About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

Late in November, Marriott hotels admitted that they had their Starwood reservation database hacked into. The hotel chain said that an entity had unauthorized access for the better part of the past four years. The leak was found to expose names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised. It is now the second-largest data breach in world history. The only breach that was larger, was Yahoo, which exposed the personal information of about three billion users.

What can you do?
If you are sure that your name is among this massive list of people, you should take the following steps immediately:

  • Change Your Password - All Marriott guests should change their passwords immediately and pick usernames and passwords that aren’t easily guessed. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should keep an eye on your Starwood Preferred Guest account as well as your credit report. You can sign up for credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is pointless.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but keeping a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their grubby little hands on it.

If you would like more information about these data breaches, how to secure yourself, and what to do when your information gets compromised, return to our blog regularly for more useful information.

Have you been hacked or had your identity stolen? Leave your experience with us in the comments section below.

See a Major Communications Boost Cloud-Hosted VoIP
Tip of the Week: How to Get Production Out of Your...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Advertising Running Cable Audit Access Professional Services PDF IBM Taxes Tablets Innovation Passwords Drones IT consulting Hosted Solution Migration Consultation Telephone Systems Inbound Marketing Encryption Startup Heating/Cooling Content Filtering A.I. uptime Printers Logistics Security Information Website History Router Mobility Cryptocurrency Enterprise Resource Planning Administrator Messenger Displays WannaCry Workplace Tips Telephone Operating System Congratulations Microsoft 365 Scam Tracking Business Owner Tech Term Training Troubleshooting communications Chromebook Bring Your Own Device Outlook Company Culture Government Law Enforcement Search Emails Retail Productivity Education Android Fake News Social Media Social Engineering Bookmark Business Intelligence IT Support Two-factor Authentication Digital Mobile Technology Microsoft Healthcare Assessment Trends Gamification Browser Risk Management Social Network IT Management Administration Data Gmail USB Social Networking Phishing Customer Resource management Value Mobile Device Management Digital Signature Data storage Patching Corporate Profile Computer Malfunction Solutions Saving Time Wireless Headphones Knowledge Mobile Devices Managed IT Service Networking Tactics Documents Bitcoin Music Piracy Fileless Malware Digital Payment MSP Proactive IT Mobile Payment CIO Automation Cache Data Protection Teamwork Monitors VoIP Microsoft Office Business Continuity Cortana Hackers Sports HTML Travel Communication Net Neutrality Navigation Entrepreneur User Tips Tech Securty Hosted Solutions Analytics Data Analysis Vulnerabilities Skype Term Specifications Laptop Best Practices Society G Suite Marketing Safety Text Messaging Server Worker Backup and Disaster Recovery Alert Processing Computer Accessories Best Available LiFi Licensing Virus Network Network Management Equifax Connected Devices Office 365 Mouse End of Support clout services Google Windows 10 Gadgets Spyware Comparison Desktop Spam Keyboard Hacking email scam Downtime Apps Electricity Tech Terms Service Level Agreement WiFi Augmented Reality Data Security IT Services Health IT Error Artificial Intelligence Cybersecurity Public Cloud Money Vendor Mangement Windows10 Trending Fleet Tracking Printing Presentation Save Time Hiring/Firing cloud storage Reading Browsers Rental Service Accountants Apple Scalability Solid State Drive Co-Managed IT Competition Big data Email Bata Backup IP Address Wireless Outsourced IT User Tip Environment Experience Workers Computer Disaster Recovery Regulations Motion Sickness VPN Redundancy Cleaning Thank You Devices Product Reviews Username Downloads Google Drive Windows 10 Supercomputer Reliable Computing Flexibility Domains Citrix Xenapp Paperless Office Data Warehousing Password Customer Relationship Management Screen Reader Facebook Privacy UTM App Collaboration Upgrade Medical IT Intranet Software Processors Business Management Electronic Medical Records Virtualization Permissions In Internet of Things Unified Threat Management File Sharing Hard Drive Computing Holiday IT Consultant Download IT Support Managed Service Provider Recovery Data Management Addiction Programming Managed IT Writing Smart Tech Health Data Breach Budget Private Cloud Unified Communications Nanotechnology Smartphone Memory Management Business Mangement Fraud Google Play Users Hard Drives Legislation Maintenance Distribution CCTV HIPAA Cybercrime Vulnerability Flash Freedom of Information BDR cyber security Tablet Dark Web Backup IT service Excel Virtual Reality CrashOverride Modem Mobile Security User Applications Language Statistics Data Backup Managed IT Services Distributed Denial of Service Directions Saving Money Webcam Business Computing Software License Bandwidth Electronic Payment Streaming Media Antivirus IT Tech Support How To Work/Life Balance Quick Tips Chamber Telephony Telephone System cloud Multi-Factor Security Books Lithium-ion battery Physical Security Asset Tracking hardware Business Cards Upgrades Start Menu SSID Wi-Fi the Internet of Things Mobile Device Business Technology Tips SharePoint Managed IT services Application Cost Management Botnet Compliance Voice over Internet Protocol Windows Read Windows 8 Internet Tip of the Week Employer-Employee Relationship Identity Theft Web Server Public Speaking Google Wallet Processor Hacker Television Information Technology Windows 7 Internet of Things Employer Employee Relationship Going Green Business Technology Evernote Malware Chrome Politics outsource cloud computing Social Hack Project Management Data Recovery Computers Ransomware News Cabling Twitter Integration Hacks Managing Stress Device security Samsung Relocation Mobile Computing Notifications Blockchain Business Growth switches Current Events Save Money VoIP Robot Network Security Database Staffing Productuvuty Micrsooft Disaster Google Docs Virtual Desktop Unified Threat Management BYOD Tip of the week Best Practice YouTube Windows Server 2008 Productivity Remote Monitoring Data Loss Hard Drive Disposal Rapid City GDPR Firewall Patch Management Finance Monitoring Settings Office Word cloud computing Deep Learning Shortcut Managed Service Smartphones Customer Service iPhone Meetings Black Market Visible Light Communication Computing Infrastructure Microchip Automobile Network Congestion Gaming Console Phone System Uninterrupted Power Supply Regulation outsource cloud storage PowerPoint Efficiency Analytic Human Resources Storage Avoiding Downtime Google Maps Content Virtual Assistant Banking eWaste Computer Repair Miscellaneous IT Plan Windows XP Security Cameras Document Management Websites Time Management Proxy Server Access Control Upload Technology Cooperation Wireless Technology Software as a Service Vendor Microsoft Excel Pain Points Conferencing 3D Printing User Error Business Metrics Google Calendar Multi-factor Authentication Bluetooth Help Desk Entertainment Sync Printer Cost Machine Learning DDoS Computer Care Vendor Management Emergency Office Tips Update Touchscreen Legal Capital Fiber-Optic Remote Computing Small Business SaaS

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150