The 2015 California Tourism Safety and Security Conference is being held Thursday, September 17, 2015 at the beautiful Island Hotel in Newport Beach, California. This half day conference is centered around fraud and forgery detection and prevention at your business. With subject matter experts instructing in hands-on, nuts and bolts training format, you will see first hand how criminals forge fraudulent credit cards, wash checks, and take advantage of your unsuspecting business.
Together with several California law enforcement, security, and tourism industry organizations, the Association plans and hosts the nation’s largest training conference dedicated to issues of safety & security for visitors and visitor venues. The annual conference features timely new training topics each year, presented by experienced practitioners and subject matter experts. Content and logistics are planned and coordinated by a committee of CTSSA volunteers, chaired by Dave Wiggins.
The event includes a full day of training, plus the Tech Expo which showcases emerging tools & technologies, as well as a keynote address, and hosted luncheon and cocktail reception. The conference has been praised for its timely and relevant “nuts-n-bolts” training content, as well as its valuable networking opportunities. The conference has been held at various locations throughout California. Participants come from all across the United States. Participation is by pre-registration, and is open only to qualified working professionals.
For more: http://bit.ly/1Mt3G6e
“This is the second time in recent months that security researchers have warned of hotel Wi-Fi networks being a potential vector of attack for cybercriminals, providing a not-so-subtle reminder that individuals must be ever-vigilant regarding the security of their devices and access points.”
Cylance, a security vendor, says that its security researchers at the Sophisticated Penetration Exploitation and Research team (SPEAR) have uncovered a flaw in the InnGate Wi-Fi router commonly used by many hotels that could be placing the devices of guests at risk. According to Wired, the Cylance team reports, the vulnerability could threaten not just guests, but could also spread to the hotels themselves if hackers are able to compromise the router to allow them to access other parts of the hotel network. Cylance says this could potentially impact reservations and billing.
The vulnerability, dubbed CVE-2015-0932 gives an attacker full read and write access to the file system of an ANTLabs’ InnGate device, Cylance reports. Cyber thieves gain remote access through an unauthenticated rsync daemon running on TCP 873, which then allows them to read and write unrestricted to the file system of the Linux based operating system.
For more: http://bit.ly/1yYJZK7
“We continue to be more focused on perimeter protection than on internal controls and monitoring. It’s clear that attackers are already inside or could be anytime they want and there’s nothing you can do about it on the perimeter…You would think external attacks cause all the damage. But study after study, two-thirds of attacks are mundane insider errors, lost equipment, technology failures, or lack of oversight over vendors.”
Chief privacy officer Jason Straight shares his insights on why organizations are struggling to stop the breach wave — and manage the aftermath.
Hackers keep on hacking, breaches keep on happening. The cycle continues, as major corporations now routinely get successfully compromised. A key element of the equation now is properly and efficiently responding to an attack as well as managing its aftermath.
The same old security missteps–falling for phishing attacks, not locking down sensitive data internally, giving users too much access, for instance–keep recurring. That’s because many organizations aren’t putting their security energy in the right places, according to Jason Straight, senior vice president and chief privacy officer at UnitedLex, which provides outsourcing services and support for the legal industry.
For more: http://ubm.io/1BTm7L2
Filed under Crime, Employee Practices, Guest Issues, Hotel Employees, Hotel Industry, Maintenance, Management And Ownership, Risk Management, Technology, Theft, Training
Petra Risk Solutions’ Loss Control Manager, Matt Karp, offers a P3 Hospitality Risk Report – ‘Preventing Credit Card Fraud at Hotels’.
P3 (Petra Plus Process) is the Risk Management Division of Petra Risk Solutions – America ’s largest independent insurance brokerage devoted exclusively to the hospitality marketplace.
For more information on Petra and P3 visit petrarisksolutions.com or call 800.466.8951.
Also of concern to hotels is the Dark Horse Virus, Shortz said. This virus is meant to capture sensitive data business travelers might have on their devices. She said it presents itself as a system update when a user logs onto a hotel’s Wi-Fi network and is prompted to type in their name and room number…Data hacks will continue to happen in the hotel industry, the presenters said. During an interview with Hotel News Now following the session, Garfinkel said it’s not a matter of if a hotel company is hacked, but when.
Lara Shortz surveyed the crowd Tuesday at the Hospitality Law Conference and asked attendees to raise their hands if they’ve been involved in a data breach.
“If you haven’t raised your hand, you should,” Shortz, an attorney at Michelman & Robinson, said during a session titled “Anatomy of a hospitality data breach.”
The session was especially timely given reports that White Lodging was again targeted by data haxkers. In 2014, malware was found in the food-and-beverage outlets of 14 of its hotels a year ago.
For more: http://bit.ly/1G81ko8