Information technology has advanced tremendously in the last couple of decades. This growth has led to countless innovations in different areas, particularly our businesses. Technology makes our daily office routines easier and more efficient.
But how exactly can technology help businesses to grow? In a recent blog post, the TPM by United Systems team discusses some of the most useful and versatile tools commonly used by business owners today.
All of the tools discussed are equally applicable to utilities and municipalities across the country. In order to create a sustainable future and continue to meet customer demand while offering the superior customer service that consumers demand nowadays, it is more important than ever for utilities and municipalities to step into the technological future and take advantage of all the tools at their disposal.
Check out the full blog for a breakdown of all these tools, applications, and benefits.
One of the primary goals of Itron Inspire is to provide the utility community a safe platform to learn from and connect with industry peers and thought leaders. After monitoring conditions related to the ongoing pandemic, and with the health and safety of customers, partners, and employees as a top priority, Itron has made the decision to host Itron Inspire virtually only for 2021.
Despite this shift to a fully virtual experience, we still look forward to gathering our community for informative keynotes, peer-led panels, insightful breakout sessions and the opportunity to learn how to move our industry forward during this unprecedented time. Together, with our utility and smart city colleagues, we’ll explore technology and services to drive business transformation, reimagine customer engagement and inspire innovation.
Join us for Itron Inspire, taking place virtually Oct. 4-6, 2021. A full agenda for the virtual experience will be posted soon.
Featured Keynotes and Sessions
With dozens of informative breakouts, led by your industry colleagues, how can you decide which sessions are right for you? One way to help choose is by reviewing sessions by track—we sort them all into one of four tracks:
Transform communities and business with intelligence that empowers. Topics covered include AMI and grid ops, forecasting, consumer energy management, water ops, renewables integration and more.
Discover how to do more with data, turning into intelligence, insight and action. Topics include meter data management solution overviews and strategies to better store and leverage massive amounts of data.
From advanced meters, regulators, measurement devices and sensors to collection systems, service and mobile solutions, intelligence starts here. Explore the possibilities in this foundational track.
Deliver efficient, resilient and sustainable utility and city services through intelligent connectivity. Topics include network and IIoT solution overviews, strategies and proven use cases to drive innovation and extend value.
When people combine ingenuity + technology, we will inspire and design a better future for ourselves, our businesses and our communities. Join us for #ItronInspire21.
Register today for the best rates and room availability. We can’t wait to see you in Palm Desert this fall. Registration is open to all Itron customers, partners and prospects. Itron will comply with all local and CDC guidelines for COVID-19 safety. View Itron’s health and safety policies for more information.
Are you looking to transition to AMR from manual meter reading? Overwhelmed by the process?
With Itron’s Start AMR promotion, you can begin the transition to AMR and redefine meter reading for your organization at a pace that fits your organizational needs!
Manual meter reading can be a slow, inaccurate and costly process. Itron’s advanced Automated Meter Reading solutions help utilities’ meter reading operations become safe, efficient, accurate and much faster than a manual process. Itron’s Start AMR promotion is centered on the Temetra Mobile App, Itron’s next-generation mobile meter data collection and management solution. The Temetra Mobile App allows meter readers to load meter reading assignments via any internet connection with a smartphone, tablet or laptop running Android, iOS or Windows 10. Once loaded, the meter reader can collect any combination of manual, probed or radio reads along with other valuable data and then send that data back to the host application over any internet connection.
The Temetra host application is a data management system deployed in the cloud. Cloud deployment allows managers and supervisors to securely work from home, the office or anywhere with an internet connection. The Temetra web application lets managers and supervisors assign work and view years of reading history, including daily and hourly usage.
The Start AMR promotion combines the Temetra Mobile app with Itron’s industry-leading AMR mobile radios that allow utilities to collect daily or hourly usage data from Itron’s advanced endpoints and meters. By combining the Temetra Mobile app and Itron’s AMR mobile radio and endpoints, utilities have access to data previously unavailable. Equipped with this data, utilities can take action with both employees and customers to better manage resources, improve customer service and create safe, accurate, efficient meter reading operations!
The Start AMR promotion is a bundled solution with everything you need to start your journey, including Itron ERT modules, mobile hardware, and software.
Act before December 31, 2021 and save as much as $7,200!
Over the last several years, we’ve seen utilities increasingly become a target for cybercrime. On Friday, February 5th, an unidentified assailant remotely accessed a computer that is a part of the SCADA system at the City of Oldsmar’s water treatment plant. In an attempt to poison the city’s water supply, the assailant briefly increased the amount of sodium hydroxide by a factor of more than 100. Thankfully, a supervisor noticed this increase and immediately reversed it, causing no harm to the water supply.
While beneficial to utilities, SCADA systems open the operation up to many cyber threats when the proper protocols and security are not in place. In 2019, we wrote the following article for the Tennessee Association of Utility District’s publication, Tennessee Utility News, outlining benefits, threats, and best practices for protecting SCADA systems.
Have questions? Need help securing your system?
That’s what we’re here for! Reach out, and we’ll be happy to help!
Throughout the utility sector, SCADA (Supervisory Control and Data Acquisition) systems are becoming more and more prevalent. SCADA systems are a type of industrial control system that enables utilities to easily collect useful data, monitor operations, and automate many processes. For the utility industry, SCADA systems can have many different applications. SCADA systems can give operators and administrators instant access to information that was previously unavailable or difficult to obtain. SCADA systems can be used to monitor and control pump stations, monitor water in tanks and reservoirs, perform remote shut-offs and turn-ons, collect data for regulatory and financial reporting, among many other useful applications. These networks are not a one size fits all solution, however. They may be small or complex, only address one small portion of operations or encompass them all. SCADA systems are becoming essential to water and wastewater system operations, monitoring, maintenance, and planning.
SCADA systems are typically made up of field equipment, data collection equipment, communication networks, and software. Field equipment such as sensors or relays allow the utility to monitor and automate their system through the creation or consumption of data. This data is communicated via fixed or wireless communication networks through the use of Remote Telemetry Units (RTUs) or Programmable Logic Controllers (PLCs) that are connected to the sensors or relays in the field. In most cases, these RTUs or PLCs perform real-time, continuous data collection, giving the utility easy access to data that enables operators to create and maintain a high level of control.
We’ve established that SCADA systems communicate data, but where is this data going? How is it being turned into action? The final piece of any SCADA system is a host platform. The host platform is comprised of hardware such as servers or a cloud solution as well as software. It is here where the actual benefit of a SCADA system comes to fruition. It is here where data is received, integrated, analyzed, and turned into actionable items. The large amounts of data that are generated by SCADA systems can be onerous and overwhelming. Having software and solutions that ensure that this data is processed properly, organized, and stored is essential to the performance of the SCADA system.
Just as SCADA continues to increase in popularity, so does the threat posed by outside sources. Over the years, we’ve heard mention of the threat posed by terrorists, hackers, and less than satisfied customers and employees. How do you protect your system from these outside threats and ensure that you avoid any loss of service?
The threat of cyber-attacks and cyber warfare is growing each day, and we see every day that utilities are not taking the necessary steps to protect their network. This topic is one that is constantly being discussed, but many times, no changes are being implemented. The two most common reasons are that many utilities do not grasp the reality that it could happen to them or the cost seems prohibitive to protect and monitor their system.
Threats to SCADA systems include but are not limited to:
Employee Error: Employees are a common cause of network security issues. While it is possible to suffer the wrath of a disgruntled employee, most commonly, network security issues caused by employees are unintentional and can many times be attributed to poor training, carelessness, or a combination of both. With proper training for employees and an active culture of vigilance, you can help your organization reduce issues caused by employee error.
Malware: Malware includes viruses, spyware, and an array of other malicious programs. These programs may not necessarily target SCADA, but because the SCADA network is not separated or protected, they are able to traverse over the entire network, thusly affecting the SCADA system.
Hackers: Intentional, malicious individuals or groups that are intent on gaining access to the network. These hackers could also use this data against you. By manipulating data or gaining complete control of your SCADA systems, serious harm can be caused to services, customers, and the entire operation.
"Using a combination of security policies and controls to adequately secure today’s systems is critical to your organization’s operation"
So what can you do:
The first step utilities need to take is documentation of your network connections to the internet. Any and all internal networks must be properly documented. All hardware, software, firmware, and applications need to be part of that documentation. All users, including outside vendors that have access to these systems, should also be documented. It is vital that utilities create and maintain accurate and thorough documentation of all connections to, pieces of, and access to their network.
In most cases, SCADA systems lack adequate monitoring and detection systems, making them vulnerable to attacks from external and internal sources. Setting up monitoring and detection controls is the next step in protecting your SCADA system. There are many different types of monitoring and detection software on the market. Selecting the software that is best for your particular operation can be a difficult task. We suggest that you work closely with network professionals to evaluate your specific network needs.
Once you have documented and set up adequate monitoring and detection systems, you can then begin to segment the network. Segmenting the network should be used to separate other business systems that are running on the same network as the SCADA system. Due to the fact that attacks are increasingly exploiting both physical and cyber vulnerabilities, it is important to align physical security and cybersecurity processes. Application whitelisting, firewalls, and gateways are all ways to build a defensive perimeter around your SCADA systems.
Security is also something that is in continual motion. Rules, security checks, report monitoring, and standardized processes must be instituted and utilized by everyone who has access to the SCADA system and all other connected networks. Regular evaluations must also be performed for vulnerability, risk, and all assets in general. These assessments should be conducted on a regular basis to verify that security measures are adapting to the changing threats on the IT landscape.
Using a combination of security policies and controls to adequately secure today’s systems is critical to your organization’s operation. Understanding common weaknesses, creating and implementing an action plan to bring security to an acceptable level, and employing standardized processes will minimize the risk posed by an increasingly hostile Internet environment.
Over the last two weeks, our Sales & Marketing has had the privilege of participating in Itron Utility Week and the Itron Partner Conference in a virtual format. While these conferences looked different this year, we could connect with utilities, industry leaders, and partners from across the country with innovation at the center of many conversations.
We heard from Itron, Inc. President & CEO, Tom Deitrich on the importance of innovation in our industry and how Itron Inc. solutions and ideas can be harnessed to meet the challenges that the utility industry is facing today as consumer expectations change, cities become more interconnected, and sustainability needs increase.
“We can empower innovation by sharing fresh ideas with endless possibilities, and together, create a more resilient, more reliable, safer and more resourceful world.” – Tom Deitrich
Throughout the last two weeks, we had the opportunity to witness how Itron, Inc. solutions can allow utilities and cities to address these changing needs and create a better future for the industry. The use of intelligence and analytics offered by these solutions will enable utilities to increase customer engagement, reduce water loss, better manage energy, and respond to changing real-time conditions. With the ever-increasing amount of data at utility’s fingertips, it’s more important than ever that we turn that data into actionable items. Having information is the first step; turning this data into progress is the second. Many utilities struggle with managing and acting upon data. Many solutions and ideals discussed over the last two weeks give utilities the tools needed to ride into the future, better prepared, and ready to ensure long term sustainability.
We want to thank Itron, Inc., for the ability to participate in these thought-provoking and informational sessions. We look forward to sharing the valuable insights gained with our customers!
Before coming to work at United Systems, I had never once heard of fraudulent utility accounts. I quickly learned that this was a very serious and costly issue that many utilities face. Let me explain… we’re going to call our customer Judy. Judy doesn’t pay her bill, and her service gets shut off. Instead of paying the bill and the fee for reconnection, Judy comes in and opens an account in her boyfriend, John’s name. A couple of months go by, and John’s account gets shut off. Well, here come Judy and John, and they open an account in their son, Joe’s, name and the cycle continues. Accounts opened in roommates, spouses, and even kids names happen regularly. The delinquent amounts and disconnect/reconnect fees are never recovered, and the utility takes a loss.
Working closely with utilities over the last several years has led me to some best practices to avoid these types of fraudulent accounts.
The key to overcoming fraudulent accounts is information. Ensuring that your CIS/billing software stores the necessary information and tracks relevant data on the customer, location, and billing account is essential. This software functionality used in conjunction with the record keeping steps above can save your utility money in the long run!
Is your utility using multiple vendors for utility billing, online bill pay, financial management, outsourced billing, network management, and meter reading software? The typical answer is: “yes.” The majority of utilities spread their technology and software services across multiple vendors. Each of these vendors have their own requirements, processes, and support. Integrations between systems are pieced together and tend to cause more headaches than benefits. Finding a vendor that meets all your utility’s technology needs is a rare occurrence. United Systems is that vendor.
Since 1977 United Systems’ priority has been helping utilities meet their goals through the use of technology. We developed comprehensive solutions based on direct feedback from our customers that addresses the specific needs of utilities. Through this process, we have discovered that many utilities struggle daily with using multiple systems to accomplish tasks that should be cohesive. We took these struggles to heart and have worked to create solutions that meet these needs in a coherent and all-encompassing manger.
United Systems & Software, Inc. offers a comprehensive suite of software designed to meet the utility billing needs, inventory needs, asset management needs, and financial needs of utilities as well as various city management functions. Our in-house staff develops all of our software, and from its inception, our software is designed with seamless integration in mind. As the nation’s leading Itron, Inc. AMR & Fixed Network Distributor, we are innately aware of the meter reading needs of utilities and how vital it is that your meter reading system and utility billing software compliment and communicate with each other. Our TPM by United Systems team consists of networking professionals that have the knowledge and skills necessary to keep your utility infrastructure safe and to ensure that your hardware is up to date, secure, and functioning properly.
Having multiple different vendors for all these functions can make day to day operations difficult at a utility. In situations where a utility is using various different vendors, the system tends to be disjointed. Employees have to go between many different vendors, with each vendor blaming the other for the issues the utility is experiencing most times. Getting answers and solutions is like swimming, upstream…difficult, and useless. Your readings aren’t importing correctly; do you call your software vendor, your AMR/AMI vendor, or is it a networking issue preventing the file from importing? Your general ledger entries are out of balance; did you enter an entry from your utility billing incorrectly, was it a voucher paid to a vendor, or a payroll entry? Where do you even start?
With United Systems, you only have one vendor to call. We support and assist you with your entire system from your telephones, to protecting your data, to the radio transponders on your meters, to ensuring that your utility bills are printed and mailed on time.
Have questions or want to learn more? Reach out to our highly trained account management team:
Phone: 1.800.455.3293
Email: marketing@united-systems.com
United Systems & Software, Inc. is a technical services firm that specializes in software development, business continuity, and wireless solutions.
This Privacy Statement applies to United-Systems.com and United Systems websites, services and products that collect information via signup, registration, or use of contact forms.
United Systems maintains and provides a wide array of websites and web servers operated by United Systems. In the course of using our websites, you may choose to provide information via web forms, email or other electronic means. Personally identifiable information submitted will only be used for United Systems related purposes. United Systems will not sell this data to outside parties.
Requests for information and information submitted via forms will be directed to the appropriate staff to respond to those requests and may be recorded to help us improve our site to better respond to similar requests.
United Systems makes every reasonable effort to ensure that your personal information remains as secure as possible. Accordingly, we prevent unauthorized access by a secure firewall and use of security technologies to protect the integrity and privacy of any personal information you provide.
As an additional security measure, your personal information is also encrypted during transmission by Secure Socket Layer 128-bit encryption software. (Encryption is a common method used to transmit sensitive data across the Internet. Encryption temporarily makes the text unreadable during the time it is being transmitted over the Internet.) This is an industry standard.
Although we endeavor to protect your personal information, United Systems cannot warrant the security of any information you transmit to us through online applications, and you do so at your own risk. Depending on the nature of the inquiry, your communication could be discarded or archived. If you wish, you can contact us instead by telephone at the numbers provided throughout our site.
Some portions of our websites may require login identifiers and/or passwords. You are responsible for taking reasonable steps to ensure that no unauthorized person has access to your password or account login information. It is your sole responsibility to control the use of login information and passwords, to authorize, monitor and control access to and use of your account and password and to inform United Systems promptly of any need to deactivate an account.
In order to provide website users with other helpful information, our websites contains links to other websites. However, United Systems provides no authority over external organizations’ websites and this policy does not apply to external sites that are provided as links. We encourage you to read the Privacy Policies on any external websites before providing them with personal information.
In order to protect the information and identity of children, we ask that minors not submit any personal information to us. Parents or caregivers should become knowledgeable about websites that collect information so they can assure that their children’s use of the Internet reflects parental preferences and requirements.
United Systems & Software, Inc. Reserves the right to alter all affiliated websites and general use of privacy policies described here without prior notice. If you have questions about this privacy policy or concerns about how we collect, use or protect your personal information, please contact us at sales@united-systems.com.
United Systems provides equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, the United Systems will provide reasonable accommodations for qualified individuals with disabilities.
United Systems does not subscribe to or engage in any personnel policy, standard, or practice that permits or allows for the promotion, demotion, employment, dismissal or laying off of any individual due to the individual’s race, creed, color, national origin, age or sex, disability, veterans or individuals with disabilities.
The mission of United Systems and Software, Incorporated (USS) is to deliver the highest quality products and services that benefit our valued customers.
In all matters, the people of USS are to be professional, honest and ethical in working with clients, fellow workers, investors, and vendors. These fundamental values are rooted in our work environment that cultivates respect in all of our actions while contributing to the quality of life and economic growth of our community.
Respect for clients – USS strives to address the dynamic needs of clients with services and products of the highest quality. Our goal is to have completely satisfied customers.
Respect for fellow workers – USS’ team members are encouraged to work and listen to one another. We encourage teamwork, trust, and loyalty. Our basic principle is to treat others better than they expect.
Respect for the individual – USS strives to promote an environment that provides challenging work, opportunities for personal growth, reward for innovation and recognition for excellence. We support a balanced lifestyle that allows each person to reach their potential in career, family, physical and spiritual needs.
Respect for investors – USS’ goals are to generate a fair return on investment and use funds prudently. We are committed to increasing the value of our company.
Respect for vendors – USS will work with each of our vendors in a professional, courteous and honest manner. Our goals are to develop and maintain mutually rewarding business partnerships. USS expects to receive products and services of the highest quality from our vendors.
Operating System* |
|
---|---|
Server |
|
Database* |
|
Port |
|
Workstation* |
|
Display |
|
Other Devices |
|
Technical Support |
|
Additional Hardware* |
|
Mobile Field Service |
|
*Not Supported: Windows ‘Home’ variant operating system, SQL Server ‘Express’ license format, impact matrix printers. |
We at United Systems (USS) are concerned about protecting sensitive customer data, as well as our own data, software products, trade secrets and intellectual property. With this in mind, the following summary delineates United Systems’ stance on security and related security measures.
USS only accesses customer data under the following circumstances:
USS keeps the data secure using the following methods:
The services and software that United Systems provides are subject to the following Terms of Use Agreement. United Systems reserves the right to update the Terms of Use Agreement at any time without notice. The most current version of the Terms of Use Agreement can be reviewed in the footer section at United-Systems.com.
Unless otherwise specified, United Systems’ services and software may not be modified, copied, distributed, transmitted, displayed, performed, reproduced, published, licensed, create derivative works from, transferred, or sell any information, software, products or services obtained from United Systems.
See the Privacy Statement disclosures relating to the collection and use of your information.
If any portion of our websites require you to create an account, you must complete the registration process by providing us with current, complete and accurate information as prompted by the applicable registration form. You also will choose a password and a user name. You are entirely responsible for maintaining the confidentiality of your password and account. Furthermore, you are entirely responsible for any and all activities that occur under your account. You agree to notify United Systems immediately of any unauthorized use of your account or any other breach of security. United Systems will not be liable for any loss that you may incur as a result of someone else using your password or account, either with or without your knowledge. However, you could be held liable for losses incurred by United Systems or another party due to someone else using your account or password. You may not use anyone else’s account at any time, without the permission of the account holder.