{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Travel Buddy with Switchfly","title":"Security First: Safeguarding Loyalty Program Data","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/2b4cf6d6\"></iframe>","width":"100%","height":180,"duration":1410,"description":"In this episode, Switchfly’s Senior Director of Software Development, Scott Napieralski, discusses safeguarding sensitive traveler data in loyalty programs. Scott reveals why travel loyalty platforms, armed with details like passport and known traveler numbers, are attractive targets for cybercriminals. The conversation unpacks not only the essential compliance landscape—GDPR, CCPA, SOC 2—but also practical approaches that Switchfly emphasizes to go beyond the minimum, building trust, transparency, and resilience. From data encryption to clear customer messaging, this episode delivers a candid look at risk, responsibility, and ongoing security leadership in today’s travel rewards space.Key HighlightsLoyalty program databases draw attackers because they combine vast amounts of personal and travel data, including sensitive identifiers such as passport numbers and known traveler numbers, making them high-value targets.Travel brands must navigate privacy legislation like the GDPR and CCPA, which mandate data transparency and user control, while also pursuing independent SOC 2 audits to validate security and privacy controls within the Switchfly platform.Best-in-class data protection includes encryption at rest and in transit, multi-factor authentication, stringent role-based access controls, and routine audits, creating several layers of defense across the Switchfly solution.Trust and transparency are reinforced through user-focused communication—privacy policy links, honest disclosures, and subtle interface cues—all integrated seamlessly into the traveler’s booking journey to put customers at ease.The influence of AI on cybersecurity is twofold: attackers and defenders alike are adopting new technologies, which makes adaptability and technical vigilance a necessity.Maintaining strong security hinges on ongoing vigilance—routine assessment, continuous developer education, and a deliberate focus on safeguarding traveler data, even when competing business pressures...","thumbnail_url":"https://img.transistorcdn.com/UoWt1SskUpTzZUFHdt_0S1fb9Ic3ocCe25NdzSJdYMA/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yOTll/MTVkZjI5ODM3NDUx/NTllMzgxMmYxYTQ5/M2FlNC5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}