About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

Late in November, Marriott hotels admitted that they had their Starwood reservation database hacked into. The hotel chain said that an entity had unauthorized access for the better part of the past four years. The leak was found to expose names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised. It is now the second-largest data breach in world history. The only breach that was larger, was Yahoo, which exposed the personal information of about three billion users.

What can you do?
If you are sure that your name is among this massive list of people, you should take the following steps immediately:

  • Change Your Password - All Marriott guests should change their passwords immediately and pick usernames and passwords that aren’t easily guessed. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should keep an eye on your Starwood Preferred Guest account as well as your credit report. You can sign up for credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is pointless.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but keeping a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their grubby little hands on it.

If you would like more information about these data breaches, how to secure yourself, and what to do when your information gets compromised, return to our blog regularly for more useful information.

Have you been hacked or had your identity stolen? Leave your experience with us in the comments section below.

See a Major Communications Boost Cloud-Hosted VoIP
Tip of the Week: How to Get Production Out of Your...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

cloud storage Mobile Security Read SaaS Mobile Device Management Migration Deep Learning DDoS Windows Data Security Hack Current Events Website Google Calendar Managing Stress Phishing CrashOverride Electricity Wireless Black Market Reliable Computing Virtual Assistant Managed Service Provider User Tips Permissions Communication Social Networking Society Accountants Botnet Maintenance Tactics IT Services Displays User Error Administration IT Identity Theft Remote Monitoring Cache Documents Finance Business Intelligence outsource cloud computing Comparison Websites Cost Retail Mobile Technology Recovery Tip of the Week Assessment Hard Drives PDF Data Protection Laptop outsource cloud storage Mobility Marketing Connected Devices Sync Writing Business Technology Best Practice Money Cybersecurity Business Computing Project Management Windows 10 Private Cloud Drones Android Lithium-ion battery Fraud Budget Streaming Media email scam Co-Managed IT How To Flexibility 3D Printing End of Support Privacy Best Practices Experience Chrome Term Visible Light Communication Health Telephone Data Document Management Books Statistics Rental Service Workplace Tips Customer Resource management Bring Your Own Device Server Save Time Saving Time Hard Drive Disposal Unified Threat Management Social Media Spyware Productivity Device security Staffing Microsoft Excel Conferencing Devices Freedom of Information Tech Terms Company Culture Enterprise Resource Planning Excel Gamification Monitors Miscellaneous Smartphones Google Maps Audit Alert Outlook Social Engineering Digital Payment Regulations Pain Points Computer Repair Backup and Disaster Recovery Disaster Recovery Meetings Electronic Payment Network Management Vendor Management IT Consultant Touchscreen Entrepreneur Data Loss Hard Drive IT Plan Productivity cloud computing Cortana Law Enforcement Fleet Tracking Browser IP Address Consultation Citrix Xenapp Data Analysis Automation Safety Vulnerabilities Collaboration Update Risk Management CCTV Email Network Printer Customer Service Access Word Outsourced IT Startup Google Docs Digital Technology Printing Emails Computer Accessories IT Support Software Running Cable Shortcut Thank You Unified Communications Proxy Server Screen Reader Bluetooth Mobile Devices Health IT Best Available Downtime Hacks Skype Public Speaking Data Warehousing A.I. Paperless Office Downloads Office Entertainment Augmented Reality Mobile Payment Physical Security Business Metrics Language YouTube IT service Regulation Analytic User Security Cameras Processor Apps Tech Term HIPAA VoIP Piracy Google Drive Cost Management Office 365 Supercomputer Memory switches Microsoft Office Monitoring Network Congestion Knowledge Passwords Hosted Solutions Efficiency WannaCry Wireless Headphones News Webcam Search Multi-Factor Security Windows XP Management Travel Wireless Technology Information User Tip Congratulations IT consulting Customer Relationship Management Storage Tech Support Managed IT Service Virus Multi-factor Authentication Router Heating/Cooling Solid State Drive cyber security Business Owner HTML Network Security Proactive IT Business Mangement Mobile Computing Dark Web Start Menu Tablet Bandwidth Windows 7 Teamwork Gmail Desktop Presentation Programming Competition Corporate Profile Addiction Applications WiFi Vendor Trending Keyboard Software as a Service Technology Tips Business Continuity Fake News BDR Settings Web Server Virtual Reality Worker Managed IT services Hiring/Firing Securty hardware Remote Computing Gaming Console Access Control Innovation clout services Domains Social Machine Learning Television Computing Infrastructure Distribution Work/Life Balance Cryptocurrency Business Growth Help Desk Education Banking Cleaning Healthcare Content Filtering Processors Micrsooft Employer Employee Relationship Data Management Flash Download Managed IT Relocation Upgrade LiFi Managed IT Services Data Recovery IBM Digital Signature Music Redundancy Motion Sickness Electronic Medical Records Patch Management Phone System Modem Fileless Malware Facebook uptime Scam G Suite Public Cloud Cybercrime Computer Care Vulnerability File Sharing Compliance Reading Uninterrupted Power Supply Employer-Employee Relationship Office Tips Virtualization Internet of Things Backup Data Backup Nanotechnology Computers Windows10 Business Management SSID Inbound Marketing Administrator Value Troubleshooting Wi-Fi Business Robot Product Reviews Big data Vendor Mangement iPhone Taxes Upgrades Quick Tips Computer Malfunction Upload Hacker Business Cards Error Asset Tracking IT Management GDPR Time Management eWaste Sports the Internet of Things Distributed Denial of Service Capital Information Technology Tip of the week Smart Tech Navigation Tablets Emergency Security Productuvuty Managed Service Google Application SharePoint Saving Money Spam Google Play Username USB CIO Cabling Unified Threat Management Holiday Disaster Apple Telephone Systems Directions Hacking Mobile Device Avoiding Downtime Smartphone Printers Internet App Small Business History Human Resources Operating System Intranet Patching Licensing Gadgets Workers Government Malware Bookmark Bata Backup Training Windows 8 UTM Evernote cloud BYOD Windows Server 2008 Processing Windows 10 IT Support Automobile Password Database Artificial Intelligence Telephony Environment Scalability Telephone System Samsung Microsoft VoIP MSP Tech Chromebook VPN Text Messaging Save Money Software License Analytics Fiber-Optic Bitcoin Data Breach Google Wallet Hosted Solution Encryption Microchip Legal Messenger Hackers Twitter Net Neutrality communications Mouse Virtual Desktop Going Green Two-factor Authentication PowerPoint Firewall Tracking Service Level Agreement Blockchain Social Network Antivirus Politics Notifications Users Equifax Computing In Internet of Things Legislation Content Specifications Data storage Networking Browsers Trends Ransomware Computer Advertising

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150