Dear Mews Community,
due to the increased amount of fake Mews Login Sites, which peaked 2-3 months ago, we gathered our thoughts and experiences in the security area. Happy to spark a conversation about the topic here.
Mews has implemented various security measures like the 2FA / New Device Logins / SSO, BUT we think there are other options which should also be added to actively prevent any hacking attempts.
I think we can all agree that the main security threats stem from our front office agents in combination with the fluctuation. Additionally, it becomes more critical if a user has access to multiple properties (e.g. Nighties that take care of multiple hotels)
Please find a few of our suggestions below:
Redefine User privileges
User privileges – in my opinion – are a mess right now. Even if you do not have access to “sensitive reports” the basic FOA user can still export reservation reports for any timeframe that is available within the system (e.g. 5 years). In that report he can view any guest data, which includes sensitive data (mail, phone number, residence, etc.). This is the most useful data for hackers, as they will mainly try to contact the guests via phone or mail (WhatsApp is the go-to). Since you can not restrict any user from exporting that data unless you remove critical permissions for a FOA, this is a huge pain point.
Those privileges need to be refined – being able to define who is allowed to export a reservation report (or general exporting of data), limiting the timeframe that can be exported*, define if user get masked (***) sensitive data when exporting such reports. (Masked Data like when 2FA was introduced and Users did not see various information’s until they activated 2FA)
*Hackers will be able to pull all OTB reservations of a reservation within 5 minutes of gaining access. There is no time for admins to react (need to get the New Login Device mail first)
Geo-blocking
Admins should be able to actively restrict logins from other countries. There is no reason that a login attempt from the US or China should even be possible for a property located in Austria.
IP Whitelisting
I know this could be a difficult one, if you look at mobile devices – solved though if you exclude the Mews App from IP Whitelisting.
Looking at PCs and Laptops though, can easily be restricted to the public IPs of your property’s internet.
Account Lockout after X failed login attempts
I am not sure if there is any security measure already in place to prevent Brute Force Attempts, but if a user enters the wrong password X number of times within Y minutes the user should be blocked. Admins then again need the privilege to unblock the user.
Regular password changes
User should be forced to changed their password after a certain amount of time. Timeframe could be set generally or defined by admins, you never know when something shows up in a leak, which could possibly lead to a compromised system.
Access to Logfiles for Admins
The logfiles currently must be requested via premium support, which is quite annoying and can not be done on a reoccurring basis (weekly, monthly, …). The mentioned files can be critical to identify any breaches and to reestablish the safety of the system. Furthermore, you can implement a monitoring with those files.
Lockout/Logout time (defined by admins)
Mews basically stays logged in and open when the front office staff is not using the PC (apart from screen timeouts defined via group policies), BUT the accounts should become locked after a certain idle time in the browser. Can be unlocked via PIN, no need to force another 2FA login there.
Logout time is currently set to 24 hours I think? Admins should be able to define the logout time themselves for the property. Average shift of a front office agent is somewhat 8-9 hours, therefore there is no need to have a logout time of 24 hours. Might as well make it 10 hours. Everyone has a different need here I guess, therefor it should be manageable by admins.
New Login Devices
Currently only the specific user gets a message for a new device login, which is a super feature. Again though, admins should receive this message as well, especially since a normal user probably has no idea what to do with an IP-address and the mail might just get deleted instead of looked at.
Greetings,
Eric

