Visual Matrix Security Overview

Visual Matrix Security Overview

Security is at the core of everything we do at Visual Matrix. From protecting guest data to preventing fraud, keeping your PMS secure requires a partnership between our technology safeguards and your property’s daily practices.
Every hotel faces the same challenge: attackers often look for the easiest way in. Weak passwords, unused accounts, or a misplaced click on a phishing email can open the door. By following the right practices and enabling built-in safeguards, you can create multiple layers of defense that protect your property, your staff, and your guests.

Why Security Matters in Hospitality

Hospitality systems are prime targets because they store valuable information and process financial transactions daily. The most common threats include:
- Phishing and social engineering — tricking staff into giving away logins or remote access.
- Stolen credentials — using a password from one system to access another.
- Unauthorized refunds — attackers exploiting user permissions to move money out of the property.
- Remote access abuse — logging in from outside the hotel network without proper controls.
Alert
These attacks don’t just risk financial loss. They can damage guest trust, affect compliance, and disrupt daily operations.

Four Pillars of Security in Visual Matrix

We’ve organized our security guidance into four areas. Each has its own detailed article to help you take the right actions at your property:

1. Core Security Best Practices
Simple, everyday habits that every employee should follow. Strong passwords, regular changes, no shared accounts, and phishing awareness form the base of your defense.

2. Enhanced PMS Safeguards
Configuration settings inside Visual Matrix that strengthen protection. From Multi-Factor Authentication (MFA) to refund controls, IP restrictions, and account audits, these are the tools that make your PMS more resilient.
👉 Read more: Enhanced PMS Safeguards

3. Working with Visual Matrix Support Safely
Support scams are one of the fastest-growing threats. Learn how to recognize legitimate technician contact, the only remote connection tools we use, and how to verify anyone claiming to be from Visual Matrix.

4. Responding to a Security Incident
Even with the best defenses, incidents can happen. This checklist walks you through what to do immediately — from police reports and IT scans to log reviews and notifying your insurance or brand.

How to Use This Guide

Think of this overview as your security roadmap.
Employees should start with the Core Best Practices to understand the daily steps expected of them.
Managers should go further by reviewing the Enhanced PMS Safeguards and Incident Response checklist.
Everyone should know how to identify legitimate Visual Matrix support interactions to avoid scams.

Notes
Security isn’t a one-time setup. It’s an ongoing process of awareness, review, and action. Returning to these articles regularly — and ensuring new employees are trained on them — will keep your property safer over time.

Still need help with this topic?

Ask Yourself:
- Have I reviewed the Core Security Best Practices with my staff?
- Do I know if Multi-Factor Authentication is enabled at my property?
- Have I checked whether all users have appropriate roles (not everyone as Supervisor)?
- Do I understand how Visual Matrix technicians will connect to my system?
- Do I know who to contact first if I suspect unauthorized access?

Support May Ask You:
- Which area of security are you asking about (Best Practices, Safeguards, Support Access, or Incident Response)?
- Have you already enabled MFA, and do all users have valid email addresses entered in their profiles?
- What roles and permissions are currently assigned to your users?
- Do you see any suspicious or unknown IP addresses in your Manage IP Security settings?
- Have you noticed any unusual login attempts in the Security Log Report?

    • Related Articles

    • **Glossary and Common Acronyms (Index) - Visual Matrix PMS

      1-10 A B C D E F G H I K L M N O P R S T U V W X Y Z 1-10 1099 The 1099 form is used to report to the US government income earned by travel agents as commissions, and income earned by owners of hotel condo units after any deductions but before any ...
    • VM Desktop PMS Remote Access

      Discontinuing VM Desktop Remote Visual Matrix discontinued the VM Remote Desktop application in its entirety due to security risks within Open SSH, the software that facilitates the connection between the remote computer and the hotel's Server. Open ...
    • Visual Matrix Security Collection

      Security is a shared responsibility. Visual Matrix provides the tools and safeguards you need to protect your PMS, but every property must also take active steps to reduce risks from fraud, phishing, and unauthorized access. This collection brings ...
    • FAQ - PMS Safety & Security

      Security in the hospitality industry is more than a best practice — it’s a vital guardrail for your guests, your staff, and your property’s operations. At Visual Matrix PMS, we build in robust safeguards to protect your system, but the strongest ...
    • Working with Visual Matrix Support Safely

      Visual Matrix technicians may occasionally need remote access to your hotel computer to provide assistance. Knowing how legitimate support works — and how to spot fraudulent attempts — is essential to protecting your property from social engineering ...