10 Minutes News for Hoteliers 10 Minutes News for Hoteliers
  • Top News
  • Posts
    • CSR and Sustainability
    • Events
    • Hotel Openings
    • Hotel Operations
    • Human Resources
    • Innovation
    • Market Trends
    • Marketing
    • Mergers & Acquisitions
    • Regulatory and Legal Affairs
    • Revenue Management
  • ๐ŸŽ™๏ธ Podcast
  • ๐Ÿ‘‰ Sign-up
  • ๐ŸŒŽ Languages
    • ๐Ÿ‡ซ๐Ÿ‡ท French
    • ๐Ÿ‡ฉ๐Ÿ‡ช German
    • ๐Ÿ‡ฎ๐Ÿ‡น Italian
    • ๐Ÿ‡ช๐Ÿ‡ธ Spain
  • ๐Ÿ“ฐ Columns
  • About us
10 Minutes News for Hoteliers 10 Minutes News for Hoteliers
  • Top News
  • Posts
    • CSR and Sustainability
    • Events
    • Hotel Openings
    • Hotel Operations
    • Human Resources
    • Innovation
    • Market Trends
    • Marketing
    • Mergers & Acquisitions
    • Regulatory and Legal Affairs
    • Revenue Management
  • ๐ŸŽ™๏ธ Podcast
  • ๐Ÿ‘‰ Sign-up
  • ๐ŸŒŽ Languages
    • ๐Ÿ‡ซ๐Ÿ‡ท French
    • ๐Ÿ‡ฉ๐Ÿ‡ช German
    • ๐Ÿ‡ฎ๐Ÿ‡น Italian
    • ๐Ÿ‡ช๐Ÿ‡ธ Spain
  • ๐Ÿ“ฐ Columns
  • About us

10 tips to protect your business against hotel phishing attacks

  • Tom Brown
  • 14 November 2024
  • 6 minute read
Total
0
Shares
0
0
0

This article was written by Mews. Click here to read the original article

image

What are phishing attacks?ย 

Phishing is a type of cybercrime that involves tricking people into giving away sensitive data or installing malware. Attackers use fraudulent emails, messages, phone calls or webpages to trick victims into clicking on malicious links. The links can lead to websites that steal personal information, download malware, or corrupt a system.ย ย 

It’s a form of social engineering where attackers impersonate a trusted entity (such a hotel, a technology partner, or a CEO) to gain the victim’s trust. Email is the most common channel for phishing in hospitality, but we also increasingly see search engines being used to advertise fraudulent websites.ย 

Why the hospitality industry is a targetย 

First of all, letโ€™s clarify why hackers want to gain access to your system. The answer is a simple one: data. And, ultimately, financial gain.ย 

Hotels (and hostels, aparthotels and the rest) hold or process a huge amount of personal and financial data, including information like names, addresses and credit card details. This data has real-world value and is often sold on to other criminal groups who then exploit the data and use it for other malicious intent.ย 

One common approach is to send emails to future guests that pretend to be from the hotel, requesting payment for the stay. The unaware guest makes the payment, and the money goes straight to the scammers. Itโ€™s a double blow of a financial loss for the customer (and likely the hotel) and a reputational loss which means theyโ€™re unlikely to return to the property.ย 

Trending
Aimbridge adds president of select service division

10 ways to protect your property from phishing attacksย 

The good news is, there are simple, concrete steps that hospitality staff can take to defend themselves against bad actors.ย ย 

1. Never use search engines to access your login pagesย 

Fraudulently duplicating login pages is one of the most common approaches for a phishing attack, and using search engines as a shortcut to access your software leaves you vulnerable.ย 

Letโ€™s say you use hotelpms.com to log in to your property management system. Cyber criminals can easily create duplicate login pages that look identical but are hosted on their own URL. Theyโ€™ll choose a URL that looks like the one you normally use โ€“ something like hotellpms.com or hotel-pms.com and pay for their webpage to rank at the top of the search.ย 

When you log in through their fake portal, they capture your real login details so they can access your data.ย 

2. Bookmark your key login pagesย 

Itโ€™s good practice to save all your login URLs to your bookmarks bar. This way youโ€™ll always go direct to the legitimate software login page. Itโ€™s also much faster than searching for the right link in a search engine.ย 

Make sure you have an up-to-date list of all your hotel software and the correct URLs for their login pages. Store this information on an internal team workspace platform so that any of your team can easily access it should they need it.ย 

3. Use strong, unique passwordsย 

Weโ€™ve all heard stories about people using โ€˜1234โ€™ as passwords, or other guessable options like petโ€™s names or kidโ€™s birthdays. The reality is that the simpler your password, the easier it is for hackers to guess and acquire it.ย ย 

Using a unique password is equally important. If you use the same password for multiple logins, it means that one security lapse can affect multiple accounts and software. For instance, if someone gains access to your personal email address, theyโ€™ll find it easy to log in to your PMS, your RMS, your CRM…ย 

You no doubt already know how to create a secure password, but as a reminder:ย 

  • Make it unique to prevent password contamination.ย 
  • Never share passwords, even within your team and especially never via email.ย 
  • Use a mix of characters, combining upper- and lower-case letters, numbers and symbols.ย 
  • Donโ€™t reuse passwords across multiple applicationsย 

4. Use a password managerย 

If your team has to remember lots of logins and passwords, password managers like 1Password or LastPass can help generate and securely store complex, unique passwords for every site your staff will access.ย 

It means you only need to remember one master password, which is not only more secure but will save time by reducing the number of forgotten password resets. Password managers can also generate complex passwords for you that are much more difficult to guess.ย 

5. Enable Two-Factor Authentication (2FA) ย 

Two-Factor Authentication (2FA) adds an extra layer of security to your account beyond your password, requiring a unique code sent to your phone or other device via apps like Microsoft Authenticator or Authy. You can also receive a login link via email (sometimes called a โ€˜magic linkโ€™) rather than a code. Magic links and 2FA are vital to protect your login details.ย ย 

The big benefit of 2FA is that even if someone has your password, they canโ€™t log in to your account without the code. This means that even if you accidentally give away your password, hackers still canโ€™t access any sensitive information.ย 

This approach is now standard across many industries, and itโ€™s something we use at Mews to keep our own systems more secure. Many people already have 2FA set up for personal use with their email or social media accounts, so verification will feel like second nature and a normal part of the login process.ย 

Read more about why 2FA is a must-have for every hospitality business.ย 

6. Set up new login alertsย 

Depending on the size of your organization, it may or may not be possible to manually track suspicious log-ins. However, like most things in the world of security, itโ€™s better to automate it.ย 

Set up suspicious log-in alerts for all your key software. Youโ€™ll get notified when someone logs in from a new device, which is often a giveaway for a cyberattack. Itโ€™s already happened to most of us. Ever received an email saying: โ€˜Someone tried to log in to your email account from [strange location]. Was this you?โ€™ย 

More advanced technologies will also give you the ability to easily control access, empowering you to approve or deny suspicious logins. So if your hotel is in Amsterdam and someone is trying to log into your PMS from India, it will raise a red flag that you can handle immediately.ย 

7. Check email addresses carefullyย 

Some phishing emails are very easy to spot. Others are much harder and mask the sender email address with a familiar name such as a software provider or someone from your business. Always be sure to double check the actual sender address โ€“ your email provider will often filter out the most obvious attempts, but some will still get through.ย 

And by the way, this also includes the log-in alerts we just mentioned. These kinds of emails can also be phishing attempts.ย 

Things to look out for:ย 

  • Poor spelling and grammarย 
  • Attachments and linksย 
  • Requests for personal or business informationย 
  • Language that asks you to act urgentlyย 

8. Create a clear plan for reporting suspicious activityย 

If one of your front desk workers suspected a phishing attack, what would they do? Make sure you come up with a clear plan and document it somewhere easily accessible so that all staff know what to do if they need to report suspicious activity.ย 

Speed is of the essence when it comes to protecting yourself against cyberattacks. The faster you can act, the better youโ€™ll minimize any potential harm.ย ย 

9. Use Single-Sign-On (SSO)ย 

Single-Sign-On (SSO) is a really powerful cybersecurity tool. It means your staff log in just once and can then access everything they need without remembering multiple passwords.ย 

Itโ€™s simple, secure and will ultimately save you time. Itโ€™s also easier for IT teams to manage access and enforce security policies, giving your business better control.ย 

10. Train your teamย 

Youโ€™re already educating yourself by reading this article, but you need your entire team to be vigilant and making smart choices. This is particularly important in hospitality, where staff turnover is so regular.ย 

Host regular best practice training sessions so that your team can recognize threats, from phishing emails to suspicious log-in activity. Cyber attackers continually evolve their methods, so itโ€™s important to stay on top of phishing trends and new approaches.ย 

If it does happen that one of your team falls for a phishing attack, they need to feel comfortable reporting it quickly. Itโ€™s not shameful to be a victim, especially as hackers can be incredibly cunning. If your staff feel too embarrassed to report it, the problem will worsen fast.ย 

Create an environment of empathy where people feel accountable for their actions, confident enough to come forward without being made to feel bad. Fraudsters target people because theyโ€™re easier to manipulate than technology โ€“ ensuring your entire team are aware of the risks is one of the most important things you can do.ย 

Stay vigilant to stay secureย 

Phishing and cyberattacks are an unfortunate reality of the twenty-first century and our connected lifestyle โ€“ and that includes hospitality. You canโ€™t stop the attempts, but you can stop them from being successful.ย 

Being proactive and vigilant is the all-important first step in your line of defense. Then, follow these eleven tips and youโ€™ll go a long way to protecting your property and your guests from any future cyberattacks.ย ย 

Want to see why Mews is best-in-class when it comes to PMS security? Here’s how we keep your guest and property data secure, from personal information to payment details.

Please click here to access the full original article.

Total
0
Shares
Share 0
Tweet 0
Pin it 0
You should like too
View Post
  • Innovation

AI agents and direct bookings: A hotelier's dream? | Arlen Ritchie posted on the topic | LinkedIn

  • Arlen Ritchie
  • 27 August 2025
View Post
  • Innovation

Why CDPs are the Backbone of Hospitality AI

  • TrustYou Editorial Team
  • 27 August 2025
View Post
  • Innovation

Benetti presents its new collection AKUBEN, the perfect combination between vertical garden and acoustic

  • Jade
  • 27 August 2025
View Post
  • Innovation

Why A Hospitality AI-Powered CXP is the Next Step for Guest Satisfaction

  • TrustYou Editorial Team
  • 27 August 2025
View Post
  • Innovation

Hotels Risk Guest Trust by Using ChatGPT with Private Data, Warns Ireckonu

  • Automatic
  • 26 August 2025
View Post
  • Innovation

Stayntouch Announces Partnership With Lion Roars Hotels & Lodges

  • LODGING Staff
  • 26 August 2025
View Post
  • Innovation

The AI Revolution in Hotel Revenue Management: Why the Future Is Already Here

  • legarde
  • 26 August 2025
View Post
  • Innovation

How to run an RFP process to choose the right RMS | Guide | Duetto

  • Duetto Content Team
  • 26 August 2025
Sponsored Posts
  • 2025 SOCIETIES Quaterly 3

    View Post
  • The Future of Revenue Management Is Strategic Leadership – LodgIQ

    View Post
  • Case Study: Refinery Hotel Redefines Revenue Management with LodgIQ

    View Post
Last Posts
  • AI agents and direct bookings: A hotelier's dream? | Arlen Ritchie posted on the topic | LinkedIn
    • 27 August 2025
  • ๐๐จ๐ฎ๐ญ๐ข๐ช๐ฎ๐ž ๐ก๐จ๐ญ๐ž๐ฅ๐ฌ: ๐˜๐จ๐ฎ๐ซ ๐›๐ข๐ ๐ ๐ž๐ฌ๐ญ ๐œ๐จ๐ฆ๐ฉ๐ž๐ญ๐ข๐ญ๐จ๐ซ ๐ข๐ฌ๐ง'๐ญ ๐๐จ๐จ๐ค๐ข๐ง๐ .๐œ๐จ๐ฆ. Had a GM call me last week, frustrated about Booking. com taking 23% commission on everyโ€ฆ | Eduard Ruppel ็ˆฑๅพทๅŽ | 44 comments
    • 27 August 2025
  • Recreation at Moxy NYC Downtown Completes Redesign
    • 27 August 2025
  • Braemar Hotels & Resorts Initiatesย Sale Process
    • 27 August 2025
  • Why CDPs are the Backbone of Hospitality AI
    • 27 August 2025
Sponsors
  • 2025 SOCIETIES Quaterly 3
  • The Future of Revenue Management Is Strategic Leadership – LodgIQ
  • Case Study: Refinery Hotel Redefines Revenue Management with LodgIQ
Contact informations

contact@10minutes.news

Advertise with us
Contact Marjolaine to learn more: marjolaine@wearepragmatik.com
Press release
pr@10minutes.news
10 Minutes News for Hoteliers 10 Minutes News for Hoteliers
  • Top News
  • Posts
  • ๐ŸŽ™๏ธ Podcast
  • ๐Ÿ‘‰ Sign-up
  • ๐ŸŒŽ Languages
  • ๐Ÿ“ฐ Columns
  • About us
Discover the best of international hotel news. Categorized, and sign-up to the newsletter

Input your search keywords and press Enter.