Hotel giant Hyatt Hotels is notifying its customers for the second time in two years of yet another payment card data breach.

Security officials spotted unauthorized access to payment card information from cards entered manually or swiped at the front desk of certain Hyatt-managed locations between March 18, 2017 and July 2, 2017.

The information said to be compromised includes cardholder names, card numbers, expiration dates, and internal verification codes. The number of impacted customers is still being investigated at this time. But we do know that the breach affects 41 Hyatt facilities across 11 countries.

Even worse? Hyatt was breached back in 2015 and impacted 250 Hyatt locations in over 50 countries after payment card processing systems were infected with malware. One thing that seems evident is that hotels using certain POS systems are being targeted by hackers, and have proven to be rather successful. Hotels acquire mass amounts of credit card data from customers between dining at a hotel restaurant, utilizing the hotel spa services, parking, and at the front desk.

While the PCI DSS Compliance Standard requires an organization to implement solutions like system hardening and File Integrity Monitoring, few retailers operate these requirements sufficiently well. It’s important that companies within the hospitality industry understand that implementing security solutions like File Integrity Monitoring and System Hardening are essential to securing your IT estate and valuable consumer payment credentials.

 

Read the full article on InfoSecurity Magazine

 

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

USA Offices

New Net Technologies LLC
4850 Tamiami Trail, Suite 301
Naples, Florida, 34103

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]

 

UK Office

New Net Technologies Ltd
The Russell Building, West Common
Harpenden, Hertfordshire
AL5 2JQ

Tel: 020 3917 4995
 [email protected]

SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2022, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.