Cyber Threat Report: Major Breaches for the Travel Industry
Which? investigators, working alongside cybersecurity experts, recently uncovered hundreds of data security vulnerabilities for major travel companies including Marriott, easyJet, and British Airways.
In June 2020, Which? assessed the websites of 98 travel industry companies. The assessment not only looked at the main domains, but subdomains as well including landing pages, promotional pages, and employee portals. Marriott, easyJet, and British Airways were in the top 5 companies with the most risks identified. Marriott owned websites had an astounding 497 vulnerabilities with a hundred of them being assessed as ‘critical’ or ‘high’.
You can read the full Which? report here.
This is a good reminder that all companies, no matter how small or large, are at risk of a cyber-attack. All vulnerabilities should be taken seriously and corrected immediately. Be vigilant when it comes to your cybersecurity with these best practices:
- Continuous Education: All employees are responsible for security. It’s incredibly easy to fall victim to a ransomware attack so it is critical that each one of your employees are fully aware of all security policies to protect your company’s data. Just one click on a corrupt link or a download of a malicious attachment could breach and cripple your company’s network. It’s every employee’s job to engage in safe online behavior to prevent a cyber-attack.
- Have a Proactive Disaster Recovery Plan: While ensuring that your data is consistently backed up is crucial, having a disaster recovery solution takes things a step further to minimize downtime and ensure that data recovery happens in a timely manner after a ransomware attack. Your backup and disaster recovery solution should be tailored for the type of information your business is storing. Identify your most critical IT assets and your downtime tolerance, in order to create a solution that works best for your business. Once your backup and disaster recovery system is installed, monitor it constantly to ensure that your data is backed up, confirmed, and secure.
- Think Like a Hacker: Consider your busiest times or vendors that you frequently work with. Cybercriminals are thinking about this too to find a weak spot to exploit in your network. Hackers are smart and they are quickly adapting to find new ways to trick users. With their clever tactics and detailed technical knowledge, they will stop at nothing to penetrate your network.
- Change All Passwords Regularly: Usernames and passwords represent the keys to the kingdom for malicious attackers. Criminals who know how to penetrate a company’s defenses can easily steal hundreds or even thousands of credentials at a time, each one representing another potential entry point to compromise your organization’s network and data.
4332 Wheeler Road #105, Augusta GA 30907