Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

Late in November, Marriott hotels admitted that they had their Starwood reservation database hacked into. The hotel chain said that an entity had unauthorized access for the better part of the past four years. The leak was found to expose names, phone numbers, email addresses, passport numbers, dates of birth, and arrival and departure information for nearly 327 million people. In some cases, credit card numbers and expiration dates were compromised. It is now the second-largest data breach in world history. The only breach that was larger, was Yahoo, which exposed the personal information of about three billion users.

What can you do?
If you are sure that your name is among this massive list of people, you should take the following steps immediately:

  • Change Your Password - All Marriott guests should change their passwords immediately and pick usernames and passwords that aren’t easily guessed. Instead of an easy-to-guess passphrase, use four unrelated words with numbers, characters, and a mix of upper and lowercase letters. Also, don’t use the same password for multiple services.
  • Monitor Your Accounts - If you think you’ve been exposed in this attack, you should keep an eye on your Starwood Preferred Guest account as well as your credit report. You can sign up for credit monitoring services, but if you are diligently checking your credit regularly, paying someone else to check it is pointless.
  • Open an Account Just for Online Purchases - It may seem to be a pain to juggle accounts but keeping a credit card specifically for online shopping and reservations is a good way to mitigate your exposure to major hacks like this one.
  • Limit Access to Information - Only share what you have to share in order to get the products and services that you are purchasing. Any additional information is just a bonus for hackers and scammers if they are able to get their grubby little hands on it.

If you would like more information about these data breaches, how to secure yourself, and what to do when your information gets compromised, return to our blog regularly for more useful information.

Have you been hacked or had your identity stolen? Leave your experience with us in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Holiday Information Automation Cloud Computing Gadgets Training Covid-19 Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Business Technology Mobile Office Data Security Apps Two-factor Authentication Vendor Chrome Budget Mobile Device Management Apple Networking Managed Services Gmail Voice over Internet Protocol App WiFi BYOD Employer-Employee Relationship Tip of the week Avoiding Downtime Marketing Conferencing How To BDR Computing Information Technology Access Control HIPAA Office 365 Hacker Applications Augmented Reality Website Retail Storage 2FA Help Desk Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Virtual Private Network Risk Management Health Router Computers Analytics Office Tips Document Management Windows 11 Monitoring Scam Data loss Excel Firewall Remote Workers Telephone Going Green Patch Management The Internet of Things Save Money Remote Monitoring End of Support Vulnerability Cooperation Free Resource Vendor Management Social Project Management Cybercrime Windows 7 Physical Security Display Microsoft 365 Printer Customer Service Solutions Paperless Office Infrastructure Mobile Security Processor Money Humor Holidays Data Storage Maintenance Word Antivirus Smart Technology Supply Chain Sports Video Conferencing Mouse Managed Services Provider Saving Time Virtual Machines Professional Services Administration Managed IT Service Safety Downloads Robot iPhone Licensing Settings Wireless Entertainment Printing Vulnerabilities Data Privacy Content Filtering IT Management Images 101 VPN YouTube Meetings Telephone System Multi-Factor Authentication Cryptocurrency Mobility Cost Management Customer Relationship Management Computer Repair Virtual Desktop Data storage LiFi Hacking Employees Presentation Integration Outlook User Tip Modem Wireless Technology Machine Learning Virtual Assistant Outsource IT Writing Database Surveillance Lenovo IP Address IT Technicians Virtual Machine Environment Media Virtual Reality Proxy Server Reviews Cookies Hacks Server Management Cyber Monday Medical IT Scary Stories Private Cloud Hotspot Transportation Small Businesses Identity Theft Recovery Fun Tactics Development Superfish Mirgation Hypervisor Displays Deep Learning Hard Drives Twitter Shopping Nanotechnology Optimization Domains PowerPoint Error Language Employer/Employee Relationships Outsourcing Education Social Engineering Addiction Management PCI DSS Chatbots Refrigeration Navigation Remote Computing Gig Economy Screen Reader Mobile Computing Public Speaking Distributed Denial of Service Workplace Lithium-ion battery Computing Infrastructure Teamwork Hiring/Firing Tablet Search Service Level Agreement Internet Service Provider Regulations Compliance Identity Best Practice Evernote Paperless Alert Entrepreneur Dark Data Bookmark Smart Tech Memes Managed IT Co-managed IT Buisness File Sharing Alerts SQL Server Technology Care IT solutions How To Download Net Neutrality Legal Financial Data History Business Growth Undo Business Communications Notifications Browsers Smartwatch Connectivity IT Break Fix Scams Travel Azure Hybrid Work Google Maps Cortana Upload Procurement Techology Social Network Telework Cyber security Alt Codes Multi-Factor Security Tech Human Resources CES IoT Communitications Dark Web Cables Downtime Unified Threat Management Hosted Solution Application Trends Supply Chain Management Unified Threat Management Customer Resource management FinTech Regulations Typing Google Calendar Term Google Apps Network Congestion Data Analysis Star Wars IT Assessment IBM Microsoft Excel IT Maintenance Staff Value Business Intelligence Knowledge Gamification Flexibility Google Drive User Error Organization Social Networking Legislation Shortcuts 5G Fileless Malware Digital Security Cameras Smart Devices Ransmoware Point of Sale Wearable Technology Memory Vendors Unified Communications Experience Content Remote Working Google Docs Health IT Motherboard Data Breach Bitcoin Network Management Competition Comparison Google Play Be Proactive Running Cable Tech Support Monitors Directions Videos Assessment Electronic Health Records Google Wallet Permissions Workforce Wasting Time Threats Trend Micro Windows 8 Specifications Security Cameras Workplace Strategies Laptop Websites User Microchip Internet Exlporer Software as a Service Drones Fraud Meta Username SharePoint Managing Costs Amazon Electronic Medical Records eCommerce Black Friday SSID Halloween

Blog Archive