BNMC Blog

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

The hotel chain, which includes all St. Regis, Westin, Sheraton, and W Hotel properties, were all managed by Marriott International’s Starwood reservation system. This system has been compromised since 2014, the multinational hotel conglomerate announced at the end of November. This gave hackers five years to cherry pick names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised.

Even though it has been a rough few years for corporations of all types, this breach is larger than the 2017 breach of Equifax and only smaller than the 2013 breach of Yahoo that affected some three billion users. Unlike those other companies, Marriott International came clean right as they found out instead of sitting on the information like Equifax and Yahoo did.

How Can You Protect Yourself?
Marriott began rolling out the notification emails to impacted customers on the Friday after the hack was discovered and has established a call center and notification website that has been updated frequently (last entry was December 22). The company seems to be operating with the assumption that every Starwood’s customer has been impacted in some way. Additionally, the company is offering enrollment in the identity monitoring service WebWatcher for one year to anyone that thinks he/she may have been impacted. This service will alert you if your likeness is found online, including on the dark web. To protect yourself further, you’ll want to:

  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should monitor your Starwood Preferred Guest account as well as your credit report. You can sign up for the available credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is less effective.
  • Change Your Password - All Marriott guests should change their passwords immediately and select usernames and passwords that aren’t obvious. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their hands on it.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but utilizing a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.

Following these four best practices will go a long way toward protecting yourself against further damage. If you have been the victim of a data breach in the past, you know that you need to be diligent about ensuring your personal information is protected.

For more information about the best practices to keep your data and information safe, return to our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Computing User Tips Malware Hackers Business Microsoft Network Security Google Productivity Software Tech Term Computer Hosted Solutions Communication Internet Mobile Devices IT Services Efficiency Ransomware Data Small Business IT Support Smartphone Innovation Android Workplace Tips Backup Hardware Cloud Computing Saving Money Data Recovery Business Continuity Managed IT Services Windows 10 Microsoft Office Managed IT Services Windows Browser Internet of Things Data Backup Users Data Management Passwords Business Management Windows 10 Productivity Server Word Outsourced IT Vulnerability Cybersecurity App Office 365 Disaster Recovery Network Encryption Smartphones Chrome Facebook Phishing Upgrade Remote Monitoring Social Media Mobile Device communications Artificial Intelligence Gmail BYOD Infrastructure Money VoIP IT Support Managed Service Tip of the week Managed Service Provider Save Money Information Employer-Employee Relationship Analytics Website Applications Hacker Data storage Big Data Company Culture Employee-Employer Relationship Display Maintenance Settings Antivirus Robot Google Drive Content Filtering Bandwidth Automation YouTube Miscellaneous Virtual Reality Apple Risk Management Access Control Paperless Office IT Management Government Router Office Tips Holiday Quick Tips Computers Virtualization Laptop Tablet Data loss The Internet of Things Unified Threat Management Retail Alert Telephone Systems desktop Spam Computing Downtime Outlook Two-factor Authentication Managing Stress Operating System Firewall WiFi Gadgets LiFi Vendor Management Avoiding Downtime Monitors Hosted Solution Development Document Management Scam Chromebook Administration Solid State Drive Mouse Wireless Networking End of Support HIPAA Hard Disk Drive VPN Mobile Security Education Storage Data Security Server Management Business Technology SaaS Printing Business Intelligence Virtual Private Network Touchscreen IT Technicians Optimization Unified Communications Drones Security Cameras Managed IT Smart Technology Connectivity Windows 8 Spying Techology Human Error Statistics Modem FinTech Analysis How To Lenovo Dark Data Update Staff Leominster Downloads Regulations Deep Learning Scalability Mail Merge Blockchain Language Value Mobile Device Management Mirgation Recycling Managed Services Shortcut Distributed Denial of Service Politics IoT Digital Payment VoIP Unified Threat Management Device Bluetooth Comparison Cookies MSP Digital Alt Codes Firefox Superfish Customer Service Cybercrime Augmented Reality K-12 Schools Disaster Office Samsung Marketing Social Networking Bring Your Own Device Migration Address Permissions Computing Infrastructure Professional Services Collaboration LED Chatbots eWaste Budget Laptops Patch Management Managed IT Service Tech Support Star Wars Social PowerPoint User Error Uninterrupted Power Supply Information Technology Mobility Specifications Nanotechnology Spyware Typing Humor Customer Relationship Management Wearable Technology Network upgrade Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Best Practice Alerts USB File Sharing Current Events Co-Managed IT Halloween Identity Continuity Software as a Service Break Fix Websites Fraud Cost Management Onboarding Time Management Printer Apps Print Toner Search Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Smart Office Content Servers Google Calendar Safety Wires Training Corporate Profile Google Docs Messaging Emergency Licensing Dongle IT solutions Going Green Remote Computing Scary Stories Solar G Suite Entertainment Dark Web Assessment Automobile Hacks Digital Signage Network Management Work Dell Google Wallet Shortcuts Cyber Monday Smart Tech Bitcoin Monitoring Network Congestion Running Cable Streaming Legislation Buisness Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Cooperation Service Level Agreement Cabling Writing Sports Compliance Legal iOS Microsoft Excel Wi-Fi Virtual Desktop Hotspot Internet Exlporer Google Maps Password Troubleshooting SharePoint Web Server what was your? Unsupported Software IT Budget GPS Students IT Consultant Computer Repair Relocation Printers Cameras Mobile Data How To Work/Life Balance Tracking Recovery Meetings Cleaning Health Private Cloud Mobile Computing CCTV Black Market Law Enforcement Webcam Notifications Windows 7 Electronic Medical Records Physical Security Error Twitter Point of Sale Ben McDonald shares Upgrades Gadget Emoji Crowdsourcing BDR Travel Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Staffing Motion Sickness Processors Taxes Machine Learning Administrator

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3