Be Safe in Your Travels

Do you remember that one hotel you’ve stayed at during the course of your travels? You remember the one I’m talking about; it looked good on the outside, but inside, there was no security. It sort of left you feeling weak in the knees hoping nothing bad would happen.

If you are an integrator and one of your clients owns a hotel or even a chain of hotels, get up on your soapbox and help them better understand security. Even if a hotel has a strong security policy, with proper procedures in place, they are still vulnerable. There are cyber-attacks, theft, fraud and a myriad of other things that could cause a patron to pause.

Like you, I travel a lot. The first things I look for in my travels are elements of security. I look at the airport; I look around inside a restaurant; and, I look inside the hotel. I’m sure you will agree that having robust security in place means a better and safer guest experience. It also means that employees will think more about safety and security, which will help minimize danger and reduce theft.

When you arrive at a hotel, though, security is probably the last thing on your mind. You’re probably more concerned about getting checked in and making that meeting on your schedule, or getting out, seeing the local sights. The first thing I do when going into a hotel room is flip the additional door lock and slide the swing door bar into place. I feel secure in the room, but when a room is not occupied, the hotel is responsible for the security of the property.

In the summer of 2012, security researcher and software developer Cody Brocious exposed a security flaw in some Onity door locks, revealing a lock-hacking technique that received widespread attention. At that time, dozens of hotel guestroom burglaries took place in Texas and Arizona. Onity announced a fix for the lock and shipped out 1.4 million solutions for its locks to hotel properties, though it took some hotels a while to get in step.

Here are a few steps a hotel or hotel chain can take to increase guest security:

Update your locks. Systems that track who goes in and out of rooms can serve as a deterrent. If there is an audit process on the door, rooms are less likely to be the subject of a theft.

Set-up cameras. Thanks to new innovations with software, video cameras can now recognize activity in an area and provide an alert. There could also be a third-party monitoring the property with the ability to audio call to advise someone who doesn’t belong on the property that they are being watched.

Customer service. When guests arrive at your hotel, greet them in a way that they know they are welcome, and in the case of an unsuspecting thief, they know the property is being watched at all times. You don’t have to hire more people, just make your employees more aware of security procedures.

Cultivate a sense of ownership. When employees have a sense of ownership, this increases their empowerment, making security on the property much tighter. Employees will be able to solve safety and security problems more quickly and efficiently. This is true in any work environment.

Hire the right employees. Most employers now require drug screening and a criminal background check. Good idea, but they also should have certain controls in place that new employees know about, such as a monitoring system that will monitor their activities so crimes of opportunity become far less likely. For instance, handling a cash bag should require that two employees are involved. The reasoning seems pretty logical.

Add monitoring to video surveillance. Most hotels have video surveillance in the lobby or at the front of the facility. They even have surveillance that monitors cash drawers, but now there is software that enables hotel owners to match transactions with video surveillance.

Protect electronic borders. Computer system hacking has become all too common. Russian hackers tapped into Wyndham Worldwide’s data center in Phoenix three times between 2008 and 2010. The result was more than 600,000 payment card accounts tapped, leading to more than $10.6 million in fraud. The result for Wyndham was a federal lawsuit alleging that they failed to implement reasonable data security measures.

Protect passwords. Not all cybercrimes occur online. Employees should have awareness about the physical security of computers, access control and passwords. The easiest and most familiar means for criminals to gain access into a computer is by conning an employee. Passwords should change every three months, and employees and security staff should always keep an eye out for people who are in staff-only areas of a facility.

If you have a question about hotel security during your travels, ask someone. Any trip you take, whether for business or pleasure, make sure you not only feel safe and secure, but that you are as safe and secure as possible at all times.

This article originally appeared in the July 2014 issue of Security Today.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”