In this webinar, IBM i security expert Sandi Moore provides valuable information to help minimize your exposure to malware and viruses, even with a remote workforce.
Go in-depth on the ransomware attack cycle, the need to protect every endpoint, and how to spot signs of infection before data is encrypted by malicious actors.
The system security level (QSECURTY) sets the overall tone for your IBM i security posture. Read this blog post to learn how many organizations are following IBM's best practices.
Password security issues are critical because they represent the most obvious—and most easily exploited—method to compromise your system. But an alarming number of users rely on the simplest passwords possible on IBM i.
The data below is taken from the 2021 State of IBM i Security Study, which provides compelling insight into the security posture of 247 IBM i servers and partitions—systems that are often used for business-critical data, payment card data, and personally identifiable information (PII). The full study can be accessed here.
...
In the wrong hands, IBM i special authorities can do serious damage, but the latest research shows far too many users have more access and authority than they need. Learn the best practices and how you can implement them.
If you believe nothing important is stored on your server's IFS, think again, because it's a conduit to many things, including the Operating System and all of your application libraries and files.
Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.