Summer 2015
NCRWA.COM
11
feature
DISCRIMINATE THE RIGHT WAY
Are you accepting credit and debit card payments? Do you transmit bank
draft data on your computer? Keep payments on a separate computer network
from other things you do, like SCADA, which is often minimally protected.
You wouldn’t run finished water and wastewater in the same pipe, would
you? In fact, consider not using wireless at all for anything that credit card or
check data travel on. There is no substitute for the security of the hard-wired,
directly-connected cable from your computer to the internet connection in
your back-office closet.
THE BIG SECRET – BANK ACCOUNTS
I am constantly amazed at how no one talks about the security of bank
account numbers in utility business offices. Credit and debit cards have PCI
Compliance standards, but there is no mention of a standard of protections
for routing and account numbers. Here’s a scenario: a list of credit cards were
stolen from your office last week. That’s bad. But what if it were a list of bank
account numbers? Wouldn’t that be a whole lot worse? Think about it. Your
customers would now have to take off work to go to their bank in person,
close their account, open a new account, order (and pay for) new checks,
re-do all their online billpay, and hope their bank balances remained intact.
What a customer relations mess you would have – and these are likely your
best, on-time customers who trust you with their bank draft info. How will
they feel about you now?
AVOID WIRELESS LEAKS
Wireless internet access is very handy, letting you get into your computer
network easily with just a username and a password. However, easy for you
also means easy for a bad guy near your office to get in, too, if he can guess
your username and password. If you must use wireless internet in your office,
consider a policy of only allowing certain people to have wireless access.
Think about what info they can see over that wireless network. Linksys
and Belkin make 2-channel routers that give you two wireless networks
from one router box. Consider making one or both of these networks “non-
broadcasting” – so people outside your building cannot see the name of your
network. These 2-channel routers are easily available and cost as little as
$80. Consider one channel for certain data you send and receive (perhaps
SCADA access) and the other channel for other types of data (such as office
management access). Make sure your wireless has WPA2-level encryption –
with a really good, long, ugly password
.
WHO’S GOT YOUR DATA?
Consider how you are storing sensitive numbers and information. They are
on your computer. And they are likely backed up somewhere else, too. Is
your computer protected with encryption? With a password? Is this computer
always connected to the internet 24 hours a day? Bad guys are usually
working “normal office hours” when we all sleep at night. Are they planning
to siphon off your unprotected customer data at 2 am your time tonight?What
about your on-site or off-site backups? How protected are they? Has that
vendor given you something in writing about how they protect your data on
their backup system?
LOCK UP
Do you have one or two people assigned to make sure all the doors are locked
at the end of the day? Have you checked the windows lately to make sure
they are secure? Is someone else assigned to make sure your work vehicles
are secured each day? Police will tell you that nearly half of all vehicles stolen
are unlocked – and half of those have the keys left IN THEM! Why be an
easy target?
Tools, purses, wallets, and anything you don’t want walking off should be
kept out of sight and locked up – in a locker, in a desk, or secure closet. Apply
this same idea to your technology and your “computer room:” always locked
up and out of sight.
PROTECT YOURSELF WITH A WRITTEN POLICY
Written policies are great tools – if you have them – and actually use them.
Remember your Red Flag Rules policy from 2010? Pull it out, dust it off,
and consider adding some language to it that mentions handling of credit
card and bank account numbers. If you haven’t already, include a few words