Our Blog: Stuff we think you should know

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

The hotel chain, which includes all St. Regis, Westin, Sheraton, and W Hotel properties, were all managed by Marriott International’s Starwood reservation system. This system has been compromised since 2014, the multinational hotel conglomerate announced at the end of November. This gave hackers five years to cherry pick names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised.

Even though it has been a rough few years for corporations of all types, this breach is larger than the 2017 breach of Equifax and only smaller than the 2013 breach of Yahoo that affected some three billion users. Unlike those other companies, Marriott International came clean right as they found out instead of sitting on the information like Equifax and Yahoo did.

How Can You Protect Yourself?
Marriott began rolling out the notification emails to impacted customers on the Friday after the hack was discovered and has established a call center and notification website that has been updated frequently (last entry was December 22). The company seems to be operating with the assumption that every Starwood’s customer has been impacted in some way. Additionally, the company is offering enrollment in the identity monitoring service WebWatcher for one year to anyone that thinks he/she may have been impacted. This service will alert you if your likeness is found online, including on the dark web. To protect yourself further, you’ll want to:

  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should monitor your Starwood Preferred Guest account as well as your credit report. You can sign up for the available credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is less effective.
  • Change Your Password - All Marriott guests should change their passwords immediately and select usernames and passwords that aren’t obvious. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their hands on it.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but utilizing a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.

Following these four best practices will go a long way toward protecting yourself against further damage. If you have been the victim of a data breach in the past, you know that you need to be diligent about ensuring your personal information is protected.

For more information about the best practices to keep your data and information safe, return to our blog regularly.

Get More Done By Automating Parts of Your Business
Tech Term: SSID
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers Malware User Tips Microsoft Computer Business Computing Internet Hosted Solutions Google Productivity Network Security Tech Term Software Mobile Devices Efficiency Communication IT Services Hardware Data Small Business Backup Workplace Tips Windows 10 Smartphone Ransomware IT Support Android Saving Money Productivity Microsoft Office Managed IT Services Cloud Computing Data Management Data Recovery Browser Business Continuity Internet of Things Word Innovation Data Backup Windows Gmail Facebook Office 365 Server Users Managed IT Services Upgrade Phishing Social Media Windows 10 App Passwords Disaster Recovery Outsourced IT Smartphones Managed Service Provider VoIP Mobile Device Employer-Employee Relationship Business Management Vulnerability Encryption Cybersecurity Network Chrome communications Artificial Intelligence Remote Monitoring Applications Tip of the week Save Money Office Tips Government Managed Service Apple Hacker BYOD Information Content Filtering Analytics IT Support Big Data Infrastructure Spam Miscellaneous Website Money Printing Wireless IT Management Automation Paperless Office Maintenance Access Control Router Firewall Customer Service Tablet Employee-Employer Relationship Antivirus Settings WiFi Avoiding Downtime Two-factor Authentication Data storage The Internet of Things Display Bandwidth Virtualization YouTube Education Virtual Reality Robot Risk Management Telephone Systems Administration Operating System Mobile Device Management SaaS Customer Relationship Management Apps HIPAA End of Support Computing Business Intelligence Wi-Fi Quick Tips Password Hacking Google Drive Laptop Scam Unified Threat Management Mouse Vendor Management Holiday Augmented Reality Solid State Drive Company Culture Mobile Security LiFi Safety Networking Chromebook Presentation Computers Hard Disk Drive VPN Storage Downtime Retail Office Hosted Solution Data Security Wireless Technology Data loss Business Technology Document Management Development Gadgets Virtual Private Network Recovery Outlook Monitors Search Server Management IBM Touchscreen Monitoring Hard Drives Disaster Experience Shortcut Unified Communications Computing Infrastructure Dongle G Suite Solar Print Toner Deep Learning Humor Unified Threat Management Smart Technology Motherboard Automobile Messaging Hacks Statistics Permissions Assessment Work Content Spyware Running Cable Superfish Legislation Identity FCC Smart Tech Desktop Budget Address Voice over Internet Protocol Entertainment Cryptocurrency Virtual Desktop Spying How To Refrigeration Uninterrupted Power Supply Patch Management Alerts Service Level Agreement Shortcuts Bring Your Own Device sip User Buisness User Error Distributed Denial of Service Analysis Employee-Employer Relationships Bluetooth IT solutions Fraud Internet Exlporer Remote Computing Optimization Streaming Lithium-ion battery Public Speaking Comparison Title II Connectivity Update Troubleshooting Competition Corporate Profile SharePoint FinTech iOS Bitcoin Network Congestion Information Technology Licensing Security Cameras Best Practice telephony 5G VoIP Managed IT Service Modem Students Writing Cortana Value Recycling Human Error Google Docs How To Halloween Specifications Compliance Digital Payment Heating/Cooling Online IoT WannaCry Downloads IT Technicians Politics MSP Scalability Windows 8 IT service Fun Collaboration PowerPoint Google Wallet Undo Cooperation Managing Stress Managed Services Business Growth Time Management Break Fix Cookies Current Events Marketing Cabling Hotspot Professional Services eWaste Device Firefox Scary Stories Black Friday Regulations Application BDR Servers Microsoft Excel Star Wars LED Legal IP Address Cybercrime Multi-Factor Security Mirgation Tech Support Migration Dark Web Nanotechnology File Sharing Onboarding Drones Staff Computer Care Cables Laptops Alt Codes Dark Data Network Management Slack Going Green Social Engineering Knowledge Managed IT Language USB Samsung Continuity Mobility Sports Techology Cyber Monday Social Networking Social Google Maps Blockchain Cost Management Smart Office Co-Managed IT Mobile Office Digital Lenovo Google Calendar Chatbots Websites Identity Theft Charging Net Neutrality Screen Reader Digital Signage Mail Merge Printer Wearable Technology Training Wires Software as a Service Typing Notifications Twitter Domains Botnet Supercomputer Regulation Motion Sickness Mobile Data Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Web Server CrashOverride Machine Learning IT Budget GPS Computer Repair IT Consultant Mobile Computing Processors Cameras Relocation Meetings Printers Physical Security Emergency Tracking Health Upgrades Cleaning Alert CCTV Private Cloud Emoji Webcam Electronic Medical Records 3D Printing Work/Life Balance Error Black Market Point of Sale Windows 7 Travel Unsupported Software Law Enforcement