Tech Talk

Recent posts

A groundbreaking new report by the Urban Land Institute in Washington, D.C. explores sustainability in the hospitality industry and examines ways in which hotels are incorporating eco-friendly best practices into both operations and construction. The study includes insights from leading hotel owners, developers and investors.

Every hotel owner wants to know how he can increase the traffic to the website, and at the same time, boost direct bookings. The key to accomplish both the objectives is to design a site that is accessible even to disabled people. It will not only improve the usability for all types of visitors, but it will also improve your market penetration. Designing ADA website is also very imperative to prevent legitimate complications. In addition to this, an ADA feature will aid in improving the website performance in search engines.

The underappreciated city of Minneapolis served as host for the 2019 edition of HITEC (produced by HFTP) which wrapped up its most recent four-day run on June 20, 2019. In the days and weeks leading up to the event, meeting solicitations and party invites filled my inbox at a growth rate any VC or entrepreneur would envy. As a first-timer to this international hospitality technology behemoth, it became apparent that HITEC actually begins a few weeks prior to when that first request or invitation lands in your over-stuffed inbox.

Time is limited. Once it’s gone, you can’t gain it back. Similarly, once a room goes unsold for a night, it will go unsold forever. There’s no way to recover that loss, because there’s no way to go back in time.
Many hotels fight this limitation by trying to sell as many rooms as possible. If all the rooms are completely booked, time no longer becomes a factor. But most don’t have the luxury of being at-capacity every single night. That’s why last-minute booking apps are growing in popularity in the industry, where hotels can make the most of each day. These apps specifically target guests who don’t plan far in advance, seeking accommodations from one week to one minute later.
There are several different ways your hotel can benefit from using last-minute booking apps in your business strategy.

IoT is Coming, Jon Snow…
Posted: 05/21/2019

Hospitality is prime for the coming advent of the various devices that make up the Internet of Things. Estimates show the industry now represents 17.5 million rooms worldwide and savvy guests are demanding more personalization and an overall improved guest experience along their connected travel journey and belief is that IoT can bring this to reality. 

want to read more articles like this?

want to read more articles like this?

Sign up to receive our twice-a-month Watercooler and Siegel Sez Newsletters and never miss another article or news story.


Storing and Sharing Files in the Cloud Can be Simple and Risk-Free — If You Take the Necessary Precautions


In recent years, there’s been a major movement toward adopting the cloud across the hospitality industry. In 2013, for instance, nearly half of all hotels were already using the cloud or wanted to make the switch, and the number has only grown since then. This should come as no surprise: As hotel guests themselves use the cloud more and more in their personal lives —booking rooms online, working remotely from their hotels, or collecting loyalty points on mobile devices — they expect the hotels they trust to do the same. It’s all part of delivering excellent customer service. But not only can adopting the cloud industry-wide provide additional convenience for your guests, it can also revolutionize the way you work.

One of the primary advantages of the cloud comes from the ability to quickly and easily share files with selected users. But while file-sharing services are quite secure, it’s always sound to add layers of extra security when entrusting the cloud with sensitive data, particularly data that’s subject to governmental regulations. Popular services even occasionally fall victim to security breaches and data leaks, which can happen when files are not protected on mobile devices, are shared accidentally with the wrong users, or when the data is not separated properly from the keys that encrypt it. As cloud-based file services becomes increasingly common and data proliferates across collaborators and devices, it also becomes increasingly important to make sure security is a top priority when it comes to sharing and storing files. 

Even the remote prospect of a data breach may seem like a serious deterrent to using the cloud to gather and store client information. But the risks are easily mitigated if you employ certain smart — even straightforward — security strategies, providing you the freedom to reap the benefits of cloud-based file-sharing without worry.

  • There are several precautions to take that can significantly increase the safety of your files and documents when they’re stored and shared in the cloud. One such solution is file-level encryption, which encrypts the data itself — not just the various places where it resides and dramatically enhances the security of your sensitive data. Encryption helps ensure that only you and users you authorize can view the files; if the information is accidentally sent to an unauthorized party or your cloud storage provider suffers a breach, your — and your clients’ — data will remain safe. Adding a level of encryption beyond the security provided by the cloud provider also means that your files will be encrypted before they ever reach the cloud, so unencrypted data isn’t being synced inadvertently. Encryption also enables you to sync files securely across mobile devices, meaning that if you take your smartphone or laptop to a meeting, say, or work from home or on the go, your files will remain encrypted and protected regardless of the device they’re on.
  • File-level end-to-end encryption not only makes storing files easy and secure, it makes sending and receiving them safe as well. Certain encryption solutions, for example, offer the ability for non-users, like guests, to upload sensitive information directly to the hotel’s encrypted folder in the cloud. What this means, for example, is that instead of relying on fax machines or unsafe email to gather third-party credit card authorizations, third-party clients can simply upload the required information to the hotel in a secure way, without having to set up or download a special service. The credit card information remains encrypted all the while, so a user error won’t result in a data breach.
  • It’s a common misconception that the cloud is risky and hackers lie in wait to infiltrate files and leak personal information. While information can get into the hands of malicious actors — especially sensitive information like payment card data — breaches are far more frequently attributable to employee mistakes rather than hackers. According to a recent study, employee negligence is the number-one cause of data breaches and twice as likely as external attacks. Employee negligence can include mistakenly sending information to the wrong recipients or misplacing a mobile device with access to sensitive information. Encrypting your files — and having the ability to block users and devices from accessing sensitive data — means that mitigating the effects of a potential breach is within your control.
  • You should also always know how and when your colleagues are accessing data. Cloud software that offers audit trails will provide insight into who accesses your files as well as when and whether they modify them. If you notice an unauthorized user moving or changing your documents, you’ll be able to take swift action to stop the suspicious activity to protect your clients’ data.
  • And finally, be sure to follow good online security protocol. If employee negligence is the number one culprit when it comes to glitches, it’s also the easiest one to prevent. Be sure to change your passwords often when using the cloud, grant employees access to client information on a need-to-know-basis only, and revoke access to company information when employees leave the company.

As more and more professionals adopt the cloud, it’s inevitably going to influence your workflow soon, if it hasn’t already. Rather than resist the cloud, it’s useful to embrace it — and to approach it head-on knowing how to mitigate potential risks.

About The Author
Asaf Cidon, Ph.D.
Co-founder and CEO

Asaf Cidon, Ph.D., is the co-founder and CEO of leading cloud security company Sookasa, which provides seamless Dropbox encryption.

Blog post currently doesn't have any comments.
Leave comment

 Security code