Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity NewsPorts: Sea, Land, & Air

How Data Breaches Can Make Hectic Holiday Travel a Nightmare

By Craig Hinkley
business travel
September 24, 2019

It’s closer than you think. Yes, it may only be the end of September, but as summer gives way to fall, millions of people across the U.S. are beginning to make their travel plans for the holiday season.

Whether that means visiting family or friends or simply trying to get away from it all, holiday travel is stressful and hectic.

But with so much to think about, the last thing on most people’s minds as they prepare for a trip – no matter when or where they’re heading – is how likely they are to be a victim of a data breach.

Yet think about how many aspects of modern travel leave us exposed to cyberthreats. Whether we realize it or not, from the moment we go online to book a trip until we return safely home, we touch a lot of things that carry potential security perils. The primary culprits, of course, are criminal hackers. But what has enabled them is a travel industry that has been slow to fully embrace application security. The result has been a rash of data breaches that have affected millions of travelers.

Travel Booking Sites

In March 2018, travel booking site Orbitz disclosed a security breach that occurred in late 2017 exposing data for thousands of customers, including information on 880,000 payment cards. 

A few years earlier, in September 2014, another travel website was hit by hackers. Viator, a travel website owned by TripAdvisor, was forced to notify approximately 1.4 million of its customers that their personal information had been exposed.

Airports

This past April, Cleveland Hopkins International Airport, the largest and busiest airport in Ohio, was hit with a ransomware attack that impacted airport systems, disabling email and knocking out some displays.

Airlines

More than nine million passengers had their data stolen due to a cyberattack on Cathay Pacific in March 2018. According to the airline, a wide range of data was leaked, including passenger names, card numbers, and dates of birth, as well as details about where each passenger had travelled.

A month later, Delta Airlines disclosed that a massive data breach involving chat software on its website allowed unauthorized access to credit card and other information. According to Delta, malware allowed access to names, addresses and credit card information entered to pay on delta.com.

In September 2018, British Airways revealed that hackers had stolen personal and financial details from some 380,000 passengers in a sophisticated data breach, which recently resulted in a £183 million GDPR fine.

Ridesharing Apps

Last fall, popular rideshare app Uber was forced to pay a total of $148 million equally to all 50 U.S. states after it was found to have intentionally concealed a massive breach in 2016 that resulted in stolen data from 57 million accounts. The payout was the largest ever multi-state breach settlement to date.

In a prior incident in May 2015, the personal information of as many as 50,000 Uber drivers was leaked. This June, Uber claimed that Lyft, its main competitor, was responsible for the breach.

Hotels

Marriott announced in November 2018 that anyone who made a reservation at one of its Starwood properties since 2014 -- approximately 500 million guests – might have had their information at risk.

What Can Be Done

Without a doubt, the travel industry has been a top target for hackers for years and has suffered more than most industries when it comes to cybercrime. On the one hand, the reason seems obvious. Travel companies routinely handle personal information for millions of customers around the world, so hackers are naturally drawn to all that data.

But travel companies have also made themselves vulnerable. While they have been quick to take advantage of technology to enhance user experience and improve internal processes, they have been slow to embrace the level of security needed to protect those systems. Mobile apps are a great example. There’s no question they have made life easier for millions of travelers. However, they also introduced new cyber risks that travel companies were ill-prepared to handle.

In fact, according to the yearly “State of Application Security” research conducted by WhiteHat Security, more than one-third of all applications in the transportation industry are always vulnerable.

If the situation is going to improve, then every travel company that touches sensitive customer data needs to take a more proactive approach to application security. All software assets – mobile, web-based or APIs – need to be thoroughly tested throughout their development lifecycle. Development and security teams need to collaborate and be well-aligned in order to understand risks and how to mitigate them. 

While the primary responsibility for cybersecurity lies with travel companies, there are also things travelers can do to protect themselves and their personal information. Using a variety of passwords is always a good idea, as is taking advantage of two-factor authentication for any app or website that supports it. And if you think you have been exposed due to a data breach, immediately change your password on the affected site or app and make sure you are not using the same password on other sites and apps.

It’s unlikely that our travel activity will ever be completely immune to cyberthreats. But if travel companies take the needed steps to improve application security and travelers remain aware of threats and use common sense to protect their information, then we can all rest a little easier and enjoy the holidays, or that dream vacation, a little more.

 

KEYWORDS: cyber security cybersecurity travel management travel security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Craig hinkley 2jpg
Craig Hinkley joined WhiteHat Security as CEO in early 2015, bringing more than 20 years of executive leadership in the technology sector to this role. Craig is driving a customer-centric focus throughout the company and has broadened WhiteHat’s global brand and visibility beyond the application security space and security buyer, to the world of the development organization and a DevSecOps approach to application development. Prior to joining WhiteHat Security, Craig served as vice president and general manager of the LogLogic business unit for TIBCO Software. In that role, he was responsible for global field sales and operations, client technical services, engineering, research and development, product design, and product management. Before TIBCO, he served as the general manager at Hewlett-Packard for the HP Networking Business in the Americas. Earlier in his career, Craig held positions at Cisco Systems Inc. and Bank of America. He earned a bachelor’s degree in Information Technology from the Swinburne University of Technology in Australia.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • leadership

    Leading a Company Through Crisis: Communication, Support and Technical Considerations

    See More
  • cyber laptop2

    5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

    See More
  • SEC0519-Review-Feat-slide1_900px

    How Human-Layered Security Can Reduce Email-Driven Data Breaches

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing