Homeland Security Warns Against Threats to US Infrastructure
Author of www.HotelLawBlog.com
By Robert E. Braun, Bob Braun is a Senior Member of JMBM’s Global Hospitality Group®
Hotels rely on third-party vendors to help run their properties efficiently, and often must give them access to sensitive guest data. This leaves hotels vulnerable to cyber attacks; they're only as secure as their vendors are, and may find themselves directly liable for a data breach. My partner Bob Braun, senior member of JMBM's Global Hospitality Group® and co-chair of JMBM's Cybersecurity and Privacy Group, discusses recent hotel cybersecurity breaches and how hotel owners can protect themselves.
Moreover, the duration of the breach was long quite long. Sabre's investigation determined that the unauthorized party first obtained access to payment card and other reservation information on August 10, 2016, and the last access to payment card information was on March 9, 2017. The hackers had potential access for seven months.
Hotel owners and consumers are, unfortunately, common victims of security breaches – all of the major hotel brands and managers have been breached, often multiple times. In analyzing the breaches, there is something that is common to almost all incidents: the vulnerability was not with a hotel, its manager or brand, but with a vendor.
Hotels are not alone, of course in relying on vendors. Companies in other high threat industries like finance, retail, and healthcare regularly work with third party vendors, and these third parties commonly have access to their clients' systems and may share or store clients' sensitive and highly-valued data. But this Sabre breach (and those of the past several years) shows us that no matter how well-protected a hotel is from a direct cyberattack, its networks and data may still be easily accessed through third parties with weaker cybersecurity protections. In one of the most famous (or infamous) breaches, the 2013 breach of Target, cybercriminals were able to steal the retailer's sensitive data by accessing its systems with credentials stolen from a vendor responsible for Target's HVAC systems. Similarly, in 2017, thieves stole Netflix's "Orange is the New Black" episodes from an audio post-production company, not from Netflix itself.
The typical hotel management or franchise agreement requires the owner to abide by or adopt data security policies and procedures in conformance with the brand's or manager's standards and to comply with data security laws and regulations. As a result, even where an incident is the result of the manager's or brand's failure to adopt or maintain appropriate standards, the owner will likely be directly liable for a breach, and may be obligated to indemnify the brand or manager for any claims arising from a breach.
Hotel owners are at a particular disadvantage compared to other companies, since hotel brands and mangers typically select vendors, like Sabre, for multiple properties and often for an entire brand. Hotel owners may have little, if any say, in the vendor, the terms of engagement, and the impact of a breach. However, under the typical hotel management or franchise agreement, the hotel owner is required to bear the cost of a breach, whether in terms of direct costs (including notifying potential victims and the increased cost of cyberliability insurance) and the indirect cost of diminished trust in the hotel.
While managers and brands are reluctant to cede authority to owners, owners should take active steps to protect themselves and their properties:
- Review data security policies and procedures critically, and require changes where the policies don't reflect current laws and regulations and, most importantly, current cyber-threats. Training programs should include a strong cybersecurity and monitoring for implementation and effectiveness. Most incidents can be traced to human error or malicious intent, not solely to technical systems.
- Require brands and managers to impose security requirements on vendors and to ensure that vendors take responsibility for the cost of a breach.
- Analyze cybersecurity policies to confirm that they adequately cover direct and third party costs of breaches. Since insurance is often one area where a hotel owner has greater control, it can be used as a lever to create a more secure environment.
- Require that brands and managers develop and test effective backup systems; while theft of data is expensive and embarrassing, newer strains of ransomware, wiperware, and fileless malware have the ability to destroy business records, and only a functional backup system can protect the hotel and its business.