Webcast

Configuration Tips to Reduce the Risk of IBM i Malware Infection

Not a week goes by that there isn’t a headline regarding a ransomware attack that has affected another organization. Ransomware and other malware can, and has, infected IBM i via a drive mapped to the system using a file share. While you can’t stop someone from falling prey to phishing and clicking on the wrong link, there are steps you can take to reduce the risk of infection. Watch our on-demand webinar with IBM i security experts to learn the IBM i configuration settings you can use to reduce the risk of malware infection.

Register now to learn about:

  • Current malware threats and tactics
  • How file shares and directory permissions work together to provide access from the network
  • Why sharing root (‘/’) puts your entire system at risk
Configuration Tips to Reduce the Risk of IBM i Malware Infection
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.