Merci, nos conseillers vont vous rappeler.
🤯 6 frustrations lors d’un transfert de fichier
Envoyer des fichiers est une tâche devenue banale dans le monde du travail. Cependant cette action anodine peut parfois être frustrante voire périlleuse pour l’entreprise. Découvrez 6 actions les « plus pénibles » lors d’échanges de fichiers.En savoir plus
par HelpSystems • 25 Avr 2019
“If you fail to plan, you are planning to fail.”
This adage is still around because it’s true—especially when it comes to cybersecurity. And this is why it’s so surprising to see that many IBM i aren’t planning to implement key security controls.
Keep reading to find out where security plans are running off course and how you can make a completely attainable plan to succeed.
For the third year in a row, cybersecurity is the top concern for more than 70 percent of the IT professionals who took the IBM i Marketplace Survey. This makes perfect sense, considering how many data breaches have made headlines and how cybersecurity has become part of the public discourse. But the next survey question was quite surprising.
The next question asked, “Which security solutions do you have in place or plan to put in place across your IBM i servers?” Eight options were listed, and survey takers could indicate whether they had the solutions in place already, planned to implement them, or had no plans to implement them.
Despite the increased focus cybersecurity and data protection around the world, many IBM i pros say their organizations have no plans to implement key security solutions:
We know that at most organizations, it’s not feasible to implement multiple solutions at once. But this lack of planning is concerning, considering how critical the IBM i operating system is to the organizations that run it.
Malicious programs like malware, ransomware, and viruses have consistenly made headlines in recent years. On top of that, cryptocurrency miners have targeted servers and PCs with malware. A malware attack can derail critical IT projects and cause downtime that costs your organization hundreds of thousands of dollars—or more.
Many IBM i professionals are just beginning to understand how malware can attack their systems through the IFS. The risk is real and the damage could be extensive (and expensive!). The good news is that malware infections are avoidable. Stand Guard Anti-Virus is server-level protection built specifically for the IBM i OS, and you can get a free trial to find out if you already have infected files in your systems.
On IBM i, exit points are another area of cybersecurity that’s not well understood. IBM added exit points to IBM i to allow data to be access from other platforms like users’ PCs. Exit programs can be installed on exit points to monitor and control access to IBM i data. Without exit programs, many users could have untraceable access to sensitive data.
IBM i has about 30 exit points. The latest State of IBM i Security Study shows that just eight percent of systems have more than five exit programs in place. That leaves a lot of unsecured exit points out there, and the IBM i Marketplace Survey shows that nearly half of all survey takers have no plans to implement exit point security.
Unsecured exit points could result in exposed or corrupted data and fines for compliance violations. For most organizations, exit programs are the low-hanging fruit of IBM i security. To know for sure how to prioritize exit point controls in your IBM i security plan, get a risk assessment. HelpSystems offers a free IBM i Security Scan that will show you whether your exit points are vulnerable.
Thanks to many high-profile data breaches, encryption has become a larger part of the security conversation than it was even a few years ago. On IBM i, less than 20 percent of organizations have implemented a database encryption solution. 60 percent have no plans to do so.
In the event your organization does suffer a data breach, encryption is your last line of defense. The data is worthless to attackers if they don’t have the encryption key. In many cases, this means your organization won’t have to notify customers of the breach because no data was actually exposed.
Database encryption on IBM i is simpler than you might think, thanks to the field procedures introduced by IBM. We have resources that explain what the process involves:
To succeed at securing your IBM i, a plan is critical. A free Security Scan is a great place to start because you’ll find out where your systems are most vulnerable and get expert tips for prioritizing your security controls. You’ll also get a report summarizing the state of your IBM i security, which can help you formulate your plan and track your progress. It’s free, it’s simple, and it’ll help you understand what changes could make the biggest impact on your security posture.