In a trend that continues to escalate against so-called “softer” targets, the travel and entertainment industry has been bearing the brunt of many of the data breaches of late. There are some specific reasons why this has been happening to hotels in particular and I expect the trend to not abate any time soon. However, the industry does have options – if they choose to schedule a wake-up call and start taking action now.
Part of the problem that hotels have is clearly the large amount of data they collect and retain in their data warehouses. Like other softer targets, such as localities and state governments, they maintain a high volume of detailed information on clientele because they need it to do their job. But having lots of data isn’t what makes hotels vulnerable in particular – it’s the challenges of the industry. There are four main reasons why hotels keep getting hacked:
These challenges are tough to manage and would-be attackers are all too keen to them. Without directly dealing with them, hotels are going to keep being ripe targets for attack. However, there are things that can be done to change the trajectory – but it will take a loud wakeup call for many vendors, sadly.
Hotels have a lot of choices, including strengthening firewalls, intrusion detection, encrypting data, and limiting access to data through access controls. But, focusing on infrastructure, perimeter, and intrusion detection is a losing battle since these measures only protect you from the threats you know about and don’t offer any protection once compromised or circumvented. Furthermore, many hotel chains have heavily invested in passive, data-at-rest encryption protection for their storage, databases, and data warehouses – which unfortunately doesn’t address the current threat vectors and only provides a false sense of security.
The key is to think about what the attackers are after at the hotel chains – the data warehouse – and how that great resource can be used while preventing abuse. Adopting a data-centric security model allows for the data to be protected as it is acquired and traverses through the organization and, if an attacker gains access through the perimeter, then the risk that the actual personal data will be exposed is dramatically reduced. Data-centric protection with technologies like tokenization allows the organization to use the protected data for their operations, analytics and data sharing, meaning that any exfiltrated data would be useless tokens and considered out of scope of a data breach. Guest safety and privacy has to extend through the full environment, not just the front doors!