Omni Hotels Customer Data Breach Discovered

July 13, 2016 Liz Salkin

On July 8th, Omni Hotels & Resorts announced that customers’ information was in danger due to a data breach on several point-of-sale systems. The hotel chain discovered that hackers breached its system and installed malicious software, gaining access to guests’ credit card and personal information.

The company stated that it discovered the breach on May 30th and has since been actively engaged with IT and security firms to investigate and detect the facts associated with the attack. According to Omni, customers’ names, card numbers, expiration dates and security codes were likely compromised during the breach. No other personal information was affected at this time.

It’s advised that guests of Omni who used a physical card at the point of sale monitor their personal information and credit card statements closely in the upcoming months. Omni has posted information and resources that you can use to help with this. To protect credit card data and personal information in the future, worried travelers should update account passwords to make them more secure and harder-to-hack. It is also a good idea to use a different password for each account.  

As a traveler, your personal information and protection is what matters most. Unfortunately, companies are no strangers to data breaches in our growing technological world. Taking a few extra moments to protect yourself while paying could help to safeguard your information in the future. 

Previous Article
Travel and Transport Announces Launch of Big Data Company
Travel and Transport Announces Launch of Big Data Company

Travel and Transport, Inc. has launched a big data solution company known as Data Visualization Intelligenc...

Next Article
Your guide to GBTA Convention 2016!
Your guide to GBTA Convention 2016!

Going to GBTA Convention 2016? Here's what you need to know.

Travelers: Get Dash Mobile for iOS and Android.

Learn More
×

Enjoying this content? Subscribe to our Travel Insight & Analysis newsletter!

First Name
Last Name
Success!
Error - something went wrong!