• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
CommentaryCybersecurity

How Travelers Can Stay Safe From Cyberattacks Over the Holidays

By
Shlomo Touboul
Shlomo Touboul
Down Arrow Button Icon
By
Shlomo Touboul
Shlomo Touboul
Down Arrow Button Icon
December 20, 2016, 10:00 AM ET
General Economy Ahead Of GDP Figures
People stand in front of Wynn Resorts Ltd.'s Wynn Palace casino resort at night in Macau, China, on Sunday, Aug. 28, 2016. Macau is scheduled to release gross domestic product (GDP) figures on Aug. 30. Photographer: Anthony Kwan/Bloomberg via Getty ImagesAnthony Kwan—Bloomberg via Getty Images

This past summer, as thousands of tourists relaxed, dined, and sipped cocktails at a variety of well-known hotels, hackers were stealing their credit card data. Kimpton and HEI announced that attackers infiltrated their point of sale (POS) systems and that malware had compromised card numbers, expiration dates, internal verification codes, and in some cases, cardholder names.

With winter and the holiday travel season around the corner, the question arises: Why are hotel chains so attractive to cyberattacks, and what—if anything—can business and leisure travelers do to protect their credit cards, personal information, and travel reward accounts from criminals?

Inviting targets

Hotel chains are often behind the cybersecurity curve, making them more vulnerable to attacks. The vast majority of IT security budgets—approximately 85%—focus on perimeter protection, not post-breach detection. This means that hotel chains are mostly focusing on keeping hackers out, but once they’ve penetrated the system, there is little to stop them from having a field day completely undetected.

Hotel chains make for especially attractive targets because they hold huge databases of credit card data. Hackers have a virtual smorgasbord of options, including public Wi-Fi signals, magnetic strip door entry cards, and multiple point of sale terminals at spas, gift shops, coffee bars, and restaurants, as well as sharing programs with third parties including airlines and car rental companies. One of the reasons hotels are such low-hanging fruit is because access to their networks and the central payment server they rely on is often frighteningly easy.

All those networks are connected not only across a single property or even a specific hotel chain, but across the entire company. Tens of thousands of credit card records are added every day, along with the millions already stored in databases. Those breaches can net hackers sensitive data across an entire company spanning multiple brands.

Front desk staff, who have access to the corporate network, are trained to be friendly, well-groomed, and professional—not security-aware—making them comparatively easy targets. Infiltrating a network might be as easy as sending staff members emails that appear to be from a familiar person or business, but actually prompt them to click on a malicious link or provide sensitive information that is then used in a cyberattack—an attack method also known as “phishing.”

Once hackers have a single machine under their control, they quickly move laterally throughout the network to find and hijack payment card data. It can be as simple as finding and copying the server data that holds existing transaction data or installing malware that updates to every POS terminal, giving hackers control over tens of thousands of them and capturing every new payment or swipe.

But the problem isn’t limited to the connected networks across the corporate or backend systems. Hotels are replete with fairly unsecured public or guest access. Guests who connect to hotel Wi-Fi are taking a big risk, since hotel Wi-Fi systems are generally not well protected. Furthermore, when guests connect to hotel systems, they bring all their system vulnerabilities with them. Sending a phishing or social engineering attack to guests and taking control of their systems is child’s play for most attack tools.

 

Protecting hotels

With so many potential entry points for attackers, it’s imperative that hotel chains move to close cybersecurity gaps as quickly as possible and begin taking post-breach detection seriously. Hotels need to operate under the assumption that their networks have been breached and take proactive measures, such as making sure their cybersecurity systems alert them to attacks with information they can act on and provide real-time digital forensics so they can properly investigate the breaches.

As for travelers, avoid the guest Wi-Fi and always use your cellular network instead—particularly when accessing sensitive accounts such as those on bank and credit card sites. If you can, get a VPN—it’s worth the additional fee. And don’t assume the hotel business center computers are safe. Avoid making sensitive digital transactions while using the hotel computers and do not plug in your USB stick into that very public computer, as there are good chances it has spyware on it.

Set up two-step verification for your online accounts. Opt to use the new “smart” credit cards with chips and pins. Choose credit cards over debit cards because the process of disputing fraudulent transactions on a credit card is easier. Or as security guru Brian Krebs put it, “having your checking account emptied of cash while your bank sorts out the situation can be a hassle and lead to secondary problems (bounced checks, for instance).” Finally, be vigilant about reviewing your credit card statements and be on the lookout for fraudulent transactions.­­­­­­

Your holiday vacation should be a time to relax, not to worry about having your valuable information stolen.

Shlomo Touboul is the CEO of Illusive Networks.

About the Author
By Shlomo Touboul
See full bioRight Arrow Button Icon

Latest in Commentary

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.


Most Popular

placeholder alt text
Economy
The $38 trillion national debt is to blame for over $1 trillion in annual interest payments from here on out, CRFB says
By Nick LichtenbergDecember 17, 2025
2 days ago
placeholder alt text
AI
'Robots are going to be amongst us': Qualcomm exec says buckle up for the next 5 years. Your car is going to be the first shoe to drop
By Nino PaoliDecember 17, 2025
2 days ago
placeholder alt text
C-Suite
Red Lobster CEO Damola Adamolekun says the key to being a better leader is being a better person: ‘Leadership is self-improvement’
By Sydney LakeDecember 17, 2025
2 days ago
placeholder alt text
Success
As millions of Gen Zers face unemployment, McDonald's CEO dishes out some tough love career advice for navigating the market: ‘You've got to make things happen for yourself’
By Preston ForeDecember 16, 2025
3 days ago
placeholder alt text
Success
Britain’s defense chief calls on Gen Z grads leaving university to skip corporate jobs and join the military as war with Russia becomes a growing risk
By Emma BurleighDecember 17, 2025
2 days ago
placeholder alt text
Future of Work
LinkedIn CEO says it's 'outdated' to have a five-year career plan: It's a 'little bit foolish' considering the pace AI is changing the workplace
By Sydney LakeDecember 18, 2025
15 hours ago

Latest in Commentary

unemployed
CommentaryLayoffs
The AI efficiency illusion: why cutting 1.1 million jobs will stifle, not scale, your strategy
By Katica RoyDecember 18, 2025
12 hours ago
Muddu
CommentaryIT
IT service is reaching its breaking point. At Salesforce, we see 3 tipping points
By Muddu SudhakarDecember 18, 2025
16 hours ago
small business
CommentaryLayoffs
Our data shows that companies of 500 and fewer workers mostly avoided the AI layoffs. They’re making AI work for them
By Gabby BurlacuDecember 18, 2025
16 hours ago
Sophia Romee is the General Manager of the GenAI Studio at the College Board
CommentaryEducation
Gen Z is on the fence about AI in the classroom. That’s a good thing
By Sophia RomeeDecember 18, 2025
16 hours ago
Tim Parker
CommentaryAutos
How Bentley’s brand is creating business advantage in disruptive times 
By Tim ParkerDecember 18, 2025
19 hours ago
layoffs
CommentaryLayoffs
The AI layoff wave is just beginning — and it’s by design
By Kevin OakesDecember 17, 2025
2 days ago