LaBelle, Phil; Chatterjee, Amitava
July 2004
Hospitality Upgrade;Summer2004, p22
Trade Publication
Discusses what the information technology (IT) assets of a hotel are and offers suggestions to ensure and promote a safe and secure environment for a hotel's guests and employees. Potential security issues such as access to guests' personal or financial data; Use of secure hardware and software firewalls to prevent hackers from planting viruses and worms capable of seeking out addresses in address books; Importance of data backups in information security.


Related Articles

  • UTMs are not for everybody.  // Network World;9/29/2008, Vol. 25 Issue 38, p1 

    The article focuses on the advantages and disadvantages of unified threat management (UTM). It contends that UTM appliances enable multiple security functions on a single hardware. Its advantages include multifunctionality in streamlining network architecture and convenience because of its...

  • Converged security pays dividends. Ting, David // Network World;6/18/2007, Vol. 24 Issue 24, p32 

    The article discusses the significance of security convergence to users and security staff. According to the author, the benefits of security covergence include the promotion of subtle changes to employee behavior that increase overall security, strengthens ability for companies to enforce...

  • The basics of good security.  // Computer Weekly;9/19/2006, p30 

    The article focuses on the importance of maintaining effective Information Technology (IT) security in organizations. Companies make efforts to block every gap in their networks to secure data. IT directors have to give attention to the changing techniques that threaten the business priorities....

  • Getting the Most From Your Hotel Technology. Hodges, Gregg // Lodging Hospitality;6/1/2006, Vol. 62 Issue 9, p50 

    The article outlines several technology solutions aimed to help hotelkeepers protect the hotel and their guests using the Internet, provide high-quality service and control costs at the same time. To ensure the security and privacy of guests, make sure that the hotel's wireless network has...

  • Governments must take a share of security burden. Saran, Cliff // Computer Weekly;9/30/2003, p1 

    The information technology industry cannot guarantee Internet security. Market forces are not enough to safeguard the global communications infrastructure, according to Scott Charney, chief security strategist at Microsoft Corp. and head of its Trustworthy Computing initiative. Guy Hains, head...

  • JERICHO FORUM: VISIONARIES WITH A VISIBILITY PROBLEM. Messmer, Ellen // Network World;8/4/2008, Vol. 25 Issue 30, p37 

    The article focuses on the Jericho Forum, a group formed by Information Technology (IT) managers in 2004. It discusses the condition and some developments of the group as well as objective and how it plays its influence to the rest of the IT industries. It relates the concept of...

  • Taking IT security to the next level. Bradbury, Danny // Computer Weekly;8/15/2006, p26 

    The article focuses on various issues related to security in the IT industry with specific reference to the two-factor authentication which will increase the security bar for corporate networks. With businesses' faith in passwords is declining, many banks are increasingly using enhanced security...

  • A matter of trust. Brooks, Jason // eWeek;5/1/2006, Vol. 23 Issue 18, p20 

    The article focuses on the importance of trust in computer network server operating system. The feature of trusted operating system, such as mandatory access controls, can help in ensuring a security protection to the system. The author commented that even if there was this tight system control,...

  • Unified threat management catching on. Greene, Tim // Network World;9/29/2008, Vol. 25 Issue 38, p1 

    The article focuses on the growing development of unified threat management (UTM) in the U.S. It cites that consumers using UTM recognize that the appliance represents a more efficient way to provide multiple security purposes and track down security data. It states that UTM has been around for...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics