{"id":15025,"date":"2014-11-13T17:56:25","date_gmt":"2014-11-13T17:56:25","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2847"},"modified":"2020-02-27T03:51:05","modified_gmt":"2020-02-26T16:51:05","slug":"hotel-it-security-quo-vadis","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/hotel-it-security-quo-vadis\/15025\/","title":{"rendered":"Hotel IT security: quo vadis?"},"content":{"rendered":"<p>The newly disclosed <a href=\"https:\/\/business.kaspersky.com\/the-dark-story-of-darkhotel\/2829\" target=\"_blank\" rel=\"noopener nofollow\">Darkhotel APT campaign<\/a> will surely draw increased scrutiny to hospitality systems\u2019 security worldwide. Even at a glance it looks like there are a lot of well-recognized problems. For instance, back in 2009, Visa released a security alert called <a href=\"http:\/\/usa.visa.com\/download\/merchants\/targeted-hospitality-sector-vulnerabilities-110609.pdf\" target=\"_blank\" rel=\"noopener nofollow\">\u201cTargeted Hospitality Sector Vulnerabilities\u201d<\/a>, regarding malicious attacks taking place in the hospitality industry \u2013 specifically on payment systems and hotel networks. In a nutshell, malware attacks lead to the clients\u2019 data getting stolen, including payment credentials.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Hotel IT #security: quo vadis?<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4CFj&amp;text=Hotel+IT+%23security%3A+quo+vadis%3F\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>It was a problem in 2009, and it was an even bigger problem in 2013-2014 when the largest retailers fell prey to massive breaches due to the malware seeded over PoS terminals. For hotels, it may be an even bigger issue. Retailers usually have access to the payment card information, and that is what gets leaked. However, guests at a hotel share information that\u2019s a lot more personally identifiable, and the breach of that data has higher consequences.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>The earliest examples of PoS malware, Trackr a.k.a. <a href=\"https:\/\/threatpost.com\/points-of-sale-poorly-secured-facing-sophisticated-attacks\/106027\" target=\"_blank\" rel=\"noopener nofollow\">Alina<\/a>, was the RAM scraper that compromised PoS systems in a university and in a number of hotels back in 2011.<\/p>\n<p>In 2012, the FBI <a href=\"http:\/\/www.fbi.gov\/sandiego\/press-releases\/2012\/malware-installed-on-travelers-laptops-through-software-updates-on-hotel-internet-connections\" target=\"_blank\" rel=\"noopener nofollow\">issued a warning<\/a> about malware being installed on travelers\u2019 laptops through software updates on hotel Internet connections (something very similar to the Darkhotel issue).<\/p>\n<p>Recently, vendors of property\/reservation\/hospitality management software put great emphasis on security concerns.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/11\/06020204\/hotels_wide-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2849\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/11\/06020204\/hotels_wide-1.jpg\" alt=\"hotels_wide\" width=\"1000\" height=\"667\"><\/a><\/p>\n<p>There is a new trend being formed over the last two years: software hospitality solutions are <a href=\"http:\/\/www.hospitalitynet.org\/news\/4066327.html\" target=\"_blank\" rel=\"noopener nofollow\">migrating<\/a> into the cloud. Why? Security and economy. It\u2019s much more lucrative to lease a ready-to-use infrastructure, more or less protected from technical mishaps and unexpected downtimes (cloud providers promise over 95% of uptime), than to strengthen the servers in-house.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Any technology is as trustworthy as it is auditable #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4CFj&amp;text=Any+technology+is+as+trustworthy+as+it+is+auditable+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Migration to the cloud, while offering certain big advantages, also brings up new challenges. We reviewed them in this <a href=\"https:\/\/business.kaspersky.com\/transparent-opacity-retrieving-confidence-in-cloud-services\/951\" target=\"_blank\" rel=\"noopener nofollow\">blog post a year ago<\/a>. Now, we\u2019ll just list the most important and most common issues across all industries with sensitive data bound for clouds:<\/p>\n<p>\u2013 The degree of control over the data reserved by the client company of the cloud service provider. In other words, it\u2019s a question of who actually owns and controls the data in the cloud.<\/p>\n<p>\u2013 Third-party access to the outsourced data. With hoteliers working with personally identifiable and payment data, protecting their client privacy is paramount.<\/p>\n<p>\u2013 Safe transition of data between the local and cloud resources. Unfortunately, we have seen examples of malware oozing from the leased facilities into the client networks, while there should be absolutely no malware in the clouds.<\/p>\n<p>Clouds themselves may improve business, reducing costs and the IT maintenance burden, but are they a panacea? Barely. Just like any other technology, they are only as trustworthy as they are auditable, and the clients should have the right solutions to protect their data \u2013 in and out of the cloud.<\/p>\n<p>Yet another problematic aspect of IT security in the hospitality industry is the use of WiFi networks. In this highly competitive environment where the user experience is everything, free WiFi today is a must, but it also generates some issues. We\u2019ll talk about them in one of our future posts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The newly disclosed Darkhotel APT campaign will surely draw increased scrutiny to hospitality systems&#8217; security worldwide. Hoteliers acknowledge the existence of security problems in their software systems, and many are opting to move these systems into the cloud. Is this a viable solution?<\/p>\n","protected":false},"author":209,"featured_media":15866,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[2223,864,189,2224,298,2225],"class_list":{"0":"post-15025","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cloud-service","10":"tag-darkhotel","11":"tag-data-security","12":"tag-hotel-data-security","13":"tag-it-security","14":"tag-pos-security"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hotel-it-security-quo-vadis\/15025\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hotel-it-security-quo-vadis\/15025\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hotel-it-security-quo-vadis\/15025\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/cloud-service\/","name":"cloud service"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=15025"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15025\/revisions"}],"predecessor-version":[{"id":26568,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15025\/revisions\/26568"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15866"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=15025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=15025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=15025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}