •  
    Before the pandemic hotels were using apps to allow guests to view hotels in their area and book hotels from the comfort of their phone. These apps also had incentives to make customers want to book through the app, now that the pandemic has caused individuals to not be able to be in contact as much, the hotels have taken advantage of these apps to allow guest to do more. Guests are now able to check in through these apps, open the door to their room without needing a key, ordering room service and towels and other toiletries through the app as well. The pandemic forced a lot of companies within the hospitality and tourism sector to become more technology friendly in the sense that they wanted less person-to-person contact, for the safety of external guests and internal guests. Like mentioned in the article smart devices have more of an influence on the guests experience overall, the article mentioned how hotels are using robots to clean rooms, deliver room service and toiletries to guest to increase social distancing standards within the properties. Hospitality was once known as an experience only able to be best delivered by humans but now it is an experience through technology that brings comfort to guests.
  •  
    To provide safer environments to guests and avoid going out of business, hotels had to quickly adopt changes and innovations. Although the industry has heavily relied on human interaction for all customer service aspects, smart technology and automation has been crucial for hotels. In many hotels, all guests need is their smartphone to check-in and get in to their rooms. Marketing has changed and many hotels rooms now feature workstations and gym equipment to ease guests travel concerns.
« First ‹ Previous 5301 - 5320 Next › Last »
Showing 20 items per page