BirdDog Version 4.0

BirdDog™ Information Systems is pleased to announce the release of Version 4.0 of Remote Data Retrieval. This newest system, to which you automatically have access when you log into our host site, provides enhanced features that are certain to make you even more productive... such as a more streamlined and intuitive user interface, the ability for end-users to perform ad hoc changes to alarm settings, and layered administration. With layered administration, end-user organizations can assign BirdDog client administrators who, in turn, will be able to add/delete other enterprise users, set each user's rights (from read-only through full editing, including use of Demand Polling), reset user passwords, add/delete Morning Report recipients, and much more.

In addition to the BirdDog Remote Data Retrieval system functional enhancements, we've also deployed new security provisions to further complement our previously implemented use of an HTTPS website to provide full SSL encryption of your sensitive and proprietary information. These enhancements include the use of unique email addresses as User IDs, as well as stronger Password requirements with history restrictions and forced routine changes. As before, with just a single account User ID and Password, your log-in will provide direct access to all BirdDog SaaS (Software-as-a-Service) systems to which you have end-user rights. And as you add or remove systems from your user profile, the single sign-on process will automatically recognize those changes.

BirdDog Security Policy Change Alert

Security Policy Change Alert - For the enhanced security of BirdDog™ Information Systems users, effective November 11, 2013, User IDs will be unique email addresses and account password requirements will be strengthened. New passwords will need to be at least 8 characters in length and contain at least one each of the following characters: uppercase alphabetical; lowercase alphabetical; numeric; and “special” (such as @, &, _, #, etc.). At the appropriate time, you will be prompted during your BirdDog log-in to click on a webpage link that will provide more details and guide you through your password change process.

BirdDog System Support

  • Log-in and system support, including password resets, are available to customers on a 24x7 basis by calling, toll-free, 800-231-9741. During business hours (8:00 a.m. until 5:00 p.m. Central Time, Monday through Friday), your call will be directed to the appropriate technical support or customer service team member.

  • During non-business hours, callers will be presented with a main menu which includes an option to reach system support and, if appropriate, to mark your message as “urgent” for an expedited response. Non-urgent support calls will be returned the next business day.

  • System support requests or questions may also be submitted via e-mail to

Coastal Flow Measurement Companies
Proving the Value of Quality
Service Since 1974


IT Security remember the basics!
Date: 9/27/2012


Ensuring adequate protection for your most sensitive information and intellectual property assets – and those of your customers, business partners, and others – is a constant challenge, especially as an increasingly greater amount is in electronic form and remotely accessible. In today's digital world, this clearly places IT (Information Technologies) Security in a mission critical role. But while your techies do battle with the latest black-hat hackers and their exploits, it's important to remember the basics.

The weakest link in nearly any security provision, whether IT-based or otherwise, is the human factor. The most robust, leading-edge security systems can often be circumvented through relatively simple social engineering techniques…and, generally, this can be accomplished without face-to-face contact. While news headlines are sensationalized with reports of sophisticated system hacks and the capture of hypersensitive information, they often pale by comparison to the crown jewels exposed by manipulating people through deception and fraud.

One example of social engineering involves baiting an unsuspecting victim with an innocent looking physical object like a USB flash drive or DVD disk, tantalizingly labeled "First Quarter Payroll Spreadsheet," "Department Performance Reviews," or something similar. These items may be left in lunch rooms, by building entrances, or around similar high-traffic areas, with the hope that a curious person or Good Samaritan will retrieve the object and try to read it with his or her computer…not realizing that the object has been loaded with malware that is released when accessed. Another common approach with many variations involves using a pretext, such as impersonating another person of authority, to glean valuable information.

In addition to social engineering awareness and associated employee training, other IT security basics cover both physical and virtual considerations, including firewalls, secure routers, anti-virus/malware, e-mail and web filtering, WiFi security, the timely application of security updates, and the use of encryption. A regular review and audit of all security measures is prudent and just plain good business. When you do, don't forget the basics!


"It's not that I'm so smart, it's just that I stay with problems longer." ~ Albert Einstein, German-born physicist

Copyright 2021 Coastal Flow Measurement, Inc. All Rights Reserved.
By continuing to view this web site you agree that you have read and accept the Terms of Service for Coastal Flow Measurement, Inc.
Coastal Flow Measurement, Inc.
P.O. Box 58965 , Houston, TX, 77258-8965
Phone: 281.282.0622; Fax: 281.282.0792