Hyatt Company Cyber Security Posture

hyatt.com

Hyatt is guided by its purpose: to care for people so they can be their best. Hyatt’s portfolio includes 1,400+ hotels and all-inclusive properties in 79 countries across six continents. Luxury Portfolio – Park Hyatt®, Alila®, Miraval®, Impression by Secrets, and The Unbound Collection by Hyatt® Lifestyle Portfolio – Andaz®, Thompson Hotels®, The Standard®, Dream® Hotels, The StandardX, Breathless Resorts & Spas®, JdV by Hyatt®, Bunkhouse® Hotels, and Me and All Hotels Inclusive Collection – Zoëtry® Wellness & Spa Resorts, Hyatt Ziva®, Hyatt Zilara®, Secrets® Resorts & Spas, Dreams® Resorts & Spas, Hyatt Vivid Hotels & Resorts, Sunscape® Resorts & Spas, Alua Hotels & Resorts®, and Bahia Principe Hotels & Resorts Classics Portfolio – Grand Hyatt®, Hyatt Regency®, Destination by Hyatt®, Hyatt Centric®, Hyatt Vacation Club®, and Hyatt® Essentials Portfolio – Caption by Hyatt®, Hyatt Place®, Hyatt House®, Hyatt Studios, Hyatt Select, and UrCove Subsidiaries of the Company operate the World of Hyatt® loyalty program, ALG Vacations®, Mr & Mrs Smith, Unlimited Vacation Club®, Amstar® DMC destination management services, and Trisept Solutions®. Visit hyatt.com for more. This account provides information about Hyatt Hotels Corporation, its subsidiaries or affiliates and/or hotels operating under a Hyatt-affiliated brand. Terms like “Hyatt,” “we,” “our,” “us,” and similar terms are used for convenience and should not be understood as precise designations of any particular entity. The account name and certain terms like “employees” are used by this site but may not be accurate. Individuals may identify themselves as working or having worked at Hyatt or a Hyatt hotel, but please note that self-identification should not be treated as confirmation of employment, past or present, by Hyatt or any particular entity or hotel. In some cases, an individual may have been employed by an affiliate of Hyatt Hotels Corporation or by an owner or franchisee of a Hyatt-branded hotel.

Hyatt Company Details

Linkedin ID:

hyatt

Employees number:

87880 employees

Number of followers:

1462947.0

NAICS:

721

Industry Type:

Hospitality

Homepage:

hyatt.com

IP Addresses:

Scan still pending

Company ID:

HYA_2728151

Scan Status:

In-progress

AI scoreHyatt Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Hyatt Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Hyatt Company Cyber Security News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
Hyatt Hotels CorporationBreach5023/2017HYA456072525Link
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The Washington State Office of the Attorney General reported a data breach involving Hyatt Hotels Corporation on October 12, 2017. The breach occurred between March 18, 2017 and July 2, 2017, potentially affecting 640 Washington residents with unauthorized access to payment card information, including cardholder names, card numbers, expiration dates, and internal verification codes.

Hyatt Hotels CorporationBreach6028/2015HYA550072525Link
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The Washington Office of the Attorney General reported a data breach involving Hyatt Hotels Corporation on January 14, 2016. The breach, which involved unauthorized access to payment card data, occurred between August 13, 2015, and December 8, 2015, affecting 15 individuals. The breach was due to malware specifically designed to target payment card data.

Hyatt Hotels CorporationRansomware90501/2016HYA1348522Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Hyatt Hotels chain across the was infected by a malware attack back in January 2016. The attackers designed the malware to exfiltrated payment card information including cardholder names, card numbers, expiration dates, and internal verification code affected payment processing systems. The hotel chain offered one year’s free protection to those affected by the breach,

Hyatt Company Subsidiaries

SubsidiaryImage

Hyatt is guided by its purpose: to care for people so they can be their best. Hyatt’s portfolio includes 1,400+ hotels and all-inclusive properties in 79 countries across six continents. Luxury Portfolio – Park Hyatt®, Alila®, Miraval®, Impression by Secrets, and The Unbound Collection by Hyatt® Lifestyle Portfolio – Andaz®, Thompson Hotels®, The Standard®, Dream® Hotels, The StandardX, Breathless Resorts & Spas®, JdV by Hyatt®, Bunkhouse® Hotels, and Me and All Hotels Inclusive Collection – Zoëtry® Wellness & Spa Resorts, Hyatt Ziva®, Hyatt Zilara®, Secrets® Resorts & Spas, Dreams® Resorts & Spas, Hyatt Vivid Hotels & Resorts, Sunscape® Resorts & Spas, Alua Hotels & Resorts®, and Bahia Principe Hotels & Resorts Classics Portfolio – Grand Hyatt®, Hyatt Regency®, Destination by Hyatt®, Hyatt Centric®, Hyatt Vacation Club®, and Hyatt® Essentials Portfolio – Caption by Hyatt®, Hyatt Place®, Hyatt House®, Hyatt Studios, Hyatt Select, and UrCove Subsidiaries of the Company operate the World of Hyatt® loyalty program, ALG Vacations®, Mr & Mrs Smith, Unlimited Vacation Club®, Amstar® DMC destination management services, and Trisept Solutions®. Visit hyatt.com for more. This account provides information about Hyatt Hotels Corporation, its subsidiaries or affiliates and/or hotels operating under a Hyatt-affiliated brand. Terms like “Hyatt,” “we,” “our,” “us,” and similar terms are used for convenience and should not be understood as precise designations of any particular entity. The account name and certain terms like “employees” are used by this site but may not be accurate. Individuals may identify themselves as working or having worked at Hyatt or a Hyatt hotel, but please note that self-identification should not be treated as confirmation of employment, past or present, by Hyatt or any particular entity or hotel. In some cases, an individual may have been employed by an affiliate of Hyatt Hotels Corporation or by an owner or franchisee of a Hyatt-branded hotel.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=hyatt' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Hyatt Cyber Security News

2025-03-13T07:00:00.000Z
Ian Hyatt

Chief of Staff Ian Hyatt was named chief of staff to Purdue University President Mung Chiang on July 1, 2024.

2024-11-06T08:00:00.000Z
New Board Members from CAVA, Hyatt’s Benjamin Vaughn, and Booking.com Join RH-ISAC to Fortify Cybersecurity in Hospitality and Retail Worldwide

RH-ISAC is a collaborative cybersecurity community serving retail, hospitality, and food industries, connecting information security teams to ...

2024-12-10T08:00:00.000Z
8 ODU Graduates Honored as Outstanding College Scholars

About Lauren-Elise: While completing her studies, she developed a dance-integrated enrichment program curriculum for Ukrainian refugee children, ...

2024-07-31T07:00:00.000Z
Cybersecurity strategies for small businesses – Christian Hyatt | Risk3Sixty

Welcome to another episode of The Roadmap. This time, we delve into a critical topic that's on every business owner's mind: cybersecurity.

2025-02-13T08:00:00.000Z
Hyatt Hotels Corp SEC 10-K Report

The report highlights the company's robust financial performance, strategic initiatives, and the challenges it faces in the dynamic hospitality industry.

2024-10-23T15:45:37.000Z
Credit Card-Grabbing Malware Hits Hyatt Hotels Once Again

I confirm that I am the owner of the email address provided and agree to receive the latest cybersecurity tips, news, and updates from Bitdefender. Right now ...

2024-07-20T07:00:00.000Z
The CrowdStrike fail and next global IT meltdown already in the making

A botched software update from the cybersecurity company CrowdStrike. “In this case, it was a content update,” said Nick Hyatt, director of threat intelligence.

2017-10-12T07:00:00.000Z
Hyatt Hotels Suffers 2nd Card Breach in 2 Years

Hyatt Corp. is alerting customers about another credit card breach at some hotels, the second major incident with the hospitality chain in ...

2024-08-16T07:00:00.000Z
Cybersecurity Trends, Challenges and Responses

The reason why business staff should take cybersecurity online courses instead of self-learning is due to the technology sophistication, ...

similarCompanies

Hyatt Similar Companies

JW Marriott

No loud pretense. No excess formalities. Just understated elegance you’ll feel the moment you walk into one of over 80 worldwide destinations. JW Marriott is part of Marriott International’s luxury portfolio and consists of beautiful properties in gateway cities and distinctive resort locations in

Radisson Blu

Welcome to the official page for Radisson Blu, a brand of Radisson Hotel Group. Stylish living spaces for business and leisure in some of the world’s favorite destinations. Choose stylish and elegant hotels that are created with you in mind. Enjoy a warm welcome with our inviting ambience and though

Minor Hotels

Minor Hotels is a global hospitality leader with over 560 hotels and resorts across six continents, a diverse portfolio of F&B businesses and a selection of luxury transportation services. With over four decades of experience, we build stronger brands, foster lasting partnerships, and drive business

MGM Resorts International

The resorts and casinos of MGM Resorts International™ are some of the most famous in the world. Our 28 destinations are renowned for their winning combination of quality entertainment, luxurious facilities, and exceptional customer service. We are actively expanding our presence globally, with pot

Two Roads Hospitality

Founded in 2016, Two Roads Hotels is an international lifestyle hotel company that manages and operates the Alila Hotels & Resorts, Destination Hotels, Joie de Vivre Hotels, Thompson Hotels, and tommie Hotels brands. At Two Roads, we create extraordinary experiences for those unafraid to break f

Abu Dhabi National Hotels

Abu Dhabi National Hotels (ADNH) was founded in 1976 as a hotel owner and asset manager. Over the years, it has evolved into a comprehensive hospitality group, offering a wide range of services including hotels, restaurants, destination management, catering, and transportation. Under its Hotels Div

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Hyatt CyberSecurity History Information

How many cyber incidents has Hyatt faced?

Total Incidents: According to Rankiteo, Hyatt has faced 3 incidents in the past.

What types of cybersecurity incidents have occurred at Hyatt?

Incident Types: The types of cybersecurity incidents that have occurred incidents Ransomware and Breach.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Hyatt Hotels Corporation Data Breach

Description: The Washington Office of the Attorney General reported a data breach involving Hyatt Hotels Corporation on January 14, 2016. The breach, which involved unauthorized access to payment card data, occurred between August 13, 2015, and December 8, 2015, affecting 15 individuals. The breach was due to malware specifically designed to target payment card data.

Date Detected: 2016-01-14

Date Publicly Disclosed: 2016-01-14

Type: Data Breach

Attack Vector: Malware

Vulnerability Exploited: Unauthorized access to payment card data

Motivation: Financial Gain

Incident : Data Breach

Title: Hyatt Hotels Corporation Data Breach

Description: The Washington State Office of the Attorney General reported a data breach involving Hyatt Hotels Corporation on October 12, 2017. The breach occurred between March 18, 2017 and July 2, 2017, potentially affecting 640 Washington residents with unauthorized access to payment card information, including cardholder names, card numbers, expiration dates, and internal verification codes.

Date Detected: 2017-10-12

Date Publicly Disclosed: 2017-10-12

Type: Data Breach

Incident : Malware Attack

Title: Hyatt Hotels Malware Attack

Description: Hyatt Hotels chain across the was infected by a malware attack back in January 2016. The attackers designed the malware to exfiltrated payment card information including cardholder names, card numbers, expiration dates, and internal verification code affected payment processing systems.

Date Detected: 2016-01-01

Type: Malware Attack

Attack Vector: Malware

Motivation: Financial Gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach HYA550072525

Data Compromised: Payment card data

Payment Information Risk: High

Incident : Data Breach HYA456072525

Data Compromised: cardholder names, card numbers, expiration dates, internal verification codes

Payment Information Risk: True

Incident : Malware Attack HYA1348522

Data Compromised: Cardholder Names, Card Numbers, Expiration Dates, Internal Verification Code

Systems Affected: Payment Processing Systems

Payment Information Risk: True

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment card data, payment card information and Payment Card Information.

Which entities were affected by each incident?

Incident : Data Breach HYA550072525

Entity Type: Corporation

Industry: Hospitality

Customers Affected: 15

Incident : Data Breach HYA456072525

Entity Type: Hospitality

Industry: Hospitality

Location: Washington

Customers Affected: 640

Incident : Malware Attack HYA1348522

Entity Type: Hotel Chain

Industry: Hospitality

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach HYA550072525

Type of Data Compromised: Payment card data

Number of Records Exposed: 15

Sensitivity of Data: High

Incident : Data Breach HYA456072525

Type of Data Compromised: payment card information

Number of Records Exposed: 640

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

Incident : Malware Attack HYA1348522

Type of Data Compromised: Payment Card Information

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

References

Where can I find more information about each incident?

Incident : Data Breach HYA550072525

Source: Washington Office of the Attorney General

Date Accessed: 2016-01-14

Incident : Data Breach HYA456072525

Source: Washington State Office of the Attorney General

Date Accessed: 2017-10-12

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington Office of the Attorney GeneralDate Accessed: 2016-01-14, and Source: Washington State Office of the Attorney GeneralDate Accessed: 2017-10-12.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident?

Incident : Malware Attack HYA1348522

Customer Advisories: The hotel chain offered one year’s free protection to those affected by the breach

What advisories does the company provide to stakeholders and customers following an incident?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was The hotel chain offered one year’s free protection to those affected by the breach.

Additional Questions

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2016-01-14.

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2016-01-14.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Payment card data, cardholder names, card numbers, expiration dates, internal verification codes, Cardholder Names, Card Numbers, Expiration Dates and Internal Verification Code.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Payment Processing Systems.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Payment card data, cardholder names, card numbers, expiration dates, internal verification codes, Cardholder Names, Card Numbers, Expiration Dates and Internal Verification Code.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 655.0.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident are Washington Office of the Attorney General and Washington State Office of the Attorney General.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued?

Most Recent Customer Advisory: The most recent customer advisory issued was was an The hotel chain offered one year’s free protection to those affected by the breach.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge