Responding to a Security Incident (PMS)

Responding to a Security Incident (PMS)

Even with strong safeguards in place, incidents can still happen. Quick and decisive action is the best way to minimize damage, protect guest data, and restore secure operations. Use this checklist if you suspect an unauthorized user has accessed your PMS or hotel network.

1. Contact Your Police Department

File a police report immediately.
Request a case number for insurance purposes.

2. Engage Your IT Provider

Ask your IT provider to perform a full scan of your computers and network.
Verify whether any unauthorized applications or programs have been installed.
Re-image or replace compromised machines if necessary.

3. Check the Security Log Report

Review logs to see what accounts and data may have been accessed.
Cloud PMS: Navigate to Management → User Settings → Security.
Desktop PMS: Navigate to Management → Admin → Security.

4. Reset All Passwords

Treat all stored passwords in browsers as compromised.
Change PMS, email, and any other system credentials immediately.
Require all employees to use new, unique passwords.
Info
If you suspect a hack or want to reset every employee’s password, open a support ticket. Visual Matrix can trigger a full reset across all accounts.

5. Restrict or Remove Compromised Access

Disable suspicious user accounts right away.
Remove or tighten IP access as needed.
Reconfirm that only current staff have active accounts.

6. Notify Required Parties

Contact your Cyber Liability Insurance provider for guidance and coverage.
For Best Western properties: Contact the Best Western Helpdesk for further instructions.

7. Request a Vulnerability Scan

Ask your IT or monitoring partner to run both internal and external scans.
Confirm that no hidden backdoors remain before resuming normal operations.

Notes
A fast and organized response is the difference between a contained incident and a prolonged crisis. By contacting authorities, securing systems, and notifying the right parties, you protect your property, your staff, and your guests.

Still need help with this topic?

Ask Yourself:
- Have I filed a police report and received a case number?
- Has my IT provider completed a full system scan?
- Did I check the Security Log Report for suspicious access?
- Have all passwords been reset, including those stored in browsers?
- Did I disable or restrict any suspicious user accounts or IPs?
- Did I notify my Cyber Liability Insurance provider (and Best Western Helpdesk, if applicable)?
- Have vulnerability scans been run to confirm the system is clean?

Support May Ask You:
- When did you first notice the suspicious activity?
- Have you already contacted law enforcement or insurance?
- What did your IT provider’s scan reveal?
- Can you share findings from the Security Log Report?
- Which accounts or IP addresses were restricted or removed?
- Have vulnerability scans been scheduled or completed?

    • Related Articles

    • Visual Matrix Security Overview (PMS)

      Security is at the core of everything we do at Visual Matrix. From protecting guest data to preventing fraud, keeping your PMS secure requires a partnership between our technology safeguards and your property’s daily practices. Every hotel faces the ...
    • FAQ - Safety & Security (PMS)

      Security in the hospitality industry is more than a best practice — it’s a vital guardrail for your guests, your staff, and your property’s operations. At Visual Matrix PMS, we build in robust safeguards to protect your system, but the strongest ...
    • Visual Matrix Security Collection (PMS)

      Security is a shared responsibility. Visual Matrix provides the tools and safeguards you need to protect your PMS, but every property must also take active steps to reduce risks from fraud, phishing, and unauthorized access. This collection brings ...
    • Core Security Best Practices (PMS)

      Strong security starts with the basics. Every property using Visual Matrix should ensure that all staff members follow these best practices every day. These habits create the first line of defense against fraud, phishing, and unauthorized access. Use ...
    • Working with Visual Matrix Support Safely (PMS)

      Visual Matrix technicians may occasionally need remote access to your hotel computer to provide assistance. Knowing how legitimate support works — and how to spot fraudulent attempts — is essential to protecting your property from social engineering ...