Many hotel employees have access to use computers while they are onsite at the hotel – whether they require access to perform their daily job functions or if there are public
computers available to them to use during their breaks. Each individual should be aware of the security risks associated with Internet and e-mail usage. You can help keep your personal information and guest information secure by using caution when accessing the Internet or e-mail.
Internet Usage
While using the Internet, you should be cautious not to reveal personal or sensitive information online. Whether the information is yours or a guest’s, the information does not need to be broadcasted to the world as it will be accessible to everyone.
Not every Web site is legitimate! You should avoid unknown or suspicious Web sites and stay away from sites with potentially offensive materials. Additionally, while surfing the Web,
be mindful of fake Web sites that request your personal information – it is likely your personal information will be compromised as a result.
Many individuals connect to the Internet using public/shared computers. While using a computer shared amongst many users, avoid entering personal or confidential information. Sometimes this information can be saved on the computer and accessible to other users. If prompted to save a username or password, do not accept. If you inadvertently save a password to a computer, notify the IT department.
Internet Security
If your hotel offers wireless Internet for guests, work with the vendor to ensure they set up the wireless signal with encryption. If your hotel also offers free wireless Internet in your lobby, pay attention to non-guests and report them to management.
Do not connect any guest facing system such as guest room or wireless Internet access, or the Business Center PCs, to the hotel’s internal network and servers. If connected, tech savvy guests may be able to hack into the hotel’s servers.
E-mail Usage
Use caution when opening attachments from unknown senders. An e-mail could contain malicious software disguised as an attachment which can wreak havoc on computer systems once it is clicked on.
One way to avoid “phishing” scams is by not clicking on links in e-mails from unknown sources. These links can take you to Web sites that you were not expecting and could infect your computer. It could also be a link to a convincing fake Web site where you are prompted to type in personal information such as account user ID and password. Reputable organizations will not normally include links to your account in their e-mails. They
expect you to access your account using their Web page.
E-mails can be used to trick you into providing personal information such as account or credit card information. This information could then be used to obtain goods or services in your name. Be suspicious of e-mails addressed to “Dear Customer” or that have numerous spelling or grammatical errors. Most official organizations will address e-mail to you personally whereas e-mails trying to falsely obtain information are normally sent to numerous people and will usually not have your name. Even though it could be enticing, do not forward virus warnings or chain e-mails. Also, it is good practice not to respond to spam e-mails. If you reply to spam, you are confirming that your e-mail address is valid, which can encourage more spam.
For your personal safety, do not include personal or vacation details in out-of-office replies.
Email is just like a post card in that the information in it can be read as it makes its way from sender to receiver. Do not ask for credit card information to be sent by email and never send credit card information in an email, chat or instant messenger service.
Mobile Devices
Some individuals may be equipped with mobile email devices such as BlackBerry® devices. Use caution when viewing sensitive data on mobile email devices, especially when you are in a crowd. When many individuals are around you, it is very easy for them to “shoulder surf,” by looking over your shoulder and obtaining personal information
they should not have.
Comments