Welcome!

News Feed Item

Staybridge Suites Lexington - Notice of Data Security Incident

LEXINGTON, Ky., Feb. 14, 2018 /PRNewswire/ -- The Staybridge Suites Lexington recently received notice from InterContinental Hotels Group ("IHG") that certain devices at the Staybridge Suites Lexington may have been infected with malware.  Upon learning of this incident, the Staybridge Suites Lexington promptly removed the devices from the network and initiated an internal investigation, with the assistance of a third-party forensic investigator, to determine the nature and scope of the incident.  Through this investigation the Staybridge Suites Lexington learned that, as a result of the malware on certain devices, unauthorized actors had access to certain information stored on the devices.  While the Staybridge Suites Lexington does not have evidence that the unauthorized actor actually accessed or acquired personal information contained on the devices, it was unable to exclude that possibility.

The Staybridge Suites Lexington determined that the affected devices contained, and the unauthorized actor may have had access to, the following types of information: name and credit card number.  To date, the Staybridge Suites Lexington has no evidence of any actual or attempted misuse of this information. 

The Staybridge Suites Lexington takes this incident and the security of personal information in its care seriously.  Since being informed of this incident, the Staybridge Suites Lexington has been working diligently, with the assistance of a third-party forensic investigator, to determine the full nature and scope of this event and to identify those individuals who may be impacted.  In addition, the Staybridge Suites Lexington changed the credentials for all impacted devices and user accounts and continues to monitor its systems to better protect the privacy and security of information within its care. 

The Staybridge Suites Lexington will be mailing notice letters to impacted individuals for whom it has address information, but was unable to locate addresses for approximately ten individuals.  The Staybridge Suites Lexington has provided potentially impacted individuals with access to 36 months of complimentary credit monitoring services. The Staybridge Suites Lexington encourages potentially impacted individuals to remain vigilant against incidents of identity theft and fraud, to review account statements, and to monitor their credit reports for suspicious activity. The Staybridge Suites Lexington is providing potentially impacted individuals with contact information for the three major credit reporting agencies, as well as advice on how to obtain free credit reports and how to place fraud alerts and security freezes on their credit files.  The relevant contact information is below:

Equifax

P.O. Box 105069

Atlanta, GA 30348

800-525-6285

www.equifax.com

Experian

P.O. Box 2002

Allen, TX 75013

888-397-3742

www.experian.com

TransUnion

P.O. Box 2000

Chester, PA 19106

800-680-7289

www.transunion.com

Potentially impacted individuals may also find information regarding identity theft, fraud alerts, security freezes and the steps they may take to protect their information by contacting the credit bureaus, and the Federal Trade Commission.  The Federal Trade Commission can be reached at: 600 Pennsylvania Avenue NW, Washington, DC 20580; www.identitytheft.gov; 1-877-ID-THEFT (1-877-438-4338); and TTY: 1-866-653-4261. 

The Staybridge Suites Lexington has set up a call center to answer questions from those who might be impacted by this incident.  Anyone with additional questions may contact the call center at 1-855-288-3432 (toll free), Monday through Saturday, 9:00 a.m. to 9:00 p.m. EDT.

Cision View original content:http://www.prnewswire.com/news-releases/staybridge-suites-lexington--notice-of-data-security-incident-300599048.html

SOURCE The Staybridge Suites Lexington

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Authorization of web applications developed in the cloud is a fundamental problem for security, yet companies often build solutions from scratch, which is error prone and impedes time to market. This talk shows developers how they can (instead) build on-top of community-owned projects and frameworks for better security.Whether you build software for enterprises, mobile, or internal microservices, security is important. Standards like SAML, OIDC, and SPIFFE help you solve identity and authenticat...
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
Hackers took three days to identify and exploit a known vulnerability in Equifax’s web applications. I will share new data that reveals why three days (at most) is the new normal for DevSecOps teams to move new business /security requirements from design into production. This session aims to enlighten DevOps teams, security and development professionals by sharing results from the 4th annual State of the Software Supply Chain Report -- a blend of public and proprietary data with expert researc...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
This session will provide an introduction to Cloud driven quality and transformation and highlight the key features that comprise it. A perspective on the cloud transformation lifecycle, transformation levers, and transformation framework will be shared. At Cognizant, we have developed a transformation strategy to enable the migration of business critical workloads to cloud environments. The strategy encompasses a set of transformation levers across the cloud transformation lifecycle to enhance ...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...