Carol describes five IBM i security settings that eliminate exposures and can be changed with very little risk of breaking anything.
Written by Carol Woodbury
I know that many of you feel handcuffed. You want to make changes to improve your IBM i security posture, but your organization is so risk averse that it’s almost impossible to make changes that have the possibility of breaking a production process. While I can’t guarantee that these changes will not cause an issue, it’s unlikely that they will.