Skip to main content

Home/ Groups/ Hospitality Technology
apere870

Obsolescence In Tech Is Jeopardizing Brand Loyalty - 0 views

    • apere870
       
      This article by Forbes talks about how obsolesce in tech is jeopardizing brand loyalty. It mentions how consumers' loyalty now depends on how satisfied they are after purchasing the product.
anaferia

How E-Waste Affects the Environment - Human-I-T - 1 views

  • As the world’s fastest-growing waste stream for almost a decade now, e-waste affects the environment in truly detrimental ways. And it’s not slowing down
  • e-waste generated annually has grown by over 7% since 2020
  • 59.4 million metric tons projected by the end of 2022
  • ...18 more annotations...
  • expected to grow 26% by 2030 and double by 2050
  • two big factors contributing to its current acceleration.
  • first is growing incomes in low- and middle-income countries which allow more people than ever to access consumer electronics
  • second is the increasing availability of previously unthought-of electronic products to consumers in middle- and high-income countries
  • Products like e-cigarettes and electric vehicles are just two examples of products that, due to their increased popularity, have begun contributing more e-waste to landfills over the past decade.
  • electronics which power our lives are composed of substances which are harmful to the environment and our health.
  • e-waste negatively impacts the environment: air, water, and soil.
  • E-waste pollutes the air primarily as a consequence of improper recycling processes that are typical at informal e-waste processing plants located in developing economies
  • E-waste workers dismantle and shred electronics at these plants, which flings large amounts of dust and other particulates into the air.
  • e-waste workers use acids, desoldering materials, and other chemicals to dissolve e-waste with high-value materials like gold and silver . These techniques then release additional damaging fumes into local communities.
  • Recyclers dispose of acids and other chemicals they rely on to strip precious metals from e-waste into streams, ponds, and rivers. Then, the heavy metals inside of e-waste – like lead, arsenic, and cadmium – then compound this damage by seeping into water tables from landfills and e-waste dumps.
  • Increased acidification of waterways leads to more marine life and fish dying.
  • The heavy metals that are present then leach into those same waterways where they damage fishes’ tissues and gills.
  • two contaminants – acid and heavy metals – decimate biodiversity. This creates a domino effect where some organisms – previously constrained by predators – are then able to flourish and dominate the area
  • increased exposure to e-waste leads to ecosystem collapse in and around our waterways.
  • the dismantling, shredding, or burning of e-waste can also release large, coarse particles into the air.
  • due to their size and weight, these particles then quickly fall back to Earth where they subsequently contaminate soil. Shredding and burning of e-waste also produces toxic ash containing heavy metals and flame retardants which then leach into soil.
  • If we want to protect our planet from scourge e-waste, we’re going to have to start prioritizing reuse above all. By embracing this central principle of the circular economy, we can begin diverting valuable electronics away from landfills and back into the hands of people who need them
  •  
    To summarize, E-waste has been the fastest-growing waste stream in the world for nearly a decade, and it has a really negative impact on the environment. And the pace is not decreasing. E-waste is made of the materials that make up the electronics that run our life which are bad for the environment and for our health. Additionally, the three primary impacts are air, water, and soil that negatively affects the environment. Finally, to protect our planet from e-waste is prioritizing reuse of products.
tashaemunnings

Hotels Crank Up TikTok Marketing in Pursuit of Authenticity-Seeking Guests - 0 views

  • Hotel marketers are using short-form video campaigns on the social media app TikTok to score views from millions of potential guests.
  • “Authenticity is quickly becoming the new cultural currency,”
  • The platform doesn’t require polished content. Users will sniff out professionally made videos and they won’t perform as well. Our TikTok strategy is based on showing our beautiful hotels from a guest’s perspective.”
  • ...1 more annotation...
  • “As well as discoverability, ‘saves’ are an important metric for us,” Hyde explained. “Users are now saving the destinations they would like to visit in the future.”
  •  
    Hotels are using Tik Tok to market their locations to their audience. They want to appeal to guests who are looking for companies that are using a more authentic approach to their marketing. This has become a fun and affordable way for them to do so.
shawndab

2022 social media trends hoteliers need to know about - Insights - 0 views

  • Social media features all the possibilities to put communities in a single circle.
  • #tiktoktravel hashtag
  • Note that these 26.1 billion users are not only millennials.
  • ...9 more annotations...
  • . At times, the process needs you to blend in before positioning where you can outshine the competitors.
  • Influencer marketing wins if you’re after a reliable social media strategy
  • identify the influencers who can assist you in boosting your social media hotel awareness.
  • authenticity
  • requesting personalities like famous figures or celebrities in your hotel can assist in building trustworthiness
  • have a trademarked hashtag and inspire potential audiences to use a particular hashtag whenever they stop by your hotel.
  • You can target several sponsored posts in specific areas using the users’ GPS.
  • Most users prefer short-form videos, running at approximately 90 seconds or fewe
  • social media marketing has grown to become a strategy that converts – even in hotels.
  •  
    This article talks about how hotels should make use of TikTok and using certain hashtags, influencers or inviting celebrities to stay at their hotel. It is talking about the importance of being consistent and short like 90 seconds or less. Using trademark hashtags and GPS sponsored content.
ryanbonifas

Press release: Target Field becomes first MLB stadium to achieve LEED Platinum Certific... - 0 views

  • Target Field becomes first Major League Baseball stadium to achieve LEED Platinum Certification via new rating system
  • Minnesota Twins receive highest honor bestowed by the U.S. Green Building Council for continued excellence in Operations and Maintenance at the “Greenest Ballpark in America”
  • Minnesota Twins announced today that they have been awarded LEED Platinum certification for Existing Buildings: Operations & Maintenance – making Target Field the first Major League Baseball venue to receive the U.S. Green Building Council’s highest possible honor via the new LEED v4.1 rating system.
  • ...3 more annotations...
  • LEED (Leadership in Energy and Environmental Design), developed by the U.S. Green Building Council (USGBC), is the most widely used green building rating system in the world and an international symbol of excellence.
  • Target Field is also the nation’s first sports venue to earn three levels of LEED certification through Arc, the state-of-the-art digital platform that uses real-world data to help benchmark, measure and improve sustainability performance.
  • “The Minnesota Twins’ fifth LEED certification at Target Field demonstrates tremendous green building leadership,” said Peter Templeton, interim president and CEO, USGBC.
  •  
    The Minnesota Twins are leading the way in green initiatives in becoming the first MLB stadium to achieve LEED Platinum Certification. As the landscape has changed with the desires of fans and guests to public assembly venues, venues across the country are doing their part to go green and obtain LEED certification. It is a great initiative the venue management industry has engaged on, not only at the major league level, but stadiums, convention centers and performing arts venues are all doing the same.
barbaraw12

4 Ways to Leverage Social Media for Your Hospitality Brand | Hospitality Technology - 1 views

  • Advertisement
  • Be on the channels that matter - Instagram, Facebook and Twitter will be the most beneficial. Don't spread yourself thin by being on social platforms that will have little or no impact.
  • Post social coupons - Whether it's for food or rooms, these coupons and promo codes should be exclusive only to your channel's followers. If customers want a discount, they have to follow your page.
  • ...6 more annotations...
  • Whether
  • Encourage
  • Set up event pages - Hosting live music, trivia or conventions? Set up an event through your Facebook page. When customers mark that they're interested or attending, their followers will see it and hopefully spread the word.
  • Encourage
  • Advertisement
  • These tips should help attract more new patrons and increase repeat visits. Above all, remember to have fun on social media. Going to a restaurant or hotel should be an enjoyable experience. So be creative and use your social channels to show everyone why your place is better than the rest.
  •  
    with technology progressing everyday many business can grow along with it with just making upgrade with using social media. by using IG, Facebook, or even Twitter to show off everything from food to drinks can bring in more customers.
djohn304

Social Media Marketing in the Hospitality Industry Following COVID-19 | SevenRooms - 0 views

  • As of January 2020, there are over 3 billion people around the globe actively using social media,
  • It’s projected that by 2023, the number of users will rise to about 3.43 billion.
  • The most popular social media platform is Facebook, with over 2 billion active users. Other popular social media outlets include Twitter, WhatsApp, Instagram, TikTok and Snapchat.
  • ...12 more annotations...
  • Simply put, social media is here to stay and it appeals to a wide variety of audiences. In the hospitality industry, where it’s so important to connect with people and to help them feel comfortable,
  • If your restaurant has incredible-looking dishes, one quick search on Instagram, and you might find that hundreds of people have posted photos of your food
  • Social media is affordable, connects you to a large audience, can be done instantly, and allows for interaction with customers and potential customers in a way that traditional advertising and marketing doesn’t.
  • 63% of customers note discounts and promotions factor highly in how they choose which restaurants to patronize.
  • Once you have your goals in mind, do your research to determine your target audience. Who are you marketing to?
  • Better lead generation Increased efficiency More organized data Content tailored to your target audience
  • People in the U.S. are inundated with anywhere from 4,000-10,000 advertisements each day,
  • Take followers on a virtual tour of your restaurant Showcase your cleaning and health & safety procedures via video to put customers at ease Create a “behind-the-scenes” video of the kitchen staff preparing meals Interview employees and share their experiences Hold a live stream Q&A session with followers
  • Additionally, answer people’s questions on social media platforms and respond to reviews — especially the negative ones!
  • By taking the time to put a positive spin on negative attention, you’re showing others that you care about their input and want the customer experience to be flawless every time.
  • there has been a significant amount of fearmongering in relation to COVID-19.
  • No matter which area of the hospitality industry you’re in, a social media strategy needs to be an integral part of your marketing plan along with things like SEO, digital ads, and traditional forms of advertising.
  •  
    This article discusses how COVID-19 has highlighted the necessity of social media for hospitality industry players. As it is contactless and gets to virtually everybody's device, it is one of the best forms of advertising a business can use. There are various things a company must do in order to be successful in their social media use. This would be to figure out their target audience, their most preferred platform, and schedule specific and relatable content for your viewership. This form of advertising is extremely cost effective and is proven to work. In my opinion, social media has achieved more than its intended purpose. Platforms like Yelp, TripAdvisor, Instagram, etc have allowed for people all over the world to have access to information about restaurants, hotels, reviews, etc and it is extremely helpful.
amdelgad

Baha Mar Launches Its First Marketing Campaign | Travel Agent Central - 1 views

  • Aiming to highlight Baha Mar's power to elevate real life moments for every guest into something spectacular, the campaign celebrates Bahamian warmth and Baha Mar’s distinct positioning as a destination offering a moment in the sun and everything else under the sun, according to the resort.
  • Each family member experiences the same resort destination, whether looking for “me time” or “we time,” and leaves having fulfilled different personal desires and expectations.
  • We needed to communicate that there is no ‘one size fits all’ approach at Baha Mar. Every nuance of the resort from amenities to special experiences and offerings is purposefully created.”
  • ...1 more annotation...
  • Baha Mar is billed as one of the largest hospitality projects ever built in the Western Hemisphere, with partners including Grand Hyatt, SLS, Rosewood, Jack Nicklaus, sbe, Peter Burwash International and luxury retailers including Bulgari, Cartier, Rolex, Tiffany & Co., amongst others.
  •  
    Baha Mar was recently built to compete with the long time staple in Nassau; Atlantis. In order to overcome the already popular destination, Baha Mar knew they needed to knock the marketing and advertising out of the park. This article talks about how the marketing campaign aimed to highlight all the perks of the 4.2 billion dollar destination. I have personally received a ton of social media ads for Baha Mar, and the sell is that they have 3 different properties for each type of person on vacation. Whether for kids, a romantic getaway, or adults only, they covered all bases with their ads.
carine_elie

UNEP Assesses Links between Chemicals and Waste Management and Other Issues | News | SD... - 0 views

  • On climate change, it highlights joint efforts on long-term monitoring data to evaluate climate impacts on chemical releases, and suggests collaborating on climate change impacts on contaminants in the ocean, and waste and resource management to advance mitigation, and climate triggered channeling of fossil fuel use for plastic production.   On the agriculture and food cluster, the report suggests collaborating on, for example: exposure of farmers from unsound pesticides use; groundwater contamination; use of food conservation, coloring agents, and food safety; and addressing food waste. On sustainable consumption and production, the assessment suggests increasing resource management and efficiency, and informing consumers about chemicals of concern in products. In some cases, the authors argue for collaboration across several clusters. For example, addressing challenges associated with pesticide use requires strengthening efforts across chemicals and waste management, world of work, biodiversity, agriculture and health.
  •  
    This is a brief report on workplace health, biodiversity, climate change, agriculture and food, sustainable consumption and production, and human rights. In addition, the World Health Organization's (WHO) action plan to combat these issues. The goal is to have everything in place by 2030.
slain006

What Is Green Computing? | IBM - 0 views

  • Green computing (also known as green IT or sustainable IT) is the design, manufacture, use and disposal of computers, chips, other technology components and peripherals in a way that limits the harmful impact on the environment, including reducing carbon emissions and the energy consumed by manufacturers, data centers and end-users
  • reducing electronic waste and promoting sustainability
  • The information and communication technology (ICT) sector is responsible for between 1.8% and 3.9% of global greenhouse gas emissions
  • ...4 more annotations...
  • 3% of annual total energy consumption
  • setting up hot and cold aisles is an important step toward greener computing because it reduces energy consumption and optimizes heating, ventilation and cooling.
  • Cost savings from reducing energy use may eventually be realized, as well.
  • employing the power management features reduces energy consumption, as does adjusting the screen brightness.
  •  
    This article explains what green computing is and how it is impacting businesses in order to reduce energy consumption. Provides us the evolution of green computing and how the Environment Protection Agency decided to promote and recognize energy consumption.
anaferia

The biggest cyber attacks of 2022 | BCS - 0 views

  • In a year of global inflation and massive rises in energy costs, it should come as no surprise that the cost of a data breach has also reached an all-time high.
  • average total cost of $4.5m
  • Amongst the 550 companies that IBM contacted that had experienced a data breach, a disappointing 83% had experienced more than one in the same period
  • ...9 more annotations...
  • common attack vector remains credential theft (19%) then phishing (16%), misconfigured cloud (15%) and vulnerabilities in third-party software (13%).
  • Russia has, for many years, attacked Ukrainian infrastructure such as power grids, internet infrastructure and banks. Since the outbreak of physical hostilities, this has extended to systems related to government administration and the military.
  • The Russia-linked cyber gang known as Conti managed to cause major disruption to financial operations throughout Costa Rica in April.
  • Ransomware, while not the overwhelming headline grabber it was a year ago, is still a major and terrifying threat to many companies
  • A group known as Lapsus$ began 2022 with a string of high profile targets including Nvidia, Ubisoft, Samsung and Microsoft. In each case, data was stolen and in many cases leaked online. Their operating model is extortion where access is most often gained through phishing and then they seek out the most sensitive data they can find and steal it. Often, they do not deploy encrypting software at all.
  • Hacking back is where offensive security experts will attempt to compromise attacker’s machines. This can be legally murky as often the attacking machines are compromised third parties.
  • June this year, a former Amazon employee, Paige Thompson, was convicted for her role in the 2019 Capital One breach. While working for Amazon Web Services (AWS), she exploited her knowledge of cloud server vulnerabilities and stole personal information of over 100 million people.
  • cripple Costa Rica’s import/export business.
  • The main attack vectors continue to be credential theft and phishing emails so it is vital to continue to raise awareness through corporate training and public ad campaigns. Finally, the conflict in Ukraine is showing how effective cyber weapons can be in disrupting command and control in a war.
  •  
    To summarize, this article states that, it should not come as a surprise that the cost of a data breach has also increased to an all-time high in a year marked by significant increases in energy prices and worldwide inflation. According to IBM's Cost of Data Breaches Report 2022, the average overall cost is $4.5 million. Additionally, even if ransomware isn't garnering as much attention as it did a year ago, it still poses a serious danger to many businesses. Credential theft and phishing emails are still the major threat vectors, therefore it's critical to keep spreading awareness through public awareness campaigns and business training. Finally, the situation in Ukraine is demonstrating the potency of cyber weapons in sabotaging command and control in a fight.
kjeewan

Data Security in the Hospitality Industry: Post-COVID Era | LoginRadius Blog - 0 views

  • The frequency of cyberattacks against business databases can be attributed to the fact that the hospitality industry largely depends on credit cards as a medium of payment. This may increase the chances of a hacker receiving access to sensitive information. Investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  • databases in the hospitality industry also happen to be the most vulnerable to data breaches.
  • The aforementioned reliance on payment cards can greatly increase the chances of information leaking. However, other virtual methods of payment like online payment and more can create the potential for cyber attacks.
  • ...6 more annotations...
  • The data collected and the people who can access it differ from country to country.
  • Staff training is restricted to the service aspect of the business. However, training employees to carry out processes in maintaining data security in hospitality like data collection and storage in the right manner is overlooked.
  • This process can involve the addition of two-factor authentication that will protect the data from being accessible to non-employees. This encryption can prevent identity theft.
  • : Employees will require thorough vetting regarding the importance of proper data storage. This training can also work towards reducing the chances of insider attacks as only a few employees will have access to the databases.
  • This includes the addition of firewalls, traffic filters, and network monitors to guard against malware present online.
  • , investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit.
  •  
    Personal information collected can range from generic data like names and phone numbers to sensitive data like bank accounts. Databases in the hospitality industry are the most vulnerable to data breaches. Reliance on payment cards or virtual payments can increase the chances of information leaking or potential for cyber attacks. Staff training in maintaining data security is overlooked. two-factor authentication, Employees training to reduce insider attacks, and cyber security measures such as adding of firewalls, traffic filters, and network monitors to guard against malware present online can ensure data security for consumers and the business.
erinkieltyka

Suspected Ransomware Attack on InterContinental Hotels Affected Over 4,000 Guests | Spi... - 0 views

  • Ransomware generally entails infiltration and compromise, exfiltration of data, and the encryption of data/systems/networks. Hospitality was the eighth most targeted sector by ransomware groups between March 2021 and April 2022.
  • 4,053 ICH users and 15 of its 325,000 employees were compromised in the attack whose perpetrator remains unknown.
  • The company was unable to accept online bookings
  • ...7 more annotations...
  • determine whether the latest cyberattack is more significant than the 2016 breach of the ICH systems. Initially thought to have been a minor breach that affected 12
  • Between September 29 to December 29, 2016, 1,175 properties were infected by malware designed to steal credit card data
  • Marriott International has been breached thrice, resulting in the compromise of the personally identifiable information of up to 338 million guests
  • Marriott was also fined £18.4 million ($23.8 million) by the U.K’s data regulator Information Commissioner’s Office for failing to protect the data of the 338 million guests
  • This is yet another reminder of the damaging impacts of cybercrime. Not only is IHG potentially getting held to ransom for its data access, but it is also losing out on customer bookings
  • Organizations should use this as a warning to never gamble with their cyber defenses. After all, the cost of preparing and preventing an attack is far less than the cost of recovering from one
  • Data breaches, on average, cost organizations $4.25 million in 2022, according to IBM’s 2022 Cost of Data Breach report.
  •  
    This article discusses a recent cyber-attack on ICH that is believed to have been a ransomware attack. It's stated that hospitality is the 8th most targeted sector for ransomware as of recently. The recent attack on ICH 4,053 users and 15 employees were compromised, which is actually far less than their last attack in 2016 that effected 1,175 properties. Hotels must take as much precaution as possible against cyber attacks because not only does it decrease their bookings, but they can also be charged millions in fines for information breaches.
smend120

Cyberattack on Luxury Resort Should Put Hospitality Industry on High Alert | Fisher Phi... - 0 views

  • Cyberattack on Luxury Resort Should Put Hospitality Industry on High Alert
  • Cybercriminals are finding new ways to hold their victims hostage
  • a recent cyberattack on a luxury resort should serve as a warning for your business.
  • ...17 more annotations...
  • The Allison Inn & Spa, recently fell prey to a ransomware attack that left its employees’ and guests’ personal information exposed
  • the stolen information – which includes data from 1,500 employees and more than 2,500 guests, including dates the guests stayed at the hotel as well as employees’ birthdays, phone numbers, and Social Security numbers – was posted on the public internet in easily searchable form.
  • Typically, stolen confidential information such as this is only published on the “dark web” and is not as easily retrieved through any type of online searches.
  • New Tactic Reveals New Dangers
  • If affected devices cannot be removed from the network (or if the network cannot be temporarily shut down), secure the network by powering down infected devices to avoid any further spread of the ransomware infection;
  • the public release of the confidential guest and employee data may have been an “experiment” to see whether it could further ratchet up pressure on the business to pay out the ransom.
  • this new tactic may be a trend we see from cybercriminals looking to extort their victims in future ransomware attacks.
  • What Should Your Business Do?
  • be prepared to implement comprehensive cybersecurity risk management processes.
  • Determine what systems were impacted and immediately isolate them
  • they were hoping to force the business to pay them a ransom.
  • Triage impacted systems for restoration and recovery
  • Engage your internal and external stakeholders
  • Retain legal counsel to provide guidance
  • Retain a third-party incident response provider
  • Report the incident to law enforcement
  • companies should consider deploying multifactor authentication in order to gain access to company networks, provide robust cybersecurity training to all employees on an annual basis, and maintain offline, encrypted backups of all internal data.
  •  
    Cybercriminals are constantly coming up with novel schemes to kidnap their victims. A recent cyberattack on a five-star resort should act as a cautionary tale for your company. In Oregon, the Allison Inn & Spa recently became the target of a ransomware assault that revealed the personal data of its staff and visitors. The stolen data was published in easily accessible form on the public internet and includes details from 1,500 employees and more than 2,500 guests, including dates of the guests' hotel stays as well as employee birthdays, phone numbers, and Social Security numbers. The "dark web" is typically the only place where stolen private information like this is released, making it harder to find through regular online searches. The goal of the cybercriminals was to coerce the company into paying a ransom. The public disclosure of the private visitor and staff information seems to have been an "experiment" to see if it would increase pressure on the company to pay the ransom. Cybercriminals may use this new strategy frequently in the future to demand ransom from their victims. The implementation of thorough cybersecurity risk management procedures should be considered by resorts. In the event of a cybersecurity attack, determine which systems were affected by the attack and immediately isolate them. Then, prioritize those systems for restoration and recovery. After which, involve internal and external stakeholders and retain legal counsel for advice. It is crucial that you hire a third-party incident response provider and notify law enforcement. Multifactor authentication should be used by businesses to protect network access, and they should also annually train all staff in cybersecurity best practices and keep offline encrypted backups of all internal data.
shawndab

Cybersecurity revenues in tourism to exceed $2B - hotelbusiness.com - 0 views

  • cybersecurity will generate revenues of $2.1 billion in 2025 in the travel and tourism industry, up from $1.4 billion in 2021, forecasts GlobalData, a leading data and analytics company.
  • highlights the growing demand for cybersecurity products and services by travel and tourism companies in order to protect their customers’ personal data.
  • Travelers now expect a seamless experience while traveling, resulting in companies using technologies such as Internet of Things (IoT) and cloud. However, this has made the sector vulnerable to cybercriminals as these technologies collect more personal and sensitive but valuable data.”
  • ...5 more annotations...
  • not only are customers put at risk, but so is an entire company’s reputation.
  • A string of high-profile attacks in the industry has led to the scrutinization of cybersecurity strategies, with regulators now clamping down and fining companies that fail to protect their customers’ data.
  • Therefore, the risk of cyber-ignorance is escalating, and tourism companies need to start taking cybersecurity seriously.
  • “Effective cybersecurity strategies must involve contingency planning, as merely investigating an attack in its aftermath
  • “Hiring a CISO is a good start but if travel and tourism companies want to prove that they are committed to cybersecurity,
  •  
    This article is about the demand for cybersecurity products and services. Using more technology has made our industry more vulnerable and a lack of protected data can leave a company's reputation at risk. It mentioned how cyber-ignorance can be more costly in the long run. Hotels need a contingency plan to be proactive and not reactive.
tashaemunnings

As Canadians start travelling more, security risks increase | IT World Canada News - 1 views

  • As people engage in more travel, both for personal reasons and work trips, in the coming months, travellers may face more cybersecurity risks. Check Point Research, a cybersecurity solutions company, has seen a 40 per cent increase in attacks within the hospitality industry over the past year. 
  • Robert Falzon, head of engineering at Check Point Canada, said there are security risks in every step of travel, from the point of booking to departure.
  • He noted that one big issue is password re-use between sites.
  • ...2 more annotations...
  • Falzon also talked about a recent tactic which involves attackers accessing people’s information through public WiFi.
  • He noted that generally, there is no security put on these WiFi systems.
  •  
    With an increase in travel, there is also an increase in security threats. Most of this comes from people reusing passwords and logging into unprotected, public Wi-Fi. Doing thee things make it easier for hackers to get ahold of a person's sensitive information. It is important that passengers think twice about what websites and servers they are using as well as their credentials.
peacejj22

Gamification: The Hotel Effect - 0 views

  • Gamification: The hotel effect
  • Nowadays, the ways to attract guest attention and interest are countless, and being able to capitalize on today’s new technologies and digital transformation is just as important as presenting an unforgettable stay for your guests. With this in mind, we’ve taken interest in a new and innovative trend that hotels have begun adding into their marketing repertoires - gamification. 
  • use cases of this concept present a wide array of possibilities
  • ...7 more annotations...
  • Why is gamification so effective in hospitality?
  • One of the important points of gamification is that it serves as a completely interactive digital experience. Being a new concept gives visitors the excitement of being able to engage with something fresh, and the interactive aspects of gamification is what keeps them interested in the program - and ultimately, of course, the property. Hotels around the world have begun introducing different variations of gamification, from simple point systems to full-fledged casino-like game ideas. Whether it be keeping up with guest loyalty or creating a sense of scarcity and urgency, gamification is a budding trend that’s set to take over the hospitality world. 
  • In addition to creating an engaging and interactive first impression for your potential guests, it’s equally important to be able to have something that keeps them constantly wanting more from you; and this is exactly what La Quinta Inns & Suites did.  The brand presented visitors with “Play & Stay”, a tremendously addictive game where users were able to potentially win collectibles or points of the brand with a digital slot machine and wheel of fortune. 
  • With “Play & Stay’s” digital slot machine, guests can use these tokens to access the game. The more times they play, the more chances they get to receive La Quinta-relevant rewards such as discounts or stays without blackout dates. The game’s addictiveness, in addition to the great potential rewards, adds to the guest's desire of returning back to the La Quinta website, and spinning the wheel again to see what more prizes they can potentially win. This in itself already helps to builds a large loyal base of La Quinta followers, and the gamification strategy’s success only amplifies its potential.
  • Accor Hotels
  • When creating a point-based gamification strategy, Accor Hotels has hit all the right spots with their Accor Live Limitless (ALL) program. The brand’s ALL program lies solely in a simple yet equally effective point system. Though it seems straightforward, the Accor point system possesses an in-depth array of different aspects in the overall strategy. Five different ALL program levels, depicted with different cards, range from classic to diamond and contain different perks each. Focusing on the actual stays of the guests, the program allows users to accumulate reward points every time they book or stay at one of the participating ALL program hotels, and members can earn additional reward and status points for every 10 Euros spent.
  • We at THN love exploring and learning about new hotel marketing initiatives, and look forward to creating more content and additional follow-ups to the growing and innovative gamification trend. We can’t wait to see what more exciting gamification strategies you have in store! 
  •  
    this article talks about how gamification is impacting the Hospitality industry.
apere870

The new ways cybercriminals are attacking travel companies | PhocusWire - 0 views

    • apere870
       
      This article discusses the new way cybercriminals are attacking travel companies. It seems that cyber breaches are more common now with businesses in the hospitality sector. The main target for hackers is small hotel chains that don't have adequate infrastructure.
ryanbonifas

Video surveillance helps secure World Poker Tour tournament | Security Magazine - 0 views

  • Video surveillance helps secure World Poker Tour tournament
  • The casino needed to have comprehensive coverage to enhance both event security and the safety of VIP guests; secure premises and protect against fraud and theft; and fulfill legal requirements set by local regulators.
  • To improve video coverage of gaming tables and the casino floor, security engineers from Volga Elektronik installed IDIS 5MP dome cameras and the IDIS Solution Suite (ISS) video management system (VMS). The expanded surveillance system helps operators detect, verify, analyze and rapidly respond to security and safety events and meet the requirements of regulatory gaming integrity.
  • ...1 more annotation...
  • "Our security team can quickly and efficiently respond to incidents and resolve disputes to reduce table stoppages. The result is an enhanced patron experience that builds on our reputation as one of Europe's top gaming destinations."
  •  
    Poker and casino type events are a great target for crime. As the need to secure not only the safety of guests grow, but the protection of a venue and its assets, venues like the Merit Royal Hotel and Casino are constantly upping their game to ensure venue and life safety.
slain006

Cybersecurity In the Hospitality Industry - 0 views

  • Like other industries that traditionally underinvest in cybersecurity, the hospitality industry has recently come under increased attacks from cybercriminals.
  • attracts new customers, and streamlines operations, bringing huge opportunities
  • While restaurants and hotels serve guests, they are also serving up valuable credit card and personal data to cybercriminals without even knowing it.
  • ...5 more annotations...
  • Despite most attackers focusing on card data, increasingly they are looking at your loyalty programs
  • Unless hospitality businesses protect themselves properly with a proactive cybersecurity strategy, all of this data is vulnerable to exploitation by organized cybercrime.
  • A key activity is to ensure a business has been properly audited from a cybersecurity perspective. You need to properly audit your IT infrastructure, your POS systems, and ensure all endpoint software is up to date and properly patched. 
  • In addition to ensuring that POS terminal software is up to date and properly patched, make sure that you are following government-mandated and PCI compliance standards for these terminals. 
  • Train Employees
  •  
    Article talks about how cyber hacking is at an all-time high in the hospitality industry. Two main areas that hackers look into the most would be loyalty programs and POS systems as they have more important data. It also talks about how companies can do in order to better protect themselves such as firewalls.
« First ‹ Previous 5661 - 5680 Next › Last »
Showing 20 items per page