The loss of millions of songs and pictures during a data migration of the once-upon-a-time social media king, MySpace, is not necessarily tragic. By comparison, there’s no shortage of tragedies to occupy our collective attention.
The importance of data has generated a bit of discussion recently. For example, by referencing the power of tech companies and their ability to harvest and synthesize data, an Economist article argues that data is now more important than oil.
There were many big breaches in 2018, here are the top 3:
Effective January 1, 2019, Hyatt will begin enforcing their Cyber Security Standard for franchise owners and operators. This standard, based on the Center for Internet Security (CIS) Critical Security Control (CSC) v6.1 framework, will include a self-certification process that begins on February 4, 2019 and has a compliance date of March 1, 2019.
VENZA’S Co-Founder and Partner Daniel Johnson, and CIO David Christiansen on why hotels are an easy target for cybercriminals, what specific areas can hotels reduce their risk of being breached, and what’s the future for PCI DSS standards with these emerging alternative payment methods.
Theresa Payton is a veteran cybercrime fighter who has brought her expertise to everything from the White House as a former chief information officer to the CBS show “Hunted,” where she plays a recurring role as herself. The president and CEO of Fortalice Solutions and co-founder of Dark Cubed recently addressed thousands of hospitality professionals […]
By Jeff Venza, President & CEO Hotel management companies are asking, how does the new privacy act in California compare to the new European Union privacy law? Here is a side-by-side comparison which reveals a few things that hotels should know. The delta between the EU Privacy Law (GDPR) to the California Consumer Privacy Act (CCPA) is: […]
A recent article in CSO magazine references the Cybersecurity Disclosure Act (CDA) of 2015 (proposed last December) and the wide-reaching impact the passing of that law might have. Not least of which is the central role that company leadership must take toward data security risk management. The article begins with the following statement: “Laws frequently […]