0% found this document useful (0 votes)
55 views

Discussion 2: Responding To Guest Concerns About Cyberattacks

The Padgett-Beale hotel experienced a cyberattack in 2021 where hackers compromised client data. They have since hired cybersecurity professionals and notified affected clients. Guests are advised to be careful using the hotel WiFi and avoid entering financial details, as hackers may target hotel networks. The hotel IT team has strengthened security, but guests should still confirm any links or emails before clicking in case of phishing attempts. Padgett-Beale values guest privacy and is working to prevent future cyberattacks.

Uploaded by

Ken Cheruiyot
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Discussion 2: Responding To Guest Concerns About Cyberattacks

The Padgett-Beale hotel experienced a cyberattack in 2021 where hackers compromised client data. They have since hired cybersecurity professionals and notified affected clients. Guests are advised to be careful using the hotel WiFi and avoid entering financial details, as hackers may target hotel networks. The hotel IT team has strengthened security, but guests should still confirm any links or emails before clicking in case of phishing attempts. Padgett-Beale values guest privacy and is working to prevent future cyberattacks.

Uploaded by

Ken Cheruiyot
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Discussion 2: Responding to Guest Concerns about Cyberattacks

To: Our Guests

From: Padgett-Beale Cyber Team

Good day, I believe your visit whether it just beginning or finishing will/was pleasant. Here at Padgett-
Beale, we pride ourselves on giving the perfect most reliable client services desirable. With that being
told, some of you may or may not already be informed that we have had news of a potential cyber-
attack on our customers.

What Happened?

Here at Padgett-Beale, we experienced a cyber-attack on 20th 2021 where the cyber-terrorist gain
access to our systems and compromise our client's confidentiality.

What we’ve done

We quickly acted on the matter where we hired cybersecurity professionals and also we involved
government experts to assist us to bring down the hackers. We found out that the hackers had acquired
private information like names, credit card numbers, email addresses, among personal details. We did
all we can to have solutions to such incidents and we wrote letters to the affected clients on the progress
of the situation. We highly request all the customers to avoid using their credit cards when they are
connected to wifi because there is where the hackers will find an opportunity to hack your devices. Use
your credit cards when necessary only.

What’s the Impact?

The trust and confidence of our customers have been jeopardized and drawn into an interrogation. A
number of our client's bank and credit card data were stolen from our database. Capital One had an
alike occurrence in 2019 where the criminals collected data from different clients, such as names,
addresses, zip codes/ postal codes, phone numbers, email addresses, and dates of birth (2019, para 6).
Missing these delicate resources could create potential prospective harm to the victim’s bankings.

What we are doing to fix the issue?

All of those clients whose data was taken are being informed of the event. This letter is being conveyed
to all of our clients to notify them of the event. Cyber-attackers are aiming for multiple information on
our customers, and certain items that you can do to help with guarding your data besides with us.
Initially, be careful when using the hotel’s Wi-Fi, ensuring to not locate any bank or credit information
while using it. Cyber-attackers have been targeted hotel Wi-Fi hotspots for their means of acquiring
delicate information. Mercan, et al (2020)., address,” cybersecurity specialists think it includes
intruders remotely misusing weakness in server application or infiltrating the hotel and getting visible
entrance to the tools.” Keep your protector up.
Hackers use sophisticated software design to spy on a certain network and check if there are loopholes
that will let them in. They use several techniques such as phishing, ransomware among other
technologies. Since the process of hacking is very quick, then it implies that by the time such activities
are realized it might too late. They are smart malicious people in a sense that they act to be legit by
sending an email through an email address that looks like ours or by sending a link through your social
media handles hence when you click they will install automatically their spying software or apps on
phones which will then use them to achieve their missions Paraskevas, A. (2020).

Such activities can be facilitated by unknown free WiFi. Sometimes you might come across free WiFi
which is a little bit faster but it's not what you think, it's a trap of hackers. Hackers cannot penetrate
easily to well-structured networks like ours but instated they have come out with different alternatives
by creating free WiFi to easily spy and hack your devices like mobile phones and laptops. Never click
any unknown link anywhere be it email or social media. Always confirm if the link starts from HTTP//
then that might be the legit email. But it's good to confirm an email account before going forward and
clicking it. Always confirm our official handles on our official website and be cautious of any other
unknown handles Chase, A. (2021).

Our IT team has done the necessary work to keep your privacy. They have the right software which
keeps our networks and databases safe from any attack from hackers. All our systems use the legit
software recommended by government authorities and also we value your privacy because you as a
client make us proud. We, therefore, ask everyone to use our WiFi since it is secured. Also never click
any link sent by an unknown email address since this will cause ransomware to your device and
potentially to our networks.

We are happy when you are secure and comfortable.

Sincerely,

Jake Perry

Padgett-Beale Cyber Team Manager


REFERENCE

Mercan, S., Cain, L., Akkaya, K., Cebe, M., Uluagac, S., Alonso, M., & Cobanoglu, C. (2020).
Improving the service industry with hyper-connectivity: IoT in hospitality. International Journal of
Contemporary Hospitality Management:
https://www.emerald.com/insight/content/doi/10.1108/IJCHM-06-2020-0621/full/html

Paraskevas, A. (2020). Cybersecurity in travel and tourism: a risk-based approach. Handbook of e-


Tourism, 1-24. https://link.springer.com/referenceworkentry/10.1007%2F978-3-030-05324-6_100-1

Chase, A. (2021). The Evolution of Cyber Risk and the Cyber Insurance Market.
https://scholarcommons.sc.edu/senior_theses/412/

You might also like