Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

Late in November, Marriott hotels admitted that they had their Starwood reservation database hacked into. The hotel chain said that an entity had unauthorized access for the better part of the past four years. The leak was found to expose names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised. It is now the second-largest data breach in world history. The only breach that was larger, was Yahoo, which exposed the personal information of about three billion users.

What can you do?
If you are sure that your name is among this massive list of people, you should take the following steps immediately:

  • Change Your Password - All Marriott guests should change their passwords immediately and pick usernames and passwords that aren’t easily guessed. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should keep an eye on your Starwood Preferred Guest account as well as your credit report. You can sign up for credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is pointless.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but keeping a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their grubby little hands on it.

If you would like more information about these data breaches, how to secure yourself, and what to do when your information gets compromised, return to our blog regularly for more useful information.

Have you been hacked or had your identity stolen? Leave your experience with us in the comments section below.

See a Major Communications Boost Cloud-Hosted VoIP
Tip of the Week: How to Get Production Out of Your...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, March 22, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

today ’s organizations CrashOverride Save Money Sports Vendor Mangement Administration computer support firms IT consulting company malware worms Download Cloud computing Staten Island Network Productivity Screen Reader Tech Retail Hacker Telephone Systems Apps Staten Island IT support Data Google Drive Data Analysis Security Cameras Work/Life Balance Mobile Technology Android Tech Terms Windows Apple Law Enforcement Two-factor Authentication Solid State Drive Regulations Hard Drive Nanotechnology Bandwidth Television Automation Password Employer-Employee Relationship Service Level Agreement Productivity Telephone managed IT services NYC Social Media managed services Windows 10 Proxy Server Settings Tech Support Desktop Excel Blockchain Microsoft Office computer services Content Saving Time HTML Mouse Touchscreen Phishing Employer Employee Relationship computer support Database Entertainment Social Network Writing Computing Security Politics Company Culture Network Management Laptop Scam IT consulting firm Business Management Access Control Running Cable File Sharing CCTV Collaboration Microsoft Virtual Reality Web Server Data Breach Specifications IT services New York City Regulation malware Hard disk History Health IT Data Management Integration Audit Mobile Security IT Support BDR Printing Vendor Management Bitcoin data recovery Staten Island computer repair WiFi Augmented Reality ransomware attacks Tablets Hard Drive Disposal Hardware Google Wallet Going Green Microsoft Excel Cost Management News Privacy Uninterrupted Power Supply Bluetooth Emails Administrator Computing Infrastructure Startup IT support NYC Staten Island computer support IT consulting Staten island Malware Workstations Multi-factor Authentication VoIP Legal datto Operating System Worker Best Practices Business Metrics IT Management tech support Staten Island Information Term Computer Tactics Ransomware Applications Flash Office 365 YouTube Motion Sickness Flexibility Vulnerabilities Displays Processors Digital Payment Microchip Big Data G Suite Browser Hosted Solution VoIP data loss Cloud Computing IT Services Managed IT Services Unified Threat Management Powerful Technology Solutions Telephone System Disaster Recovery LiFi computer repair Staten Island Medical IT Tip of the Week Hardware Solutions User Tips computer support NYC Congratulations iPhone Fake News Wi-Fi Router Software as a Service Network Congestion IT consulting firms Compliance Virtual Desktop Networking Healthcare Virus Quick Tips Scalability How To Best Practice Accountants IT support New York City Spyware Office Tips IT services Staten Island Public Cloud Thank You Bring Your Own Device Proactive IT Error Data Protection IT consulting NYC Downloads Outsourced IT Knowledge Computers Saving Money Safety Cooperation Content Filtering Upgrade Management Distributed Denial of Service Server Small Business Webcam Spam Website Cloud Virtual Assistant Efficiency Cybercrime Workers SaaS Comparison Artificial Intelligence Tracking staten island managed services Email Business Emergency VPN Staten Island tech support IT consulting Staten Island Data Security Redundancy Rental Service Microsoft 365 Technology In Internet of Things Cortana Encryption Language Travel Managed IT Managed Service Provider Telephony Society managed services Staten Island Google Play Solutions Communication Software Computer Malfunction Trends managed it services Word tech support Outlook Information Technology Identity Theft Remote Computing Cleaning Social Engineering Antivirus Websites Internet of Things Firewall Evernote Remote Monitoring Corporate Profile Botnet Monitoring Taxes Accidental deletion Wireless Technology 3D Printing IT services NYC SSID The Internet of Things Software License Vendor Banking Staffing Windows 7 Hacks Paperless Office Printer Monitors Devices IT support firms Experience Tablet Health Chromebook BYOD Piracy Lenovo Recovery Document Management Patch Management Gmail Users Google Calendar Data Backup Machine Learning Unified Communications Facebook Office DDoS Maintenance Smartphones Backup Securty Gamification Professional Services Equifax Text Messaging computer services Staten Island Network Security IT support Hack Workplace Tips Alert Miscellaneous Business Mangement Staten Island IT consulting Social Streaming Media Lithium-ion battery Time Management Mobile Device Business Computing Disaster Start Menu computer support Staten Island Printers Black Market eWaste Innovation Education Upload IT support Staten Island CryptoLocker tech support Staten Isalnd Managed IT Services Relocation Hosted Solutions Holiday communications Hiring/Firing Smartphone Conferencing Analytics Downtime Automobile Cybersecurity Mobile Device Management Domains Data storage Notifications Wireless Addiction Multi-Factor Security Directions Digital User Tip Cache Username App Project Management Budget Samsung Freedom of Information Device security IT consulting Update Cabling Managed Service Search Tech Term Business Technology Advertising Google Maps it support Meetings Physical Security Modem Hacking Access Hackers Government Business Cards Navigation PowerPoint Google Passwords Documents Windows 10 End of Support Legislation Mobility Laptops Fileless Malware Processor Business Continuity Windows 8 Computer Care Tip of the week PDF Managing Stress Memory end-user files email scam Customer Resource management SharePoint Reliable Computing Windows XP Visible Light Communication Mobile Devices Backup and Disaster Recovery Robot Internet Twitter Music Unified Threat Management Money Private Cloud Gadgets Drones Business Growth Supercomputer Vulnerability Browsers IBM Cryptocurrency Help Desk Voice over Internet Protocol Deep Learning Bookmark Electronic Medical Records IT support Staten Islans Google Docs Customer Service managed IT services staten island Wireless Headphones IT Consultant Training Virtualization data recovery

Newsletter Sign Up