Lessons Learned from IBM i Cyber Attacks

IBM i (OS/400, i5/OS)
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Despite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls. 

Editor's note: This article introduces the November 2020 Webinar: Lessons Learned from IBM i Cyber Attacks, which is On-Demand and available to download and view from the MC Webcast Center.

In this webinar, IBM i security expert and IBM Champion Robin Tatam explores cyber attacks on IBM i. You'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

  • Learn which security gaps cyber criminals love most
  • Find out how other IBM i organizations have fallen victim
  • Get the details on policies and processes you can implement to protect your organization, even when staff works from home

Robin will describe the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.

 

Lessons Learned from IBM i Cyber Attacks

Despite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls. 

 

Want to learn more? Visit HelpSystems today.

 

 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$0.00 Raised:
$