facebook linkedin twitter

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

Late in November, Marriott hotels admitted that they had their Starwood reservation database hacked into. The hotel chain said that an entity had unauthorized access for the better part of the past four years. The leak was found to expose names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised. It is now the second-largest data breach in world history. The only breach that was larger, was Yahoo, which exposed the personal information of about three billion users.

What can you do?
If you are sure that your name is among this massive list of people, you should take the following steps immediately:

  • Change Your Password - All Marriott guests should change their passwords immediately and pick usernames and passwords that aren’t easily guessed. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should keep an eye on your Starwood Preferred Guest account as well as your credit report. You can sign up for credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is pointless.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but keeping a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their grubby little hands on it.

If you would like more information about these data breaches, how to secure yourself, and what to do when your information gets compromised, return to our blog regularly for more useful information.

Have you been hacked or had your identity stolen? Leave your experience with us in the comments section below.

See a Major Communications Boost Cloud-Hosted VoIP
Tip of the Week: How to Get Production Out of Your...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Saving Money Network Security Email Malware IT Services Hosted Solutions Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices Smartphones User Tips Gadgets Business Continuity Innovation Disaster Recovery Android Social Media Microsoft Office Mobile Office Virtualization Network VoIP Data Backup Server Smartphone Mobile Device Management Collaboration Communication Productivity Miscellaneous Data Recovery Upgrade Ransomware Tech Term Windows 10 Windows IT Support Unified Threat Management Passwords communications Facebook Holiday Operating System Remote Monitoring Apps Cybersecurity BYOD Mobile Computing Remote Computing Managed IT services Vendor Management Phishing Users WiFi BDR Mobile Device Analytics Marketing Automation The Internet of Things Firewall Outsourced IT History Apple Data Management Alert Artificial Intelligence Internet of Things Browser Managed IT Services Save Money Big data App IT Consultant Encryption Going Green Bring Your Own Device Antivirus Maintenance Office Printer Gmail Bandwidth Health Content Filtering Spam Hiring/Firing Hard Drives Cost Management Outlook Windows 8 Office 365 Saving Time Help Desk Windows 10 Wireless Technology Budget Two-factor Authentication Search Virus Tech Support Managed IT Cybercrime Cloud Computing Lithium-ion Battery Business Technology Best Practice Information Technology Blockchain Document Management Hacking IBM Computers Training VPN Travel Update Access Control Recovery Employer-Employee Relationship Phone System Money Applications Managed Service Running Cable Networking Proactive IT Legal Regulations Intranet Twitter Humor Education SaaS Administration Customer Service Information Hard Drive Risk Management Law Enforcement Website Government Mobility Compliance Healthcare Data storage Save Time It Management Laptop Excel Password Cortana Patch Management Value Comparison Tablet Company Culture Data Loss Business Growth Computer Repair Customer Relationship Management Scam Hacker Augmented Reality Machine Learning Social Networking PowerPoint Telephone Systems Fax Server Data Breach Paperless Office Sports Project Management User Digital Websites Computing Disaster End of Support Social File Sharing Hosted Solution Robot Wireless DDoS Google Maps Securty Avoiding Downtime Business Intelligence Social Engineering Solid State Drive iPhone Digital Payment Router Downtime Flexibility Word Data Security Black Market Current Events Cryptocurrency Google Docs Download User Error Private Cloud Co-managed IT Trending Experience Monitors Telephony Mouse Cleaning Office Tips Microchip Processors Taxes Redundancy Conferencing Distributed Denial of Service Lifestyle Programming Gaming Console USB Statistics Presentation Evernote Network Congestion YouTube Webcam Monitoring Unified Communications Settings Text Messaging Public Cloud Specifications Safety Virtual Desktop Identity Theft Streaming Media Start Menu Tech Terms Documents Management Mobile Technology Entertainment Software as a Service IT service Heating/Cooling Storage Virtual Reality Politics Uninterrupted Power Supply Vulnerabilities Net Neutrality Inbound Marketing Emails Vendor Chrome Automobile Chromebook Bitcoin Bluetooth Retail Computing Infrastructure Hack Pain Points Data Protection eWaste Computer Accessories How To Web Server Screen Reader Customer Resource management Visible Light Communication Memory Shortcut WannaCry Cabling Downloads Navigation Gamification Troubleshooting Wi-Fi Administrator Time Management Freedom of Information Smart Tech Distribution IT consulting Upselling Entrepreneur Books Corporate Profile Workers Webinar Data Analysis Piracy Upload LinkedIn Assessment SharePoint GDPR HTML Environment Supercomputer Fiber-Optic Database Video Surveillance HIPAA CIO Saving ZTime Electronic Payment Tip of the week Telephone System Archive Advertising Flash Competition Worker Google Calendar Tech Mobile Security Skype Business Owner Touchscreen News Multi-Factor Security Cost Windows XP Reading VoIP Samsung Fileless Malware Software License Trends Staffing Google Wallet IP Address G Suite Consultation Modem Devices Point of Contact Displays Harddrive Employer Employee Relationship Knowledge Proxy Server Fraud Tactics Society Debate Micrsooft Hacks Human Resources Physical Security Best Practives Electronic Medical Records Virtual Assistant GPS Application Licensing Technology Tips Term UTM Content External Harddrive Banking Botnet Fake News Legislation Error Relocation Tablets Audit Directions IT Plan Enterprise Resource Planning Drones Sync Microserver Data Warehousing SSID Accountants A.I. Analytic Dark Web email scam Addiction Recycling Product Reviews Thin CLient Notifications CCTV Emergency Health IT Hard Drive Disposal Permissions Language 3D Ebay Digital Signature Access Processing Multi-factor Authentication Smart Phones Business Metrics Computer Malfunction Get More Done Microsoft Excel Wireless Headphones Telephone Read Teamwork Reliable Computing Computer Care Managed IT Service Migration Connected Devices In Internet of Things Google Drive Turn Key Windows Server 2008 Equifax Fleet Tracking switches Writing Printer Server Bookmark Network Management Music Google Play Device security MSP Upgrades Leadership PDF Trojan Vulnerability Device Management Adminstration Pirating Information Spyware Mobile Payment Motion Sickness Nanotechnology Social Network Content Management LiFi Best Available Keyboard Scalability Electricity Organize Printing Processor Desktop Finance Business Managemenet Domains Windows 7 Startup Asset Tracking Messenger Tracking Browsers Business Cards Service Level Agreement Television Security Cameras Username Deep Learning Rental Service Meetings User Tip Unified Threat Management Backup and Disaster Recovery online Currency Work/Life Balance Public Speaking cache 3D Printing Printers CrashOverride Managing Stress Regulation Capital Productuvuty Cooperation Medical IT