#hotel-security

[ follow ]
#cybersecurity
Healthcare
fromBoston.com
2 days ago

Services at Brockton hospital return to normal more than a week after cyberattack

A Brockton hospital resumed normal operations after a cybersecurity incident caused temporary service shutdowns and diverted ambulances.
Privacy professionals
fromSecurityWeek
4 days ago

Nightclub Giant RCI Hospitality Reports Data Breach

RCI Hospitality Holdings reported a cybersecurity incident exposing sensitive personal information of independent contractors due to an IDOR vulnerability.
Healthcare
fromBoston.com
2 days ago

Services at Brockton hospital return to normal more than a week after cyberattack

A Brockton hospital resumed normal operations after a cybersecurity incident caused temporary service shutdowns and diverted ambulances.
Privacy professionals
fromSecurityWeek
4 days ago

Nightclub Giant RCI Hospitality Reports Data Breach

RCI Hospitality Holdings reported a cybersecurity incident exposing sensitive personal information of independent contractors due to an IDOR vulnerability.
UK news
fromwww.bbc.com
4 days ago

Guests expose hotel safety failings beyond Travelodge

A woman was raped by a colleague in a hotel room due to security failings, raising concerns about hotel safety protocols.
#data-breach
Privacy professionals
fromTheregister
5 days ago

Booking.com warns of possible reservation data exposure

Booking.com warns customers of potential data exposure due to unauthorized access, affecting reservation details but not financial information.
Privacy professionals
fromTechCrunch
4 days ago

Booking.com confirms hackers accessed customers' data | TechCrunch

Hackers accessed Booking.com customers' personal data, including names, emails, and booking details, prompting notifications to affected users.
Privacy professionals
fromTechRepublic
4 days ago

Booking.com Hack Exposes Customer Data, Sparks Travel Scam Fears

Hackers breached Booking.com, exposing personal data of customers, including names, addresses, and booking details, raising concerns about privacy and security.
Privacy professionals
fromTechzine Global
5 days ago

Booking.com confirms data breach, but is tight-lipped about details

A data breach at Booking.com exposed customer bookings, with unauthorized access to personal information, though the extent and timing remain unclear.
#hospitality
Information security
fromComputerWeekly.com
2 days ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
fromInsideHook
2 weeks ago

Why Are So Many Luxury Hotels Nickel-and-Diming Their Guests?

Luxury hotels are supposed to provide exceptional hospitality, yet many seem to prioritize profit over guest satisfaction, leading to feelings of exploitation during stays.
Berlin
Marketing tech
fromPhocuswire
in 2 months

Travel marketing's AI identity crisis

AI is fundamentally changing travel marketing, requiring a complete rethinking of traditional strategies and customer engagement.
#physical-security
#executive-protection
Information security
fromSecuritymagazine
3 days ago

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

The executive protection model must evolve from a reactive approach to a comprehensive security infrastructure due to increased accessibility of personal information.
Information security
fromSecuritymagazine
2 weeks ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
fromMail Online
2 weeks ago

Grim reason you should NEVER use shampoo and conditioner from hotels

'Never ever use these three things in a hotel room,' she warned in a video. Her first tip was to avoid using the 'wall-mounted refillable containers with soap and shampoo' now commonly found in hotel bathrooms.
Berlin
fromwww.businessinsider.com
4 days ago

We're in a new era of heightened CEO safety measures, security pros say

This attack is just shedding light on the fact that you're even more vulnerable outside of the office, said Don Aviv, CEO of Interfor International, a security consultancy.
Information security
Remote teams
fromCity AM
3 weeks ago

The Debate: Is employee tracking justified in the modern workplace?

Tracking junior employees' work hours ensures accountability and productivity, addressing issues of underreporting and resource allocation.
Information security
fromSecurityWeek
3 days ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
#airport-security
Information security
fromInfoWorld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromTechzine Global
4 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
fromEntrepreneur
1 month ago

Data Centers Are Deploying $175,000 Robot Dogs for Security. Companies Say They're Worth It.

Boston Dynamics' Spot ranges from $175,000 to $300,000, depending on configuration. Ghost Robotics' Vision 60 starts at $165,000. Both companies pitch them as cheaper alternatives to human guards, who cost around $150,000 annually. "Typically, our customers have a payoff within two years," Merry Frayne, senior director of product management at Boston Dynamics, told Business Insider.
Boston
Travel
fromTravel + Leisure
1 month ago

Thieves Always Check These Common Hotel Hiding Spots First-Here, 8 Clever Ways to Protect Your Valuables

Hotel thieves target predictable hiding spots like toiletry kits and dresser drawers, making affordable security lock boxes and disguised containers essential for protecting valuables while traveling.
US news
fromSecuritymagazine
1 month ago

Airport Security Challenges in the Midst of the DHS Shutdown

DHS shutdown causes TSA staffing shortages, creating extended airport security lines nationwide as spring travel increases.
fromTravel + Leisure
1 month ago

This Is Why You Should Never Put Your Phone in the TSA Bin, According to Frequent Flyers and Travel Experts

I had my camera stolen while going through security. It was a painful loss, mainly because of the memories captured on it. When she brought it up to the security officers, they told her there was no video coverage of that area.
Travel
Fashion & style
fromTravel + Leisure
1 month ago

These Are the First Places Thieves Look for Valuables in a Hotel-and Where to Store Them Instead

Experienced thieves target predictable hiding spots like hotel bathroom drawers and suitcase pockets; travelers should use alternative storage methods to protect valuables during vacations.
Travel
fromTravel + Leisure
1 month ago

These Are the Most Stolen Hotel Room Items, According to Hospitality Workers

Towels are the most frequently stolen hotel items at 88%, followed by bathrobes at 66% and hangers, according to a survey of over 1,200 hotel staff and owners.
#competition-law
EU data protection
fromBusiness Matters
1 month ago

CMA investigates Hilton, IHG and Marriott over alleged hotel data sharing via STR

The UK's CMA launched a formal investigation into Hilton, InterContinental Hotels Group, and Marriott International for potentially sharing competitively sensitive information through STR data analytics platform.
Marketing tech
fromwww.independent.co.uk
1 month ago

Hilton and Marriott among hotel chains under investigation over data sharing

UK competition watchdog investigates three major hotel chains and data analytics firm CoStar for suspected collusion through shared pricing information via algorithms.
EU data protection
fromBusiness Matters
1 month ago

CMA investigates Hilton, IHG and Marriott over alleged hotel data sharing via STR

The UK's CMA launched a formal investigation into Hilton, InterContinental Hotels Group, and Marriott International for potentially sharing competitively sensitive information through STR data analytics platform.
Marketing tech
fromwww.independent.co.uk
1 month ago

Hilton and Marriott among hotel chains under investigation over data sharing

UK competition watchdog investigates three major hotel chains and data analytics firm CoStar for suspected collusion through shared pricing information via algorithms.
Information security
fromBusiness Matters
4 weeks ago

How to build an effective employee phishing training program in 2026

Effective employee phishing training programs focus on behavior change and continuous education to reduce security risks and improve reporting rates.
Public health
fromTravel + Leisure
2 months ago

Hotel Refillable Toiletry Dispensers May Be More Bacteria-filled Than You Think, Study Finds

Refillable hotel toiletry dispensers often contain bacterial contamination exceeding accepted limits, creating hygiene concerns despite environmental benefits.
Digital life
fromTravel + Leisure
2 months ago

The Simple Way to Get a Bigger Hotel Room for Free-Plus More Tips From Experts

Polite, in-person requests, travel-agent advocacy, direct bookings, and loyalty status can increase chances of receiving complimentary hotel room upgrades.
US politics
fromwww.mediaite.com
2 months ago

2 Minnesota Hotels Cancel ICE Reservations and Temporarily Shut Down Due to Safety Concerns'

Two Minnesota hotels canceled ICE agents' reservations and temporarily closed due to heightened public safety and security concerns amid anti-ICE protests following Renee Good's shooting.
Gadgets
fromArchitectural Digest
1 month ago

The Spectrum of Home Security Today-From Sensors to Safe Rooms

Modern home security uses discreet, AI-enabled sensors, cloud storage, and professional integrations, making devices critical for evidence and design-integrated protection.
fromInsideHook
1 month ago

Does the Future of Booking Hotels Involve AI Agents?

It isn't a universal truth, but a vast number of goods and services have their own full-circle moments. While there are still plenty of travel agencies in the U.S., the overall number is still down considerably from a peak in the 1980s. For some industry forecasters, though, the future looks a lot like the recent past, except that instead of travelers trusting human agents with making their travel plans a reality, they'll use AI agents for the same purpose.
E-Commerce
Privacy technologies
fromwww.mercurynews.com
1 month ago

Protect your family with the best home security devices

Affordable, easy-to-install home security devices are now accessible to most families, including window locks, door reinforcements, and alarms that provide effective protection against intruders and accidents.
Travel
fromTravel + Leisure
1 month ago

These Are the 9 Best Hotel Rewards Program for 2026, According to WalletHub

Choice Privileges ranks as the top hotel rewards program overall, offering faster point accumulation and broader accessibility across budget and midscale hotel categories.
Information security
fromSecuritymagazine
1 month ago

ISC West 2026 Product Preview

ISC West 2026 will feature AI-powered security solutions including system performance verification, remote power diagnostics, and advanced surveillance cameras with edge analytics capabilities.
US politics
fromNextgov.com
2 months ago

Super Bowl gears up for massive security operation

Federal, state and local agencies, including multiple DHS components, will provide extensive security support for the Super Bowl and surrounding events in the Bay Area.
fromZDNET
1 month ago

Your smart home may be at risk - 6 ways experts protect your devices from attacks

All smart homes are at risk of being hacked, but it's not a likely event. The type of bad actors that target smart homes and devices, such as security cameras, are opportunistic. They search randomly for easy targets -- they don't tend to choose a particular home to attack and then try to circumvent that specific system.
Privacy technologies
Travel
fromTravel + Leisure
1 month ago

We Asked Hotel Housekeeping Pros How to Be a Better Hotel Guest-Here's What They Said

Housekeeping professionals prefer guests hang damp items, declutter surfaces, and consolidate used towels in one area to enable efficient cleaning and faster room turnover.
Information security
fromSecuritymagazine
1 month ago

Why Security Culture Metrics Matter More Than Dashboards

Traditional cybersecurity metrics create false confidence by masking hidden risks; culture metrics measuring employee engagement and responsiveness are essential for actual security effectiveness.
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Information security
fromSecurityWeek
1 month ago

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric

Industrial control system manufacturers Siemens, Schneider Electric, Mitsubishi Electric, and Moxa released multiple security advisories addressing critical and high-severity vulnerabilities in their ICS products.
Travel
fromSilicon Canals
2 months ago

Why hotel checkout times are getting earlier and the pushback guests can legally make - Silicon Canals

Hotels are enforcing stricter check-in and checkout times due to housekeeping staffing shortages, reducing flexibility for travelers.
fromInsideHook
2 months ago

Where Have All the Hotel Bathroom Doors Gone?

On a recent two-week trip to Japan with my fiancé - six cities, six hotels - every stay was gorgeous and perfectly appointed. We wanted for nothing. Except, in most cases, a proper bathroom door. Instead, we spent the better part of two weeks making accidental eye contact through frosted glass and translucent panels while one of us was otherwise occupied. A design choice, apparently. A test of intimacy, definitely.
Travel
Information security
fromSecuritymagazine
1 month ago

Enhancing Incident Response with Integrated Access Control and Video Verification

Integrated access control and video verification technology enhance incident response capabilities and operational resilience by providing situational clarity and enabling faster security action.
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
Information security
fromZDNET
2 months ago

3 security gadgets I never leave home without (and don't break the bank)

Carry an inexpensive kit of physical security tools, like a USB data blocker, to protect devices from malicious chargers, cables, and data theft while traveling.
Information security
fromComputerworld
2 months ago

This is why high-value targets should use Lockdown Mode

Apple's Lockdown Mode prevented the FBI from accessing a seized iPhone, demonstrating strong protection against physical wired extraction attempts.
Information security
fromBusiness Matters
2 months ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
Information security
fromThe Hacker News
1 month ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
fromSecuritymagazine
2 months ago

Plenty of Associations, But Not Enough Association

I belong to six professional organizations. Or maybe it's 13, 19, 26, or 47. I can't be sure. The ones where I pay dues or volunteer I know well: ASIS International, the Life Safety Alliance, Chartered Security Professionals, and a couple of others. Then come the niche and industry-specific associations like the International Council of Shopping Centers, public-private partnerships such as OSAC and Infragard, and the countless ASIS Communities.
Information security
fromSecuritymagazine
2 months ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
[ Load more ]