10 Minutes News for Hoteliers 10 Minutes News for Hoteliers
  • Top News
  • Posts
    • CSR and Sustainability
    • Events
    • Hotel Openings
    • Hotel Operations
    • Human Resources
    • Innovation
    • Market Trends
    • Marketing
    • Mergers & Acquisitions
    • Regulatory and Legal Affairs
    • Revenue Management
  • 🎙️ Podcast
  • 👉 Sign-up
  • 🌎 Languages
    • 🇫🇷 French
    • 🇩🇪 German
    • 🇮🇹 Italian
    • 🇪🇸 Spain
  • 📰 Columns
  • About us
10 Minutes News for Hoteliers 10 Minutes News for Hoteliers
  • Top News
  • Posts
    • CSR and Sustainability
    • Events
    • Hotel Openings
    • Hotel Operations
    • Human Resources
    • Innovation
    • Market Trends
    • Marketing
    • Mergers & Acquisitions
    • Regulatory and Legal Affairs
    • Revenue Management
  • 🎙️ Podcast
  • 👉 Sign-up
  • 🌎 Languages
    • 🇫🇷 French
    • 🇩🇪 German
    • 🇮🇹 Italian
    • 🇪🇸 Spain
  • 📰 Columns
  • About us

What Hoteliers Need to Know About Third-Party Cyber Risks

  • Automatic
  • 6 March 2025
  • 4 minute read
Total
0
Shares
0
0
0

This article was written by Hospitality Technology. Click here to read the original article

image

Hotels rely on an intricate network of third-party vendors and suppliers to support reservations, payment processing, property management, etc. While these relationships are necessary for great guest service, they also create new opportunities for cyberattacks. If a bad actor successfully infiltrates a third-party vendor, they can take advantage of network connections to go after hotels, stealing data, taking vital systems offline, or launching other attacks. 

Clearly, hotels can’t simply sever ties with all third parties, but there are steps you can take to close the gaps and protect your organization (and guests) from bad actors.

Here’s a look at how cybercriminals exploit third-party connections to launch cyberattacks on hotels—and what you can do to bolster your defenses.

Infected POS Software Gives Hackers a Gateway to Hotels’ (and their Customers’) Data

Hotels use point-of-sale (POS) terminals every day to complete transactions with hundreds of customers from the front desk to spas, restaurants, and gift shops. If hackers successfully compromise a hotel’s POS terminals, they can not only bring operations to a halt but use it as a channel to steal valuable guest and employee data. 

Consider: A hacker breaches a POS provider’s network, perhaps by exploiting a known vulnerability or using stolen login credentials. Once they’ve gained access, they infect the POS software with malware. Unaware of the breach, the provider pushes out a software update to its network of hotels, potentially reaching hundreds of organizations and corrupting thousands of POS terminals. Thanks to the widely deployed malware, hackers now have access to hotels’ employees’ and guests’ data, e.g., credit card numbers, addresses, passports, and other personally identifiable information to sell on the dark web.

Nike: An Epic Saga of Value Destruction
Trending
Nike: An Epic Saga of Value Destruction

Data breaches are always a headache for organizations, but they’re extra costly when they come from a third-party vendor. In fact, according to IBM’s Cost of a Data Breach Report 2024, “a data breach originating through a business partner costs nearly 12% more than other types of data breaches.” But the cost goes beyond the hard numbers. After a data breach, a hotel’s reputation can take years to recover. Plus, it’s the hotel that gets slapped with stiff regulatory fines as they’re the party interacting directly with customers and thus responsible for safeguarding their data.

Phishing Schemes Give Hackers Direct Access to Property Management Systems

Even without deploying malware on hotels’ devices, threat actors can still find ways to get to hotels’ data via third-party vendors. Sometimes, all it takes is a simple email or old-fashioned phone call. 

For example, suppose a hacker wants to get their hands on guests’ personally identifiable information, which is stored on a hotel’s property management system (PMS). By using phishing tactics, cybercriminals can pose as a hotel’s PMS vendor and trick employees into handing over login credentials or granting remote systems access. They may send an email using a domain similar to that of the real PMS vendor or call the front desk and pose as a PMS representative. Often, hackers will employ scare tactics to get employees to act fast, e.g., pressuring them to immediately download an important “security update.”

Today, artificial intelligence and deepfake technology make it easier for hackers to carry out phishing attacks with eerie accuracy. In fact, even the CEO of Zscaler recently issued a warning about deepfake-enabled phishing attacks after hackers used his voice to successfully scam his own staff. Meanwhile, another recent industry report revealed that 82% of phishing toolkits sold on the dark web now mention deepfakes, and almost three-quarters, AI.

Unsecured APIs Give Attackers Access to Managed Service Providers—and then Hotels 

Another way hackers can go after hotels’ data is through their managed service providers (MSPs) whom hoteliers turn to for IT or cloud services. 

Like other third-party providers, MSPs are productive attack channels for bad actors because, if successfully breached, they can be a link to dozens if not hundreds of hotels. Rather than going after one hotel directly, this kind of third-party cyberattack lets hackers maximize damage. 

To target hotels, attackers first infiltrate the MSP, which they can do by taking advantage of vulnerabilities in the MSP’s infrastructure, such as weak security controls or unpatched software. From there, they identify and exploit unsecured APIs that the MSP uses to connect to hotels’ management systems. Once inside, cybercriminals deploy ransomware, steal guest data, or otherwise disrupt operations, like corrupting smart devices to lock guests out of rooms.

If hotels want to calculate the risks of third-party cyberattacks, look to the integrity of MSPs. New data from a 2024 Hybrid Security Trends Report says 76% of MSPs identified a cyberattack on their infrastructure in the last year.

How to Protect Your Hotel from Third-Party Cybersecurity Risks

With vital integrations connecting hotels to dozens of third parties, the potential for risk is plentiful—but hoteliers can dramatically improve their cybersecurity defenses with a few strategies. 

First, to combat phishing schemes, prioritize cybersecurity education. Mandate cybersecurity training across your organization and conduct regular exercises to teach employees how to detect and defect phony emails and phone calls.

To mitigate the impact of POS malware, isolate POS systems from other devices to prevent lateral movement. In the event of breaches via MSPs or other vendors, network segmentation can further help limit hackers’ access. Other best practices include preparing incident response plans and implementing a zero trust security architecture.

In the face of rising threats, the best defense is community support. Turn to other hotels and hospitality organizations via industry groups like RH-ISAC, the global, retail- and hospitality-focused cyber intelligence sharing community, whose new LinkSECURE program delivers cybersecurity support for small- to mid-size vendors and service providers with limited IT or cyber resources to help mature their cybersecurity operations. The program matches every member with a success manager who evaluates their cybersecurity posture and walks them step-by-step through the critical security controls and safeguards.

Stay safe out there!

Please click here to access the full original article.

Total
0
Shares
Share 0
Tweet 0
Pin it 0
You should like too
View Post
  • TOP NEWS

Duetto and Event Temple Announce Integration

  • Automatic
  • 13 May 2025
View Post
  • TOP NEWS

Running a successful hotel is predicated on a lot of things. The PMS is pivotal.

  • David Eisen
  • 12 May 2025
View Post
  • TOP NEWS

The president of Donohoe Hospitality has had a remarkable career. One forged from tragedy.

  • David Eisen
  • 9 May 2025
View Post
  • TOP NEWS

Hotel design 2025: Blending heritage, innovation and sustainability – Part 1

  • k.fytaki
  • 9 May 2025
View Post
  • TOP NEWS

From global to local, U.S. lodging industry forced to adjust to leisure-driven demand as business travel falls behind

  • Guest Contributor
  • 9 May 2025
View Post
  • TOP NEWS

ForWard Conference Moves to Atlanta, Centers Theme on Amplifying Power for Women in Hospitality

  • LODGING Staff
  • 8 May 2025
View Post
  • TOP NEWS

107 – How much should B2B tech company invest in sales & marketing?

  • Martin Soler
  • 8 May 2025
View Post
  • TOP NEWS

Beyond the Price Tag – How Hotels Can Win by Reimagining the 4Ps

  • Anders Johansson
  • 8 May 2025
Sponsored Posts
  • The RFP Process for Hotel PMS

    View Post
  • Top hospitality tech trends from Mews Unfold 2024

    View Post
  • Getting Started with AI: A Step-by-Step Guide for Hoteliers

    View Post
Last Posts
  • 3 Smart Moves Hotels Can Make Now to Simplify Peak Season Later
    • 14 May 2025
  • IHG Unifies Global Call Center Operations on Genesys Cloud
    • 14 May 2025
  • Independent Hotel Rates Aggressively Targeted by Secondary OTAs
    • 14 May 2025
  • HVAC Just Became Your Next Big Tech Decision
    • 14 May 2025
  • Independent Hotel Show announces 2025 theme of Redefining Luxury 
    • 14 May 2025
Sponsors
  • The RFP Process for Hotel PMS
  • Top hospitality tech trends from Mews Unfold 2024
  • Getting Started with AI: A Step-by-Step Guide for Hoteliers
Contact informations

contact@10minutes.news

Advertise with us
Contact Marjolaine to learn more: marjolaine@wearepragmatik.com
Press release
pr@10minutes.news
10 Minutes News for Hoteliers 10 Minutes News for Hoteliers
  • Top News
  • Posts
  • 🎙️ Podcast
  • 👉 Sign-up
  • 🌎 Languages
  • 📰 Columns
  • About us
Discover the best of international hotel news. Categorized, and sign-up to the newsletter

Input your search keywords and press Enter.