500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

The hotel chain, which includes all St. Regis, Westin, Sheraton, and W Hotel properties, were all managed by Marriott International’s Starwood reservation system. This system has been compromised since 2014, the multinational hotel conglomerate announced at the end of November. This gave hackers five years to cherry pick names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised.

Even though it has been a rough few years for corporations of all types, this breach is larger than the 2017 breach of Equifax and only smaller than the 2013 breach of Yahoo that affected some three billion users. Unlike those other companies, Marriott International came clean right as they found out instead of sitting on the information like Equifax and Yahoo did.

How Can You Protect Yourself?
Marriott began rolling out the notification emails to impacted customers on the Friday after the hack was discovered and has established a call center and notification website that has been updated frequently (last entry was December 22). The company seems to be operating with the assumption that every Starwood’s customer has been impacted in some way. Additionally, the company is offering enrollment in the identity monitoring service WebWatcher for one year to anyone that thinks he/she may have been impacted. This service will alert you if your likeness is found online, including on the dark web. To protect yourself further, you’ll want to:

  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should monitor your Starwood Preferred Guest account as well as your credit report. You can sign up for the available credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is less effective.
  • Change Your Password - All Marriott guests should change their passwords immediately and select usernames and passwords that aren’t obvious. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their hands on it.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but utilizing a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.

Following these four best practices will go a long way toward protecting yourself against further damage. If you have been the victim of a data breach in the past, you know that you need to be diligent about ensuring your personal information is protected.

For more information about the best practices to keep your data and information safe, return to our blog regularly.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, February 17 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Business Computing Malware Network Security Hackers Productivity Tech Term Business Google Software User Tips Computer Internet Microsoft IT Services Hosted Solutions Efficiency Mobile Devices Ransomware Communication Small Business Hardware Smartphone Data IT Support Android Backup Saving Money Managed IT Services Innovation Cloud Computing Data Management Business Continuity Windows 10 Windows Managed IT Services Browser Internet of Things Data Recovery Workplace Tips App Cybersecurity Data Backup Productivity Business Management Microsoft Office Server Upgrade Windows 10 Mobile Device Disaster Recovery Encryption Office 365 Artificial Intelligence Gmail Passwords Vulnerability Remote Monitoring Facebook Phishing Word Outsourced IT Users Employer-Employee Relationship Website Analytics communications Applications Tip of the week VoIP Smartphones Information Network Infrastructure Money Chrome IT Support BYOD Managed Service Provider YouTube Google Drive Content Filtering Robot Bandwidth Save Money Risk Management Miscellaneous Social Media Automation Office Tips Virtual Reality Employee-Employer Relationship Paperless Office Managed Service Router Antivirus Big Data Government Data storage Settings Company Culture Maintenance Display Access Control IT Management Server Management Document Management Business Technology Hosted Solution Vendor Management Virtual Private Network Monitors Administration Touchscreen Development Mouse Wireless Quick Tips Tablet HIPAA Apple End of Support Education Mobile Security Storage Laptop Printing Two-factor Authentication The Internet of Things Avoiding Downtime SaaS Scam Business Intelligence Hacker Data loss Unified Threat Management Downtime Holiday Computers Telephone Systems desktop Networking Outlook Gadgets Retail Alert Spam Computing Operating System VPN WiFi Firewall LiFi Data Security Managing Stress Star Wars Legislation Shortcuts Typing Humor Spyware Chatbots eWaste Monitoring Halloween Office Samsung Information Technology Uninterrupted Power Supply Tech Support Best Practice Computer Care IBM Wearable Technology Network upgrade Microsoft Excel Current Events File Sharing Nanotechnology SharePoint Streaming Solid State Drive Alerts Managed IT USB Smart Technology Chromebook Motherboard Techology Cables Troubleshooting Fraud Statistics Cost Management Security Cameras Cryptocurrency Identity Theft How To Identity Lenovo Continuity Spying Scary Stories Social Engineering Apps Websites Google Docs Training Corporate Profile Mail Merge Smart Office Blockchain Analysis Running Cable IT solutions Going Green Screen Reader Downloads Charging Human Error Buisness G Suite Hard Disk Drive Licensing Shortcut Dongle Distributed Denial of Service Hacks Automobile VoIP Unified Threat Management Wires Bluetooth Assessment Comparison Managed Services Virtual Desktop Bitcoin Firefox Superfish Solar Sports Safety Google Wallet Dell Device Business Growth WannaCry Address Work Permissions Remote Computing Cabling Smart Tech Legal Cooperation Patch Management Service Level Agreement Managed IT Service Network Congestion Password Google Maps User Error Voice over Internet Protocol LED Hotspot Internet Exlporer Specifications Laptops Windows 8 Customer Relationship Management Compliance PowerPoint Unified Communications Drones Mobility Wi-Fi IT Technicians Optimization Writing Heating/Cooling Connectivity Multi-Factor Security Deep Learning Staff Leominster Break Fix Cybercrime Virtualization Mobile Device Management Time Management Modem Printer FinTech Co-Managed IT Language Search Value Black Friday Software as a Service Dark Data Update Digital Payment Regulations Onboarding Marketing Print Toner Alt Codes Digital Mirgation Emergency Recycling Slack Disaster Servers IoT Google Calendar Politics Bring Your Own Device Augmented Reality K-12 Schools Dark Web Collaboration Network Management Cookies MSP Content Budget Computing Infrastructure Professional Services Cyber Monday Customer Service Social Social Networking Digital Signage Health Private Cloud Webcam Black Market Law Enforcement Error Electronic Medical Records Notifications Point of Sale Ben McDonald shares Physical Security Twitter Travel Upgrades Gadget Emoji BDR Printers Supercomputer CrashOverride Crowdsourcing Personal Information Botnet Staffing Motion Sickness Regulation 3D Printing Taxes Cortana Administrator what was your? IT Budget Web Server Machine Learning GPS Processors Unsupported Software IT Consultant Cameras Computer Repair Relocation Tracking Meetings Mobile Data Cleaning Mobile Computing CCTV Entertainment Recovery How To Work/Life Balance

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3