Security


Group Profiles in Review PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 20 February 2015 00:00

Carol takes a look at the proper use and configuration of group profiles.

carol woodburyWritten by Carol Woodbury

I realized that it's been awhile since I've discussed group profiles, so this article is a review of when to use group profiles and how they should be configured.

Add a comment
Last Updated on Friday, 20 February 2015 00:00
Read more...
 
PCI and the IBM i: If You're Not Paying Attention, You Should Be PDF Print E-mail
Security - Compliance / Privacy
Written by Ira Chandler   
Monday, 09 February 2015 00:00

Does your company accept credit-card payments? If so, you're responsible for Payment Card Industry (PCI) mandates.

ira chandlerWritten by Ira Chandler

Just because you run the world's most secure and reliable computing platform (the IBM i, System i, iSeries, AS/400), you're not exempt from the requirements of the international security council that dictates merchant security. Although the many best practices we employ on the IBM midrange platform generally keep the system out of the news, you still must be compliant with the industry standards.


 

We will refrain from listing the recent data breaches, knowing that you're aware of the risk you take when you store cardholder data. So, in this short article, we will address the following questions:

Add a comment
Last Updated on Friday, 06 February 2015 13:30
Read more...
 
Data Security in a Nebulous World PDF Print E-mail
Security - General
Written by Paul Keyes   
Monday, 26 January 2015 00:00

What's safer? The cloud or your own IBM i?

paul keyesWritten by Paul Keyes

Nobody understands the cloud. That's a common joke amongst IT professionals. It's often spoken tongue in cheek about laymen consumers uploading selfies by the millions as they constantly sync their devices without a clue in the world about what's actually happening to their data. While the concept of cloud-based data may confuse most consumers, two groups of people actually do thoroughly understand how the cloud works: the IT professionals who build and maintain the droves of servers on which all of our data is stored, and the hackers who spend their every waking moment trying to break into them.

Add a comment
Last Updated on Thursday, 22 January 2015 14:31
Read more...
 
When Management Turns Its Back on Security: The Business Effects PDF Print E-mail
Security - General
Written by SkyView Partners, Inc.   
Monday, 26 January 2015 00:00

Something is preventing management from understanding the need to secure its electronic data.

Written by SkyView Partners

Editor's note: This article introduces the white paper "When Management Turns Its Back on Security: The Business Effects" available free at the MC White Paper Center.

 

One of the great mysteries as we walk into an IBM i shop is the lock on the computer room door. Often, when we first start consulting engagements, we are given a tour of the facility, and inevitably it includes a tour of the "raised floor" computer room, outfitted with expensive air-handling equipment and protected by a door that requires specific authorization to enter. The mystery is that, while all this expensive hardware needs physical protection, the company's most valuable assets are wide open to people who don't need access to them.

Add a comment
Last Updated on Monday, 26 January 2015 00:00
Read more...
 
Start Thinking About Security in New Ways PDF Print E-mail
Security - Compliance / Privacy
Written by Carol Woodbury   
Friday, 23 January 2015 00:00

Are you heads down, focused on the tasks in front of you? If so, you may be missing something. In this article, Carol discusses the need to stop, take time, and see if you need to think about things differently.

carol woodburyWritten by Carol Woodbury

At this time of year, I try to get away for a few days to relax and stop thinking about work. I've found that when I'm constantly heads down on work, I don't pick up on things around me that have changed. I tend to always do things the same way, but when I get away I may realize there's an easier or better way to do something. If I don't take a break, I'm unlikely to realize what I'm missing—as in new topics that I should be paying attention to or researching or new business opportunities that are right in front of my face but I couldn't "see" because I was too busy with other things. In this article, I'll encourage you to step back from your normal routine and see what you might be missing.

Add a comment
Last Updated on Friday, 23 January 2015 09:53
Read more...
 
Carol's Favorite (IBM i and Other) Things PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 19 December 2014 00:00

Carol reveals what inspires her and makes her happy.

carol woodburyWritten by Carol Woodbury

It's the time of year when Oprah releases her list of favorite things, so Carol shares her list of favorite IBM i features and security resources.

Add a comment
Last Updated on Friday, 19 December 2014 00:00
Read more...
 
Protecting Your Passwords on IBM i PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by Carol Woodbury   
Friday, 21 November 2014 00:00

Many recent hacks have accessed networks and then accessed databases by obtaining administrator credentials (user IDs and passwords). Databases of emails and passwords are also being stolen from breached organizations. Carol discusses how to reduce password abuse.

carol woodburyWritten by Carol Woodbury

You may not realize it, but many of the organizations recently breached are large IBM i shops. The general public never knows whether our beloved IBM i was breached because that information is never published. But to dismiss the possibility out of hand and ignore steps that you can take to protect your organization and—more importantly—the data on your IBM i systems is putting that data at significant risk. This article focuses on protecting passwords since exploiting stolen credentials (user IDs and passwords) is one method being used by hackers to gain access to data.

Add a comment
Last Updated on Friday, 21 November 2014 00:00
Read more...
 
User Rating: / 1
PoorBest 
Technology Focus: The IBM i Isn't Immune to Security Problems (Continued) PDF Print E-mail
Security - IBM i (OS/400, i5/OS)
Written by John Ghrist   
Monday, 17 November 2014 00:00

The box we love is well-known for its excellent security, but ensuring that tight security requires a little planning, effort, and knowledge.

john gristWritten by John Ghrist

Editor's note: Last month, we published the first part of this very comprehensive article, which included interviews with prominent security vendors who addressed the issues IBM i shops face today. Today, we finish it up with the rest of the list of vendors and products that we started last month.

Add a comment
Last Updated on Monday, 17 November 2014 00:00
Read more...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 42

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM