Security Installation Example
Company & Need: Our practice breach scenario company will be Albany Towing Services, who I reached out to after hearing about their quality services in the local news. When a person gets in a car accident these guys race to the scene. In the case of an emergency or an accident, the insurance agent calls, explains the situation in detail, and requests a tow truck be sent to the customer’s location. The operator determines the distance (in miles) from Albany and states the price of the service. The insurance agent verifies the customer’s agreement to the price and proceeds to give Albany Towing the credit card over the phone. The dispatcher calls for the appropriate vehicle to be sent to the location, processes the credit card payment, and provides an estimated time of arrival to the requested location. Overall, the process is standard across the industry. The majority of towing companies process credit card payments over the phone, but why do they need any kind of security?
Albany Towing Services needs security to protect the customer’s privacy and credit card data from being stolen. When it comes to the Internet, no one needs to steal physical objects any longer. People can now use technology to steal digital property we have online. In this company’s case, the computer system they used was newer, so it had some basic antivirus software and a standard firewall. However, that’s not necessarily enough to stop someone who wants to steal information. If the computer system or terminal are not protected, the risk of a breach is much higher. If you remember from Christmas of 2015, Target was hacked from a remote location just outside the store, most likely a mobile vehicle. Security software is needed to protect Target and the clients from unauthorized access and breaches of data. The same is true for our example company.
Goal: Computer-based security to protect private data and client credit card information
Solution: Computer system upgrade to Solid State HD Dell XPS computers and Antamedia kiosk software. The premium edition locks the computer system, secures folder access rights, blocks system keys, hides system drives, and best of all – blocks applications and program options. The secured payment processing is another key feature that was really a perfect fit for the organization. The enhanced security comes with a hefty price tag, but it’s small in comparison to the damage that can be done by hackers if any customer information is stolen. In addition to any initial monetary hits, the long-term damage to a company’s reputation can be very damaging. In this example, we simply explained why companies choose to protect themselves. For a practice scenario of a data breach, please see our breach scenario page.
In order to reach our team or ask about the example company’s experience, please contact email@example.com.