","showSummary":null,"url":"/4-ways-make-data-differentiator","date":"2017-05-11T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":21439,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/intelbiz0517.jpg?itok=ClAjAkpL","width":196,"height":219,"alt":""},"topics":[{"name":"Data & Analytics","url":"/data-analytics"},{"name":"May 2017 Issue","url":"/may-2017-issue"},{"name":"Security -- Network","url":"/security-network"},{"name":"Back-of-House / Back-Office","url":"/back-house-back-office"},{"name":"Forecasting","url":"/forecasting"},{"name":"Inventory Control/Management","url":"/inventory-controlmanagement"},{"name":"Kitchen Operations & Management","url":"/kitchen-operations-management"},{"name":"Labor/Workforce Mgmt/Scheduling","url":"/laborworkforce-mgmtscheduling"},{"name":"Menu & Nutritional Analysis","url":"/menu-nutritional-analysis"},{"name":"Mobile Devices & Apps","url":"/mobile-devices-apps"},{"name":"POS","url":"/pos"},{"name":"Revenue Management","url":"/revenue-management"},{"name":"Operations","url":"/operations"},{"name":"Software","url":"/software"},{"name":"Restaurants","url":"/restaurants"},{"name":"Lodging","url":"/lodging"},{"name":"Intelligent Biz","url":"/intelligent-biz"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Cybercriminals Increasingly Target Hotel Contact Centers","id":9247,"bundle":"article","summary":"But new technologies can ensure that payment card data and other personally identifiable information taken over the phone is kept secure and never held in the contact center infrastructure.","showSummary":null,"url":"/cybercriminals-increasingly-target-hotel-contact-centers","date":"2017-05-09T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":21432,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/call-center_0.jpg?itok=HyLOfpjK","width":190,"height":210,"alt":null},"topics":[{"name":"Call Center","url":"/call-center"},{"name":"Security -- Network","url":"/security-network"},{"name":"Loss Prevention/Fraud Detection","url":"/loss-preventionfraud-detection"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Payment Security","url":"/payment-security"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":" Does Your Hotel Have Cyber Liability Coverage?","id":9258,"bundle":"article","summary":"Most general liability policies do not cover cybercrimes or costs associated with a privacy event or breach, and some even specifically exclude losses incurred because of the internet or computer systems.","showSummary":null,"url":"/does-your-hotel-have-cyber-liability-coverage","date":"2017-05-05T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":21427,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/cyber-crime-190x210.jpg?itok=Q6NIoSHI","width":190,"height":210,"alt":null},"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Payment Security","url":"/payment-security"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Tech-Savvy Innovative Hotels Are More Vulnerable to Data Breaches","id":9268,"bundle":"article","summary":"However, forward-thinking operators can limit the amount of unknown risk and liability with PCI compliance and other preventative measures.","showSummary":null,"url":"/tech-savvy-innovative-hotels-are-more-vulnerable-data-breaches","date":"2017-05-03T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":21425,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/data-security-hotel.jpg?itok=Q1fxE1u7","width":190,"height":210,"alt":null},"topics":[{"name":"Data & Analytics","url":"/data-analytics"},{"name":"Security -- Network","url":"/security-network"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Payment Security","url":"/payment-security"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"How Can Hoteliers Protect Themselves from Data Breaches?","id":9283,"bundle":"article","summary":"Two options exist: implement stronger, higher walls of security or devalue the cardholder data by encrypting it before it reaches the POS.","showSummary":null,"url":"/how-can-hoteliers-protect-themselves-data-breaches","date":"2017-04-28T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Data & Analytics","url":"/data-analytics"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Mobile Point of Sale (POS)","url":"/mobile-point-sale-pos"},{"name":"Payment Security","url":"/payment-security"},{"name":"POS","url":"/pos"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Top Restaurant Tech Headlines from April","id":9282,"bundle":"article","summary":"From breaches to 'bots, HT reveals the newstories that engaged readers the most over the course of the last month.","showSummary":null,"url":"/top-restaurant-tech-headlines-april","date":"2017-04-28T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":21423,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/cellphone-news.jpg?itok=zdizEccY","width":190,"height":210,"alt":null},"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Kiosks","url":"/kiosks"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Mobile Payments","url":"/mobile-payments"},{"name":"Payment Security","url":"/payment-security"},{"name":"Payment Processing","url":"/payment-processing"},{"name":"Tableside Payment","url":"/tableside-payment"},{"name":"Restaurants","url":"/restaurants"},{"name":"Coffee Bar","url":"/coffee-bar"},{"name":"Family Casual Dining","url":"/family-casual-dining"},{"name":"Fast Casual Dining","url":"/fast-casual-dining"},{"name":"Fine Dining","url":"/fine-dining"},{"name":"Juice Bar","url":"/juice-bar"},{"name":"Pizzeria","url":"/pizzeria"},{"name":"Sandwich Shop","url":"/sandwich-shop"},{"name":"Quick Service Restaurant (QSR)","url":"/quick-service-restaurant-qsr"}],"attachedFiles":[]},{"title":"Chipotle Joins Shoney's, Arby's as Latest Security Breach Victim","id":9287,"bundle":"article","summary":"Restaurant chain believes card transactions from March 24 to April 18 could be compromised.","showSummary":null,"url":"/chipotle-joins-shoneys-arbys-latest-security-breach-victim","date":"2017-04-27T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Payment Security","url":"/payment-security"},{"name":"Restaurants","url":"/restaurants"},{"name":"Fast Casual Dining","url":"/fast-casual-dining"},{"name":"Quick Service Restaurant (QSR)","url":"/quick-service-restaurant-qsr"}],"attachedFiles":[]},{"title":"Peninsula Hotels Uses In-Room Tablets to Personalize Guest Experience","id":9310,"bundle":"article","summary":"While it is easy to purchase tablets and build customized apps, Peninsula Hotels found it much more difficult to manage and secure the devices on their own.","showSummary":null,"url":"/peninsula-hotels-uses-room-tablets-personalize-guest-experience","date":"2017-04-21T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":21392,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/penninsula-hotel-ny.jpg?itok=lJnkXDlA","width":190,"height":210,"alt":null},"topics":[{"name":"Check-in/out (hotel)","url":"/check-inout-hotel"},{"name":"Customer Relationship Management (CRM)","url":"/customer-relationship-management-crm"},{"name":"Customer Experience/Service","url":"/customer-experience-service"},{"name":"Security -- Network","url":"/security-network"},{"name":"Guestroom / In-room","url":"/guestroom-room"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Online Check-In","url":"/online-check"},{"name":"Self-Checkout","url":"/self-checkout"},{"name":"Mobile Devices & Apps","url":"/mobile-devices-apps"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Best American Hospitality Corp. Reports Security Breach at 37 Shoney's Restaurants","id":9327,"bundle":"article","summary":"Best American Hospitality manages and operates the Shoney's corporate affiliated restauarants.","showSummary":null,"url":"/best-american-hospitality-corp-reports-security-breach-37-shoneys-restaurants","date":"2017-04-18T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Payment Security","url":"/payment-security"},{"name":"Restaurants","url":"/restaurants"}],"attachedFiles":[]},{"title":"Arby's Releases Update on Payment Card Security Breach","id":9329,"bundle":"article","summary":"Some restaurants were affected as early as Oct. 8, twelve days prior to the original Oct. 20 start date.","showSummary":null,"url":"/arbys-releases-update-payment-card-security-breach","date":"2017-04-18T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Payment Security","url":"/payment-security"},{"name":"Restaurants","url":"/restaurants"},{"name":"Mobile Device Security","url":"/mobile-device-security"}],"attachedFiles":[]}]},"title":"Mobile Device Security","contentParagraphs":null,"sections":null};
const country = "US";
const language = null;
const SITE_LANGUAGE = "en";
const siteName = "Hospitality Technology";
const userRoles = ["anonymous"];
const userUid = 0;
const indexName = "HT";
const title = "Mobile Device Security | Hospitality Technology";
window.dataLayer = window.dataLayer || [];
const data = {};
data.entityTaxonomy = {};
const contentTypes = [
"article",
"blog",
"bulletin",
"embed_page",
"landing_page",
"event",
"image",
"page",
"product",
"whitepaper",
"video",
"tags",
];
if (
routeInfo &&
"bundle" in routeInfo &&
contentTypes.includes(routeInfo["bundle"])
) {
data.entityBundle = routeInfo.bundle;
data.entityTitle = title || `${routeInfo.title} | ${siteName}`;
data.entityId = routeInfo.id;
data.entityName = routeInfo.author?.uname;
data.entityCreated = routeInfo.created;
data.sponsored = routeInfo.sponsored;
data.sponsor = routeInfo.sponsoringCompany;
data.entityType = "node";
data.entityLangcode = SITE_LANGUAGE;
data.siteName = siteName;
data.drupalLanguage = language;
data.drupalCountry = country;
data.userRoles = userRoles;
data.userUid = userUid;
data.entityTaxonomyKeys = {};
data.entityTaxonomyHierarchies = {};
data.parentNaicsCode = {};
data.isPro = false;
data.algoliaIndexName = indexName;
// Add toxonomy data
const taxonomies = {
businessTopic: "business_topic",
contentType: "content_type",
company: "company",
marketSegment: "market_segment",
};
const getHierarchy = (term, terms = []) => {
terms.push({ id: term.id, name: term.name });
if (term.parentTerm != null) {
getHierarchy(term.parentTerm, terms);
}
return terms;
};
const getTerms = (term, useApiId = false) => {
return { id: useApiId ? term.apiId : term.id, name: term.name };
};
const getKeys = (term) => {
return { id: term.id, name: term.apiId };
};
Object.entries(taxonomies).forEach(([key, item]) => {
terms = routeInfo[key];
if (terms && terms.length > 0) {
data["entityTaxonomy"][item] = terms.map((term) =>
getTerms(term, key === "company")
);
if (key !== "company") {
data["entityTaxonomyKeys"][item] = terms.map(getKeys);
termGroups = [];
terms.forEach((term, termInd) => {
termGroups[termInd] = getHierarchy(term);
});
data["entityTaxonomyHierarchies"][item] = termGroups;
}
}
});
data["entityTaxonomy"]["tags"] = routeInfo["topics"] || [];
// Primary Topic is either the business topic or the top tag.
if (routeInfo["businessTopic"]?.length > 0) {
data["entityPrimaryTopic"] = routeInfo["businessTopic"][0]["name"];
} else {
if (routeInfo["topics"]?.length > 0) {
data["entityPrimaryTopic"] = routeInfo["topics"][0]["name"];
}
}
// Primary and secondary entityNaicsCodes come from the MarketSegment
if (routeInfo.marketSegment?.length > 0) {
data.entityNaicsCode = {};
data["entityNaicsCode"]["id"] = routeInfo["marketSegment"][0]["id"];
data["entityNaicsCode"]["name"] =
routeInfo["marketSegment"][0]["naicsCode"];
if (routeInfo["marketSegment"][0]["parentTerm"] != null) {
data["parentNaicsCode"]["id"] =
routeInfo["marketSegment"][0]["parentTerm"]["id"];
data["parentNaicsCode"]["name"] =
routeInfo["marketSegment"][0]["parentTerm"]["naicsCode"];
}
} else {
data.entityNaicsCode = [];
}
if (routeInfo.taggedPro) {
data.isPro = routeInfo.taggedPro;
}
window.dataLayer.push(data);
} else if (routeInfo && "vid" in routeInfo) {
data.entityBundle = "tags";
data.entityTitle = routeInfo.name;
data.entityId = routeInfo.id;
data.entityName = routeInfo.author?.uname;
data.entityCreated = routeInfo.created;
data.entityType = "taxonomy_term";
data.entityLangcode = SITE_LANGUAGE;
data.siteName = siteName;
data.sponsored = routeInfo.sponsored;
data.sponsor = routeInfo.sponsoringCompany;
data.drupalLanguage = language;
data.drupalCountry = country;
data.userRoles = userRoles;
data.userUid = userUid;
data.algoliaIndexName = indexName;
data["entityTaxonomy"]["tags"] = {
id: routeInfo["id"],
name: routeInfo["name"],
};
window.dataLayer.push(data);
}
})();
Mobile Device Security | Hospitality Technology
Heeding analytic best practices yields insights into operations and customers
But new technologies can ensure that payment card data and other personally identifiable information taken over the phone is kept secure and never held in the contact center infrastructure.
Does Your Hotel Have Cyber Liability Coverage? Most general liability policies do not cover cybercrimes or costs associated with a privacy event or breach, and some even specifically exclude losses incurred because of the internet or computer systems.
X
This ad will auto-close in 10 seconds