Want to know more about CyberHive Trusted Cloud?

Book a Demo

Hotel chains need CyberHive’s super-fast detection to eject cyber criminals before damage is done

What should we learn from successful cyber-attacks on the servers of well-resourced hotel chains? Firstly, that hotels are probably relying on outdated cyber security that focuses on defending the perimeter of their IT systems. And secondly, that hospitality businesses are highly-prized targets because they hold the financial details of millions of customers, many of whom are wealthy.

The list of major cyber crimes perpetrated against hotel chains gets steadily longer. Last November the details of 500 million Marriott International guests were compromised and before that, card numbers and verification codes were stolen from servers for 1,200 hotels in the InterContinental Hotels Group.

Hackers also took card payment details relating to 41 hotels in the Hyatt Hotels Corporation. It was the second time the chain had been raided. In late 2015, customers’ financial data was stolen from 250 hotels.

It is a question of when, not if, your servers are breached

Unfortunately, it is no longer a question of if hotel chains and hospitality businesses will be breached, but when. That makes fast, almost-instant detection crucial so that damage can be prevented. Achieving that is only possible through CyberHive’s state-of-the-art security technology that uses the power and integrity of chips found on every server’s motherboard.

The reality now is that new malware is being released on such a massive scale that the AV industry cannot cope.  As soon as the AV industry identifies and blocks one type of attack, the hackers have moved on.

Staff are only human and they make you vulnerable

Most cyber-attacks originate from human errors because hackers have become hugely expert in tricking employees, usually through a malware-laden phishing email that looks convincing.

Criminals are also well-versed in the art of corrupting employees in data centres so they plant unauthorised software on servers. Such software may go undetected for months while it steals valuable information.

Conventional security takes too long to detect breaches

The problem with malware on servers is the length of time taken to detect it. Respected researchers The Ponemon Institute in their 2018 Cost of a Data Breach Study, found that it took an average of 197 days to identify a data breach and 69 days to contain it.

In the Marriott breach, the hackers had originally gained illegal entry to the chain’s Starwood reservation system back in 2014. The company may somewhere along the line have lost its encryption keys – which, if true, demonstrates that encryption is only as good as the processes and people that implemented it.

With CyberHive detection-time is reduced from weeks to seconds

This is where CyberHive comes in, using a combination of hardware-based cryptography and whitelisting technology to shift the emphasis from defending against known external threats to identifying all attacks within seconds, before they have any impact.

The technology is easily implemented since it employs the chips found on the motherboards of every server. It checks the server’s status every few seconds, which is impossible with conventional technology. And being impervious to hacking, no person or organisation can interfere with servers, falsify verification data or bypass security.

CyberHive also offers protection against insider-attacks by eliminating single points of human weakness. If someone in a data centre drops nasty software on a server, the organisation’s cyber security staff will know about it right away.

Of course, there is never a single magic solution. Staff-training and the retention anti-virus and associated technologies remain important. But given the increasing sophistication of cyber criminals, the only sensible approach for hotels is to implement CyberHive. Only then will they avoid the commercial misery of having to tell millions of customers that their data has been stolen.


Other Insight Articles

  • Why 2FA is an inadequate response to securing Office 365

    IT decision makers at financial institutions were quick to see the advantages of moving to cloud-based platforms; the ability to provide unique types of services, to become agile and to lower opera...

    Find out more
  • Cyber-security professionals must rethink their counter-attack

    The Bank of England has revealed that cyber-attacks were the joint second most cited risk to the stability of the UK financial system with cyber-attacks increasing to a record high of 62 percent¹. ...

    Find out more

Enda Kenny spoke recently to #LondonStockExchange about the impact of #datasecurity on the wider population and why he's working with #CyberHive as Board Advisor, to help with its mission to make data breaches a thing of the past.


Contact Us

Please fill in the details below to get a 2 week demo of
CyberHive's cloud platform technology