Video
Getting Started with IBM i Security: Malware/Ransomware
By Sandi Moore
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware.
If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Blog
What is Hyperautomation?
Wed, 11/08/2023
For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen.
Enter hyperautomation. What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy. ...
News Article
Solutions Review: Social Media Scams Impacting Businesses and Individuals Today
By John Wilson on Thu, 11/02/2023
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
On-Demand Webinar
How to Avoid the Biggest Mistakes in IBM i Security
By Sandi Moore
Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.
News Article
Cyber Security Intelligence: Understanding the Threat of QR Codes & Quishing
By Dr Steve Jeffery on Mon, 10/23/2023
Many organizations are concerned about QR code phishing or quishing because it can bypass existing security measures, making recipient awareness the key to protection. Steve Jeffery spoke to Cyber Security Intelligence about the threats of quishing and how to prevent them.
On-Demand Webinar
'The Expert’s Guide to Power Systems Cloud Security,' presented by Meridian IT and Fortra
If you're curious about IBM i in the cloud or have already made the switch, you don’t want to miss this session that will equip you with the knowledge and tools necessary to navigate the complex landscape of cloud security for Power servers.
Article
What's New in Automate
Mon, 10/16/2023
That latest version of Automate has just been released. Find out more about what's new!
Blog
Financial Services Cybersecurity: What You Need to Know
By Antonio Sanchez on Wed, 10/11/2023
Today’s financial threat landscape is evolving, and firms are facing record high risk. Learn what’s causing the uptick and which essential cybersecurity practices will ke.ep you safe
News Article
U.S. News & World Report: 5 Warning Signs Your 401(k) Is Being Scammed
By Eric George on Mon, 10/09/2023
Your 401(k) is an important asset for a secure retirement, but it could be at risk of scams and fraud. Eric George spoke to U.S. News & World Report about how people can protect their 401(k) accounts.
News Article
Journal of Cyber Policy: Even Cybersecurity Experts Get Scammed
By John Wilson on Thu, 10/05/2023
Cyber threats can target anyone, and even cybersecurity experts can fall victim to scams! In the article featured in the Journal of Cyber Policy, John Wilson shares his personal story and highlights the actions he took to prevent threat actors from using his data.
Blog
You’ve Upgraded Your Hardware. Now It’s Time to Upgrade Your Security Posture
By Amy Williams on Wed, 09/20/2023
If you have recently upgraded your hardware, our this is a great opportunity to establish IBM i security best practices for your organization now and into the future — and our free Security Scan will help you do just that. The Security Scan takes an inventory of your current security settings and uses the results to demonstrate your data’s degree of vulnerability and pinpoint specific weaknesses.
Datasheet
Fortra's Automate: Expert Services
Summary
Fortra offers Expert Services to its Automate customers. A Fortra automation consultant will partner with your team and provide several services related to the Automate solution, including but not limited to:
Expert Advice: Assist and advise on configuration changes in the customer environment.
Mentoring and Training: Provide one-to-one customized training on product features...
Blog
What is IT Process Automation? How to Build a More Resilient IT Department
Thu, 09/14/2023
As IT environments grow increasingly complex—and budgets and staff resources shrink—IT teams everywhere are looking for ways to fill the gaps. And they’re turning to IT process automation software. In fact, per Fortra’s recent IT automation survey, 72 percent of users say they’re looking to expand automation within the next year.
Curious how your IT department can utilize a process automation...
On-Demand Webinar
Zero Trust on IBM i: What It Is and Why It Matters
By Kurt Thomas
Watch Kurt Thomas and George Hibler discuss why Zero Trust on IBM i is important, what Zero Trust on IBM i looks like, and how to implement it.
Guide
Enterprise Automation: The Holistic Guide
Enterprise IT automation that leverages a strategic approach helps manage diverse automation tools and solutions holistically. Learn more about the key principles to embrace for holistic enterprise IT automation.
News Article
Security Weekly: Email Impersonation Threats Reaching Corporate Inboxes Hit An All-Time High
By John Wilson on Mon, 08/21/2023
During his recent interview with SC Media Security Weekly Podcast, John Wilson delves deep into threat actors' common techniques and shares strategies for defending against email impersonation.
News Article
ABC11 EyewitnessNews: FBI Warns of Teens Being Targeted in Sextortion Scams
By John Wilson on Tue, 08/01/2023
The FBI has issued a warning about teenagers being targeted in sextortion scams. John Wilson spoke to ABC11 EyewitnessNews about the techniques the scammers use.
Blog
Understanding CVE 2023-30990: The Vulnerability Exploiting the DDM
By Amneris Teruel on Tue, 07/25/2023
Discover CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service. Learn what this vulnerability is, how it impacts the IBM i, and how you can prevent as well as assess your exposure to it.
News Article
Cybersecurity Insiders: The Looming Threat of Business Email Compromise
By John Wilson on Thu, 07/20/2023
How can organizations protect themselves from business email compromise (BEC)? John Wilson spoke to Cybersecurity Insiders about the complexities of these threats and shared important insights from Fortra's latest report on BEC.