10 Minutes News for Hoteliers 10 Minutes News for Hoteliers
  • Top News
  • Posts
    • CSR and Sustainability
    • Events
    • Hotel Openings
    • Hotel Operations
    • Human Resources
    • Innovation
    • Market Trends
    • Marketing
    • Mergers & Acquisitions
    • Regulatory and Legal Affairs
    • Revenue Management
  • 🎙️ Podcast
  • 👉 Sign-up
  • 🌎 Languages
    • 🇫🇷 French
    • 🇩🇪 German
    • 🇮🇹 Italian
    • 🇪🇸 Spain
  • 📰 Columns
  • About us
10 Minutes News for Hoteliers 10 Minutes News for Hoteliers
  • Top News
  • Posts
    • CSR and Sustainability
    • Events
    • Hotel Openings
    • Hotel Operations
    • Human Resources
    • Innovation
    • Market Trends
    • Marketing
    • Mergers & Acquisitions
    • Regulatory and Legal Affairs
    • Revenue Management
  • 🎙️ Podcast
  • 👉 Sign-up
  • 🌎 Languages
    • 🇫🇷 French
    • 🇩🇪 German
    • 🇮🇹 Italian
    • 🇪🇸 Spain
  • 📰 Columns
  • About us

The Hotel Cybersecurity Checklist

  • Clay Bassford
  • 14 June 2023
  • 5 minute read
Total
0
Shares
0
0
0

This article was written by Shiji Insights. Click here to read the original article

Aleksander Ludynia is the Chief Security Officer at Shiji Group and has over 15 years of experience in cybersecurity under his belt. We’ve put Alex’s vast knowledge of hotel cybersecurity into an easy-to-follow checklist for hoteliers to ensure their data and systems are secure. The Hotel Cybersecurity Checklist is free to download here:

Download the checklist and follow along with this guide to implement cybersecurity best practices for hotels in 2023.

The Importance Of Cybersecurity

Cybersecurity is of paramount importance to all businesses, however, in the case of the Hospitality Industry, it is quite a unique situation. Hotels tend to handle and own a very large amount of data, sometimes in the hundreds of millions of records for some of the bigger brands, which makes them a prime target for cybercrime. And this encompasses not only crimes against guest information but also against the business itself, as can happen with rate information that may be stolen and sold to benefit a competitor.

Cybersecurity Check List - ShijiCybersecurity Check List - Shiji

There are different risks involved, but the biggest incidents that have happened in the industry were related to cardholder data and leaks of personal data, and when we are talking about such a huge database, the repercussions in the media and beyond can be devastating to the business. It has become more important than ever to protect this precious reservoir of information, and hotels should pay attention to the risks incorporating technology brings to their operations, even though cybersecurity isn’t inherently their core responsibility.

Merusaka Nusa Dua, Bali (Indonesia)
Trending
Merusaka Nusa Dua, Bali (Indonesia)


image

The Crown Jewels of Hotel Data

The large amount of customer data processed by hotels is its crown jewel. Whether it is data that can be used to steal money, such as payment or credit card data, or personal and location data that can be used for other nefarious ends, hotels deal with these two types of critical customer information valuable to cyber criminals on a daily basis. On top of it, they also handle sensitive information on rates, which can be of interest to competitors in the same industry. 

Threat Actors

There are multiple agents who are the “bad guys” threatening a hotel’s security. The first one of them is cyber gangs, and among other tactics, they may try to steal cardholders’ data or use ransomware attacks – software that “kidnaps” a business’ systems and demands a ransom payment in order to stop the disruption or in exchange for not exfiltrating data.

Secondly, there are state-sponsored attacks. Hotels have information on certain persons of interest and their location, as well as that of their associates or other important people they are meeting with, which can be useful knowledge for governments.   

Lastly, we cannot forget about competitors, who may be interested in information about the rates of other chains in order to benefit their own operations, and due care must be taken to protect that type of data, too.

With that in mind, I’ve developed this checklist of steps to consider when developing the cybersecurity action plan for your hotel, to ensure that you are adequately managing the risks to your customers, your property, and your reputation. 


  1. Assign Cybersecurity and Privacy Specialist roles

Hotels need to staff these roles even though the technology isn’t their core business. These will be the people guiding the efforts of the rest of the personnel, as security is everyone’s job. 

  1. Identify and assess risks for all sensitive data

Conduct audits of all data handled by your hotel that can be considered sensitive in order to understand your risk profile, including the systems used to process and store data, and then map the data flow to identify all the places where information can be. 

Common points are legacy systems, which are hard to protect against new threats and to connect to new solutions in a secure manner; inexperienced or temporary staff who may not follow security protocols thus becoming a bridge by knowingly or unknowingly deploying viruses to the network; bad habits, such as staff writing credit card numbers in pieces of paper when in a rush or keeping passwords in unprotected places; and third-party systems with which hotels exchange information such as payments, reservations, invoicing, door locks, TV access, and many other types of vendors that are necessary for daily operations.

Once this is done, list down the threats and risks that may affect the data, considering the possible threat actors and attack methods your system may be vulnerable to.

  1. Protect the data and key systems

When all the data, systems, and possible threats are identified, it is time to protect them – especially your crown jewels. Knowing what needs to be protected ensures that you will be able to choose a security solution to apply, as well as an ideal secure configuration to harden all of your key systems.

  1. Manage access and vulnerabilities

Make sure you grant appropriate levels of access to each department or role in the proper way, by managing access privileges and monitoring them. Control who has access to what kind of information and for what reasons, so that each person is only able to see what is necessary for them to fulfill their duties. 

Often, cybercriminals do not target specific businesses, they are just opportunistic, and thus make use of bots to find vulnerabilities that can be exploited. Vulnerability management and basic cybersecurity hygiene are key to preventing being the low-hanging fruit for these criminals.

  1. Monitoring

Monitoring access regularly helps in identifying breaches or leaks early, and gives you time to react to them. Keep track of traffic of users, applications, and networks.

  1. Deploy malware protection

Many companies think that simply having an antivirus solution means they are safe, but malware is very dangerous. It’s necessary to pick the best solution, configure it properly, and make sure that it’s deployed everywhere, and that it is indeed effective.

  1. Deploy endpoint protection

Endpoints (such as mobile devices, browsers, and office computers) are usually the first step in the biggest cyber attacks, as criminals rarely start attacks with something big, like going directly for servers. They’d rather attack one person to get access to that person’s workstation and then use it as an access point to go deeper into the company. Monitoring network traffic at each endpoint is crucial, and if you detect attacks at a very early stage, while still at the endpoint, you may be able to stop most of the attacks. 

  1. Manage legacy and third-party systems

Your systems may interact with that of third-party vendors or suppliers, so it is necessary to manage that interaction and ensure its security. There have often been incidents in the last years, usually very large-scale ones, where the culprits were hacked vendor systems which then allowed access to other businesses’ data. As for legacy systems, they tend to be more vulnerable as security patches stop being released, making them susceptible to modern forms of attack.

  1. Build awareness and prepare for the worst

Provide good training to employees on how to spot phishing and other sorts of attacks conducted by cybercriminals to decrease the likelihood of one of them becoming the access point. However, it is important to introduce and periodically improve incident management processes: have procedures in place in the case of an emergency or a disaster caused by a successful attack, meaning keeping constant backups and setting recovery processes in place.

  1. Test your security

Last but not least, test your security often. Conduct penetration testing to verify your security level and make sure it is up to par. This can be done through auditing, conducting technical tests, or using external or internal penetration testers to verify the actual security of your systems.

Download the full checklist by clicking below:

RELATED:

Please click here to access the full original article.

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Related Topics
  • Shiji Insights
You should like too
View Post
  • Categorizing...

IHG Unifies Global Call Center Operations on Genesys Cloud

  • Automatic
  • 14 May 2025
View Post
  • Categorizing...

Independent Hotel Rates Aggressively Targeted by Secondary OTAs

  • Automatic
  • 14 May 2025
View Post
  • Categorizing...

HVAC Just Became Your Next Big Tech Decision

  • Automatic
  • 14 May 2025
View Post
  • Categorizing...

Independent Hotel Show announces 2025 theme of Redefining Luxury 

  • Sophie Weir
  • 14 May 2025
View Post
  • Categorizing...

University of Houston’s Hilton College Launches New Online Doctorate Program

  • LODGING Staff
  • 14 May 2025
View Post
  • Categorizing...

THE GRAND HOTEL BIRMINGHAM PRESENTS DOWNSTAIRS AT THE GRAND 

  • Sophie Weir
  • 14 May 2025
View Post
  • Categorizing...

AHLA Applauds House Committee for Advancing Critical Tax Provisions Supporting Hotel Industry

  • LODGING Staff
  • 14 May 2025
View Post
  • Categorizing...

Wyndham and Le Park Concord to Launch 100 Super 8 Hotels Across Saudi Arabia

  • LODGING Staff
  • 14 May 2025
Sponsored Posts
  • The RFP Process for Hotel PMS

    View Post
  • Top hospitality tech trends from Mews Unfold 2024

    View Post
  • Getting Started with AI: A Step-by-Step Guide for Hoteliers

    View Post
Last Posts
  • IHG Unifies Global Call Center Operations on Genesys Cloud
    • 14 May 2025
  • Independent Hotel Rates Aggressively Targeted by Secondary OTAs
    • 14 May 2025
  • HVAC Just Became Your Next Big Tech Decision
    • 14 May 2025
  • Independent Hotel Show announces 2025 theme of Redefining Luxury 
    • 14 May 2025
  • University of Houston’s Hilton College Launches New Online Doctorate Program
    • 14 May 2025
Sponsors
  • The RFP Process for Hotel PMS
  • Top hospitality tech trends from Mews Unfold 2024
  • Getting Started with AI: A Step-by-Step Guide for Hoteliers
Contact informations

contact@10minutes.news

Advertise with us
Contact Marjolaine to learn more: marjolaine@wearepragmatik.com
Press release
pr@10minutes.news
10 Minutes News for Hoteliers 10 Minutes News for Hoteliers
  • Top News
  • Posts
  • 🎙️ Podcast
  • 👉 Sign-up
  • 🌎 Languages
  • 📰 Columns
  • About us
Discover the best of international hotel news. Categorized, and sign-up to the newsletter

Input your search keywords and press Enter.