
Security Checklist for IBM i Systems
For the past three years, Precisely has annually surveyed IT professionals who are responsible for IBM i systems at their companies. When respondents were asked to indicate their organization’s top...
For the past three years, Precisely has annually surveyed IT professionals who are responsible for IBM i systems at their companies. When respondents were asked to indicate their organization’s top...
Thirty-four percent of data breaches last year involved inside actors, according to the Verizon Data Breach Investigation Report. Employees can contribute to data loss due to simple errors or...
IBM’s security implementation on the IBM i platform is good, but that doesn’t mean that it’s immune from data breaches. All PCs and servers on the same network as your IBM i server are...
Every so often, we encounter someone still using antiquated DES for encryption. If your organization hasn’t switched to the Advanced Encryption Standard (AES), it’s time for an upgrade. To...
You know you should keep your data secure, but do you know how? Do you know the meaning of terms like compliance, multi-factor authentication and data tokenization? If not, this post is for you. Keep...
In the world of data security there are many different types of encryption, but arguably the two most common are AES and PGP. With so many three-letter acronyms in the technical landscape, it’s...
The IBM i has a well-earned reputation as one of the most secure IT platforms in the world. But actually, that’s something of a misnomer. It would be more correct to say that IBM i is one of the...
With increases in data breaches, the topics of data encryption and its importance are appearing more often in public discussions of data security. There is also increased confusion about the...
FinTech (financial technologies) is transforming the financial services industry. FinTech professionals from banks and credit unions to insurance companies deal with huge amounts of private data on a...