Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical Security

Hackers Don’t Take PTO: Why Travel Season Is Prime Time for Cyberattacks

By Brent Johnson
Man on laptop at airport
Joel Mott via Unsplash
August 14, 2025

When vacationers unwind and employees unplug, cybercriminals clock in for their busiest time of year.

The travel and hospitality industries are a top target for cyberattacks. Booking portals, mobile apps and reservation systems create a sprawling network of public-facing entry points that are difficult to secure. 

In April 2025, cybersecurity researchers identified more than 95,000 vulnerabilities across hospitality platforms, including 14,000 classified as critical. Add that baseline risk with a summer surge in traveler data and fewer staff on duty, and it creates the perfect storm for cyberattacks. 

Don’t let your busiest season become your most vulnerable. Strengthen your security to keep transactions secure, maintain customer trust and safeguard sensitive data.

Hackers Capitalize on Hospitality’s Peak Season

During peak travel season, travelers rush to finalize plans — booking flights, reserving hotel rooms and checking in on the go. 

As a result, more personally identifiable information (PII) — from email addresses to credit card and passport numbers — flows through hospitality platforms during this season than any other point in the year. Much of it is entered quickly, often over unsecured networks and public-facing systems.

At the same time, internal teams are stretched thin by seasonal PTO, leaving fewer people to catch unusual activity or respond to alerts. It’s an ideal scenario for hackers: sensitive data moving through exposed systems, with limited oversight to spot suspicious activity.

Cybercriminals understand these vulnerabilities, and their tactics are rapidly evolving. Many now use generative AI to create convincing phishing emails, fake booking confirmations and even deepfake voicemails impersonating guest services or IT support. 

For example, an attacker might spoof a hotel’s booking confirmation email with a fraudulent link. A guest, eager to confirm details, clicks through and enters their credentials — unknowingly sharing credit card details, upcoming trip data and enough PII to launch follow-up attacks or fraudulent bookings.

Even the most secure platforms aren’t immune to data breaches. In June 2025, a breach exposed more than 16 billion login credentials from tech giants like Apple, Google and Facebook. The scope was historic, and the message clear: If industry leaders with massive security budgets can be compromised, hospitality brands must be even more proactive about securing their sites.

As warmer weather peaks, so does the risk of cyberattacks. Hackers’ tactics are smarter, and the window for detection is smaller. Now is the time to secure your systems before a busy season turns into a security crisis.

4 Ways to Fortify Your Site From Hackers 

With more travelers submitting sensitive data to hospitality sites and fewer staff available to oversee systems, cybercriminals are well positioned to exploit the opportunity.

To stay secure, your site needs layered, preemptive defenses. The following four strategies can help you safeguard customer data, stay PCI compliant and maintain trust from the moment a guest visits your site to the second they check out.

1. Audit Your Infrastructure and Close Gaps

Start with a comprehensive vulnerability assessment across your public-facing systems, from login portals to reservation platforms. Penetration testing by a trusted third party can simulate real-world breach attempts, helping you identify weak spots before attackers do. 

While compliance with PCI DSS 4.0 is critical and represents an important improvement, it should be viewed as a solid foundation rather than a complete solution. True protection requires layered security beyond compliance checkboxes.

At the transaction level, 3D Secure (3DS) adds another layer of defense by authenticating the cardholder in real time through the issuing ban. While PCI 3DS is mandatory in Europe and widely used to verify high-value online transactions, it remains optional in the U.S. Even so, U.S. hospitality brands can benefit from adopting it proactively to prevent unauthorized purchases.

For card-present transactions, adopting PCI-validated Point-to-Point Encryption (P2PE) is the gold standard, immediately encrypting cardholder data upon dip, tap, swipe or key entry, ensuring that no payment data is exposed upon entry or in transit.

2. Implement End-To-End Encryption and Tokenization

If attackers manage to breach your systems, encryption ensures they can’t decipher what they steal. By partnering with a trusted payment security provider, you can encrypt data as it moves through your network, making it unreadable without a decryption key.

Tokenization provides an added layer of protection in case that key is compromised. It replaces actual card or personal information with randomized, unrecognizable tokens that hold no exploitable value.

For example, if a hotel’s payment database is breached, tokenization prevents exposure of real credit card numbers or guest details — attackers would only find format-preserving tokens that have no mathematical or cryptographic relationship to the original data, rendering them useless without authorized access to the tokenization system.

3. Train Employees to Recognize Social Engineering Attacks

Reduced staffing and PTO coverage during the summer may increase the chances of warning signs of a phishing attack going unnoticed. Just one click on a fraudulent login page can grant attackers network access or launch malware.

Regular training is essential to help employees recognize threats like fake invoices, credential-stealing links or AI-generated voicemails impersonating executives. Simulated phishing exercises — like fake guest complaint emails — reinforce this training in a safe, realistic context.

Equally important are clear reporting protocols. Employees should know exactly how to report suspicious messages and whom to contact, even when key leaders are out of the office.

4. Prepare for High-Traffic, Low Coverage Periods

Without a clear coverage plan, employee vacations leave gaps in oversight, slowing threat detection and increasing the risk of delayed responses.

To maintain readiness, security operations need to run at full strength — even when staffing is limited. Fortunately, automated monitoring and alerting systems don’t take time off. These solutions should be put in place to encrypt and tokenize data from point-to-point, with designated personnel on-call to respond to incidents. Essential updates — like software patches and security maintenance — should never be delayed due to limited staff availability.

Now is also the time to test the effectiveness of your response procedures. If a breach happens over a holiday weekend, your team should be ready to act immediately and confidently.

Travel Security Starts Now

Cybercriminals don’t take vacations, and your defenses can’t afford to either. With more guest data flowing through your systems and fewer eyes on alerts, this is the most vulnerable time for your site’s cybersecurity. 

That’s why layered defenses like encryption and tokenization — which operate continuously — are essential. Combined with well-trained staff and proactive planning, they allow your guests to focus on the trip ahead while your team delivers a seamless user experience.

From the moment a guest lands on your website until they tap “Book Now,” every interaction should be protected. Secure your systems now so that a data breach doesn’t disrupt your busiest quarter.

KEYWORDS: hackers travel cybersecurity travel risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brent johnson headshot

Brent Johnson is Chief Information Security Officer at Bluefin. Image courtesy of Johnson 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    Colonial Pipeline ransomware attack proves yet again that cybesecurity is paramount: Why companies don’t take cybersecurity seriously

    See More
  • e-tower1-900px.jpg

    Energy Sector is a 'Prime Target' for Cyberattacks

    See More
  • ransomware

    Rise of ransomware: Why OT is a prime target for cybercriminals

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing