{"id":13665,"date":"2019-05-10T12:00:47","date_gmt":"2019-05-10T12:00:47","guid":{"rendered":"http:\/\/www.techbeatph.com\/wproot\/?p=13665"},"modified":"2019-05-10T11:08:11","modified_gmt":"2019-05-10T11:08:11","slug":"tourism-industry-warned-hackers-target-visitor-data","status":"publish","type":"post","link":"https:\/\/www.techbeatph.com\/wproot\/tourism-industry-warned-hackers-target-visitor-data\/","title":{"rendered":"Tourism industry warned hackers target visitor data"},"content":{"rendered":"<p><strong>Tourism industry warned hackers target visitor data<\/strong><\/p>\n<p>The local travel industry has grown more competitive in securing bookings with a continuous rise in the number of tourist arrivals in the country. Last year, the Department of Tourism posted a record-breaking 7.1 million international tourist arrivals, surpassing the 6.6 million arrivals in 2017 by 7.68 percent despite the six-month closure of Boracay. An influx of this magnitude and the amount of personal information it comes with call for industry players to strengthen cybersecurity measures even more.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.techbeatph.com\/wproot\/wp-content\/uploads\/2019\/05\/Hacker.jpg\" alt=\"\" width=\"910\" height=\"570\" class=\"aligncenter size-full wp-image-13669\" srcset=\"https:\/\/www.techbeatph.com\/wproot\/wp-content\/uploads\/2019\/05\/Hacker.jpg 910w, https:\/\/www.techbeatph.com\/wproot\/wp-content\/uploads\/2019\/05\/Hacker-300x188.jpg 300w, https:\/\/www.techbeatph.com\/wproot\/wp-content\/uploads\/2019\/05\/Hacker-768x481.jpg 768w\" sizes=\"auto, (max-width: 910px) 100vw, 910px\" \/><\/p>\n<p>The Philippines is an attractive destination not only for tourists but also for hackers. In fact, cybersecurity experts predict that the Philippines will be among this year\u2019s most targeted countries in the ASEAN region for malware designed to avoid detection and possibly be a launch pad for other cyber attacks. ePLDT is thereby urging airlines, cruise lines, car rentals, hotels, and tour operators to be extra cautious when handling their customers\u2019 information.<\/p>\n<p>\u201cIt\u2019s easy to get caught up in the overwhelming demand for travel services especially during peak seasons like summer but strengthening cybersecurity measures must always be a priority. Clients are entrusting confidential information. Hence, it is the service providers\u2019 responsibility to handle it well,\u201d said Angel Redoble, First Vice President and Chief Information Security Officer of ePLDT Group, PLDT Group, and SMART.<br \/>\nCybercriminals infiltrate systems in various ways, one of which is by pretending to be customers and then luring salespersons into believing they have lost their reservation details. When the fake customers are asked to give personal information for checking, they propose to send it via email and do so with an attachment of data-stealing malware, which automatically downloads once clicked. The malware then breaks into payment systems where it collects loads of personal data such as credit card information.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.techbeatph.com\/wproot\/wp-content\/uploads\/2019\/05\/Hacker-2.jpg\" alt=\"\" width=\"763\" height=\"409\" class=\"aligncenter size-full wp-image-13668\" srcset=\"https:\/\/www.techbeatph.com\/wproot\/wp-content\/uploads\/2019\/05\/Hacker-2.jpg 763w, https:\/\/www.techbeatph.com\/wproot\/wp-content\/uploads\/2019\/05\/Hacker-2-300x161.jpg 300w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/><\/p>\n<p>Another thing to be wary of is a \u201crogue hotspot\u201d or a Wi-Fi access point set up by an attacker that mimics a legitimate hotspot provided by airports, hotels, coffee shops, etc. Victims that connect to such rogue hotspots usually have no idea about the dangers awaiting them because the attacks use familiar network names. An attacker can collect sensitive user details and credentials like account names, passwords, credit card details, and the like just by eavesdropping on the network traffic. In some cases, attackers may push out malware to a victims\u2019 device or redirect victims to malicious sites or servers that will infect them with malware.<br \/>\nHaving the right cybersecurity solutions in place, coupled with sufficient user awareness campaigns, can curb such incidents. It is essential to invest in people, processes, learning and awareness, and of course, technology. In the event there\u2019s an absence of these, working with a trusted partner like ePLDT can address this concern. ePLDT\u2019s class-on-its-own cybersecurity portfolio includes an end-to-end SOCaaS (Security Operations Center as a Service) offering, which companies can subscribe to for monitoring, alerting, incident analysis, response, and threat intelligence.<\/p>\n<p>\u201cWith digital transformation comes a number of challenges in security compliance and data protection. ePLDT is extending its expertise to organizations to help them set up reliable and resilient systems that promote the safety of customer data, which is vital to business resilience,\u201d said Nerissa Ramos, Senior Vice President and Chief Operating Officer of ePLDT.<\/p>\n<p>To get ahead of these cybercriminals, the best way is to implement cybersecurity measures and solutions that will predict and prevent attacks from infecting systems in the first place. By employing available technology, businesses will be able to ensure the security and privacy of data entrusted to them, inasmuch as they ensure the physical safety of their establishments. ePLDT\u2019s Managed Security Platforms, on the other hand, provide deep inspection capabilities and multi-level protection through technology partnerships combined with best practices and local security expertise.<\/p>\n<p>\u201cWe are working hard to deliver effective, end-to-end cybersecurity services for businesses\u2014regardless of their industry\u2014so they can protect themselves against emerging cyber attacks,\u201d said SVP and Head of PLDT and Smart Enterprise Business Groups Jovy Hernandez.<\/p>\n<p>Apart from Cyber Security services, ePLDT delivers best-in-class digital business solutions up to par with global standards which include Data Center services, Cloud, and Managed IT Services. To know more about ePLDT, visit<strong> <em><a href=\"http:\/\/www.epldt.com\/\">www.epldt.com<\/a><\/em><\/strong>. Leave IT to us. Let IT Be ePLDT. <\/p>\n<p>For more Tech Lifestyle News and Features Visit us at\u00a0<strong><em><a href=\"http:\/\/www.techbeatph.com\/wproot\/\">Techbeatph.com<\/a><\/em><\/strong>\u00a0and Visit and Subscribe to our Youtube Channel\u00a0<strong><em><a>here<\/a><\/em><\/strong>.<\/p>\n<p>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tourism industry warned hackers target visitor data The local travel industry has grown more competitive in securing bookings with a continuous rise in the number of tourist arrivals in the country. Last year, the Department of Tourism posted a record-breaking 7.1 million international tourist arrivals, surpassing the 6.6 million arrivals in 2017 by 7.68 percent&#8230;<\/p>\n","protected":false},"author":3,"featured_media":13671,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,15],"tags":[417,420,418,390,419],"class_list":["post-13665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifestyle","category-techbeatcast","tag-cyber-security","tag-data-privacy","tag-data-protection","tag-epldt","tag-hackers"],"_links":{"self":[{"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/posts\/13665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/comments?post=13665"}],"version-history":[{"count":4,"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/posts\/13665\/revisions"}],"predecessor-version":[{"id":13673,"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/posts\/13665\/revisions\/13673"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/media\/13671"}],"wp:attachment":[{"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/media?parent=13665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/categories?post=13665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techbeatph.com\/wproot\/wp-json\/wp\/v2\/tags?post=13665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}