Be Safe in Your Travels

Do you remember that one hotel you’ve stayed at during the course of your travels? You remember the one I’m talking about; it looked good on the outside, but inside, there was no security. It sort of left you feeling weak in the knees hoping nothing bad would happen.

If you are an integrator and one of your clients owns a hotel or even a chain of hotels, get up on your soapbox and help them better understand security. Even if a hotel has a strong security policy, with proper procedures in place, they are still vulnerable. There are cyber-attacks, theft, fraud and a myriad of other things that could cause a patron to pause.

Like you, I travel a lot. The first things I look for in my travels are elements of security. I look at the airport; I look around inside a restaurant; and, I look inside the hotel. I’m sure you will agree that having robust security in place means a better and safer guest experience. It also means that employees will think more about safety and security, which will help minimize danger and reduce theft.

When you arrive at a hotel, though, security is probably the last thing on your mind. You’re probably more concerned about getting checked in and making that meeting on your schedule, or getting out, seeing the local sights. The first thing I do when going into a hotel room is flip the additional door lock and slide the swing door bar into place. I feel secure in the room, but when a room is not occupied, the hotel is responsible for the security of the property.

In the summer of 2012, security researcher and software developer Cody Brocious exposed a security flaw in some Onity door locks, revealing a lock-hacking technique that received widespread attention. At that time, dozens of hotel guestroom burglaries took place in Texas and Arizona. Onity announced a fix for the lock and shipped out 1.4 million solutions for its locks to hotel properties, though it took some hotels a while to get in step.

Here are a few steps a hotel or hotel chain can take to increase guest security:

Update your locks. Systems that track who goes in and out of rooms can serve as a deterrent. If there is an audit process on the door, rooms are less likely to be the subject of a theft.

Set-up cameras. Thanks to new innovations with software, video cameras can now recognize activity in an area and provide an alert. There could also be a third-party monitoring the property with the ability to audio call to advise someone who doesn’t belong on the property that they are being watched.

Customer service. When guests arrive at your hotel, greet them in a way that they know they are welcome, and in the case of an unsuspecting thief, they know the property is being watched at all times. You don’t have to hire more people, just make your employees more aware of security procedures.

Cultivate a sense of ownership. When employees have a sense of ownership, this increases their empowerment, making security on the property much tighter. Employees will be able to solve safety and security problems more quickly and efficiently. This is true in any work environment.

Hire the right employees. Most employers now require drug screening and a criminal background check. Good idea, but they also should have certain controls in place that new employees know about, such as a monitoring system that will monitor their activities so crimes of opportunity become far less likely. For instance, handling a cash bag should require that two employees are involved. The reasoning seems pretty logical.

Add monitoring to video surveillance. Most hotels have video surveillance in the lobby or at the front of the facility. They even have surveillance that monitors cash drawers, but now there is software that enables hotel owners to match transactions with video surveillance.

Protect electronic borders. Computer system hacking has become all too common. Russian hackers tapped into Wyndham Worldwide’s data center in Phoenix three times between 2008 and 2010. The result was more than 600,000 payment card accounts tapped, leading to more than $10.6 million in fraud. The result for Wyndham was a federal lawsuit alleging that they failed to implement reasonable data security measures.

Protect passwords. Not all cybercrimes occur online. Employees should have awareness about the physical security of computers, access control and passwords. The easiest and most familiar means for criminals to gain access into a computer is by conning an employee. Passwords should change every three months, and employees and security staff should always keep an eye out for people who are in staff-only areas of a facility.

If you have a question about hotel security during your travels, ask someone. Any trip you take, whether for business or pleasure, make sure you not only feel safe and secure, but that you are as safe and secure as possible at all times.

This article originally appeared in the July 2014 issue of Security Today.

Featured

  • Survey Shows Election Anxiety Crosses Party Lines

    New reports of election worker intimidation are raising concerns about election interference. A majority of Americans (71%) are worried about voter intimidation or safety at the polls, and 75% want security cameras at their voting place, according to a new national survey. Read Now

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3