Like the long shutter times required for old photographs, a payment transaction at a hotel can remain exposed for a while, creating a distinct fraud risk that's not often found at other merchants.
"It's based on the way they hold data," said Tony Ashe, managing director of NXSystems, a security technology company, explaining that cards are used to check in, then accumulate other charges during the course of a stay. NXSystems is advocating tokenization and increased automation of data handling as a strategy to combat the fraud that results from this practice.
"And a lot of hotels are booked online or over the phone with a card number. It's a risky play to give that data over the phone or keystroke it in," Ashe said. "And that data is being held onto for a long time, and many hotels aren't PCI compliant."
Many of the major data breaches reported over the past couple of years involved hotels and hotel chains. The
Hotels are an appealing target for fraudsters because of the size of the market—the industry is very large, expecting to generate nearly
"There's a paper trail, and often a hotel location will have a clipboard of paper with credit card information that's sitting on a manager's desk," Ashe said, adding these clipboards are sometimes used to authorize charges for corporate guests. "There are many points of vulnerability for card information, with relatively low-wage employees handling information, along with cyberattacks."
The travel industry overall suffers higher chargeback rates than many other sectors, earning it a high-risk designation, said Rick Oglesby, a senior analyst and consultant for Double Diamond Group.
"In addition to breach risk, travel firms often engage in transactions that are paid in advance of service delivery, which increases the risk of fraud, disputes and chargebacks," Oglesby said.
On the back end, hotels rely heavily on card-on-file transactions, which are charged to cards that are not present at the point of purchase, Oglesby said. "There is also a high concentration of cross-border payments and intermediated payments, all of which elevate the risk profile of the merchant."
Antiquated systems create added vulnerability. Writing in PaymentsSource in March,
Tokenization replaces card account numbers with a false equivalent that can't be used to create a counterfeit card. While that wouldn't address the "clipboard" problem, automating bookkeeping and adding tokenization through a bundled product that can access corporate card accounts would provide a greater shield for card data, Ashe said.
Hotels and other travel sectors will continue to be a relatively high risk category regardless of the EMV migration and despite tokenization efforts, Oglesby said.
"But EMV and tokenization will be a key part of a solution that combines global acceptance, payment facilitation, card-on-file management, encryption, tokenization and other features," Oglesby said. "It's also a clear example of how payment solutions are becoming increasingly vertical-centric and why a payment terminal on a desk really doesn't cut it anymore."