Many recent hacks have accessed networks and then accessed databases by obtaining administrator credentials (user IDs and passwords). Databases of emails and passwords are also being stolen from breached organizations. Carol discusses how to reduce password abuse.
Written by Carol Woodbury
You may not realize it, but many of the organizations recently breached are large IBM i shops. The general public never knows whether our beloved IBM i was breached because that information is never published. But to dismiss the possibility out of hand and ignore steps that you can take to protect your organization and—more importantly—the data on your IBM i systems is putting that data at significant risk. This article focuses on protecting passwords since exploiting stolen credentials (user IDs and passwords) is one method being used by hackers to gain access to data.