Skip to main content

Dear Mews Community,

due to the increased amount of fake Mews Login Sites, which peaked 2-3 months ago, we gathered our thoughts and experiences in the security area. Happy to spark a conversation about the topic here.

Mews has implemented various security measures like the 2FA / New Device Logins / SSO, BUT we think there are other options which should also be added to actively prevent any hacking attempts.

I think we can all agree that the main security threats stem from our front office agents in combination with the fluctuation. Additionally, it becomes more critical if a user has access to multiple properties (e.g. Nighties that take care of multiple hotels)

Please find a few of our suggestions below:

Redefine User privileges

User privileges – in my opinion – are a mess right now. Even if you do not have access to “sensitive reports” the basic FOA user can still export reservation reports for any timeframe that is available within the system (e.g. 5 years). In that report he can view any guest data, which includes sensitive data (mail, phone number, residence, etc.). This is the most useful data for hackers, as they will mainly try to contact the guests via phone or mail (WhatsApp is the go-to). Since you can not restrict any user from exporting that data unless you remove critical permissions for a FOA, this is a huge pain point.

Those privileges need to be refined – being able to define who is allowed to export a reservation report (or general exporting of data), limiting the timeframe that can be exported*, define if user get masked (***) sensitive data when exporting such reports. (Masked Data like when 2FA was introduced and Users did not see various information’s until they activated 2FA)

*Hackers will be able to pull all OTB reservations of a reservation within 5 minutes of gaining access. There is no time for admins to react (need to get the New Login Device mail first)

Geo-blocking

Admins should be able to actively restrict logins from other countries. There is no reason that a login attempt from the US or China should even be possible for a property located in Austria.

IP Whitelisting

I know this could be a difficult one, if you look at mobile devices – solved though if you exclude the Mews App from IP Whitelisting.

Looking at PCs and Laptops though, can easily be restricted to the public IPs of your property’s internet.

Account Lockout after X failed login attempts

I am not sure if there is any security measure already in place to prevent Brute Force Attempts, but if a user enters the wrong password X number of times within Y minutes the user should be blocked. Admins then again need the privilege to unblock the user.

Regular password changes

User should be forced to changed their password after a certain amount of time. Timeframe could be set generally or defined by admins, you never know when something shows up in a leak, which could possibly lead to a compromised system.

Access to Logfiles for Admins

The logfiles currently must be requested via premium support, which is quite annoying and can not be done on a reoccurring basis (weekly, monthly, …). The mentioned files can be critical to identify any breaches and to reestablish the safety of the system. Furthermore, you can implement a monitoring with those files.

Lockout/Logout time (defined by admins)

Mews basically stays logged in and open when the front office staff is not using the PC (apart from screen timeouts defined via group policies), BUT the accounts should become locked after a certain idle time in the browser. Can be unlocked via PIN, no need to force another 2FA login there.

Logout time is currently set to 24 hours I think? Admins should be able to define the logout time themselves for the property. Average shift of a front office agent is somewhat 8-9 hours, therefore there is no need to have a logout time of 24 hours. Might as well make it 10 hours. Everyone has a different need here I guess, therefor it should be manageable by admins.

New Login Devices

Currently only the specific user gets a message for a new device login, which is a super feature. Again though, admins should receive this message as well, especially since a normal user probably has no idea what to do with an IP-address and the mail might just get deleted instead of looked at.

 

Greetings,
Eric

Significantly more granular user privileges + IP whitelisting would be ideal for us.

 


Hello, 

Those are all excellent points and I would like to add that we should be able to decide which users can login via the app. 

Thanks!


Very nice list @Eric Kröll, thank you!

Adding as ideas

Certificate based access
Make a security certificate available on the marketplace / or elsewhere per property, which an admin user can download to install on all permitted PC’s / Laptops

2FA with verification code
The Microsoft principle - show the user a verification code which they need to enter into Authenticator App

OAuth2 with APIs
Change APIs to OAuth2 with limited life token

Cheers, Marc


Dear Eric,
It is some valid points in there. I think we have been teased with more granular privileges for a while now so to me this is very interesting that it get looked at with security in mind!

Geo-Blocking should be effective together with IP-Whitelisting!

 

Have a great day!
 


Hi Eric,

thank you for the detailed overview.


The topic of passwords in particular is always difficult to implement in a team. There are still the classic 45678 password friends.

That's why I think it's good if there is a length and character specification for the password and the regular renewal. 

 

Best regards!


I like the way you're thinking @Eric Kröll! To add something to the topic of user rights; the description and explanation of the current rights are very, very vague as well. Sometimes we had to tick a privilege and test to see if that's the tickbox we needed. 

In addition to that, we would prefer not all admins being able to have access to the Marketplace. If an admin account is hacked, a hacker would even be able to disconnect or connect an integration…. with all consequences that entails. 😩

@Carin any suggestions? 


Redefine User privileges

Better privileges is a good thing but i dislike generally restricting export features. These seem to be already pretty weak in Mews. Maybe just use some kind of internal hardening where users have to authenticate again or differently for certain especially sensitive actions.

Geo-blocking

Thats a great feature. Maybe global and overwriteable on user or role basis.

IP Whitelisting

Would be awesome for us but i think for many others thats not applicable. Would be nice if that could be set global and on user and role basis.

Account Lockout after X failed login attempts

I hope brute force protection is already in place.

Regular password changes

I hate that. I really think thats just good in theory … in reality users tend to do really weak passwords that are easy to remember because of this.

Access to Logfiles for Admins

I really like the out-of-the-box mentality of mews and logs should not be something that normal users have to deal with. Mews is offering this service and should be responsible to have a secure platform. Monitoring for any security breaches is definetly something that Mews has to do!

Lockout/Logout time (defined by admins)

Could be usefule. Would be great – as most of the time – to set this globally and on user or role basis.

New Login Devices

I like this feature because these mails shouldn’t be happening that often.


Perfect ideas Eric!

Geoblocking and Logout times sound especially relevant to us. But all your mentioned functionalities are great security increasing ideas


Hi Eric,

 

It’s great to see this topic being addressed!

 

Let’s be honest—security is rarely the most exciting part of operations, yet it’s essential. And, as we know, there’s no one-size-fits-all solution. From my perspective, there are three main aspects to focus on for security in this area:

 

  1. Access Control: Ensuring only the right individuals have data access.
  2. Data Availability Limitation: Minimizing accessible data in case of unauthorized access.
  3. Access Insights: Gaining clear visibility into data access.

 

Here’s a bit more detail on each:

1. Access Control

This starts with a strong password policy—12 characters minimum, with numbers, punctuation, and more. A password manager makes length irrelevant since it can handle longer passwords without issue.

 

I’m also cautious about short password lifespans; they often result in weaker passwords where users just add numbers or slight variations, which research shows can reduce security rather than improve it.

Geo-blocking isn’t highly effective in my experience, as it’s easy for malicious actors to bypass. Instead, whitelisting combined with user groups is a much stronger approach. For example, we could restrict login permissions based on on-premise access for specific departments, while managers and higher-level employees could be granted broader access. Auto-logouts based on user group can also add an extra layer of protection.

 

A direct link for SSO significantly simplifies access. We provide users with a link that bypasses the login process, granting direct access to the Mews dashboard. Although it’s not a strict security measure, it reduces opportunities for malicious actors to intercept the login stage. If a re-login is required, users tend to use our provided link, which is faster and easier than the standard login procedure.

 

2. Data Availability

More granular permissions would be a major improvement, allowing us to limit data access both by function and time frame. A permissions structure at the chain level would also be extremely helpful!

 

3. Logging and Monitoring

When it comes to security, logging is crucial. It provides vital information, not only to actively manage a breach but also to evaluate the impact and address affected users proactively. Without robust logging, incident response becomes a guessing game, so comprehensive logging is key to informed decision-making.

 

There’s also a fourth critical aspect: Onboarding, Offboarding, and Account Sharing. Often, user accounts remain active even after someone has left, which is commonly overlooked. Implementing a block for accounts inactive over 4 weeks, with a notification to the manager, can prevent unexpected access issues.

Account sharing presents additional challenges, especially with external roles like night guards and housekeeping, resulting in many one-time users. Currently, we use SSO to streamline onboarding and offboarding, and our IdP logging aids this process. With SCIM in beta, I’m looking to further refine user account management soon.

 

Let me know if you’d like to discuss any of these points further or need additional insights.

 

Ivo


Very nice list @Eric Kröll, thank you!

Adding as ideas

Certificate based access
Make a security certificate available on the marketplace / or elsewhere per property, which an admin user can download to install on all permitted PC’s / Laptops

2FA with verification code
The Microsoft principle - show the user a verification code which they need to enter into Authenticator App

OAuth2 with APIs
Change APIs to OAuth2 with limited life token

Cheers, Marc

Let me second that and @Eric Kröll ideas, and add Passkey authentication.

Furthermore, please no regular password changes - that’s just … garbage. ;-)

Regards,

Jean-Philipp.


hey folks - love the thoughts on this, thank you!  I head up our Platform & Security Engineering teams at Mews, and am happy to engage :) 

There is perhaps an opportunity for us to better share our plans around our security roadmap, as a number of these things you folks surface are on the roadmap for 2025.  I'll respond on each of the points below based on experience - some of these are just personal preference, and things we are exploring together in Mews.

 

Refine User Privileges
We agree that there are opportunities here.  Both Identity (who a user is) and Authorisation (what a user can do) are being addressed in 2025, and we are going to be addressing all of this within the maturing of our product in 2025.

 

Geo-blocking / IP Whitelisting
My own personal experience is that these are light friction rather than things that I've seen contribute positively to security posture.  Attackers adapt quickly to these controls, and alter their attacks quickly to bypass these.  That said, we will indeed be looking more broadly at anomaly detection here to better support patterns of traffic that may be malicious, and we will be doing more to protect Mews customers via this mechanism.

 

Account Lockout
This can be useful.  In respect to the phishing incident we've seen recently, this would not have helped directly (routinely, hotel employees were handing their valid credentials to the attackers on phishing sites, so didn't require more than one login), but we'll explore the options here for sure.

 

Regular Password Changes
This is routinely not advised by security groups as users are unable to maintain the cognitive load of complex passwords easily, and so tend towards more insecure passwords (mysecret1, mysecret2, etc.). The better recommendation here is an effective password manager (e.g. 1Password).  PNIST recommends password resets only when a known breach has occured, or every 365 days, though a password manager is more important here]

 

Access to Logfiles for Admins
We agree - the activity log within the product is the aim for this, though we should mature this tool to include more areas of the site, and more usage patterns.  Utopia would be a self-serve solution, though we naturally need to make sure that we provide a tool that is fit for purpose on this so that our customers can get to useful data quickly.

 

Lockout/Logout Time
Session timeouts can be a useful security mechanism, and should be considered for sure.  Again, in relation to the current phishing incident, this would not have helped directly, but we agree this is worth considering and it is on our discussion list for 2025.

 

New Login Devices
We agree, and in the coming months this will mature significantly to better support both device detection, but also device authorisation (active action needed to approve a login).  This can have a huge impact on security posture for a hotel.

 

Authentication/Authorisation Extensions
We love the additional points raised around additional patterns of 2FA etc. are all on our list to be evaluated into 2025 also, thank you.

 

I love the discussion on this though, thank you! Please do keep the ideas coming!


@Eric Kröll love the topic. Thanks for opening that up here. Ever since we signed up (in 2017!!) we were told this was top of the prio list, so @Terry Brown no pressure there but its taking time ;)

Cant say i have much to add to the extensive list of what Eric and the others have added but am looking forward to the activity thats coming from the security team, as we are all anxiously awaiting this!


Hi all,

 

i also want to add some points:

  • More granular user permissions.
  • Avoid to generate major / large exports in Mews for regular staff. For example Reservation Reports with a large timeframe >1 Month or >100 data sets. This should only be possible for Admins.
  • Geo Blocking
  • IP Restrictions to login only from properties for Front Office Staff
  • Track Session Times
  • Avoid or track simultaneos logins to prevent attacks.Automatically logout if a second login is registered
  • Regular password changes + no easy password like e.g. username, 1234 and last 10 passwords.
  • Track Login / Logout time. Yet we only see last login with a day

 

Best

Linus 


@Linus.Bihn Second that, except regular password changes - this has been proven to not improve security at all!

Kind regards,

JP.


Love these folks, thank you for sharing.

Some of these are on the roadmap already, but I’ve referenced those that aren’t as part of the discussion as we proceed too.

 

Really appreciated :) 


Reply