How retail and hospitality can protect themselves from increased cyber attacks

Every industry in the world is vulnerable to phishing and other cyber attacks, but retail and hospitality rank as some of the most high-value targets for hackers looking for personal identifiable information (PII) and payment card information (PCI). These two industries are often ranked among the top three most vulnerable industries, right behind financial institutions. That vulnerability became apparent earlier this month when the MGM Grand cyber attack shut down hundreds of casino games and disabled hotel room cards. The company reportedly lost between $4.2 million and $8.4 million in daily revenue during the attack.

Retail and hospitality (R&H) companies collect PII and PCI data through many customer interaction points – loyalty programs, reservation sites, stored purchase histories, or customer journey data. But the data itself may reside in places vulnerable to attack, like point-of-sale (POS) systems, call centers or shared workstations. In some cases these systems might be installed on legacy infrastructure, which often do not have updated security measures for authentication potentially leaving their customers’ security and personal data at high-risk for cyber attacks. 

A robust phishing-resistant multi-factor authentication (MFA) solution is needed to protect this kind of data and securely access it. As industries that often work directly with consumers, R&H has the added challenge of making sure any MFA solution is user friendly and easy to understand. Consumers are often targets for stolen credentials scams through “social engineering” – a recent Verizon Data Breach Investigation Report found that 74% of breaches are caused by stolen credentials. A second factor-method for authentication – or better yet going completely passwordless – is crucial to avoid falling victim to another cyber attack. Usernames and passwords, and other legacy MFA like SMS, mobile authentication apps and one-time passcodes, will not offer enough security, nor do they enable good user experiences. 

Hyatt Hotels and YubiKeys

Recently, Hyatt Hotels reached a security crossroads – legacy authentication systems weren’t  meeting their needs. Art Chernobrov, Hyatt’s Director of Identity, Access and Endpoints had seen enough of the old authentication system. His massive hotel chain had 200,000 employees moving between 1,500 locations (and working remotely), and he had already moved away from traditional usernames and passwords. Employees were using a one-time password (OTP) sent over SMS that created an atmosphere of ‘MFA fatigue’ as there were numerous MFA prompts daily. 

“I’ve seen the compromises in the industry, and other places, that come from fatigue, and MFA requests, that people just blindly accept. You don’t want to be that guy. You don’t want it to be on your watch.”

Art Chernobrov, Director of Identity, Access and Endpoints, Hyatt

YubiKeys offered a solution that worked well with Hyatt’s existing Microsoft authentications like Entra ID (formerly Azure ID) and SSO. With a hardware-bound, phishing-resistant security key, MFA fatigue was no longer an issue and the organization as a whole could embrace a passwordless future. Hyatt Hotels is leveraging YubiKeys and passwordless to reduce risks as well as to elevate guest experiences in their lobbies. 

Covering the retail and hospitality cybersecurity bases

Deploying a new MFA solution should start with some due diligence and internal auditing. This is why it’s critical to follow proven guidance to ensure that you have all the information you need. In general, it’s good to start a rollout with your high-value users handling the most sensitive data. These employees are more motivated to follow directions and adopt a new system. Once MFA is road-tested with that group, expand use cases by rolling out to the rest of the workforce.

We recommend making a key applications inventory part of your internal audit. During that inventory, you might ask these questions for each application or authentication scenario.
 

  1. Who needs access?
  2. What authentication approach will you take?
  3. How do you currently manage access: IAM, IdP, PAM, SSO, or VPN?
  4. What is your workforce like: Remote, hybrid, on-premise, or multi-location
  5. What devices are they using: Owned, BYOD, desktop, laptop, smartphone, tablet, POS terminals, or inventory scanners?

Come say hello in Dallas at the RH-ISAC Summit

The 2023 RH-ISAC Cyber Intelligence Summit is coming to Dallas, Texas on October 2-4. Retail and hospitality cyber security experts and executives will be there to discuss the latest technologies that will protect this sector in 2024, and Yubico will also be attending. We offer a discount code for those that want to register here.

All RH-ISAC Core Members are already granted free admission to the event, but the discount code will be applicable for any non-RH-ISAC member. Please come by and see us at table 16 during the show!

——

Read our guide, “How to get started with phishing-resistant MFA to secure retail and hospitality” for more information on how YubiKeys can help your organization. Check out how Hyatt is leveraging YubiKeys in the case study here.

Talk to our teamTalk to our team

Share this article:


  • Introducing new features for Yubico Authenticator for iOSWe’re excited to share the new features now available for Yubico Authenticator for iOS in the latest app update on the App Store. Many of these improvements aim to address frequently requested features from our customers, while providing additional new functionalities for a seamless authentication experience on iOS.  With increased interest in going passwordless and […]Read moreiOSYubico Authenticator
  • Platform independent digital identity for all Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake identities. To mitigate these risks, some claim that we have to choose between security, usability […]Read moreDigital IdentityEUDIFounderStina Ehrensvard
  • Q&A with Yubico’s CEO: Our move to the main Nasdaq market in StockholmAs 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and achievements of 2024—culminating in […]Read moreCEOMattias Danielsson
  • Exploring DORA: A look at the next major EU mandateFinancial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area (EEA) must also soon follow new rules. These new rules focus on the protection, detection, containment, and the […]Read moreDORAEU