What's Happening?
Access Hospitality is set to enforce the use of Trusted Browsers across all Guestline Property Management System (PMS) sites starting May 2026. This move comes in response to a rise in phishing attacks targeting the hospitality industry, where cybercriminals
exploit hotel property management systems and booking channels to gain unauthorized access and harvest sensitive data. The Trusted Browsers initiative is designed to enhance security by ensuring that only approved and recognized devices can access critical systems, thereby reducing the risk of compromised accounts and unauthorized logins. Nicola Longfield, Chief Commercial Officer at Access Hospitality, emphasized the importance of this security measure, noting that it is a second-factor authentication method tailored for hospitality environments.
Why It's Important?
The implementation of Trusted Browsers is a significant step in bolstering cybersecurity within the hospitality sector, which is increasingly vulnerable to cyber threats. By mandating this security measure, Access Hospitality aims to protect guest data and operational systems from unauthorized access and potential exploitation. This initiative not only safeguards sensitive information but also helps maintain the integrity and trust of hotel operations. As cyber threats continue to evolve, such proactive measures are crucial for preventing data breaches and ensuring the safety of both guests and hotel staff. The broader impact of this move could lead to industry-wide adoption of similar security protocols, setting a new standard for cybersecurity in hospitality.
What's Next?
Hotel operators are encouraged to begin the transition to Trusted Browsers immediately, even before the enforcement date. By pre-approving browsers in the Admin Panel, operators can ensure a seamless transition for their teams. As the enforcement date approaches, it is expected that more hotels will adopt similar security measures to protect against phishing attacks. The success of this initiative could prompt other sectors within the hospitality industry to implement comparable security protocols, further enhancing the overall cybersecurity landscape.












