Back

It is reported that a division of Marriotts International - Starwood - has been compromised possibly since 2014. 500 million records covering guests staying at W Hotels, Sheraton, Le Meridian and Four Points by Sheraton are known to have been compromised. Compromised data appears to cover name, address information, email address, date of Birth, gender and passport information.

Another week, and another data breach....this time a whopping 500 million personal data records of clients staying at some popular Sheraton International Hotels have been compromised.


Internal investigations at Sheraton have found that attackers have been able to access the Starwood Reservation Database since 2014, and that highly personal information may have been downloaded that will include all personal name, addresses, email addresses, passport, gender and details of the hotel stay.

If you stayed at any of the Hotels covered by this database - W Hotels, Sheraton, Le Meridian and Four Points by Sheraton - then you should be involved and concerned that your personal data is now on the dark web.  Marriott are already emailing people who they think are affected, but it assumes that they have your current email address.

Our advice is to do a search of your emails to see if you did stay at any of these locations since 2014, and if so, assume that your information is now being traded.

The ICO (Information Commissioners Office) are investigating, and potentially there will be significant fines involved because of GDPR.  

Marriotts have offered a free 12 month subscription to Webwatcher - an internet tracking system to spot unauthorised use of your personal details - so sign up for free (even if you are not completely sure that you are a Marriotts customer, but may have been)

Enroll on this web site - https://answers.kroll.co.uk/

Marriots also are providing a dedicated call centre as well where you can check to see if you might be involved

Email: uksupport@kroll.com 
Phone: 0808-189-1065

As with all hacks, once the data has gone, it is important to consider the potential uses - keep an eye on your credit cards, bank accounts and other transactions like finance applications that could be being put in your name by cyber criminals to commit fraud.  Do not ignore any communications for credit agreements that you know nothing about.  

One way of protecting yourself is to use a secure password and identity manager - there are a number around like "Dashlane" which assist in managing different complex passwords for all your internet sites, and the ability to change them quickly in the event of a hack.

Marriott appear to have taken the right steps to deal with this event under GDPR, but that will not protect them from a potentially eyewatering fine, it will be higher because gender information was involved, but more importantly, damage to the Marriott brand will be significant because people will not trust them to handle their personal information securely.

If you have any concerns or want to check that your IT systems are cybersecure, please speak to one of our professionals at CIS Ltd.  email sales@cisltd.com

Get in Touch

Client Feedback

“We are delighted to be working with CIS, the project is already looking well organised and innovative. CIS delivers a prompt professional service with trusted knowledge we can rely on at all times.”

John Story, Head of IT

St Paul's Cathedral

“CIS have been our go-to IT supplier for nearly 20 years, and throughout that time they have been flexible, consultative, and above all putting our business at the forefront of their advice. I would be very pleased to recommend them for any company that needs to have a real partnership with their IT company.”

Graham Hughes, Managing Director

Rovema UK Ltd

Previous
Next

Keep Up To Date

close

CIS Overview

Cloud

Cloud

  • CIS Private Cloud
  • Infrastructure as a Service
  • Backup & Disaster Recovery
  • Remote Desktop Services
Security

Security

  • Anti-Virus & Ransomware
  • Extensive Encryption
  • Firewall & Next-Gen UTM
  • Penetration Testing
  • Digital Rights Management
  • Phishing
  • Mobile Device Management
Communications

Communications

  • Exchange Server Hosted & On Prem 
  • Mail365
  • Unified Communications
  • Office 365
  • Mobile & VoIP Telephony
  • Internet Connectivity
Support

Support

  • Consultancy
  • Analysis & Audit Services
  • User Training & Enablement
  • Fully Managed Support
People

People

Since its inception in 1989 CIS' philosophy has always been the same. We believe that in order for our team mates to provide the best possible service to our clients and to remain motivated and inspired themselves, we have to create a positive and stimulating working environment. One that encourages ambition, a continued exchange of ideas and dialogue, hard work, performance and loyalty. We have always rewarded our staff for going the extra mile and for embracing our company ethos but we also aim to make their working experience enjoyable and fun, working on the basis that humour can go a long way and fairness and respect are paramount.

Portfolio

Portfolio

Even though we say this ourselves, our portfolio is first class. We offer a range and quality of Cloud Services that can cater for all our customers' business goals and aspirations. It's our job to find the perfect solution for your requirements and you'll benefit from the research and development carried out by our team to find the ideal system solutions for you.

Partners

Partners

Partners are vital to the ongoing success of our company so we nurture our award-winning network of like-minded organisations, building up mutual trust and respect in our working practices that can only benefit our customers.

Productivity

Productivity

It has always been of key importance to CIS to achieve high levels of productivity and to ensure that we remain s highly effective, lean and fast-moving organisation. It allows us to keep ahead of the game and to spot and act upon new products and trends whenever possible. By keeping on our toes, we can pass on benefits to our clients and partners without the need for time consuming learning curves.