Security


Tips for Preparing for an IBM i Audit PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 15 May 2015 00:00

Audits may not always be your favorite activity, but there are a few things you can do ahead of time to prepare and make it less painful.

carol woodburyWritten by Carol Woodbury

Many administrators go through what I call the "audit fire drill" when they hear they're about to undergo an audit. My desire is to help eliminate some of the panic when preparing for an audit by giving you some tips to follow.

Add a comment
Last Updated on Friday, 15 May 2015 00:00
Read more...
 
When Management Turns Its Back on Security: The Business Effects PDF Print E-mail
Security - General
Written by SkyView Partners, Inc.   
Tuesday, 28 April 2015 00:00

Something is preventing management from understanding the need to secure its electronic data.

Written by SkyView Partners

Editor's note: This article introduces the white paper "When Management Turns Its Back on Security: The Business Effects" available free at the MC White Paper Center.

 

One of the great mysteries as we walk into an IBM i shop is the lock on the computer room door. Often, when we first start consulting engagements, we are given a tour of the facility, and inevitably it includes a tour of the "raised floor" computer room, outfitted with expensive air-handling equipment and protected by a door that requires specific authorization to enter. The mystery is that, while all this expensive hardware needs physical protection, the company's most valuable assets are wide open to people who don't need access to them.

Add a comment

Last Updated on Tuesday, 21 April 2015 13:57
Read more...
 
True or False: A Pop Quiz on IBM i Security Facts PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 17 April 2015 00:00

It's Friday, and Carol remembers how much everyone loves a surprise test right before the weekend.

carol woodburyWritten by Carol Woodbury

I don't know about you, but I've always hated taking tests. Hopefully, you will enjoy this True/False quiz on IBM i security facts and even learn a few things.

Add a comment
Last Updated on Friday, 17 April 2015 00:00
Read more...
 
User Rating: / 1
PoorBest 
Two-Factor Authentication and the IBM i: A Beautiful Marriage PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Patrick Townsend   
Monday, 13 April 2015 00:00

What problem does Two-Factor Authentication (2FA) solve?

patrick townsendWritten by Patrick Townsend

The data breach at Target started in a typical way. The attackers planted malware on a user's PC via a phishing attack, captured a password, and used that password as the entry point to work their way into the Target corporate network. In this case, the stolen user credential was at a service provider to Target, not one of Target's own users. But that's immaterial. The attack method was very typical: steal a user credential to log into a system, and enter into the critical systems from there. You don't have to actually start by stealing the credentials to the most sensitive system. You can start at the periphery and work your way in.

Add a comment
Last Updated on Monday, 13 April 2015 00:00
Read more...
 
Getting Started with IBM i Security PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by PowerTech Group, Inc.   
Monday, 23 March 2015 00:00

It's a growing concern.

Written by PowerTech Group, Inc.

Editor's note: This article introduces the white paper "Getting Started with IBM i Security" available free at the MC White Paper Center.

 

Data security, while always a business concern, rose to critical prominence after 2012. The year was a record-breaker in both size and scope of breaches; there were massive distributed-denial-of-service (DDoS) attacks against financial institutions, not to mention the shocking incident at the South Carolina Internal Revenue Service, a breach that spanned several months and resulted in 44 systems being compromised.

Add a comment
Last Updated on Sunday, 22 March 2015 14:48
Read more...
 
IFS for IBM i in Review PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 20 March 2015 00:00

Carol talks about some configuration settings not to ignore in the IFS.

carol woodburyWritten by Carol Woodbury

Many of you are daunted by the security aspects of the Integrated File System (IFS), but there are a few things that—whether you're comfortable or not—you should not ignore.

Add a comment
Last Updated on Friday, 20 March 2015 00:00
Read more...
 
Group Profiles in Review PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 20 February 2015 00:00

Carol takes a look at the proper use and configuration of group profiles.

carol woodburyWritten by Carol Woodbury

I realized that it's been awhile since I've discussed group profiles, so this article is a review of when to use group profiles and how they should be configured.

Add a comment
Last Updated on Friday, 20 February 2015 00:00
Read more...
 
PCI and the IBM i: If You're Not Paying Attention, You Should Be PDF Print E-mail
Security - Compliance / Privacy
Written by Ira Chandler   
Monday, 09 February 2015 00:00

Does your company accept credit-card payments? If so, you're responsible for Payment Card Industry (PCI) mandates.

ira chandlerWritten by Ira Chandler

Just because you run the world's most secure and reliable computing platform (the IBM i, System i, iSeries, AS/400), you're not exempt from the requirements of the international security council that dictates merchant security. Although the many best practices we employ on the IBM midrange platform generally keep the system out of the news, you still must be compliant with the industry standards.


 

We will refrain from listing the recent data breaches, knowing that you're aware of the risk you take when you store cardholder data. So, in this short article, we will address the following questions:

Add a comment
Last Updated on Friday, 06 February 2015 13:30
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 42

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM