Seekom takes security seriously: From phishing simulations to IT health checks

Is online security front of mind in your accommodation business? The consequences of a security breach can be major and include financial loss, reputational damage and losing the trust of your customers.

 

Seekom takes security seriously: From phishing simulations to IT health checks

At Seekom, we believe security is paramount and have recently taken some extra steps to keep both our systems and our customers safe in the face of cyber threats. Measures include regular security scans by external experts to maintain compliance with Payment Card Industry (PCI) requirements and random phishing exercises with staff to ensure they don't fall prey to someone wanting to hack our systems.

To make doubly sure that our online defences are watertight we also engage independent experts to run IT Security Health Checks of our systems and web services each quarter.

External security scans ensure PCI compliance

Seekom conducts regular external security scans to check our compliance with PCI standards, which provide a strong framework for protecting customer payment data and are critical for any business that handles credit card information

Our security scans, performed by independent external providers, assess our entire system to identify potential vulnerabilities and make sure we meet the strict security requirements established by the PCI Security Standards Council. These scans involve testing firewalls, encryption protocols, access controls, and ensuring sensitive data is stored and transmitted securely, among other things.

Random phishing exercises raise awareness of cyber attacks

One of the most common methods hackers use to infiltrate businesses is known as ‘phishing’, where cyber hackers attempt to deceive employees into revealing sensitive information, such as passwords or financial data, by posing as legitimate entities.

The weakest link in a security chain can often be human error, which is why we’ve incorporated random phishing exercises into our security protocol. These exercises simulate real phishing attempts, testing our staff’s ability to recognise and respond to suspicious emails or messages. By doing this we create a security-conscious working environment where our team remains vigilant and on alert to detect fraudulent behaviour.

Quarterly IT Security Health Checks safeguard our systems

Seekom undertakes quarterly external IT Security Health Checks of our systems and web services. These health checks provide a comprehensive evaluation of our IT infrastructure and identify any potential vulnerabilities. By conducting regular checks we proactively ensure our systems remain robust and resilient in the face of new and emerging threats and maintain a strong line of defence.

At Seekom we’re proud to be ‘walking the talk’ when it comes to online security. We do our utmost to make sure we’ve got your back with solid cyber defences so you can have peace of mind as you go about your business.

The measures outlined above are recent additions to our security efforts, but they aren’t the only steps we take. Other steps to safer online security that we’ve blogged about include introducing stronger passwords and multi-factor authentication, as well as implementing security updates in many of the version upgrades we release for our Seekom system. We’ve also published advice about how to stay scam savvy – it’s worth a read if you want to keep your online guard up.

Recent Blog Post

Smarts to help you operate more effectively and efficiently. From guides of our systems and integrations to tips and tricks you can use every day - we've got you covered.

Seekom blog on data security

Keeping data secure: playing it safe online is a team effort

Keeping data secure: playing it safe online is a team effort Keeping sensitive data and systems safe is crucial for businesses seeking to survive and thrive online – including the accommodation industry. Whilst Seekom’s suite of security solutions provide top-of-the-line security, it’s key to know that online security is a team effort as a chain is only as strong as […]