top of page
No hay tags aún.

BÚSQUEDA POR TAGS: 

POSTS RECIENTES: 

SÍGUEME:

  • Facebook Clean Grey
  • Twitter Clean Grey
  • Instagram Clean Grey

Cyber attacks threaten tourism sector

After the public and financial sector, the tourism sector occupies a prominent place as a target of cyber attacks.

For me, this news is of vital importance. As expected, tourism today is the goal of many hackers, because due to new technologies and the advancement of these, people, increasingly, opt to buy everything online.

This is good and bad at the same time. I explain: it is good because, for example, to buy a plane ticket is no longer necessary to go to a travel agency to buy it, if not online can be done as it is faster and even much cheaper. But this is also bad because only by the fact of putting a contact number or an email the hackers can know up to the number of your bank account, your card and in the worst case, they are already, They can know where you live and rob you in your own home.

The main threats to tourism are theft of information, a very precious asset on the black market (Deep Web), attacks that cause business disruption and do not allow companies to provide services, And attacks that affect the quality of the service, which degrades the user experience.

The article also names a series of recommendations to avoid the occurrence of these cases, which are as follows:

1. Data security: Do not gather personal information that is not necessary and limit your access to third parties. Secure storage of information. Periodic testing of vulnerabilities in systems.

2. Control access to the most sensitive data: Restrict access to data sensitive to employees. Limit the number of administrator accesses. Security procedures during the life cycle of sensitive information. 3. Monitoring and segmentation of the Network: Monitoring the Network in 24 × 7 to detect unauthorized access and malicious activity. Segment the Network and locate the most sensitive data in a safer place. 4. Securitization of remote access: Limitation of access for customers and employees that access remotely. Endpoint Securitization. 5. Require security measures to service providers. Security of applications developed by third parties. Continuous monitoring of compliance with the security measures adopted. Application testing period. 6. Establishment of organizational measures that complement and give meaning to the implemented technical measures. Compliance with regulatory requirements. Raise the security speech to the CEO's agenda.

http://www.preferente.com/noticias-de-turismo/los-ciberataques-amenazan-al-sector-turistico-266773.html


bottom of page