Fuse Networks Blog

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

Late in November, Marriott hotels admitted that they had their Starwood reservation database hacked into. The hotel chain said that an entity had unauthorized access for the better part of the past four years. The leak was found to expose names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised. It is now the second-largest data breach in world history. The only breach that was larger, was Yahoo, which exposed the personal information of about three billion users.

What can you do?
If you are sure that your name is among this massive list of people, you should take the following steps immediately:

  • Change Your Password - All Marriott guests should change their passwords immediately and pick usernames and passwords that aren’t easily guessed. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should keep an eye on your Starwood Preferred Guest account as well as your credit report. You can sign up for credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is pointless.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but keeping a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their grubby little hands on it.

If you would like more information about these data breaches, how to secure yourself, and what to do when your information gets compromised, return to our blog regularly for more useful information.

Have you been hacked or had your identity stolen? Leave your experience with us in the comments section below.

See a Major Communications Boost Cloud-Hosted VoIP
Tip of the Week: How to Get Production Out of Your...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 19 2019

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Tech Term Network Security Hackers Business Computing Privacy Innovation Productivity Data Backup Collaboration Android Cybersecurity Software Data recovery User Tips IT Support Computer Data Google Efficiency Communications Email Communication Business Management Mobile Device Malware Internet IT Services Office 365 Smartphone Hosted Solutions Hardware Mobile Devices VoIP Small Business Applications Microsoft Office Cost Management Browser Managed Service Facebook Artificial Intelligence Access Control Backup Information Business Technology Smartphones Social Media Cloud Phishing Blockchain Cybercrime Apps Maintenance Vulnerability Internet of Things Ransomware Scam Vulnerabilities Cloud Computing Automation Data Security Saving Money Holiday Business Windows 10 Mobile Device Management Workplace Tips Two-factor Authentication Passwords BDR IT Management Disaster Recovery Google Maps Social Engineering Quick Tips Hacking Remote Monitoring App Update Data loss Managed IT services Gmail Users Apple Outsourced IT Saving Time Cooperation Websites Printer Conferencing Tech Terms Document Management Bitcoin Mobility Network Vendor Data Breach Healthcare Bandwidth Microsoft Augmented Reality Alert Patch Management Fuse Networks Emergency Processor Robot Data Protection Accountants Encryption Help Desk PowerPoint Microsoft Excel Company Culture Data Analysis Productivity Tactics Electronic Medical Records Modem Cleaning BYOD Microsoft 365 Tip of the week Backup and Disaster Recovery Error Term Gadgets Budget Legislation Trends Government CIO Navigation Training Computer Care Vendor Management Professional Services Identity Theft Virtualization Fileless Malware Hard Drive Big Data Addiction User Tip SSID Distributed Denial of Service Information Technology Computers Bookmark Managed IT Services Mobile Security Website Twitter Telephone Comparison Google Play Gamification Legal Miscellaneous Screen Reader Knowledge Google Calendar Computing Infrastructure Devices Equifax Service Level Agreement Voice over Internet Protocol Cryptocurrency Laptop Server Downloads Directions Hard Drive Disposal Freedom of Information Nanotechnology Browsers Social Network Specifications Health IT Security Cameras SharePoint Downtime Emails Law Enforcement Monitoring Evernote Networking Compliance Spam Startup Going Green NCSAM iPhone Desktop Operating System Travel Cortana Cost email scam HTML Windows 10 Machine Learning Analytics Medical IT News Mobile Technology Digital Multi-factor Authentication Paperless Office Customer Resource management Television Social project management Piracy Bluetooth WiFi Management Business Continuity Google Docs Business Cards Regulations Download Managed Service Provider Unified Communications IT Retail Username Disaster Microchip eWaste VPN Network Management Audit Proxy Server Data Management Fake News Virtual Reality Entertainment Virtual Assistant Device security Database Telephone System Mouse Sports Router Money Software License Wireless Headphones Content Excel Antivirus Chromebook Computing Tech Upload Printing Support Windows 7 Safety IBM Fun Employer-Employee Relationship The Internet of Things Marketing Hacker Competition Customer Relationship Management IP Address Solutions Hard Drives Regulation Customer Service Search Upgrade Printers Mobile Office Integration Domains Wireless Public Speaking Managing Stress Presentation Wi-Fi Lithium-ion battery Multi-Factor Security Hiring/Firing Wireless Technology 5G Tech Support