500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

The hotel chain, which includes all St. Regis, Westin, Sheraton, and W Hotel properties, were all managed by Marriott International’s Starwood reservation system. This system has been compromised since 2014, the multinational hotel conglomerate announced at the end of November. This gave hackers five years to cherry pick names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised.

Even though it has been a rough few years for corporations of all types, this breach is larger than the 2017 breach of Equifax and only smaller than the 2013 breach of Yahoo that affected some three billion users. Unlike those other companies, Marriott International came clean right as they found out instead of sitting on the information like Equifax and Yahoo did.

How Can You Protect Yourself?
Marriott began rolling out the notification emails to impacted customers on the Friday after the hack was discovered and has established a call center and notification website that has been updated frequently (last entry was December 22). The company seems to be operating with the assumption that every Starwood’s customer has been impacted in some way. Additionally, the company is offering enrollment in the identity monitoring service WebWatcher for one year to anyone that thinks he/she may have been impacted. This service will alert you if your likeness is found online, including on the dark web. To protect yourself further, you’ll want to:

  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should monitor your Starwood Preferred Guest account as well as your credit report. You can sign up for the available credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is less effective.
  • Change Your Password - All Marriott guests should change their passwords immediately and select usernames and passwords that aren’t obvious. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their hands on it.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but utilizing a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.

Following these four best practices will go a long way toward protecting yourself against further damage. If you have been the victim of a data breach in the past, you know that you need to be diligent about ensuring your personal information is protected.

For more information about the best practices to keep your data and information safe, return to our blog regularly.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, June 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email User Tips Business Computing Privacy Google Malware Productivity Hackers Network Security Microsoft Business Software Computer Hosted Solutions Tech Term Data Ransomware Communication Internet Small Business IT Services Efficiency Mobile Devices Cloud Computing Data Recovery Workplace Tips Backup IT Support Hardware Smartphone Android Saving Money Innovation Microsoft Office Business Continuity Managed IT Services Windows Data Backup Data Management Internet of Things Mobile Device Users Information Browser Social Media Managed IT Services Windows 10 Passwords Outsourced IT Vulnerability Productivity Word Upgrade Facebook Server Phishing Cybersecurity Gmail Windows 10 App Business Management Office 365 Encryption Smartphones Remote Monitoring Chrome communications Artificial Intelligence Network Disaster Recovery VoIP BYOD Miscellaneous Managed Service Provider Gadgets Analytics Employer-Employee Relationship Managed Service Save Money Applications IT Support Website Money Virtual Reality Infrastructure Tip of the week Antivirus Company Culture Big Data Google Drive Maintenance Bandwidth Content Filtering Apps Display Settings Access Control Education Employee-Employer Relationship VPN Apple IT Management Robot YouTube Paperless Office Automation Hacker Data storage Risk Management Router Office Tips Unified Threat Management Government Hosted Solution The Internet of Things Scam Computers Virtualization Administration Firewall Holiday Augmented Reality Mouse Downtime Document Management Retail Alert Managing Stress Networking Wireless Solid State Drive Development Storage Data Security Server Management Monitors Printing Business Technology Vendor Management Touchscreen Chromebook HIPAA Virtual Private Network Hard Disk Drive Quick Tips Mobile Security Tablet End of Support Data loss Spam Computing Business Intelligence Outlook Two-factor Authentication WiFi Telephone Systems Bring Your Own Device Operating System SaaS LiFi Laptop desktop Avoiding Downtime Humor Digital Language Value Employee-Employer Relationships Writing Specifications Information Technology Disaster Regulations Streaming Customer Relationship Management Wi-Fi Typing iOS Heating/Cooling Multi-Factor Security Current Events Collaboration Mirgation Recycling Troubleshooting Best Practice IoT Time Management Dark Data Printer Update K-12 Schools Spying National Security Break Fix Cookies MSP Security Cameras Cryptocurrency Spyware Computing Infrastructure Professional Services Analysis Students Search Black Friday Cybercrime Uninterrupted Power Supply Social Networking Human Error Star Wars Scalability Servers Google Calendar IT solutions Going Green File Sharing Chatbots eWaste Emergency Politics Marketing Google Docs Computer Care IBM Network Management Customer Service Hacks Wearable Technology Network upgrade Dark Web Nanotechnology Managed Services Bitcoin Identity Theft Alerts USB Mixed Reality Office Cyber Monday Samsung Google Wallet Motherboard Cables Device Private Cloud Fraud Cost Management Migration Legislation Identity Continuity LED Tech Support Business Growth Training Corporate Profile SharePoint Password Automobile Smart Office PowerPoint Microsoft Excel Halloween Legal G Suite Screen Reader Charging Laptops Windows 8 Licensing Dongle Data Breach Managed IT Social Engineering Smart Technology Unified Communications Drones Dell Wires Mobility Techology Assessment Statistics Cabling Solar Co-Managed IT How To Lenovo Websites WannaCry Downloads Mobile Device Management Google Maps Work Onboarding Mail Merge Blockchain Deep Learning Scary Stories Smart Tech Software as a Service Cooperation Service Level Agreement Slack Hard Disk Drives Shortcut Safety Distributed Denial of Service Running Cable Voice over Internet Protocol Print Toner VoIP Unified Threat Management Hotspot Internet Exlporer Messaging Bluetooth Comparison Remote Computing Compliance Content Firefox Superfish Alt Codes Buisness Entertainment Network Congestion Virtual Desktop IT Technicians Optimization Digital Signage Address Permissions Sports Connectivity User Error Social Digital Payment Staff Leominster Monitoring Solid State Drives Patch Management Managed IT Service Budget Modem FinTech Shortcuts Tracking Processors Meetings Machine Learning Unsupported Software Cleaning CCTV Webcam Computer Repair Relocation Printers Mobile Data Recovery Error Updates How To Work/Life Balance Point of Sale Ben McDonald shares Health Black Market Travel Law Enforcement Supercomputer CrashOverride Notifications BDR Electronic Medical Records Windows 7 Twitter Motion Sickness Physical Security Staffing Emoji Administrator Upgrades Gadget Taxes Regulation IT Budget Crowdsourcing Web Server what was your? Personal Information Botnet GPS Cortana Mobile Computing 3D Printing IT Consultant Cameras

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3