MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

May 24, 2010 | Volume 5 Issue 10


TOP STORY: Does Compliance Guarantee Privacy?
FEATURED ARTICLE: Are Your Users Exposing Your Company to Risks Using Standard FTP File Transfers?
NEWS HIGHLIGHT: Krengel Technology Releases DB2 Web Service Enabler
WHITE PAPER: Beyond FTP: Securing and Managing File Transfers
FORUM: Printing PDFs from the IFS

• MC VIDEO NEWS MAKERS: Monitoring HA Systems Remotely

Manage Subscription | Contact Us

Sponsor - SEQUEL Software

IBM® System i® Data Access Made Easy

• Complete management access to critical data

• Easy to use by IT and end users

• Automated data access and display

• Comprehensive BI package: reports, tables, key performance indicators, and dashboards

• System i-centric for real-time data analysis

• Multiple interface options: graphical, green-screen, browser

• Expert support and training

Meet your System i data access and analysis needs. Click here for a FREE Information Kit!


Feature Article - Security
Does Compliance Guarantee Privacy?

In this article, security expert Carol Woodbury discusses whether being in compliance guarantees the privacy of your data.

carol_woodburyWritten by Carol Woodbury

When I was asked to write this article, I had to take a few minutes to determine the answer to the question. My initial reaction was, "Yes, of course. If you're in compliance, the data privacy is ensured." But as I thought about it a bit more, doubts began to crowd out my initial reaction. Join me in my thought process as I derive my final answer.


Feature Article - Security
Are Your Users Exposing Your Company to Risks Using Standard FTP File Transfers?

FTP is an outdated, unsecure protocol that nevertheless remains in widespread use.

tom_stockwellWritten by Thomas M. Stockwell

Editor's Note: This article introduces "Beyond FTP: Securing and Managing File Transfers," a free white paper that you can download from the MC White Paper Center.


Every day, millions of files are exchanged all over the world by corporations, government entities, and other organizations. These electronic transfers include the critical data needed to conduct business, such as customer and order information, EDI documents, financial data, payment information, as well as employee- and health-related information.


In the News


Support MC Press - Visit Our Sponsors


Forums Sponsor






Search Sponsor






MC Industry Blogs


Welcome to Carol Woodbury's blog


Posted 04-30-2010 at 10:44 PM by C.Woodbury

In my travels, I've had the privilege of meeting many, very interesting people. I was recently in Napa Valley, CA and ran into a woman whose specialty is fraud prevention. Wow - her stories were amazing! The cunning and the lengths people go to to commit fraud are mind-boggling - like knowing the laws and regs well enough to be able to skim money just below the limit where, what she was taking wouldn't be noticed unless someone looked very closely.

The reason I bring this up is because the occurence of fraud continues to rise. So my question to you is this - When was the last time you went through your processes and procedures to make sure there are enough checks and balances in place to make sure you're not experiencing fraud in your workplace? For those of you that chafe under processes and procedures, this is a reminder that they're in place for a reason.

I am reminded of one of Ronald Reagan's favorite phrases ... trust, but verify. I encourage you to do the same.