hotels update security slowly for wifi, electronic door locks
Klipton, owned by IHG, reported that credit card payments had been attacked by malware.
The attack came after a data leak in the United States. S.
HEI hotels & Resorts are 20 hotels operated by Marriott International, Hyatt, IHG and Starwood hotels and Resorts.
\"Hotel companies are considered low-hanging fruits by attackers because they are usually a little behind in terms of cybersecurity and the hotel chain network is also good --
Shlomo Touboul, CEO of an unreal network company in Tel Aviv, Israel, said: \"Connect
Network security company.
\"Once Attackers penetrate the network, they don\'t have anything to detect and mitigate attacks.
While hotel companies usually have a good investment in preventive tools, they don\'t pay much attention to post-default testing.
\"Not all hackers focus on getting credit data through payment systems.
Others are more disruptive and choose to focus on public WiFi, keyless access or check --in apps.
Nathan Wenzler said that why WiFi is not safe to update security is not a priority in many hotels, especially Internet access, which has become the universal amenities that guests expect, chief security architect at AsTech Consulting, San Francisco
Independent security consulting company.
Many guests mistakenly believe that the WiFi network is maintained by the hotel, which makes them a big target for hackers eager to steal passwords and other personal data.
\"Their security measures are poor, if any,\" he said . \".
Touboul says guests should choose to use their cellular network instead of the guest WiFi network when they want to access their bank account or shop.
Another security issue with the door key app as more and more hotels add apps to register and enter and open rooms, there is now another ready-made target.
While these applications are convenient for guests, the security of the internal network that controls these wireless Internet services is often overlooked.
Bluetooth or NFC-
The enable app as the key to the hotel room door can easily be broken.
\"More and more hotel chains offer customers keyless access systems that are driven by apps they download to their phones,\" said Wenzler . \".
\"When they get to their room door, they activate the app, which opens the door over wireless transmission and gives the client access to the authorization.
\"Security researchers have used various technologies to prove many times that these applications are vulnerable,\" he said, this means that hackers who are also targeting WiFi \"can now easily target the use of these keyless access systems \".
Consumers who want to use these keyless access to the system should be aware of lurking people, because savvy attackers can detect Bluetooth or NFC by using their smartphones, tablets or laptops-
Short enable app
Range signals and try to compromise when entering and losing.
\"If you see someone nearby when you enter a hotel room, it is safest to wait a moment for them to pass before using keyless access to the system,\" Wenzler said . \".
Sticking to the standard key card can reduce the chances that hotel guests will be targeted by hackers, and also means compromise between convenience and security.
\"While the hotel does a better job of protecting users from apps downloaded to their devices and supporting an internal network of keyless entrance locks on the hotel\'s interior doors, if the customer has the slightest concerns, \"It might be safer to get a physical key card and use it,\" he said. \".
While these keyless entries are touted as safe as key cards, Yossi Zekri, CEO of acant, Los Angeles, says the opposite is true
A provider based on intelligent data capture and authentication solutions.
Instead, the hotel should adopt a variety of solutions to verify the identity of guests
Whether an entry is made from a key card or a keyless entry, factor authentication is more secure.
\"Currently, the industry standard for verifying IDs on the hotel app is SMS,\" he said . \".
\"Consumers get more protection by adopting a stricter verification process.
The identity file and ID can be verified through the text and password layer.
\"Other hackers not only target WiFi and keyless access, they also focus on other methods such as apps that allow digital bookings or check in.
Zekri said that when consumers use the mobile app to stay in a hotel before they arrive, it is crucial to determine that the person is real.
\"The only way to get a confirmation is to validate the ID, which can be multiple
\"This is a factor that is considered to ensure a high level of protection,\" he said . \".
\"Front desk or authentication via mobile app is an important part of providing a safe and secure environment for hotel guests.
\"Other guests are checking in through self-help
The service booth is very different from the security level.
Many hotels use scanners and mobile devices at the front desk to authenticate driver\'s licenses and passports.
\"However, many hotels only have a visual inspection of the ID card and may make a copy of the photo,\" said Zekri . \".
\"This is the safest way.
Mobile and kiosk solutions can easily and quickly request documents for authentication.
\"The hotel needs to be proactive,\" said Touboul, \"It seems that there is only a matter of time until its network is infiltrated and is now ready for the day. \".
\"Since penetration is inevitable, their plans should include high fidelity testing and high quality real-time
Time forensics obtained from the source of the attack.