Intelligent SME.tech Issue 44 | Page 39

intelligent

INDUSTRY UNLOCKED // uncover a weakness before it is exploited by malicious actors . The frequency of your audits will depend on the size of your organisation but ideally you should have a third party perform an audit once a month or quarterly . By regularly reviewing and updating security policies you will develop a system based on continuous improvement .

2 . Employee training : Your staff should not be your only line of defence , but they are an important barrier to entry . Technological solutions , such as firewalls , are important , but they are not foolproof . Educate staff about cybersecurity best practices , including recognising phishing attempts and understanding the importance of strong password management . Training should be an evolving process with informative material regularly updated and accompanied alongside simulated phishing exercises to reinforce what staff have learned by putting it into practice .
3 . Secure payment systems : Your customers will expect payments to be protected . Implement secure payment processing systems , regularly update software and adhere to Payment Card Industry Data Security Standard ( PCI DSS ) guidelines . To ensure you are PCI compliant , regularly monitor and test your networks , perform risk assessments and create an internal information security policy , with strong access control measures .
4 . Data encryption : Encrypt sensitive customer data to protect it from unauthorised access , both in transit and at rest . Effective encryption strategies cater to the entire data lifecycle , from creation to storage to eventual deletion . This involves encrypting data before it is stored , decrypting it only when necessary for authorised purposes and finally disposing of encryption keys and encrypted data when it is no longer required .
5 . Incident response plan : Develop and regularly update an incident response plan to minimise damage in the event of a cyberbreach . This entails establishing clear roles and responsibilities for those on the response team , along with robust communication strategies for timely updates . The incident response plan will detail the steps and procedures for detecting , assessing and responding to different types of cyberthreats . When the threat is contained , your organisation can move towards the recovery and restoration of your operations .
6 . Be aware of brand phishing : Phishing is commonly used to exfiltrate customer data and hospitality is a prime target for brand impersonation . Be aware of any campaigns circulating that may refer to your hotel chain and make it clear to existing and prospective customers to only trust legitimate emails . A recent example of brand phishing attacks includes the exploitation of booking . com , one of the world ’ s largest websites for holidaymakers . Hackers target individual hotels that use the booking . com portal and once they gain administrative control , they trick guests into paying money to them and not the hotel .
Whether independent or part of a chain , hotels are responsible for storing the personal identifiable information of employees and customers and can ill afford any weaknesses in their cyberdefences . To safeguard sensitive data and maintain industry integrity , hotels across the country should apply the same principles of physical security to their cybersecurity strategy , investing in the best technology , implementing access controls to limit exposure of confidential documents and mapping out an incident response plan to mitigate any losses .
In the world of hospitality , securing your digital doors isn ’ t just key , it ’ s the only way to ensure a five-star experience for guests and peace of mind for management . �
Intelligent SME . tech
. tech
39