Security Business

JUL 2019

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link:

Contents of this Issue


Page 98 of 108

S38 ACCESS CONTROL Trends And Technology | JULY/AUGUST 2019 networks, and application logs and, at the same time, left the door wide open on vulnerabilities in the giant hotel brand’s network that could enable cyber criminals to launch massive future attacks. The data leaks included all sensitive information that we’ve come to expect from such an attack: • Server API key and password • Device names • IP addresses of incoming connections to the system and geolocation • Firewall and open ports information • Malware alerts • Restricted applications • Login attempts • Brute force attack detection • Local computer name and addresses, including alerts of which of them has no antivirus installed • Virus and Malware detected on various machines • Application errors • Server names and OS details • Information identifying cybersecurity policies • Employees’ full names and usernames • Other telling security data Expanding Threats, New Risks However, what makes this attack most concerning to those in charge of physical access control systems – especially those charged with securing hotel and resort facilities – the information reaped from the hotels’ databases allows any would-be attacker the ability to monitor the hotel networks and, according to the vpnMentor team: “gather valuable information about administrators and other users, and build an attack vector targeting the weakest links in the security chain. It also enables the attacker to see what the security team sees, learn from their attempts based on the alerts raised by the systems, and adjust their attacks accordingly.” The White Hat hackers added that, “It’s as if the nefarious individuals have their own camera looking in on the company’s security office.” They said that in a worst case scenario the leak not only put the hotel networks at risk, but also endangered the physical security of hotel guests and other patrons since bad actors could now potentially compromise multiple devices that control hotel locking mechanisms, electronic in-room safes along with other physical security devices tied to the networks. After the news of this chilling hotel data breach broke in Forbes magazine, John Carter, co-founder and CTO of ReconaSense, a provider of physical security intelligence and next-gen risk-adaptive access control that offers the industry an advanced security and risk intelligence platform that incorporates artificial intelligence (AI) on an artificial neural network (ANN), admits that despite physical security risks that threaten lives and sensitive data, too many organizations still keep physical security data isolated from infosecurity data. In many cases, a physical wall literally separates a Network Operation Center (NOC) and physical security teams from sharing intelligence. “Attackers who gain physical access to a computer can further invade and wreak havoc across multiple connected IT systems - and vice versa. In this latest hotel systems breach, cybersecurity flaws expose critical IT data as well as physical security systems such as key cards, video cameras, motion detectors, and other devices that ensure guest and employee safety. AI-powered solutions can detect anomalies and identify threats across an entire security infrastructure (IT and physical) before a breach occurs, enabling teams to go beyond managing siloed data and alerts to achieving true situational awareness and rapid response capabilities,” says Carter. John Carter, co-founder and CTO of ReconaSense,

Articles in this issue

Archives of this issue

view archives of Security Business - JUL 2019