<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Traveling this Summer? Don't Let Your Data Get Checked Out

You probably really never think too much about it. You are on a trip and check into your hotel. After you get settled, you want to check your Facebook, email, Instagram and Twitter accounts. So, you will do what you have been doing every other time you check into a hotel, you click on the wifi that is given you to.

But, have you really ever thought about the information you are giving out over the web?


Using the hotel password and wifi might not be the smartest thing you can do. For the hospitality sector, securing guests; not users’ networks, is the priority.

Hotels Lack Ideal Security Measures

Hotels are more worried about how the business looks from the outside then what could be happening on the inside.

Hackers have taken notice as well.

According to a recent report by the UK Government Cyber Security Breaches Survey in 2016, compared with other industries, the hospitality sector is less engaged with cyber security - and are less likely to see it as a priority.

Report Shows Hotels Need to Catch Up

  • One in five don’t apply software updates when available
  • A quarter don’t have sufficient firewall protection
  • A third don’t have updated malware protection
  • 40% of businesses never notify senior managers about cyber security issues

At hotel reception credit card informationMany managers have not seen this as an issue, but guests sure will. A guest who is staying in an un-secure hotel will be apt not to return. After all, not many people want their information stolen and used against them.

With cyber attacks on the rise, the hospitality industry is a major target considering the level of valuable personal data it holds.

The report goes on to talk about the cyber risks that hotels can face if they do not get with the times and update their security practices.

Cyber Risks Facing Hotels

Point of sale thefts – incidents have occurred where cyber criminals have harvested customers’ names, credit card numbers and CVV codes after installing malware on card payment systems.

DarkHotel hacking of corporate guests – a campaign which has seen business guests targeted after connecting to the internet via hotel wi-fi.

Phishing scam targeting customers and hotels – guests have been tricked into handing over their details on fake websites posing as a legitimate booking site while hoteliers were also lured into sending their monthly fees to fake branded webpages.

DoS attacks close hotel websites – a typical technique employed by hackers is a denial of service attack which can shut down an entire hotel chain’s website by overwhelming it with traffic sources.

10 Tips For Better Cyber Security

So What Should Hotels Do to Stop the Attacks?

You will never be able to fully stop cyber attacks. But, hotels need to get with the times and update their security systems with the latest technologies. A hotel should posses enough tools and practices to reduce the risk of an attack, and to know when an attack is taking place. This is accomplished by building and frequently re-evaluating a visibility plane.


“9 Tips to” Protect Against Credit Card Theft
As we all know, theft of credit card data, or skimming, continues to be on the rise and there are certain security standards, which must be followed.

  1. Replace your credit cards after a data breach.
  2. Guard your information - Phishing emails often request both sensitive (account information, passwords) and non-financial information (DOB, name, address, etc.) to commit fraud and identity theft.
  3. Change passwords frequently. And use strong passwords.
  4. Security freeze - blocks your credit history from being viewed by lenders.
  5. Frequently check your bank statements online.
  6. Use a secure pay device, like an EMV card or secure digital pay service (Apple Pay, Google Wallet, etc.) whenever possible.
  7. Report fraud and financial crime immediately.
  8. Take advantage of your bank's online banking safety security features.
  9. Request a temporary card number from your credit card issuer for making purchases online.

Hotels should also have background checks in place during the recruitment process and ensure IT security policies are in place, which includes deleting access when an employee leaves the business.

What Happens When an Attack Does Occur?

If a cyber attack does occur, hotels need to have in place a cyber security plan that has been tested and is updated on a regular basis.

A post from InfoSec Institute said:

As the Stroz Friedberg’s managing director Bryan Rose takes it, the fact that cyber insurers do not undertake rigorous assessment before creating cyber policies in writing means that they fail to identify the high-risk clients. Consequently. “[T]here’s a real risk that insurance companies are not appropriately pricing the risk,” Rose concludes.

A lot of companies fail and do not receive insurance payment because they did not have a plan in place or it was not effective enough. If this undertaking seems daunting, perhaps it's time to weight the pros and cons of outsourcing you network security. 

At the end of the day, it is all about making sure your business and customers are secure. This is why hotels need to have cyber security at the top of their priority lists.

Written by Tim O'Neill

As the Senior Technology Consultant & Chief Editor at LoveMyTool, Tim O’Neill has over 45 years of technology experience at data/voice and video networking analysis companies, including successful senior roles in Sales, Product Design, Marketing Management, Business Development and Security.

Authors

Topics

Sign Up for Blog Updates