217-228-6180 or 888-333-2563
salesadmin@etccomputerland.com
ETC’s AlienVault USM (Unified Security Management) Solution

Today’s security threats are advanced and constantly evolving. Threats become more complex and targeted for companies dealing with large amounts of sensitive customer and company information. Such organizations need to have an easily-manageable and reasonably-priced solution to ensure they are not susceptible to attacks, that they can respond quickly and effectively in the case they are attacked, and that they meet and surpass compliance standards that are in place to protect their customers. The peace of mind that can be achieved with such a solution creates indispensable value for both the company and the customer alike.

AlienVault USM is the all-in-one solution Security Management tool that is ideal for mid-market organizations. In this Educational Series, we will delve into the various powerful features and demonstrate how to make the most of them. This series is designed both for companies interested in AlienVault and those that already use it. In this article, we will introduce AlienVault from a bird’s-eye view – and then we will follow up with more detail in later installments.

Not only is AlienVault USM reliable and cost-effective, but it is also very fast to implement. As soon as it is turned on, the Asset Discovery feature identifies the assets on your network – along with metadata, software services, operating system information, hardware information, and users that are logged in. You can then access all of this information in one screen. This saves you both time and money.

One of the benefits of having all of your security management services bundled into AlienVault Unified Security Management is that asset information discovered is correlated with known vulnerabilities, and the intrusion detection system is constantly updated.

Some of the Behavioral Monitoring capabilities in USM include: Netflow information, bandwidth monitoring, and Traffic capture.

AlienVault also makes extensive use of information from outside of your network in order to keep your information and the information of your clients safe and uncompromised. AlienVault Labs has security researchers constantly updating the knowledge in the AlienVault Threat Inteligence system, and this data is transmitted directly to USM. This goes beyond the more traditional signature-based detection methods with which you may be familiar. The applicable alarms are shown in the interface, and they are separated by the intent of the attacker. This provides your team with a categorized survey of threats. You will receive information on malware infection attempts, and you are able to drill down to identify information for a given host. AlienVaults Opent Threat Exchange – aka “OTX” – empowers you to easily identify known malicious attackers as they seek to target your environment.

Compliance is a very important part of your organization’s Security Management efforts, and for those companies subject to strict compliance regulations, AlientVault USM’s compliance-ensuring technology is worth the price alone. USM not only collects the data you will need for your reports, but also generates the reports in the formats you will need to present to auditors.

What AlienVault’s Unified Security Management ultimately means for your organization’s security team is that you will have complete security visibility that is fast and easily accessible. Rather than spending time setting up and coordinating several tools, your team will be able to spend more time responding to and investigating alarms related to people using and potentially targeting your systems. You can have it set up in a matter of minutes. Watch the video to learn more.

This is part of ETC’s Managed Security Educational Series to inform both current and prospective AlienVault customers of its features and managed security best practices. If you haven’t already, Opt in below to receive our educational series by email. Conveniently schedule a free assessment to determine your custom Managed Security needs. Call our specialists at (217) 228-6180 to discuss the best managed security solutions for you.

SIEM Solutions
First
Last

The best way to prevent an infection is to not rely on just one solution but to use multiple, layered solutions for the best possible protection.

1. Security Awareness Training
It’s easier to prevent malware infections if you know what to look for. If you understand the latest techniques cybercriminals are using, the easier it will be to avoid. Know your enemy! 

2. Internet Security Products
There are many commercial products that will help you avoid all malware infections, but understand that none of them are 100% effective. The cybercriminals are always looking for weaknesses in security products and promptly take advantage of them.

3. Antivirus Software
While antivirus is highly recommended, you should have multiple layers of protection in place. It is not wise to solely rely on antivirus software to keep your PC secure, as it cannot prevent infections from zero-day or newly emerging threats.

The list of antivirus products below was proven the most effective at preventing malware from AV-Test.org 

Avira Antivirus Pro 2015
Kaspersky Internet Security 2015
Bitdefender Internet Security 2015
Norton Security 2014 & 2015
Trend Micro Internet Security 2015

4. AntiMalware Software
Most anti-malware software like MalwareBytes is designed to run alongside Antivirus products, and it’s recommended you have both in place.

5. Whitelisting Software
Whitelisting offers the best protection against malware and virus attacks. Whitelisting software allows only known good software that you approve to run or execute on your system. All other applications are prevented from running or executing.

6. Backup Solutions
In the event of a catastrophic attack or complete system failure, it’s essential to have your data backed up. Many have been able to quickly and fully recover from an attack because their data was backed up and safe.

Ask us about our KnowBe4 resources.

The phone system is the lifeblood of any business. Unfortunately, an unfit system can be a hindrance, making average tasks like conference calling complicated. Getting in touch with team members, customers, and suppliers should be easy, so you should watch out for the following struggles that point to a complete phone system overhaul.

Adding and removing users is tough

Changes can come to your team at the drop of a hat, so are you ready to add or remove a user from your phone system? Assigning a new phone number should be easy, right? Not necessarily.

Traditional phone systems have limitations because of phone line and port capacity, and upgrading can cost you big time. You often have to wait weeks to get new Direct Dial-In (DDI) numbers for each new employee. Sounds like it’s time to compare these upgrade costs to the overall switch to a VoIP system.

You’re forced to use a third party for conference calls

Traditional phone systems limit the number of lines that can be active on a call at one time. If you dread setting up each conference call because the process is cumbersome or if you’re paying extra for your third-party facilitator then you should consider a new VoIP system. Call conferencing comes standard on the VoIP systems offered by ETC ComputerLand.

Trouble with too many locations

Your business should have the capability to grow. As you set up offices at multiple locations, are you setting up an individual phone system for each? There’s an easier way with VoIP. This cost-effective solution will improve communication between team members across multiple locations thus increasing productivity while allowing you to better serve your customers.

Increasing call volume

A growing business is bound to see a year-over-year increase in calls or even seasonal spikes in activity. If so, you might discover that you don’t have enough incoming or outgoing phone lines. Customers might be getting a busy signal when calling in for customer service or sales and you can’t have that. Lost productivity leads to lost revenues.

This problem can force you to add ports to your existing system, but why not consider a VoIP system that makes adding call capacity easier without depending on hardware ports.

Lack of features

Older phone systems don’t offer features that come with VoIP systems. Personal call routing, mobility, enhanced call routing, voicemail to email, auto attendant, directory assistance, conferencing, call recording, call tracking, and more make the VoIP upgrade worth your investment.

How would you like to save up to 70 percent of your current monthly phone bill? Businesses of all sizes are making the switch to VoIP to save money and invest in improved reliability, mobility, and scalability. Call 217-228-6180 for a no-obligation consultation and we’ll show you where you can save money right away!

This month’s security tip is timely information on the Equifax breach from our security training partner KnowBe4.

Cyber criminals have stolen 143 million credit records in the recent hacking scandal at big-three credit bureau Equifax. At this point you have to assume that the bad guys have highly personal information that they can use to trick you. You need to watch out for the following things: 

•   Phishing emails that claim to be from Equifax where you can check if your data was compromised

•   Phishing emails that claim there is a problem with a credit card, your credit record, or other personal financial information

•   Calls from scammers that claim they are from your bank or credit union

•   Fraudulent charges on any credit card because your identity was stolen

Here are 5 things you can do to prevent identity theft: 

•   First sign up for credit monitoring (there are many companies providing that service including Equifax but we cannot recommend that)

•   Next freeze your credit files at the three major credit bureaus Equifax, Experian and TransUnion. Remember that generally it is not possible to sign up for credit monitoring services after a freeze is in place. Advice for how to file a freeze is available here on a state-by-state basis: http://consumersunion.org/research/security-freeze/

•   Check your credit reports via the free annualcreditreport.com

•   Check your bank and credit card statements for any unauthorized activity

•   If you believe you may have been the victim of identity theft, here is a site where you can learn more about how to protect yourself: www.idtheftcenter.org. You can also call the center’s toll-free number (888-400-5530) for advice on how to resolve identify-theft issues. All of the center’s services are free.

And as always, Think Before You Click!

Every so often, a customer asks us something like “I brought my computer in because it had a malware infection. Your charge to fix my machine is $200, but I only paid $400 for it. Your repair is half of what I would pay for a new machine, why is that?”

Malware does not distinguish between high-end and budget computers. It infects all of them in the same way. And, removing the malware involves the same repair activities whether it is a high-end machine or a budget machine. And by the way, this applies similarly to installing new software or connecting your machine to a network or many other activities. The cost of the machine simply has nothing to do with the work you ask our technicians to perform.

When you leave a machine with us, we understand our job is to get your machine running again. Our skilled technicians do everything they can to perform their job in an efficient manner; one that exceeds your expectations. This often requires a significant amount of technician time, which means expense to you. We understand this.

If you have a budget machine and are concerned about the cost of repair, please tell us in advance. Our technicians will communicate with you as they complete your repair, too, so you can decide whether to fix a budget machine or make an informed decision about purchasing a new one.

We understand that navigating security is important these days, so we’ve gathered a few tips to help you protect yourself while using Windows 10.

It’s important to use encrypted connections or VPN whenever possible. Windows 10 does offer a little help when dealing with Internet Service Providers. In your Wi-Fi settings, turn on the “Use random hardware addresses” feature to make it harder for people to track your location when you connect to different Wi-Fi networks.

Go to Settings > Privacy > Location to turn off the master location switch at the top of the page. Here you can turn location service off for your user account, set a city, zip, or region for apps to deliver relevant content, specify a default location for Windows to use when a more precise location isn’t available, and erase your saved history.

Cortana uploads some of your information from your calendar, contacts, browser history, and more to make your experience more personal. Click here to find out how to turn off Cortana completely.

You can save your files to the cloud using OneDrive when using your Microsoft account, but OneDrive is an opt-in service. Don’t sign in and it won’t do anything. If you accidentally sign in, click here to shut down OneDrive completely.

Call 217-228-6180 if you need us to help you with a more specific Windows 10 question!

You might call it a memory stick, flash drive, thumb drive, jump drive or a number of other names. Chances are you’ve got at least one lying around, but what would you do if you found one on the ground that didn’t belong to you?

Two hundred and ninety-seven flash drives were dropped in plain sight on the U of I campus in Champaign, Urbana last year. Forty-five percent of participants opened one or more files on the picked up flash drives and ultimately ninety-eight percent, or 290 of the drives, were removed from their drop locations by the end of the observation period. (Read the paper.)

That open rate is way too high. Our point is that you don’t know where that flash drive has been, so you should probably throw it away. If it has contact information physically on the outside of the drive, you could try to find the owner, but ultimately you shouldn’t just plug it in and see what’s on it.

Even if a flash drive isn’t hiding malware that could compromise your computer, at the very least, sharing drives could have exposed it to such atrocities. Unfortunately, the overall majority of USB vendors don’t build any kind of security into the devices, so you have to look out for yourself.

Call 217-228-6180 if you have a mystery flash drive we can help you with.

Who can enter this contest

1. To be eligible to participate in this contest, entrants must be residents of U.S. who are 18 years of age or older and reside in Illinois or Missouri and be existing users of Facebook.

2. Employees of ETC ComputerLand, Vervocity Interactive, Media Development, Facebook, Inc., Facebook.com and the immediate family members of each are ineligible. The term “immediate family” includes spouses, grandparents, parents, siblings, children and grandchildren. ETC ComputerLand will honor only one winner per household.

How to enter

1. No purchase is necessary and only one entry is allowed per Facebook account holder.

2. Log onto http://www.facebook.com to like or comment on the contest post on ETC ComputerLand’s Facebook page to enter.

3. The contest starts on Wednesday, November 18, 2015 at 10 a.m. and all entries must be received by Monday, November 23, 2015 at 3 p.m. ETC ComputerLand is not responsible for server unavailability, computer or other electronic malfunction if entry is not received.

4. On Monday, November 23, 2015 at 3 p.m., one (1) winner will selected randomly from the entries and the announcement of that winner will be made on ETC ComputerLand’s Facebook page by 5 p.m. the same day.

The prize

1. One (1) winner will be selected to win a $50 Gas Card from ETC ComputerLand.

2. The winner will be notified in the Facebook thread and via private message on Facebook. To claim their prize, the winner must provide his or her correct name, address and phone number, sign a release of eligibility and show photo I.D.

3. The prize may be claimed at ETC ComputerLand from 9 a.m. to 5 p.m., Monday through Friday (with the exception of Thanksgiving Day on Thursday, November 26, 2015, Thursday, December 24, 2015, or Christmas Day on Friday, December 25, 2015) and must be claimed by the deadline of Thursday, December 31, 2015 at 5 p.m. unless other arrangements are agreed upon by ETC ComputerLand.

4. If the winner cannot be notified within two weeks (by Tuesday, December 8, 2015) or does not sign the release to claim the prize, then that prize will be forfeited and, if time permits, will be awarded to an alternative winner selected randomly from the remaining valid entries.

5. The winner is responsible for paying all local, county, state and federal taxes on prizes based upon the estimated retail value of the prizes set forth in the rules posted here.

6. ETC ComputerLand, Vervocity Interactive and Media Development are not responsible for any liability arising directly or indirectly from the award or use of the prize.

7. By claiming your prize, you acknowledge that ETC ComputerLand, Vervocity Interactive and Media Development have the right to publicize your name, character, likeness, photograph, voice and the fact that you are the winner for promotional purposes without financial remuneration.

Odd of winning/other

1. The odds of winning depend on the number of valid entries received.

2. The contest rules are available Monday through Friday during normal business hours at ETC ComputerLand.

3. This contest is subject to all applicable laws and regulations and is void where prohibited. ETC ComputerLand, Vervocity Interactive, Media Development, Facebook, Inc. and Facebook.com accept no responsibility or liability in connection with any injuries, losses or damages of any kind caused by or resulting from the acceptance, possession or use of any prize awarded hereunder.

4. ETC ComputerLand cannot be held liable for any lost or stolen entries, prizes, or contest information.

5. ETC ComputerLand reserves the right to make rules and contest changes, and change the aforementioned contest dates.

6. By entering this contest, each entrant waives any and all claims of liability against ETC ComputerLand, Vervocity Interactive, Media Development, Facebook.com, and their respective parents, affiliates, officers, directors, employees and agents, for any and all claims, loss, damage or injury which may occur as a result of entrant’s participation in this contest.

7. Facebook, Inc., and www.facebook.com (collectively, “Facebook”) are not affiliated with ETC ComputerLand nor this contest.  This contest is in no way sponsored, endorsed, or administered by or associated with Facebook.

Who can enter this contest

1. To be eligible to participate in this contest, entrants must be residents of U.S. who are 18 years of age or older and reside in Illinois or Missouri and be existing users of Facebook.

2. Employees of ETC ComputerLand, Vervocity Interactive, Media Development, Facebook, Inc., Facebook.com and the immediate family members of each are ineligible. The term “immediate family” includes spouses, grandparents, parents, siblings, children and grandchildren. ETC ComputerLand will honor only one winner per household.

How to enter

1. No purchase is necessary and only one entry is allowed per Facebook account holder.

2. Log onto http://www.facebook.com to like or comment on the contest post on ETC ComputerLand’s Facebook page to enter.

3. The contest starts on Monday, September 21 at 11 a.m. and all entries must be received by Friday, September 25 at 3 p.m. ETC ComputerLand is not responsible for server unavailability, computer or other electronic malfunction if entry is not received.

4. On Friday, September 25 at 3 p.m., one (1) winner will selected randomly from the entries and the announcement of that winner will be made on ETC ComputerLand’s Facebook page by 5 p.m. the same day.

The prize

1. One (1) winner will be selected to win a $100 ETC ComputerLand Gift Certificate that can be used toward ETC ComputerLand IT Solutions including IT Support, Computer Repair, Printer Repair or Hardware/Software Solutions.

2. The winner will be notified in the Facebook thread and via private message on Facebook. To claim their prize, the winner must provide his or her correct name, address and phone number, sign a release of eligibility and show photo I.D.

3. The prize may be claimed during normal ETC ComputerLand business hours Monday through Friday from 9 a.m. to 5 p.m. and must be claimed by the deadline of Friday, October 9 at 5 p.m. unless other arrangements are agreed upon by ETC ComputerLand.

4. If the winner cannot be notified within two weeks (by Friday, October 9) or does not sign the release to claim the prize, then that prize will be forfeited and, if time permits, will be awarded to an alternative winner selected randomly from the remaining valid entries.

5. The winner is responsible for paying all local, county, state and federal taxes on prizes based upon the estimated retail value of the prizes set forth in the rules posted here.

6. ETC ComputerLand, Vervocity Interactive and Media Development are not responsible for any liability arising directly or indirectly from the award or use of the prize.

7. By claiming your prize, you acknowledge that ETC ComputerLand, Vervocity Interactive and Media Development have the right to publicize your name, character, likeness, photograph, voice and the fact that you are the winner for promotional purposes without financial remuneration.

Odd of winning/other

1. The odds of winning depend on the number of valid entries received.

2. The contest rules are available Monday through Friday during normal business hours at ETC ComputerLand.

3. This contest is subject to all applicable laws and regulations and is void where prohibited. ETC ComputerLand, Vervocity Interactive, Media Development, Facebook, Inc. and Facebook.com accept no responsibility or liability in connection with any injuries, losses or damages of any kind caused by or resulting from the acceptance, possession or use of any prize awarded hereunder.

4. ETC ComputerLand cannot be held liable for any lost or stolen entries, prizes, or contest information. 

5. ETC ComputerLand reserves the right to make rules and contest changes, and change the aforementioned contest dates.

6. By entering this contest, each entrant waives any and all claims of liability against ETC ComputerLand, Vervocity Interactive, Media Development, Facebook.com, and their respective parents, affiliates, officers, directors, employees and agents, for any and all claims, loss, damage or injury which may occur as a result of entrant’s participation in this contest.

7. Facebook, Inc., and www.facebook.com (collectively, “Facebook”) are not affiliated with ETC ComputerLand nor this contest.  This contest is in no way sponsored, endorsed, or administered by or associated with Facebook.