How do you let the good guys in while keeping the bad guys out?
By Chris Peters
A lack of physical security combined with diabolical social engineering practices presents an ongoing challenge to network security personnel. Even if your company doesn't have a wireless network, it's a pretty sure bet that some of the laptops in your organization have built-in wireless capability. That means that a wireless laptop could act as a bridge, forming an opportunity for access to your internal network to anyone with an antenna, some precocious software, and the will to hack into your world.
Do you really know that your security is what it should and could be?
By John Earl
Editor's Note: This article is an excerpt from the white paper"The State of System i (AS/400) Security," which can be downloaded free from the MC White Paper Center.
How good is the security on your IBM i (System i, iSeries, AS/400)? Are you confident about the controls you have put in place? Can you demonstrate that you're compliant with regulatory requirements that affect your industry? Do you know whether your system is better secured than the average System i?