Travel and Hospitality

As this sector grows, so too the global footprint of sensitive data. Understand the threat. Adopt global best practices.

Is your property secure from cyber threats?

Request Info

Travel and hospitality is, without a doubt, the world’s largest industry. Over 50% of all travel reservations are made online, including hotel reservations. This means data collected includes names, addresses, personal email addresses, and of course, financial details (credit cards and banking). This is in addition to employee information such Social Security numbers and medical information. What’s more, many segments of the hospitality industry have rewards programs that encourage clients to frequent a particular establishment or chain. These store information necessary in order to facilitate reservations, billing and payment, and benefits. And, as though the industry did not have enough to contend with, after heavy barrages of PoS intrusions as well as DDoS attacks, ransomware has also emerged as a real threat.

SOLUTIONS FOR TRAVEL AND HOSPITALITY

If you're in the travel or hospitality industry, you know that data protection and business continuity are critical. You also realize you are on practically every cyber criminal's hit list because the confidential data you store is highly valuable. Just as you would want to provide world-class service to your guests, the safeguarding of your network must meet the same exacting standards.

Protect User Protect User

Protect User

In the security industry, we think of users as the single most vulnerable point in a network. And one you can neither patch nor upgrade; or put a firewall around them. Or can you? As users navigate the internet, unaware of its dangers (with some even believing that nice Nigerian gentlemen are ready and willing to hand them $20 million), NWBUSA offers solutions that help you put a sturdy, protective fence around your users so they cannot harm themselves or your network.

Protect Email Protect Email

Protect Email

As we rush to increase security around network perimeters, hackers look for new ways to penetrate our defenses, and in a turn of events that we should have expected, they have gone back to ‘basics’. Using social engineering to attack via email, with techniques such as spoofing, phishing, even spear-phishing, and ransomware. Over 81% of attacks to a network today start with a phishing email. Spam is no longer just a nuisance as the vast majority of spam today actually contains a threat, be it to the user or to your network. Filtering emails properly and thoroughly is paramount to ensuring your network and data are not compromised.

Protect Gateway Protect Gateway

Protect Gateway

This used to be an easy concept – that little router between your LAN and the ISP. Plug in a firewall, set it up properly, and you are done. Well, things have changed quite a bit with the advent of the cloud and IoT. Network perimeters are no longer always so well defined. However, the problems are still the same – you need to be able to filter traffic to ensure ingress is blocked unless properly authorized; and you need to control egress as well, because what runs inside your extended LAN today is not always necessarily under your direct control. A properly configured, strong gateway solution is still the first line of defense against threats.

Protect Server Protect Server

Protect Server

Web Servers are commodities that makes hackers salivate. A server is a powerful machine, with lots of CPU and memory, and usually abundant bandwidth at its disposal. Most times, it represents the sole traffic allowed inbound through a firewall, and is thus the only port visible to hackers, and likely exploitable. A server can be used to distribute malware, or as a Command and Control center for a botnet. It can be harvested to launch DDoS attacks. Used as bridge into a network if the firewall is not properly configured, and from here, hackers can gain access to your database and steal data. Or, very simply, it can be kept hostage or compromised to cause harm or ask for ransom. Even if your website is "just a marketing tool", would you do business with a company that it has been compromised? Protecting your web servers is fundamental, and a common misconception is that a mere IPS is sufficient to achieve this.

I see the statistics about the email messages and how many intrusion attempts are made and blocked – and they‟re very many. But as far as how much damage that would have been caused if Network Box hadn't prevented it, I can only imagine. As the saying goes, it‟s hard to prove a negative
John Healy Network Administrator

Security Needs Served

NWBUSA can help with an IT security solution that lets you reduce the time and resources spent protecting, monitoring and maintaining your network. This allows you to focus on your core business - ensuring your guests and patrons leave with a smile on their faces. Call us.

  • FW+ (Firewall+)

    IT security, at its most basic form, starts with a firewall. NWBUSA's FW+ solution includes a fully-managed firewall, fully-integrated intrusion prevention systems (IPS), virtual private network (VPN), and distributed denial of service (DDoS) protection.

  • WBP+ (Web Browsing Protection+)

    Malicious websites have the capability of putting an entire network at risk. NWBUSA's WBP+ solution is a comprehensive bundle that includes the FW+ solution (firewall, IPS/IDS, VPN), web browsing protection modules [anti-malware for files and URLs (HTTP and HTTPS), content filtering], policy enforcement, application filtering, and more.

  • WAF+ (Web Application Firewall+)

    Protecting web servers and web applications has become just as important as protecting an entire network. NWBUSA's WAF+ solution offers a comprehensive bundle of security modules specifically designed to protect against web application attacks. Coupled with DDoS (Distributed Denial of Service) protection, this solution can mitigate single- and multi-layered attacks, allowing legitimate users to continue to access the web server and web applications.

  • MCES (Managed Cloud Email Security)

    This leverages 25 anti-spam engines, 16 anti-malware engines (including our award winning Z-Scan to stop zero-day attacks in true real-time), and a database of over 40 million anti-spam and anti-malware signatures. It is a cost-effective, proactive, certified and IPv6-ready solution that provides multilayered email threat protection against malware, spam, phishing, spyware, zero-day threats and more.