Menu

Hotels face increasing risk from cyber pirates

Featured

Hotels face increasing risk from cyber pirates - [https://darrellmccoy.files.wordpress.com/2014/11/cyber_piracy.jpg?w=672&h=372&crop=1] Hotels face increasing risk from cyber pirates - [https://darrellmccoy.files.wordpress.com/2014/11/cyber_piracy.jpg?w=672&h=372&crop=1]

SA business must heed the threat amid global rise in ransomware attacks.

South African businesses are becoming increasingly vulnerable to the 400% growth in global ransomware extortion attacks.

According to audit, tax and business advisory firm Grant Thornton, businesses need to act now to ensure that their digital systems are protected and that critical systems are taken offline.

Recently an upmarket hotel in Austria had its electronic key system compromised by hackers who locked management out of its own computer system. Guests were unable to access or leave their hotel rooms and this led to the hotel being forced to pay a ransom of two Bitcoins – an electronic currency that is difficult to trace – equivalent to about $1 800 (R20 000) to gain access to their system.

Martin Jansen van Vuuren, Director: Advisory Services at Grant Thornton says that the Austrian attack indicates just how easily hotels’ systems can be infiltrated from cyber space.

Mobile phones used as keys in many hotels these days, are also vulnerable as they often do not have the same level of security as a desktop system.  Hackers could steal “door keys” via cyber space or simply disable keys causing huge inconvenience. Open WiFi systems, that are by their nature made easy to access for hotel guests, are another potential source for hackers if they are linked to systems which can be used to gain entry to devices and then to lock out users or steal data.

“Many hotels do not have on-site IT support and rely on the Hotel chain’s head office or an external service provider to attend to IT issues. This centralised approach places individual properties at additional risk of attack, as a cyber-attack may not be picked up quickly enough leading to a delay in combating the cyber-attack” he says.

Ransomware attacks quadrupled in 2016 to 4 000 a day

According to data from the United States Justice Department, ransomware attacks quadrupled in 2016 to an average of 4000 a day. The FBI quote costs to victims of such attacks rose to $209-million (R2,7bn) in the first three months of 2016, compared with $24million (R312m) for the whole of 2015.

“Ransomware syndicates are extremely sophisticated, even hosting their own ‘call centres’ which assist you to access your decryption key and undertake not to attack you with the same ransom. They even use algorithms to determine your particular industry, and the ransom price is based on your industry’s perceived ‘wealth’,” says Jonker. “You can’t really prevent these attacks; you can only reduce your attack vulnerability to some extent”.

Grant Thornton’s IT Advisory team advises the following steps in order to minimise the risk:

  • Remove admin rights for laptop users to prevent users from inadvertently downloading malicious software;
  • Ensure that all systems undergo well-structured  backup processes  and that they are recoverable;
  • Segregate networks so that different network segments are limited to different groups of authorised users;
  • Provide database access only to those people who require access; and
  • Install antivirus software on all devices including laptops; smart phones and other wearable technologies; and finally
  • Use low-code programming platforms to develop apps, as we do, where security has already been incorporated into the platform.

Jonker says that it is best practice to isolate certain high risk and critical (especially national) infrastructure networks and systems, so that they are off the grid and entirely inaccessible from cyber space.  They only ever link intermittently via a small ‘sterile’ middle system, with neither linked system connected at the same time – a bit like an airlock in a submarine.  So an hotel’s external public reservation system might interface hourly via such a sanitised link only.

“At the end of the day you balance security with the need for convenience, availability, functionality and innovation,” says Jonker. “To produce leapfrog new technology most developers are focused on building systems that work, not systems that are secure. We need to change mind sets so that we don’t focus exclusively on functionality but ensure that we build systems that enhance security and privacy in equal measure” he concludes.

back to top

Industries

About us

Follow us

Follow us @BusinessNewsCT

BusinessNewsCT Revitalised Burma looks ahead to growth - https://t.co/3QvSM7l1zz https://t.co/eEH9Mn3zQV
BusinessNewsCT Atlas Copco expands range of dewatering pumps - https://t.co/Od3hEUMI2z #Atlascopco https://t.co/johuMN3iCZ