“Modern societies have become increasingly dependent on Information and Communication”. What methods, tools and techniques are currently used in hotels regarding computer network and system protection?

“Technologies offer both opportunities and challenges with respect to improvements in the quality of life of people and the communities in which they live” (Muata, Bryson, Vogel, 2014, p.93). Technology in hospitality industry is driven by the increasing transaction volumes, complex reporting requirement, and international communication needs (Cobanoglu, & Demicco, 2007). Information technology (IT) can improve almost all areas of hospitality industry, such as guest services, reservations, food and beverage management, sales, food service catering, maintenance, security, and hospitality accounting (Cobanoglu, & Demicco, 2007).

Having high technology causes a lot of data breach and information loss. To prevent against losses, organizations observe their computer network for security threats from a wide range of sources, such as computer-assisted fraud, espionable, sabotage, vandalism, hacking, system failures, fire, and flood (Cobanoglu, & Demicco, 2007). To protect the public trust and to prevent copycat hackers to hack into an organization’s computer system, most of the organizations try not to reveal the data breaches and cyber attacks against their computer systems (Cobanoglu, & Demicco, 2007).

Every level of hotel management (e.g., property level, user level) involves computer networks. At the property level, there are local area networks where reservation, front office, payroll, accounting, restaurant management, human resources, and other systems are located (Cobanoglu & Cougias, 2003). At the user level, the user browse the hotel website to make reservations and to access the information about the hotel (Cobanoglu, & Demicco, 2007). This level of interaction in a network environment increases the vulnerability of computer systems to information and network security threats as any unencrypted information transmitted on Transmission Control Protocol/Internet Protocol (TCP/IP) can be sniffed by unauthorized people (Cobanoglu, & Demicco, 2007). The IT security problem exacerbates as most of the people in hotels who deal with computer systems (e.g., front office managers and accountants) are not IT experts and have only some familiarity with computer systems (Cobanoglu, 2005). Cyber risk is becoming an increasing issue for many organizations and businesses, including hospitality industry, a new advances in computing systems emerge, such as cloud computing, social media, and big data.

What methods, tools and techniques are currently used in hotels regarding computer network and system protection?

What are the current threats to computer network security in hotels?

What are the ways of handling security attacts in the hotel’s computer networks?

What is the importance of network security in hotels?

Which methods hotels leverage to secure their websites for any data and financial transactions?

What criteria hotels have to consider in making a strong password for their computer networks and logins (computers and websites)?

If the topic inspired you attend the workshop during W2F 2018!