Fix Your Risk
An important issue in contemporary times, when it comes to hotels, data security needs to be addressed even more diligently since it involves guestsâ security and their privacy.
By Bindu Gopal Rao
Most customers never give much though to the fact that hotels take so much of their personal data including their credit card details when they check in. That is probably because they have implicit trust in the hotelâs security practices when they volunteer this information.
However, if the thought every crossed their mind that this data could be compromised, would they be willing to part with it while checking in? Would they even want to stay in a hotel if they ever learn that it had suffered a data breach in the past?
Can you see how easily the spotlight has been firmly affixed on the data security systems implemented in hotels? And also why it is imperative for these to be robust, scalable and be able to thwart all kinds of potential attacks.
The hospitality industry has witnessed numerous sophisticated attacks on secured data including the recent breaches reported by InterContinental Hotels Group and Sabre Hospitality Solutions. It is not surprising, but hackers have usually targeted the payment card data information from different point-of-sales (POS) systems in hotels resulting in unauthorised credit card charges and other malicious activities.
Apart from the lack of POS encryption; hotel networks are often poorly defended in some cases allowing hackers to sit undetected on networks. The industry has witnessed also hackers increasingly moving to ransomware and extortion, a modus operandi that is spreading like wildfire in other industry sectors as well.
Data threat is not limited to credit card forgery but also cyber-attacks on guest network and hotel network. Hotels need to think about multiple endpoints and remote connections they rely on to run the propertyâs operations. Electronic door locks, HVAC controls, alarms and a full range of Internet of Things (IoT) devices can fall under the control of cybercriminals aiming to disrupt normal operations, highjack data and misuse it. Hotels accommodate diverse, global clients and corporate travellers with high-credit worth. They are favourite targets for cybercriminals due to the availability of massive number of potential credit cards at one location and large amount of customer data.
Subhendu Sahu, acting country manager for India, FireEye pointed out that cybercriminals often attack hotels through spear-phishing emails to deliver malware and extortion tactics. They are typically focused on stealing credit card information and personally identifiable information. Most of these actors are opportunistic and generally seek isolated systems for exploitation. They tend to go after large volumes to be sold in the underground. Another threat is cyber espionage. âBusiness and government professionals, especially to visiting foreign countries, often rely on hotel networks to conduct business and may be unfamiliar with threats posed while abroad. Last month, we observed a campaign by threat group APT28. This Russia-based group compromised hotel Wi-Fi networks to steal personal credentials of hotel guests,â Sahu added.
Safe and Secure
Organisations need to be able to detect and respond to unique attacks that have not been seen before and the key is to have strong coverage on a networkâs endpoints â whether those are POS, workstations, or mobile device. Hotels are vulnerable to cybercrimes through a variety of avenues that break with the traditional physical security measures deployed across the hospitality industry.
According to Gaurav Tyagi, IT manager of StayWell Hospitality Group India regular monitoring of network should be conducted to identify irregular activities. One cannot put the entire responsibility on a machine and relax as machines can perform its task but someone ought to monitor it withing its parameters. âA security threat could come from a hotel guest too. To avoid this, use two different networks and keep them physically separate. Using a good quality firewall on both these networks helps. We normally avoid giving internet access on staffâs personal computers and avoid it on official computers if it is not necessary,â he added.
Sarada Muduli, revenue manager, Lords Hotels & Resorts stated that his hotel chain has installed a WiFi firewall that alerts his team about any compromise to its operations. The company also has an auto trigger for anti-hacking, anti-spamware, and antivirus to protect email communication of guest database.
âWe try and keep the interface for the guests very simple, however since it is a sensitive area we maintain standard protocols like mandating an OTP while signing into the hotelâs WiFi or a personalised check with PMS. While this might be slightly intrusive, guests are aware of its reason. We also request them for identity proof and offer secured platform to them to use the facilities,â Muduli revealed.
A key aspect in hotels is ensuring that guests are not inconvenienced at any time and their security measures are discreet. âKeeping all our data security standards and implementation in place, we also ensure that its usability is simple and straight forward for the guest devices, where most of the security protocols run at the backend with little or no guest intervention,â explained Bijesh Mukundan, IT manager of Le Meridien Mahabaleshwar Resorts and Spa. For instance, guest authentication is taken only as and where crucial, and all guest personal data is wiped out post-guest usage automatically on public access devices.
Before seeking any data security solutions, hoteliers are required to undertake the shift in the mind-set and recognise that in todayâs scenario, cyber breaches are not a question of âifâ but âwhenâ. âWithout graduating from breach-denial or breach-prevention only to breach-acceptance, hoteliers would not be able to see the right solutions that safeguard them as well as their guests against the challenges in the cyber-age. As they undertake this mind-shift, the realisation to change their security strategy to make it data-centred shall be a natural choice. Having said that they need to review the three-step secure-the-breach strategy to protect the data through encryption, secure key management and strong multi-factor authentication,â explained Rana Gupta, VP, APAC, Sales, Identity and Data Protection, Gemalto.
The Right Fit
Implementing the best payment gateway, secured booking engines, firewall for WiFi internal usage and external firewalls are some ways to safeguard sensitive data. While numerous solutions are available to maintain data privacy, it is important to bear in mind that these are scalable.
âNo security software, anti-virus system or other tools can offer 100% guarantee to prevent cyber-attacks. On the other hand, securing and limiting the system too much may cause other problems such as preventing customers from accessing information they might need. Thus, hotels should manage the risk in cyber defence in a meaningful manner that has a balance in security implementation using the newest technology available while testing the security posture by using strong feedback structure,â said Thirupati Gasiganti, IT manager at Novotel Hyderabad Airport Hotel.
Practices like creation of separate networks for each aspect of the hotel helps in preventing cyber criminals from gaining wider access to more vulnerable networks. Hotels, therefore, are implementing innovative strategies to safeguard their data and also protect customer information.
âSegregating sections in different VLANS is already in place. However, people still play a vital role. We have enforced no-removable device policy in our network with exception to only IT and the secure BIOS, disallowing any boot configuration alteration. Also, we have secure LAN ports disallowing any foreign device connection physically,â he stated.
Technology companies have their own list of protocols that they advice hoteliers to follow. âCompanies should have endpoint and email protection to detect the advanced forms of the attacks, such as spear phishing emails that contain malicious macros to launch malware that can steal credentials or serve as a beach head on a system. It is vital for organisations to have the right threat intelligence to understand how other countries employ these tactics. In cyber, tactics move at the speed of a click. Other countries and criminals adopt malware and tactics of another country,â opined Sahu.
Muduli added, âThe IT team should run a drill periodically to test the systemâs efficiency and preparedness. This allows them to identify any loopholes or errors and rectify them promptly. Fronts such as the website domains need to be up and running at all times and so it is auto responsive to any cyber-attack.â
Data security solutions are quite expensive and based on the business requirement a specific budget allocation is required. Tyagi said, âWe have to look it in to two parts -things which are necessary to run the business and things which must be there from IT point of view. In hospitality industry, management is more interested in first part but as an IT person you cannot ignore the latter. For example, you can easily get budget to improve your Internet speed, but it is very hard to get approval on firewall upgrade.â
Naturally then ensuring that hoteliers are able to make a wise investment in arguably the most important aspect of data security. It is of paramount importance in an industry where the key differentiator will be guest trust and confidence.