Our Blog: Stuff we think you should know

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

The hotel chain, which includes all St. Regis, Westin, Sheraton, and W Hotel properties, were all managed by Marriott International’s Starwood reservation system. This system has been compromised since 2014, the multinational hotel conglomerate announced at the end of November. This gave hackers five years to cherry pick names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised.

Even though it has been a rough few years for corporations of all types, this breach is larger than the 2017 breach of Equifax and only smaller than the 2013 breach of Yahoo that affected some three billion users. Unlike those other companies, Marriott International came clean right as they found out instead of sitting on the information like Equifax and Yahoo did.

How Can You Protect Yourself?
Marriott began rolling out the notification emails to impacted customers on the Friday after the hack was discovered and has established a call center and notification website that has been updated frequently (last entry was December 22). The company seems to be operating with the assumption that every Starwood’s customer has been impacted in some way. Additionally, the company is offering enrollment in the identity monitoring service WebWatcher for one year to anyone that thinks he/she may have been impacted. This service will alert you if your likeness is found online, including on the dark web. To protect yourself further, you’ll want to:

  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should monitor your Starwood Preferred Guest account as well as your credit report. You can sign up for the available credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is less effective.
  • Change Your Password - All Marriott guests should change their passwords immediately and select usernames and passwords that aren’t obvious. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their hands on it.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but utilizing a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.

Following these four best practices will go a long way toward protecting yourself against further damage. If you have been the victim of a data breach in the past, you know that you need to be diligent about ensuring your personal information is protected.

For more information about the best practices to keep your data and information safe, return to our blog regularly.

Get More Done By Automating Parts of Your Business
Tech Term: SSID


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Hackers Privacy Email Business Malware User Tips Computer Business Computing Internet Network Security Software Google Productivity Tech Term Microsoft Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Ransomware Backup Windows 10 Hardware Data Android Smartphone IT Support Productivity Saving Money Workplace Tips Managed IT Services Data Management Browser Microsoft Office Managed IT Services Facebook Business Continuity Server Cloud Computing Upgrade Internet of Things Data Recovery Windows Gmail Passwords Innovation Office 365 Disaster Recovery Phishing Data Backup Word App Remote Monitoring Business Management Outsourced IT Windows 10 Mobile Device Users Smartphones Managed Service Provider Cybersecurity VoIP Artificial Intelligence Employer-Employee Relationship Encryption Information Network Infrastructure Chrome Content Filtering Government Big Data Miscellaneous Spam communications BYOD Website Tip of the week Analytics Vulnerability Social Media IT Support Applications Office Tips Money Printing Automation WiFi Hacker Settings Two-factor Authentication Avoiding Downtime The Internet of Things Bandwidth IT Management YouTube Maintenance Save Money Apple Risk Management Tablet Wireless Data storage Antivirus Display Access Control Router Virtual Reality Employee-Employer Relationship Managed Service Firewall Paperless Office Customer Service Robot Safety Mobile Security Virtual Private Network Operating System Development Presentation Holiday Server Management Downtime End of Support Unified Threat Management Hosted Solution Computing Office Touchscreen Google Drive Wireless Technology Password Gadgets Vendor Management Virtualization Telephone Systems Recovery Mouse LiFi Search Education Quick Tips Document Management Computers Scam IBM Business Intelligence Storage Administration Retail Mobile Device Management Apps HIPAA Networking Customer Relationship Management Company Culture Wi-Fi Laptop Outlook VPN Hacking Augmented Reality Monitors Data Security SaaS Data loss Business Technology Halloween Deep Learning Humor Value Cortana Specifications Compliance eWaste Device Network Management Online IoT Managed IT Fun Hacks Remote Computing Downloads IT Technicians LED Techology Break Fix Cookies Cables Undo Laptops Google Maps Cryptocurrency Update Cooperation Onboarding Digital Lenovo Budget Scary Stories Bring Your Own Device sip Hotspot Professional Services Slack Mail Merge How To Black Friday Marketing Regulations Continuity Mobility Digital Payment Microsoft Excel Star Wars Charging Disaster Shortcut Multi-Factor Security Mirgation Smart Office Application Co-Managed IT Unified Threat Management IP Address Cybercrime Politics Dark Web Nanotechnology Wires Software as a Service Statistics Bitcoin Network Congestion Chromebook Staff Digital Signage Spyware Superfish Sports Best Practice telephony Collaboration Language USB Monitoring Address Knowledge Information Technology Cyber Monday Social Networking Solar Print Toner Google Docs Blockchain Cost Management Uninterrupted Power Supply Patch Management Writing Google Calendar Chatbots Work Content User Error Mobile Office Tech Support Net Neutrality Screen Reader Voice over Internet Protocol Bluetooth Windows 8 Printer Wearable Technology Desktop Motherboard Hard Drives Shortcuts Business Growth File Sharing Computing Infrastructure Dongle Spying Corporate Profile Experience Unified Communications Google Wallet Computer Care Smart Technology Permissions Assessment Analysis Solid State Drive Current Events Samsung Legislation Identity Optimization Streaming VoIP Running Cable Legal Websites Identity Theft FCC Smart Tech FinTech Virtual Desktop Troubleshooting How To Distributed Denial of Service Refrigeration Security Cameras IT service Heating/Cooling Buisness Alt Codes Dark Data Alerts User Service Level Agreement WannaCry Drones Training Automobile Fraud Internet Exlporer Public Speaking Hard Disk Drive IT solutions Going Green Social Engineering G Suite Comparison Recycling Human Error Time Management Lithium-ion battery Title II Connectivity MSP Competition Cabling Social SharePoint Firefox Managed IT Service Modem Managing Stress Managed Services BDR Servers 5G Typing Licensing PowerPoint Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server GPS Mobile Data Computer Repair IT Consultant Relocation Processors Cameras Tracking Meetings Health Cleaning Private Cloud Regulation Mobile Computing Alert CCTV Physical Security Entertainment Emoji Webcam CrashOverride Electronic Medical Records Upgrades Work/Life Balance Error Domains Black Market Point of Sale Travel Emergency 3D Printing Law Enforcement Notifications Botnet Supercomputer Twitter Printers Motion Sickness Unsupported Software Gadget Staffing