Tag Archives: Cybersecurity

Hospitality Industry Technology Update: “Smartphones to Open Doors at Some Hotels”

“…Guests at these properties will receive a message on a Starwood app containing a virtual key, which will unlock the door with a tap or twist of their phone through the use of Bluetooth technology.Image The company says the iPhone 4s or newer models and the Android phones running 4.3 or newer will be compatible…”

“…Nevertheless, many hotel operators have been searching for ways to eliminate the bottlenecks that can form at a hotel’s front desk. The delays are the bane of many a road warrior’s travel experience…”

Guests arriving at the Aloft Hotel in Manhattan or one in Silicon Valley will soon be able to do something hotels have dreamed about offering for years: walk past the check-in desk and enter their rooms by using a smart phone as a room key.

The boutique hotel brand from Starwood Hotels & Resorts Worldwide Inc. plans to offer this feature at two hotels, in the Harlem neighborhood and in Cupertino, Calif., before the end of the quarter.

For more: http://online.wsj.com/news/articles/SB10001424052702304856504579339130820876304?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304856504579339130820876304.html

Comments Off on Hospitality Industry Technology Update: “Smartphones to Open Doors at Some Hotels”

Filed under Guest Issues, Maintenance, Management And Ownership, Privacy, Technology

Hospitality Industry Cyber Security Risk: “The Target and Neiman Marcus Breaches: What Hoteliers Need To Know”

“…Most of all, hotel companies need to make a commitment to secure the sensitive information of their companies and their guests, and to seek out informed consultants and advisers.Image Information security is a relatively new and rapidly changing area, and requires specialized knowledge; the investment today can protect a hotel from being front page news — for the wrong reasons — later. Developing a comprehensive information privacy and security program…”

The recent headlines about the Target and Neiman Marcus security breach with customer credit cards highlights a growing crisis that concerns owners and operator of hotels as well as retailers. In this article, Bob Braun, one of the senior members of our Global Hospitality Group® who focuses on data security — when he is not working on hotel management or franchise agreements — gives us some thoughts on what to do about this problem.

The Target and Neiman Marcus problem. When 50 million Americans – more than 15% of the nation’s population – wake up to find that their credit card information was compromised while Christmas shopping, we all take note. When we find out that there were 70 million victims, and the information went far beyond credit card information, and that it wasn’t just one chain, Target, but at least four more, including Neiman Marcus (which estimates 40 million payment card numbers were compromised), we should start to look at our own businesses and procedures to think about how we should plan for and respond to these malicious attacks.

For more: http://www.hospitalitynet.org/column/global/154000392/4063594.html

Comments Off on Hospitality Industry Cyber Security Risk: “The Target and Neiman Marcus Breaches: What Hoteliers Need To Know”

Filed under Crime, Management And Ownership, Privacy, Risk Management, Technology, Theft

Hospitality Industry Cyber Crime Risks: Boston Restaurant Group Was Source Of Major Credit Card Payment System Breach; “Sophisticated, Outside Attack”

“…The (restaurant group) believes that it was a sophisticated, outside attack…Boston Police and the US Secret Service are Hospitality Industry Identity Theftinvestigating…This is the second major breach of the Briar Group’s payment systems. In 2009, malware, or malicious software, was apparently installed on Briar’s computers, allowing thieves to access credit and debit card information. The chain paid a $110,000 to the state to settle allegations that it failed to protect diners’ personal information after that security breach.

A local restaurant chain confirmed Friday that its computer systems were breached, putting the credit-card information of thousands of customers at risk, including visitors who attended two major conventions in Boston.

The Briar Group, which owns 10 restaurants and bars in Boston, including two at the Westin hotel connected to the Boston Convention & Exhibition Center, said its computer systems were infiltrated sometime between October and early November. It said customer names, credit-card numbers, expiration dates, and security information were captured from the cards’ magnetic strips.

The company isn’t sure how many customers were affected, but every month thousands visit Briar’s locations, said Diana C. Pisciotta, a spokeswoman for the chain.

The American Public Health Association hosted 13,000 conventioneers in Boston in early November, and the American Society of Human Genetics brought 8,000 attendees to a conference in October. Both reported that hundreds of people reported unauthorized charges on their accounts after visiting Boston.

For more: http://www.bostonglobe.com/business/2013/12/27/local-restaurant-chain-source-data-breach-that-compromised-card-info-conventioneers/wPhKKndyN4hshrU47J2rwO/story.html

Comments Off on Hospitality Industry Cyber Crime Risks: Boston Restaurant Group Was Source Of Major Credit Card Payment System Breach; “Sophisticated, Outside Attack”

Filed under Crime, Guest Issues, Liability, Maintenance, Management And Ownership, Risk Management, Technology, Theft

Hospitality Industry Cybercrime Risks: Criminal Hackers Target Hotels Lacking “Advanced Data Security Safeguards” On Local Credit Card Transactions; “Chip-And-Pin Cards” Coming Soon

“…criminal hackers gravitate to some hotels because, like retail stores and restaurants, hotels do many credit card transactions at a local level, where centralized and highly sophisticated data security safeguards may be lacking…Most hotels are locally owned, though managed by big Cyber Risk Insurance Graphichotel chain companies. For hotel owners, it is expensive to come into full compliance with the tough global data security criteria set by the credit card companies…That includes using complex passwords, being wary of public Wi-Fi, updating antivirus software — and checking credit card statements carefully…”

“…In the United States, credit cards use magnetic strips that are more vulnerable to hacking than the electronic chips embedded in credit cards in Europe and elsewhere. Such cards also require entry of a PIN…these so-called chip-and-PIN cards are headed our way, said Kathy Orner, vice president for information security at Carlson Rezidor, a worldwide hotel company that is among the industry leaders in data security…all of the major credit card issuers plan to start introducing these cards in the United States within two or three years…”

In its 2013 Global Security Report, Trustwave, a data security management firm, says that the top three industries targeted for data breach attacks in 2012, measured by the number of its investigations, were retailing (45 percent), food and beverage (24 percent) and hotels (9 percent). Three years ago, the hotel industry was at the top, but hotels have since made “significant strides” in improving credit card security measures, the report says.

Last year, for example, the Federal Trade Commission sued Wyndham Worldwide, the hotel chain, for what it said was inadequate safeguarding of credit card information that led to three data breaches at hotels in under two years, with “millions of dollars in fraud loss, and the export of hundreds of thousands of consumers’ payment card account information to an Internet domain address registered in Russia.”

The threat is constant, Mr. Roman said. “The best protection is vigilance, and that takes work,” he said.

For more:  http://www.nytimes.com/2013/09/03/business/data-security-begins-with-the-traveler.html

Comments Off on Hospitality Industry Cybercrime Risks: Criminal Hackers Target Hotels Lacking “Advanced Data Security Safeguards” On Local Credit Card Transactions; “Chip-And-Pin Cards” Coming Soon

Filed under Guest Issues, Insurance, Liability, Management And Ownership, Privacy, Risk Management, Technology, Theft

Hospitality Industry Information Risks: “Cyber-Risk Insurance” Protects Businesses Against “Data Breaches”

…CFOs are looking for insurance against cyber threats. In the past few years,  cyber-risk coverage has become one of the fastest- Cyber Risk Insurance Graphicgrowing businesses for insurers…Businesses, government agencies, hospitals and schools in  the U.S. reported 343 data breaches this year through July, reports CFOJ’s  Maxwell Murphy. That exceeds the number reported in all of 2006 and puts 2013 on  pace for 588 breaches, the most since 2010…”

Data breaches have been on the rise after a dip in the past two years, and experts say the publicly disclosed breaches of computer networks may be only a  fraction of the total.

Cybersecurity used to be something that Ciena CFO James Moylan Jr. delegated. But now he spends as much as 10% of his time making sure  Ciena and its technologies are protected from hackers, cutthroat competitors and other potential cybercriminals. “With all the things that have been in the  news—hackers and, frankly, the Chinese—it’s all caused us to think about” how to cut the potential cost of a data breach, he says. The average cost of a breach  is about $188 per stolen record, and the average loss per incident is $9.4 million, according to a study last week from the Ponemon Institute.

For more:  http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-300092/

Comments Off on Hospitality Industry Information Risks: “Cyber-Risk Insurance” Protects Businesses Against “Data Breaches”

Filed under Crime, Guest Issues, Insurance, Liability, Management And Ownership, Risk Management, Theft

Hospitality Industry Cybercrime Risks: Hotel And Restaurant “Connected Point-Of-Sale (POS) Systems” Attacked By New Malware Called “Dexter”; Steals Credit Card Data And Transmits It “Encrypted” Back To Attacker

“…Just before the 2012 festive period, a new piece of malware surfaced and was found in hundreds of POS systems in hotels, restaurants, retailers and private parking providers. The malware was discovered by Israel-based security cybercrime in hotelsfirm Seculert: ‘Dexter’ (which comes from the string ‘BKDR_DEXTR.A’) is a data-theft tool used to target and attack POS systems. The program, which is Microsoft Windows-based, uses common techniques to search the memory of running processes to identify credit-card track data, but with the uniqueness of the attacker having full control…”

Connected point-of-sale (POS) systems – that’s the checkout to you and me – are the most recent targets of the cybercriminal, and a specially-crafted malware, dubbed Dexter, is further indication that now all kinds of connected devices may be vulnerable to attack.

Seculert CTO and co-founder Aviv Raff explains that while the company is as yet uncertain as to who is behind Dexter, the author is fluent in English: Dexter mainly targeted English-speaking countries. The malware was located in 40 different countries, but notably 42 per cent of POS systems targeted were in North America and 19 per cent UK-based. “Instead of going through the trouble of infecting tens of thousands of consumer PCs or physically installing a skimmer, an attacker can achieve the same results by targeting just a few POS systems with specially crafted malware,” Raff says.

The malware injects itself into the iexplore.exe file in Windows servers, through rewriting in the registry key. It then’ pinches sensitive credit-card data from the server, before transferring it through a remote command and control system. Windows-based POS systems are used increasingly in the industry, and according to Seculert’s findings, 51 per cent of targeted POS systems use the outdated Windows XP. The high percentage indicates Windows-based machines that process unencrypted track data are viable targets.

Microsoft Windows XP may be the ‘preferred’ choice for POS systems, especially among smaller retailers who feel that they cannot afford to upgrade, but with the operating system to be discontinued in 2014, the question is over what support will be offered for remaining XP users and if they will be able to handle the upgrade to Windows 7 or 8.

“Dexter only has three purposes in life,” says Trustwave’s security researcher Josh Grunzweig. “To always be running on the victims’ machine, to find any card, or track, data in any running program on the victim, and to communicate with the attacker who is controlling it.”

The latter is what makes the malware stand out and impresses Grunzweig. “I can’t remember the last time I saw a piece of malware that targeted POS systems that had a nice command and control structure to it,” adds Grunzweig.

He explains the hacker maintains control of the attack by using normal communication methods, but with the skill to hide what it was sending by encoding the data. This involved sending out a message to the attacker, by default, every five minutes and also checks the victim to see if there is any track data running every 60 seconds.

The magnetic strip on a credit card contains three tracks and the malware attempts to extract data from memory relating to tracks one and two, containing numeric or alphanumeric data that can be used to clone the card that was used in a transaction. If Dexter finds any of this track data, it alerts the attacker in the next message sent and the process is repeated. The attacker has the control to change the times and install additional malware or even remove Dexter altogether.

“The most unusual thing about Dexter is the small amount of public attention it has received,” says Trustwave’s Josh Grunzweig. “The issues that make POS-specific malware difficult to discuss in the industry also affects the ability of antivirus companies; without samples they are unable to provide detailed protections for specific threats.”

For more:  http://eandt.theiet.org/magazine/2013/03/turn-on-log-in-checkout.cfm

Comments Off on Hospitality Industry Cybercrime Risks: Hotel And Restaurant “Connected Point-Of-Sale (POS) Systems” Attacked By New Malware Called “Dexter”; Steals Credit Card Data And Transmits It “Encrypted” Back To Attacker

Filed under Claims, Guest Issues, Liability, Management And Ownership, Privacy, Risk Management, Technology, Theft

Hospitality Industry Information Security Risks: Hotels, Restaurants And Retailers Accounted For 78% Of “Data Breaches By Cyber-Criminals” In 2012; “Weak Or Guessable Passwords” Is Most Common Vulnerability

“…Almost one-third of all victims had critical systems administered by a third party…Attackers had no trouble exploiting that weakness, with vulnerable remote-access systems accounting for the method of entry in 47 cybercrime in hotelspercent of the cases…in most cases, users – not software vulnerabilities – were to blame. Almost 90 percent of systems had weak or easily guessable passwords, with “Password1″ continuing to be the most common, according to Trustwave’s report…”

An analysis of breach data for 2012 found that retailers and the hospitality industry continued to command the most interest from cyber-criminals, accounting for 78 percent of the breaches documented by security services firm Trustwave.

The businesses are typically easy targets, having outsourced the administration of important servers and business data to firms that focus more on keeping the systems functioning than on security, says Christopher Pogue, director of digital forensics and incident response for Trustwave’s SpiderLabs.

“An integrator may have 1,000 customers and may do remote administration for all of them using, not 1,000 passwords, but maybe two or three,” Pogue said. “That leaves a vulnerability that can be exploited by attackers.”

For more:  http://www.techweekeurope.co.uk/news/retailer-hotel-crime-107589

Comments Off on Hospitality Industry Information Security Risks: Hotels, Restaurants And Retailers Accounted For 78% Of “Data Breaches By Cyber-Criminals” In 2012; “Weak Or Guessable Passwords” Is Most Common Vulnerability

Filed under Crime, Liability, Maintenance, Management And Ownership, Privacy, Risk Management, Technology, Theft

Hospitality Industry Wireless Security Risks: Cyber Criminals Setting Up "Mock Wi-Fi Hot Spots" At Hotels To Steal Wireless Device Data

“People will see ‘free Wi-Fi’ and click on it, and when they do that they open themselves up to great exposure…the best approach is to be wary and steer clear of Wi-Fi hotspots that do not seem legitimate — something (that) looks like it’s not quite right, not the proper name they might expect,” 

Gary Davis, McAfee’s director of global consumer marketing, said there was a growing trend of hackers setting up mock Wi-Fi hotspots in public places, which appear at the top of the list of available Wi-Fi connections.

Once compromised, hackers can take total control of a device, including removing all the data contained on it. Android devices are currently the devices most targeted by hackers, Davis said.

“We saw a 1,200% increase in malware targeting Android devices just in the first quarter of this year,” he said.

John said the best approach for business travelers when using public Wi-Fi is to remotely log into their employer’s virtual private network, or VPN, which ensures all data received and sent from a device is encrypted.

For more:  http://edition.cnn.com/2012/06/12/business/cyber-hackers-data-security-travel/index.html

Comments Off on Hospitality Industry Wireless Security Risks: Cyber Criminals Setting Up "Mock Wi-Fi Hot Spots" At Hotels To Steal Wireless Device Data

Filed under Crime, Guest Issues, Liability, Maintenance, Risk Management, Technology, Theft

Hospitality Industry Information Technology Risks: Hotel And Restaurant "POS Systems" Are The #1 Target Of Criminal Data Breaches

If a criminal can breach a system in the restaurant, they also have access to the front desk, the spa and any other connected system. The risk is even greater when hotels are part of a hotel chain with interconnected systems.

Franchise businesses are particularly at risk primarily because franchises tend to have the same POS system duplicated at all locations. If a cybercriminal can figure out a way to breach one, in all likelihood, they can replicate the attack at other locations.

In 2011, Trustwave SpiderLabs conducted 42 percent more data breach investigations than in the previous year. More than 85 percent of these data breaches occurred in the food and beverage, retail and hospitality industries.

Why the focus on these industries? There are several reasons, but the number one is that they all process credit cards. In our investigations, we found that the vast majority of assets targeted by criminals were point-of-sale software systems (75 percent of cases). Think of the scenario of a hotel that maintains a restaurant, a spa, as well as other services all connected to one POS system.  We’ve investigated cases where the criminal breaches the environment at one location and was in turn able to connect todozens of others through the wide area network used by the hotel chain.

For more:  http://www.forbes.com/sites/ciocentral/2012/04/11/restaurants-beware-hackers-want-your-customer-data/

2 Comments

Filed under Crime, Guest Issues, Liability, Maintenance, Management And Ownership, Privacy, Risk Management, Technology, Theft

Hospitality Industry Information Technology Risks: Hotel And Restaurant "POS Systems" Are The #1 Target Of Criminal Data Breaches

If a criminal can breach a system in the restaurant, they also have access to the front desk, the spa and any other connected system. The risk is even greater when hotels are part of a hotel chain with interconnected systems.

Franchise businesses are particularly at risk primarily because franchises tend to have the same POS system duplicated at all locations. If a cybercriminal can figure out a way to breach one, in all likelihood, they can replicate the attack at other locations.

In 2011, Trustwave SpiderLabs conducted 42 percent more data breach investigations than in the previous year. More than 85 percent of these data breaches occurred in the food and beverage, retail and hospitality industries.

Why the focus on these industries? There are several reasons, but the number one is that they all process credit cards. In our investigations, we found that the vast majority of assets targeted by criminals were point-of-sale software systems (75 percent of cases). Think of the scenario of a hotel that maintains a restaurant, a spa, as well as other services all connected to one POS system.  We’ve investigated cases where the criminal breaches the environment at one location and was in turn able to connect todozens of others through the wide area network used by the hotel chain.

For more:  http://www.forbes.com/sites/ciocentral/2012/04/11/restaurants-beware-hackers-want-your-customer-data/

2 Comments

Filed under Crime, Guest Issues, Liability, Maintenance, Management And Ownership, Privacy, Risk Management, Technology, Theft