DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

City of Norman, OK temporarily suspends utility payment portal; ditches Click2Gov after another potential security incident

Posted on November 7, 2019 by Dissent

The City of Norman, Oklahoma has suspended its online portal for paying utility bills after they were notified of a potential security incident involving Click2Gov software by CentralSquare Technologies.

At this point, the city seems to have had enough with Click2Gov security issues. The city is currently in the process of switching over to another payment processor.

The city issued the following press release:

All online payments for City of Norman utility services and permitting fees are suspended through November 12 while the City makes an emergency transfer to a new payment processor. Payments may be made in person at 201-C W. Gray St., by mail at the same address or by calling 405-366-5320 for Utility payments or 405-366-5339 for permitting and licensing fees.

The City was made aware of a potential security event this week involving Click2Gov, a third-party payment software system that processes some payments on behalf of the City. As a precaution, the City has taken down the Click2Gov payment servers and is in the process of implementing a new online payment solution through Paymentus. The new software is anticipated to be online by November 12.

The City of Norman takes cyber-security and the public’s data very seriously. The City works on a daily basis to ensure its online systems are secure to the highest extent possible, and the safeguarding of its citizen’s financial information is the City’s highest priority. The City is currently working with CentralSquare, the parent company of Click2Gov, and other third-party experts to determine the scope of the security event.

An investigation into the event at Click2Gov by the Federal Bureau of Investigation is ongoing. Once the investigation is complete, all potentially impacted parties will be notified as required by the law.

Previous coverage of Click2Gov breaches is linked from here.

CORRECTION:  A previous version of this post incorrectly reported that this was the second time Norman, Oklahoma experienced a Click2Gov breach.  This was the only such incident Norman, Oklahoma reported. DataBreaches.net regrets the error.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
Category: Commentaries and AnalysesGovernment SectorOf NoteSubcontractorU.S.

Post navigation

← Mysterious hacker dumps database of infamous IronMarch neo-nazi forum
If Robert Grant didn’t like having Time AI called “snake oil cryptography,” he’s really going to hate what he’s being called now. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.