Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

Late in November, Marriott hotels admitted that they had their Starwood reservation database hacked into. The hotel chain said that an entity had unauthorized access for the better part of the past four years. The leak was found to expose names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised. It is now the second-largest data breach in world history. The only breach that was larger, was Yahoo, which exposed the personal information of about three billion users.

What can you do?
If you are sure that your name is among this massive list of people, you should take the following steps immediately:

  • Change Your Password - All Marriott guests should change their passwords immediately and pick usernames and passwords that aren’t easily guessed. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should keep an eye on your Starwood Preferred Guest account as well as your credit report. You can sign up for credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is pointless.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but keeping a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their grubby little hands on it.

If you would like more information about these data breaches, how to secure yourself, and what to do when your information gets compromised, return to our blog regularly for more useful information.

Have you been hacked or had your identity stolen? Leave your experience with us in the comments section below.

See a Major Communications Boost Cloud-Hosted VoIP
Tip of the Week: How to Get Production Out of Your...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

3D Printing Specifications Mobile Computing Vendor Management Artificial Intelligence Device security Tip of the Week Windows 8 User Tip Directions Computer Malfunction Hack Technology Start Menu A.I. Office Professional Services Gadgets Bookmark Printing Patch Management Conferencing hardware IT consulting Flexibility Public Speaking Business Management Hard Drives Logistics HTML Accountants DDoS Value Web Server Proxy Server Enterprise Resource Planning IT service WannaCry VoIP Messenger Chrome Social Engineering Visible Light Communication IT Support Productivity Save Time Addiction Electronic Payment Business Growth Cybercrime Physical Security Comparison Shortcut Deep Learning Spam Phishing Browser Licensing Computing Infrastructure Mobile Device Management Data storage Startup Information Entertainment Content Wi-Fi Alert Processors Holiday Evernote Retail Congratulations Email Employer-Employee Relationship Blockchain Apple Administrator Staffing Telephony Managed IT services VoIP iPhone Sync Law Enforcement Tech Support Solid State Drive Electronic Medical Records User Error Cooperation Human Resources eWaste Monitors Knowledge Advertising Access Digital Hosted Solutions Society Business Metrics SharePoint Automation Social Media Troubleshooting Cost Internet of Things Data Protection Augmented Reality Tech Terms Downloads Saving Time Laptop Backup and Disaster Recovery communications Tip of the week Cabling Hacks Settings email scam Migration Networking Vulnerability Recovery Android Documents Touchscreen Information Technology Regulation Read Memory Legal IT Management Capital Telephone Cost Management History Backup Displays Health IT Network Congestion Connected Devices Television Hackers Managing Stress uptime Help Desk Patching cloud storage cyber security Trends Saving Money Update Unified Communications Equifax Google Black Market Programming Microchip Entrepreneur Analytic User Tips Company Culture Remote Computing SaaS Private Cloud Windows Data Backup Telephone System Streaming Media Supercomputer Books Firewall Citrix Xenapp Net Neutrality Screen Reader Identity Theft BYOD Internet HIPAA Network Security Windows 10 Managed IT Service Fraud Business Owner Document Management Integration Tablets Computing Experience Small Business Security Going Green Computer Repair Data Loss Managed IT Services Printer Mobility Big data Hard Drive Disposal Software as a Service Virtual Assistant Tracking Medical IT Mobile Technology YouTube Current Events IT Support Content Filtering Gamification Banking Business Computing Heating/Cooling Vendor Windows XP Pain Points Innovation Modem Rental Service Proactive IT Efficiency Fileless Malware Word Robot Google Play Mouse Meetings Security Cameras USB Upload Webcam Machine Learning Network Management Ransomware Chamber Microsoft Excel Multi-Factor Security Technology Tips Health Electricity Search Collaboration Money Vulnerabilities Language Smartphones Applications Intranet Wireless Technology Mobile Payment Navigation Paperless Office Microsoft Uninterrupted Power Supply Computers Cryptocurrency Server Business Windows 7 CIO Keyboard Tech Term cloud the Internet of Things IT Consultant Scam Virtualization BDR Finance Marketing Cortana Software License Best Available Inbound Marketing End of Support Chromebook Customer Resource management Product Reviews Twitter Error outsource cloud computing Productuvuty WiFi Legislation Healthcare Avoiding Downtime Consultation Micrsooft Safety Tablet Managed IT Operating System Tech Skype Access Control How To Statistics Google Wallet Excel Customer Service clout services IBM Project Management Bandwidth Printers Processing Samsung VPN Antivirus Motion Sickness Mobile Device Education Business Mangement Hacking Writing Unified Threat Management Miscellaneous Travel CCTV Quick Tips outsource cloud storage Upgrades Outlook Mobile Security Download Worker Wireless Headphones Wireless Thank You Smartphone Hiring/Firing Business Technology Telephone Systems Politics Virtual Desktop Multi-factor Authentication Disaster IT Plan GDPR Lithium-ion battery Windows 10 Nanotechnology Malware Data Analysis Music Hard Drive Regulations Best Practices Asset Tracking File Sharing Microsoft Office Public Cloud Monitoring Securty Desktop Upgrade Computer Accessories Text Messaging Redundancy Website Piracy Password In Internet of Things Social Network Management Application Taxes SSID Running Cable cloud computing Remote Monitoring News Flash Virtual Reality Maintenance Digital Payment Hosted Solution Cache Business Continuity Phone System Encryption Google Drive Hacker Trending Save Money Websites Router Time Management Emergency Spyware Managed Service Provider Data Security Social Data Recovery Distribution Risk Management Freedom of Information CrashOverride Relocation Business Cards Windows Server 2008 Network Office 365 Users Work/Life Balance Software Computer Care Fiber-Optic Domains Best Practice Vendor Mangement Username UTM Fake News IT Cybersecurity Google Calendar Employer Employee Relationship Business Intelligence Scalability Bitcoin Gmail PDF Computer Competition Compliance Customer Relationship Management Bring Your Own Device User Permissions Reliable Computing Database Cleaning Data Management Training Emails Disaster Recovery Notifications switches Outsourced IT Teamwork Automobile Communication Environment Government Google Docs Administration IP Address Botnet PowerPoint Privacy Storage Voice over Internet Protocol Workers Social Networking Office Tips Browsers Solutions Bata Backup Bluetooth Fleet Tracking Apps Presentation Sports Downtime Mobile Devices Devices IT Services G Suite Distributed Denial of Service Data Gaming Console Budget Co-Managed IT Corporate Profile Data Breach Drones Two-factor Authentication Facebook Analytics Unified Threat Management Processor Data Warehousing Google Maps Passwords Term Tactics LiFi Productivity Dark Web Assessment Audit App Reading Service Level Agreement Workplace Tips Digital Signature Managed Service Rapid City Windows10 Virus Smart Tech MSP Microsoft 365

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150