MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

April 14, 2014 | Volume 9 Issue 7


TOP STORY: Are You Meeting the PCI DSS Security Standards?
FEATURED ARTICLE: ACO MONITOR: Managing Your IBM i Using Wireless Devices
NEWS HIGHLIGHT: Comodo Advises Patch to Run the Latest Version of OpenSSL in Light of "Heartbleed" Vulnerability
WHITE PAPER:Virus Got You Down?
EVENT:OCEAN User Group Meeting

Sponsor - Maxava

DR Strategy Guide for IBM i - FREE eBook      

How much revenue would your business lose if your systems went down for a week? 24 hours? 12 hours?  What damage would it cause your reputation? Today every second counts! 

Learn key considerations for your Disaster Recovery Plan to ensure your IBM i and your business can weather any storm.  Get a free copy of our brand new eBook, DR Strategy Guide for IBM i - essential for every IBM i user. 




Feature Article - Security
Are You Meeting the PCI DSS Security Standards?

Don’t take the requirements lightly; the cost of non-compliance could be very steep.

ira chandlerWritten by Ira Chandler

Acceptance of debit and credit cards is a growing requirement for businesses of all sizes. Since 2005, the Payment Card Industry Security Standards Council (PCI) has imposed strict mandates, the Data Security Standards (DSS), to ensure the security of the computer systems that process, transmit, and/or store sensitive credit card data.


Sponsor - The MC Press Bookstore

Take the next step with PHP! Expand your knowledge and understanding of this essential programming language with the latest book from PHP guru Kevin Schroeder: Advanced Guide to PHP on IBM i. Master important PHP topics such as debugging, test-driven development, web-based development, advanced object-oriented programming, and web security. You’ll also get an in-depth look at the new PHP Toolkit for IBM i provided by Zend Technologies. Don’t delay; get started today on building your understanding and skill level with this example-packed, accessible book. Order today! 


Feature Article - System Administration
ACO MONITOR: Managing Your IBM i Using Wireless Devices

Read on for an in-depth review of the native IBM i technology and ACO MONITOR's advanced two-way messaging features to remotely manage your IBM i while in or away from the office.

Written by DDL Systems, Inc.

Editor's Note: This article introduces the white paper "Automate IBM i Operations Using Wireless Devices" available free from the MC White Paper Center.


Managing the complexities of today's operating systems, business applications, and networks challenges even the most knowledgeable IT professionals. The cost to an enterprise of unplanned downtime, loss of human expertise during sick leave or vacation, and system/application or environmental failure can be devastating. Today's systems management applications monitor all critical tasks and make increasing use of your existing expertise and technology to maximize system availability, improve productivity, and increase customer service.


Sponsor - The MC Press Bookstore

The Essential Guide to Security. In this practical and highly readable guide--an update to her acclaimed IBM i & i5/OS Security & Compliance: A Practical Guide--security expert Carol Woodbury explains IBM i security and the way it functions within IBM i systems. Whether you’re new to IBM i or a seasoned veteran, this book contains the critical information and explanations you need to successfully maintain a secure system. Get your copy today. >>


MC White Paper Center


Virus Got You Down?

Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that?

Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today. In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.

Download this important White Paper today! 


Don't miss these great offerings in the MC Press White Paper Center:

Latest White Papers:

PCI and What it means to IBM i

Data Access in a Big Data World

Top Security Issues for the Integrated File System (IFS)

How to Effectively Manage and Monitor Your Business Applications

The Promise of A/P Automation

The Essential Guide to IBM i Database Modernization

The State of IBM i Security 2013

Storing Metadata the Profound UI Way

Secure Inside and Out: Maximizing Intrusion Detection on IBM i

Solving the Little Things with Automation for IBM Power Systems

Managing Privileged Users on IBM i

5 Ways to Control Access using Application Administration

Analyzing IBM i Performance Metrics

3 Essential Steps to Successful Performance Management

Plus Choose From This Amazing Selection, Too

Lights Out IBM i Automation

10 Top Job Scheduling Challenges for your IBM i and How to Solve Them

101 things you can Automate on your IBM i & 10 Tips for Peace of Mind

3 Essential Steps to Successful Performance Management

5 Shortcuts to Sensible Operational Security

5 Ways to Control Access using Application Administration

6 Recommendations for Smarter Spooled File Processing on Your IBM i

A FREE HA/DR Jargon Buster

Analyzing IBM i Performance Metrics

Assess the Appropriateness of the iSeries/IBM i in My Business

Baker College Makes IBM i Apps More Cool, Less Old-School, With Profound UI

Best Practices: The Fundamentals of Document Automation

Beyond FTP: Securing and Managing File Transfers

Bringing Mashups to Your Enterprise Business Applications

Building a Sound Investment Strategy Through Technology

Business Intelligence for the IBM i Customer

Case Study: Streamline Purchase-to-Pay using Document Management

Cloud Computing

Compliance without the Complexities

Critical Elements for Business ContinuityDMZ Gateways: Secret Weapons for Data Security

Defending Against Data Breach: Developing the Right Strategy for Data Encryption

DMZ Gateways: Secret Weapons for Data Security

Getting the most from your SAP production reports

Getting the Most out of Your Audit Journal - Handouts

Goodbye Paper, Hello Freedom: Paperless Accounts Payable

Goodbye Paper, Hello Freedom: The Complete Guide to Going Paperless

How to Effectively Manage and Monitor Your Business Applications

IBM i Scheduling Survival Guide

IBM i Trends and the IBM i Cloud

Keeping your System i Applications Relevant in a Service-Oriented World


Laws and Regulations and Standards… Oh my!

Make “Paperwork” Smarter

Managing Data and Healthcare Regulations Efficiently

Managing Privileged Users on IBM i

Modern Monitoring Methods for Power Systems

Oh no! Another Audit!

PCI Compliance for Power Systems Running IBM i

PCI DSS Compliance with Managed File Transfer

Pillars Of Data Protection

Protecting your Data – How Much Security is Enough?

Revolutionizing System i Application Modernization

Secure Inside and Out: Maximizing Intrusion Detection on IBM i

SOA What? Why SOA is Critical for iSeries RPG Shops

Solving the Little Things with Automation for IBM Power Systems

Storing Metadata the Profound UI Way

Supply Chain Synchronization: Recession-proof Strategies for Improving Efficiencies

System Modernization Survival Guide

The Eight Pillars of an Enterprise Application Architecture

The Hidden Cost of Compliance

Top Security Issues for the Integrated File System (IFS)

Using Microsoft .NET to Build Scalable Enterprise IBM i Applications

Using Software for Compliance…

Ways to Use IBM i Audit Journal

What Authorities Do Programmers Really Need?

Why Companies Fail PCI Audits - Handouts


*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!

Have a White Paper you would like to list? click here or call (208) 629-7275 for information.



In the News

The Latest from IBM

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor


MC Industry Blogs

Read and Share the latest from the IBM i Security Blog

brought to you by PowerTech

The Rise and Implications of Cyber Insurance Policies

Posted in Security on February 21st, 2014 by Robin – Be the first to Comment



The surge in data breaches and cyber attacks over the past few years has spurred organizations to cast a wider net when it comes to security. In particular, they are more keen to purchase cyber insurance policies that cover a comprehensive range of liabilities, including malware-infected mainframes, distributed denial of service attacks, and other issues that could trigger unplanned downtime.


One of the most telling revelations of the holiday breach at Target was that the retailer had purchased at least $100 million worth of cyber insurance. The incident exposed data on as many as 70 million payment card accounts, but Target’s insurance purchases could be a sign of things to come. Going forward, more organizations may sign up for policies as insurers get better at quantifying breach risks and IT departments seek an additional layer of protection to cover key assets.