About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

  • Register

Prosper Solutions Blog

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

Late in November, Marriott hotels admitted that they had their Starwood reservation database hacked into. The hotel chain said that an entity had unauthorized access for the better part of the past four years. The leak was found to expose names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised. It is now the second-largest data breach in world history. The only breach that was larger, was Yahoo, which exposed the personal information of about three billion users.

What can you do?
If you are sure that your name is among this massive list of people, you should take the following steps immediately:

  • Change Your Password - All Marriott guests should change their passwords immediately and pick usernames and passwords that aren’t easily guessed. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should keep an eye on your Starwood Preferred Guest account as well as your credit report. You can sign up for credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is pointless.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but keeping a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their grubby little hands on it.

If you would like more information about these data breaches, how to secure yourself, and what to do when your information gets compromised, return to our blog regularly for more useful information.

Have you been hacked or had your identity stolen? Leave your experience with us in the comments section below.

See a Major Communications Boost Cloud-Hosted VoIP
Tip of the Week: How to Get Production Out of Your...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Two-factor Authentication Memory IT Support Outlook Networking Email Laptop Mobile Security Hard Drive Disposal Excel Social Network Going Green Windows 10 Employer Employee Relationship IP Address Gamification Managed IT Services BYOD Information Technology iPhone Password Regulation Black Market Gaming Console cyber security Capital IT Management Tip of the Week Windows 7 Health SaaS eWaste SSID Innovation Business Computing Supercomputer Device security Licensing Processors switches Risk Management Operating System In Internet of Things hardware LiFi Language Pain Points outsource cloud storage Hard Drive Specifications Saving Time BDR Privacy Hackers Securty Malware Website Remote Monitoring Vendor Management Data Loss Database Television Inbound Marketing Law Enforcement Telephone Systems Social Media Augmented Reality Micrsooft VPN Project Management Google Docs Botnet Data Windows 8 Paperless Office CIO Emails Downloads Flexibility Nanotechnology CrashOverride Tech Terms Scam Lithium-ion battery Processing Facebook Download Public Cloud Encryption Productuvuty Electricity Cryptocurrency Read Teamwork Google Play communications Vendor Help Desk Google Calendar Browsers Data Backup Books Programming Office Tips Fiber-Optic Bitcoin Save Money Data Security Skype Social Engineering Workers Computer Repair Productivity Tracking outsource cloud computing Printing SharePoint Reliable Computing Cybersecurity Unified Communications Visible Light Communication Phone System Antivirus Avoiding Downtime Bookmark Net Neutrality IT service Emergency Windows XP WiFi Distributed Denial of Service Customer Resource management Internet of Things Disaster Communication Freedom of Information Running Cable Tech Term Education Flash Access Microchip IT Relocation Fake News Spyware Advertising Health IT Shortcut Computing Conferencing Best Available Hack Chrome Google Safety Office Google Drive Wireless Headphones Analytics Windows Data Protection Permissions Outsourced IT Collaboration Deep Learning Web Server Citrix Xenapp uptime IT Consultant Redundancy Smartphone Windows Server 2008 Statistics Tech Work/Life Balance Scalability Time Management Cortana Heating/Cooling Processor Storage Printer Sync Bata Backup Wi-Fi Notifications Public Speaking User Distribution clout services UTM Hard Drives Managed Service Provider Gadgets Uninterrupted Power Supply Apps Computer Malfunction Technology Tips Patch Management Connected Devices Mouse IT Services Upload Downtime Digital Telephone System Bandwidth Settings Identity Theft Thank You Proactive IT Virtual Reality Upgrade Business Owner Intranet Miscellaneous Value Digital Payment Physical Security email scam Retail Content Filtering Electronic Medical Records Trending Experience Spam Accountants HTML Blockchain Business Continuity Data Warehousing Legislation Customer Relationship Management PDF Customer Service Touchscreen Cost Update Consultation Messenger Patching WannaCry VoIP Network Congestion Printers Mobile Device Management Virus Smartphones Managed IT services Term Chromebook Troubleshooting Search Enterprise Resource Planning Data Recovery Entertainment Wireless Saving Money Solid State Drive How To Private Cloud Network Twitter Hacker Automation YouTube Hiring/Firing Presentation Corporate Profile Audit Compliance Mobile Computing Monitoring Monitors cloud computing Internet Computer Business Mobile Payment File Sharing Office 365 Government Screen Reader GDPR Dark Web Network Management Equifax Content Upgrades Writing Efficiency User Tip USB Webcam Alert Managed IT cloud Congratulations Remote Computing Small Business PowerPoint Bring Your Own Device Company Culture Phishing Mobility Machine Learning Rental Service Business Cards Computer Accessories Managed Service Software as a Service Product Reviews DDoS Maintenance Cleaning Mobile Technology MSP IT consulting Ransomware Cabling Motion Sickness Disaster Recovery Employer-Employee Relationship Administration Sports Managed IT Service Robot Holiday Devices Mobile Devices User Tips Quick Tips Mobile Device Windows 10 Big data Documents Social Multi-Factor Security Managing Stress Co-Managed IT Tablets Data Management Data storage Computers Business Mangement Save Time News Administrator Domains Information Banking Travel Security Security Cameras Fileless Malware Best Practice Environment Evernote Users Directions Business Intelligence History Computer Care Productivity Displays Start Menu IT Support Meetings Computing Infrastructure Asset Tracking G Suite Best Practices Vendor Mangement User Error Business Technology Regulations HIPAA Fleet Tracking Worker IT Plan Router Gmail Access Control Data Breach Comparison Tip of the week Document Management Technology Business Growth Current Events Tech Support Electronic Payment Username Unified Threat Management Assessment Google Maps Vulnerabilities Hosted Solutions Music Management Proxy Server Politics Vulnerability Unified Threat Management Android Browser IBM Hosted Solution Marketing Finance Word Cost Management Tactics Wireless Technology Apple Business Metrics Telephony Desktop Google Wallet Recovery Server A.I. Taxes Modem Staffing Telephone Samsung Windows10 Software License cloud storage Microsoft Excel Artificial Intelligence Knowledge Cache Microsoft Service Level Agreement Human Resources Competition Hacking Migration Navigation Digital Signature Bluetooth Automobile Piracy Healthcare Passwords Trends Error Tablet Entrepreneur Data Analysis Streaming Media Hacks Society Virtual Assistant Websites Workplace Tips Firewall Fraud CCTV VoIP Text Messaging 3D Printing Application Reading App Keyboard Backup Backup and Disaster Recovery Drones Startup the Internet of Things Analytic Training Money Addiction Virtual Desktop Social Networking Multi-factor Authentication Smart Tech Virtualization End of Support Microsoft Office Network Security Applications Software Legal Budget Cybercrime Business Management

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150