Be Safe in Your Travels

Do you remember that one hotel you’ve stayed at during the course of your travels? You remember the one I’m talking about; it looked good on the outside, but inside, there was no security. It sort of left you feeling weak in the knees hoping nothing bad would happen.

If you are an integrator and one of your clients owns a hotel or even a chain of hotels, get up on your soapbox and help them better understand security. Even if a hotel has a strong security policy, with proper procedures in place, they are still vulnerable. There are cyber-attacks, theft, fraud and a myriad of other things that could cause a patron to pause.

Like you, I travel a lot. The first things I look for in my travels are elements of security. I look at the airport; I look around inside a restaurant; and, I look inside the hotel. I’m sure you will agree that having robust security in place means a better and safer guest experience. It also means that employees will think more about safety and security, which will help minimize danger and reduce theft.

When you arrive at a hotel, though, security is probably the last thing on your mind. You’re probably more concerned about getting checked in and making that meeting on your schedule, or getting out, seeing the local sights. The first thing I do when going into a hotel room is flip the additional door lock and slide the swing door bar into place. I feel secure in the room, but when a room is not occupied, the hotel is responsible for the security of the property.

In the summer of 2012, security researcher and software developer Cody Brocious exposed a security flaw in some Onity door locks, revealing a lock-hacking technique that received widespread attention. At that time, dozens of hotel guestroom burglaries took place in Texas and Arizona. Onity announced a fix for the lock and shipped out 1.4 million solutions for its locks to hotel properties, though it took some hotels a while to get in step.

Here are a few steps a hotel or hotel chain can take to increase guest security:

Update your locks. Systems that track who goes in and out of rooms can serve as a deterrent. If there is an audit process on the door, rooms are less likely to be the subject of a theft.

Set-up cameras. Thanks to new innovations with software, video cameras can now recognize activity in an area and provide an alert. There could also be a third-party monitoring the property with the ability to audio call to advise someone who doesn’t belong on the property that they are being watched.

Customer service. When guests arrive at your hotel, greet them in a way that they know they are welcome, and in the case of an unsuspecting thief, they know the property is being watched at all times. You don’t have to hire more people, just make your employees more aware of security procedures.

Cultivate a sense of ownership. When employees have a sense of ownership, this increases their empowerment, making security on the property much tighter. Employees will be able to solve safety and security problems more quickly and efficiently. This is true in any work environment.

Hire the right employees. Most employers now require drug screening and a criminal background check. Good idea, but they also should have certain controls in place that new employees know about, such as a monitoring system that will monitor their activities so crimes of opportunity become far less likely. For instance, handling a cash bag should require that two employees are involved. The reasoning seems pretty logical.

Add monitoring to video surveillance. Most hotels have video surveillance in the lobby or at the front of the facility. They even have surveillance that monitors cash drawers, but now there is software that enables hotel owners to match transactions with video surveillance.

Protect electronic borders. Computer system hacking has become all too common. Russian hackers tapped into Wyndham Worldwide’s data center in Phoenix three times between 2008 and 2010. The result was more than 600,000 payment card accounts tapped, leading to more than $10.6 million in fraud. The result for Wyndham was a federal lawsuit alleging that they failed to implement reasonable data security measures.

Protect passwords. Not all cybercrimes occur online. Employees should have awareness about the physical security of computers, access control and passwords. The easiest and most familiar means for criminals to gain access into a computer is by conning an employee. Passwords should change every three months, and employees and security staff should always keep an eye out for people who are in staff-only areas of a facility.

If you have a question about hotel security during your travels, ask someone. Any trip you take, whether for business or pleasure, make sure you not only feel safe and secure, but that you are as safe and secure as possible at all times.

This article originally appeared in the July 2014 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3