Study shows hotels' Internet connections unsafe

Oct 01, 2008 By George Lowery

(PhysOrg.com) -- Travelers who use a hotel's Internet network risk the possibility of data theft, concludes a new study from Cornell's School of Hotel Administration.

The analysis of the networks in 46 hotels and a survey of 147 U.S. hotels found that a majority of the hotels do not use all available tools to maintain network security.

For example, about 20 percent of the hotels surveyed still use simple hub-type systems, which are most vulnerable to hacking. The findings of the firsthand analysis of 46 hotels were no more encouraging.

"Even with hotels that required authentication, I found helpful employees who got me past that barrier," said Josh Ogle '08, a Cornell Hotel School graduate, president of TriVesta LLC. and a co-author of the study. "So, authentication is not as effective as we think, and then I found that of the 39 hotels that offered WiFi connections, only six used encryption to help protect the system."

Added co-author Erica L. Wagner, assistant professor of information systems at the Hotel School: "On balance, we were forced to conclude that guests' data transmissions are often at risk when they use a hotel's network. However, we did find hotels that were paying attention to the security of their guests' data. I should point out that improving security does not have to be costly."

The report concludes with a case study of the W Dallas - Victory Hotel, which has taken a security step not used by most hotels. "What the W Dallas has done is to set up each node on its network as a virtual local area network, or VLAN," explained co-author Mark P. Talbert, a Hotel School senior lecturer in information systems. "By using these VLANs, the hotel has separated each guest's computer in a way that should protect against stolen data. It also gives the hotel greater control over the guest side of the network."

Provided by Cornell University

Explore further: Millions without mobile phone service in Argentina

add to favorites email to friend print save as pdf

Related Stories

Granular model explains unusual behavior in sand

Nov 17, 2014

From a mechanical perspective, granular materials are stuck between a rock and a fluid place, with behavior resembling neither a solid nor a liquid. Think of sand through an hourglass: As grains funnel through, ...

Microsoft rolls out Skype for web browsers

Nov 14, 2014

Microsoft on Friday released a test version of Skype that lets people make Internet calls from web browsers, eliminating the need to install special applications.

Hackers target CEOs in 'Darkhotel' scheme

Nov 10, 2014

Hackers have developed a scheme to steal sensitive information from top executives by penetrating the Wi-Fi networks of luxury hotels, security researchers said Monday.

High-intensity sound waves may aid regenerative medicine

Oct 30, 2014

Researchers at the University of Washington have developed a way to use sound to create cellular scaffolding for tissue engineering, a unique approach that could help overcome one of regenerative medicine's ...

Recommended for you

Amputee puts limb system through its paces

1 hour ago

"Amputee Makes History with APL's Modular Prosthetic Limb" is the headline from Johns Hopkins Applied Physics Laboratory, where a team working on prosthetics observed a milestone when a double amputee showed ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.