Water Utility Service

November 11, 2008

Gopher Utility Services is a full service Water Utility Service located in kannapolis, NC. We service all of the Southeastern United States to include North Carolina (NC), South Carolina (SC), Tennessee (TN), Virginia (VA),Georgia (GA) and Florida (FL).

Gopher is a licensed 3 generation well drilling family that has expanded into SCADA control system design, manufacture and installation in addition to water utility service installation and repair, wastewater utility service and repair and both residential, commercial and industrial water installation.

We can handle any water related problems, give us a call at 704-932-7662 or visit us at our website:

Gopher Utility Services


Well Servicing

October 2, 2008

At Gopher Utility Services we pride ourselves in quick, reliable and trustworthy servicing of your well water filtration system. One of the most important steps you can take as a well homeowner is to periodically have your well water tested. How? Easy, just call Gopher Utility Services. The results can provide a baseline for monitoring your well water quality over time. If problems are detected, hard water, too much iron or a multitude of other problems, we can suggest a solution. Or, you may just want to monitor the situation.

For other helpful facts, visit Gopher Utility Service for  Charlotte Well Service or call 704-932-7662

Well Water Filtration

September 25, 2008

Well water filtration is an integral part of your whole house water system. Did you know that at the very bottle of your water well is a filtration screen that helps prevent debrix from getting into your well pump. This well screen helps prolong the life of your water pump by filtering out sand, rock and larger particles that would effect the efficiency and effectiveness of your submersible or jet pump.

This initial water filtration step does not affect  the concentration of dissolved minerals such as calcium and magnesium, the cause for water hardness. Ever have problems getting your soap to lather? If you do, its usually because you have “hard” water which is an increased concentration of calcium and magnesium in your water. Its not bad but you can do something to reduce the concentrations.

There is a lot more information on well water filtration – visit our website for more information at:
Water Well

Well problems: Call the experts at Gopher Utility Services – 704-932-7762

Well Pump Problems?

September 24, 2008

Problems with your well pump?

Are you experiencing problems with the home water system?

Most of our service calls deal with well pump problems. These problems can usually be resolved quickly by either a well pump replacement or a rebuild. We have the facilities and know how to resolve the problem quickly and at a fair price.

If your well pump is a submersible or a jet pump, makes no difference. We can take care of your problem.

Its important for you to realize that Gopher Utility Services provides service to major water utilities and municipalities, in addition to helping the average homeowner with their water problems.

If you need help with your well water problems, call Gopher! 704-932-7662

well pump problems

Charlotte Well Pump Repair – Emergency Water

September 1, 2008

Charlotte well pump repair service is available for all of Charlotte, and Union, Mecklenburg and Cabarrus counties for emergency service well pump repair. With Hurricane Hanna approaching the SE United States and possibly affecting the Carolinas, make sure you have water stored in case you lose power and your well water pump does not function.

Emergency Water Storage

You should store at at minimum one gallon of water per person per day and that many experts suggest keeping a two-week supply? This assumes at least one-half gallon of water daily per person would be used just for drinking.

Here is a list of possible solutions to store bulk water in addition to the “water in the bathtub” and “milk carton” water storage solutions

1. WaterBob

The WaterBob is a 100-gallon bag made of 4-mil, food-grade plastic that is placed in the bathtub. An included siphon pump is used dispense the water into jugs or pitchers. The WaterBob costs $30 (Cost per gallon $.3)

2. Home Emergency Water System

This two-ply plastic bladder system holds more than 45 gallons of water, not the expensive water you buy at the store.  Made in Conway, South Carolina (Cost per gallon $1.12).

3. Aquatank

This bladder comes in different sizes from 30 gallons to 300 gallons. A 300 gallon bladder costs about $300 (Cost per gallon $1)

4. 55 gallon or 15 gallon Drum

It is weather resistant and can be stored outside. A 55 gallon drum costs approximately 58 dollars (Cost per gallon $1.05)

5. A 5 gallon collapsible water container

It costs about $6 (Cost per gallon $1.2)

For More information on Emergency Preparation: Check out FEMA

Problems with your well? Call Gopher Utility Services at 704-932-7662

Charlotte Well Service – Well Sanitation

August 30, 2008

Well Sanitation –  If your water well area has been flooded recently, you may need to sanitize your well.

Here are 8 easy steps to follow:

1) Bypass your water softener, filters and any other water treatment items you may have connected to your well water system. Why is this important? If you have a resin based water treatment system, the chlorine that you will introduce into your system may damage your resins making them ineffective.

2) You’ll have to remove the well cap/well seal to introduce the sanitizing medium, chlorine.

3) Put a pipe or hose into the well, 10′ is good, to get around any obstructions.

4) Introduce half of the chlorine tablets into the well, listen to make sure they are hitting the water.

5) The other half, dissolve chlorine tablets in a bucket of water  and pour the sanitizer into the well.

6) Circulate the water through the entire system making sure you have a strong chlorine odor. You can connect a hose to an outside water faucet and open the silcock and run it back into the well. Do this for all your service lines.

7) Let the solutions sit for at least 6 hours, preferrably overnight. Then drain the system being careful not to sanitize your septic system! Flush until the chlorine smell has dissipated.

8) Return all equipment to servicing positions.

After several week, you should have the water tested for bacteria. If bacteria is present, call Gopher Utility Services for porfessional help

Well Pump Problems in Charlotte,NC?

August 25, 2008

Pump problems with your water well?

Gopher Utility Services installs and reconditions well water pumps. With decades of experience, we know water pumps and can give you the quickest, most cost effective solution to your well water pump problem.

As a water utility and wastewater utility service company, we have the experience and know how to it right the first time, everytime.

Visit our website at Water Pump Servicing or call us at 704-932-7662.


Water Well Drilling in Charlotte

August 21, 2008

Charlotte well drilling and water well drilling in the surrounding counties of Union, Cabbarras and Mecklenburg continue above average due to the continued drought conditions.

During drought conditions the groundwater level drops due to the continued demand. Normal precipitation patterns replenish the groundwater table but due to the lack of replenishing rains from especially tropical depressions and hurricanes, many wells are running dry.

Your alternatives are few, one of which is to drill a deeper water well, but for more advice, call us at Gopher Utility Services located in Kannapolis, NC.

July 16, 2008

Gopher Utility Services, Inc is a full service water utility and waste water utility licensed contractor, fully insured and bonded, for any residential, commercial and industrial water project. Fully licensed as commercial electricians, Gopher installs and trouble shoots any SCADA problems, control system problems and with a fully equipped mechanical shop, can repair parts for quick repair turnaround times.
Emergency service, 24/7 is also available.

Call us for information.  704-932-7552

SCADA Control Systems – Top 10 Rules for Protection

July 14, 2008

SCADA control systems – more SCADA data.

NewswireToday – /newswire/ – Irvine, CA, United States, 06/11/2008 – Leader in device-based authentication distills years of experience into valuable advice for security administrators.

Uniloc Inc., the leader in device-based authentication, today announced its top ten rules for securing SCADA networks and Industrial Control Systems. Uniloc’s advice comes at a time when threats to control systems can originate from numerous sources such as terrorists, industrial spies, disgruntled employees, malicious intruders, human errors and accidents, equipment failures, and natural disasters. Addressing this threat, Uniloc recently unveiled NetAnchor CIS™, a powerful device-based Identity and Access Management (IAM) appliance for securing critical infrastructures against such potentially catastrophic threats to water and power utilities, oil and gas infrastructure, transportation networks and large industrial environments.

In a paper entitled, Ten Rules for Combating Cyber Security Attacks on Critical Infrastructure, Jim White, head of Uniloc’s infrastructure security group, presents guidelines for addressing challenges in securing the nation’s critical infrastructure.

“Following the release of our NetAnchor CIS critical infrastructure security solution, many customers asked us to send them basic information about how best to secure their SCADA networks,” said Jim White, VP, Business Development for Uniloc. “After receiving significant feedback from the industry, it is in the best interest of our nation that those managing its critical infrastructure have the most advanced technology and methodologies available for securing these networks.”

Uniloc’s Top Ten Rules for Combating Cyber Attacks on Critical Infrastructure

Begin with your environment
1. Do Serious Risk Analysis. Determine what your exposure is to identified threats, their consequences, cost of mitigation and risk tolerance. Create a risk profile of critical assets, using it as a basis to develop policies and procedures prior to deploying technologies.

2. Implement policies and procedures. Before implementing any technical solution, create a comprehensive set of policies and procedures that serve as guidance to operators, security personnel, vendors, and anybody who could have access to or contact with SCADA systems.

3. Ignore training at your peril. Often overlooked, staff training is one of the most important components of a good security plan. Having the right technical policies, procedures and infrastructure is useless without people knowing how to properly use them. Training should encompass all aspects of your security plan.

4. Make security policies as important as safety policies. You should have zero tolerance within the organization for security breaches across any aspect of your SCADA environment. Such breaches can lead to loss of life, bodily injury or other consequences such as a detrimental impact on the environment or local community.

5. Integrate physical and cyber security. Physical access controls and surveillance technologies need to be integrated into an overall cyber security infrastructure. Just as SCADA has migrated to the use of IP protocols and COTs technologies, access and surveillance functions have moved in parallel. Integrating these functions creates a coordinated approach to protecting critical systems.

Know your enemy — better yet, know your friends

6. Create a “trust” zone. Isolate cyber assets from all personnel except those specifically authorized. Focus on methodologies and technologies that authenticate and authorize only those who are trusted and prohibits all others by default.

7. Establish authentication for users and devices/systems. Device /system “fingerprinting” provides the first layer in creating a “cyber fortress” architecture. Such architecture creates a trust perimeter for both SCADA systems and access clients based on the actual physical fingerprint authentication of systems and devices.

8. Strictly enforce privileges. Ensure that only authenticated systems and clients are allowed to communicate across an encrypted communications channel. All applications should use Role Based Access Control (RBAC) at both the application and device level. Device fingerprinting technology allows RBAC to be implemented at a level that has not been available before — the device itself.

9. Use dynamic password methodologies. Periodically changing passwords is a best-practice policy worth following. However, in some cases the policy can be restrictive and unenforceable. Using a dynamic challenge and response mechanism between hardware devices creates a hardware password that is enforced dynamically and only known between trusted devices.

10. Adopt physical device recognition. Many companies seek to mitigate the risk of problems caused by humans (traditionally the ‘weak link’ in security systems) by using multi-factor authentication, notably human biometrics such as retina scanning, smart cards, and fingerprinting. While all of these serve to identify an authorized user, most are not practical in an industrial environment. The best solution is to include a user’s computer as part of an identity and access control solution, validating identity through multi-factor identification.

Additional questions? SCADA

About NetAnchor CIS
NetAnchor CIS protects SCADA networks using Uniloc physical device recognition to restrict access to distributed field components to designated computers used by authorized personnel at the control center and in the field. With NetAnchor CIS, an authorized user must be on an authorized device to access control system networks. NetAnchor CIS provides notification and location of unauthorized connection attempts to the NetAnchor CIS Virtual Private Network (VPN) as well as attempted physical connection attempts to a NetAnchor CIS field security appliance. NetAnchor CIS also shields control systems against malicious code threats, ensuring against network vulnerabilities and allowing centralized field security monitoring.

About Uniloc Device-Based Authentication
Physical Device Recognition (PDR) is the core technology behind NetAnchor CIS and is based on the fundamental principle that no two digital devices are identical. The process of physical device recognition starts by generating a digital identity for a device, known as its “Physical Device Fingerprint.” A physical device fingerprint is made up of a combination of machine characteristics and properties that are generated using a set of proprietary algorithms. The Uniloc Physical Device Fingerprinting algorithms allow the unique, reproducible identification of a device with an accuracy greater than 3.4 * 10^38, allowing Uniloc to identify devices with more comparable accuracy than human DNA testing. When applied to NetAnchor CIS, the stage is set for this device-based authentication to stand as the leading access control solution for infrastructure security.

About Uniloc
Uniloc USA is the technology leader in electronic Physical Device Recognition (PDR) for critical infrastructure security. The core technology platform driving Uniloc innovation is physical device fingerprinting, the company’s patented method of uniquely identifying a user device, such as a PC or PDA, by the naturally occurring, inherent physical imperfections of that device, and then incorporating that physical device fingerprint into licenses or access credentials. Uniloc’s technologies can identify devices with more comparable accuracy than human DNA. Uniloc is the inventor and holder of the seminal physical device locking patent (U.S. 5,490,216) and has 9 related patents pending. Uniloc has applied its Physical Device Fingerprinting technical expertise to several vertical markets, including software publishing, network authentication, transportation, social networking and DVD retailing.

NetAnch CIS is a trademark of Uniloc USA. All other brand and product names are, or may be trademarks of their respective owners.