Skip to navigation Skip to search Skip to content
Contact

Cyber attack in the hotel

How can we protect ourselves?


Cyber attacks are becoming more and more of an issue - unfortunately also in hotels. And it's no longer just the big players in the industry that are affected. IT security is still not a priority for many hotel businesses, yet hacker attacks are on the rise. Preventive measures and concepts for emergencies are needed to be armed against them - in the hotel industry too!

Cyber attack icon with skull and circuit as a symbol for digital threats and IT security risks

Webinar recording (German): Cyber attacks in hotels - how can we protect ourselves?

  • Explanation of different methods of cyber attacks that occur specifically in the hotel and tourism industry
  • Facts and myths about cyber attacks
  • Current incidents in the hotel and tourism industry including explanations of procedures and concepts
  • Measures and their implementation to prevent cyber attacks

Methods of cyber attacks

Fraudsters use manipulated emails to gain access to sensitive company data and thus prepare a cyber attack.

spam mails

Phisingmails

Trojan horse

Crypto Locker Ransomware

Social engineering

Also an issue in the hotel industry

Spam mail = advertising mail, malware, phishing mail

Phishing mail, the aim is to obtain user name and password or install malware in the background - focus in the hotel industry: booking platforms, emails from international guests, CEO fraud

Trojans, disguised as a useful program in an email attachment or as a download

Crypto Locker Ransomware, a type of malware that encrypts files and then hands over a key with a ransom demand to reverse this action.

Social engineering- humans pose the greatest risk to IT security. A company's employees are often tricked into circumventing normal security precautions and disclosing sensitive data.

Source: www.ncsc.admin.ch

 

Cyberattacks by employees as a security risk - 90% of cyberattacks are due to human error

About the speakers

Mathias Niggli is an experienced computer specialist for computer and network security at Leuchter IT Solutions. He is familiar with cyber attacks. He also has experience in forensics as well as findings from investigations into cell phones and cryptocurrencies. He has already made a name for himself with his security awareness training courses. His tip is to keep hackers at bay by taking appropriate preventive measures.

Maria Hunger originally trained as a tourism clerk, but changed sectors. She is currently training to become a business IT specialist HF. At Leuchter, she is responsible for the Hospitality division. As she is familiar with both the hotel industry and IT, she sees many opportunities for support in her work.

How can we protect ourselves?

Do NOT open attachments from unknown senders
Do not pass on any information to strangers
No notes with passwords at the workplace
Locking the device when leaving the workstation
Secure passwords - at least 8 characters, special characters, upper & lower case
Report security incidents immediately to IT provider/management
Carry out awareness training
sensitize - sensitize - sensitize

Leuchter IT Cyber Security Awareness - minimizing the risk of cybercrime through targeted employee training

The Leuchter IT Cyber Security Awareness Service supports companies, including those in the hotel industry, in sustainably increasing their IT security resilience. The greatest risk of cybercrime is posed by a company's own employees. They often lack knowledge and awareness of possible attacks. These are carried out via phishing, spam or viruses, which can be infiltrated via various channels such as email, social media, WhatsApp or similar.

Modern open-plan office in loft style with brick walls, open workstations and contemporary office furnishings

Our offer

  • Leuchter IT Cyber Security Awareness

    Raising awareness for your company with customized solutions

    Contents

    • Sending fictitious phishing, spam or virus messages (procedure and information)
    • Targeted employee training with increasing level of severity
    • Evaluations defined by department/employee (procedure and information)
    • Training/procedure

Personal consultation

A team of various professionals will take care of your inquiries concerning the topics IT infrastructure, organisation, communication and co-operation in the modern business world. Please consign your questions and messages to our team. A proven expert in these topics will contact you.
We look forward to your inquiry!

Get in touch
Team IT-Infrastruktur

Team IT-Infrastruktur