Security

Filter By Topic

The Economic Cost of Falling Behind

The Economic Cost of Falling Behind

We have talked on many occasions about the negative results of companies on this platform that are simply not doing their due diligence to ensure...

How Do We Fix The Great IBM i Resource Shortage

How Do We Fix The Great IBM i Resource Shortage?

I’ve had the chance to get out and meet with people from the IBM i community lately at COMMON and the NHMUG meeting. After two...

Deploying Access Client Solutions Centrally with Java Included

Deploying Access Client Solutions Centrally with Java Included

The IBM i Access Client Solutions tool is the de facto standard for managing your IBM i systems. It allows you to start 5250 telnet...

Reimagining Your IBM i Backup Strategy With External Storage

Reimagining Your IBM i Backup Strategy With External Storage

These days I spend a fair amount of my time working with IBM i clients of all sizes to enhance their backup strategy.  Or in...

PTF Feature June 2022

IBM i, FSP, and HMC release levels and PTFs (June 2022)

Below is a table of the major group PTFs for the last few releases. This is what we are installing for our customers on iTech...

6 Steps to Help Back Up Your Data During Hurricane Season

6 Steps to Help Back Up Your Data During Hurricane Season

The 2022 hurricane season has officially started and the NOAA already released predictions calling the 2022 season “above normal’ with 14-21 named storms expected. Of...

Do You Know Where Your Audit Journal Receivers Live on Your System?

Do You Know Where Your Audit Journal Receivers Live on Your System?

QAUDJRN is the default IBM Security Audit Journal, located in QSYS. This is the journal name and library where user activity is logged. QAUDJRN should...

Protecting your IFS with Anti-virus and Anti-ransomware Solutions

Protecting your IFS with Anti-virus and Anti-ransomware Solutions

We’ve said it before, and we will continue to say your IBM i may not be secure. There’s a lot of misconception about the IBM...

IBM i, FSP, and HMC release levels and PTFs (May 2022)

Below is a table of the major group PTFs for the last few releases. This is what we are installing for our customers on iTech...

Information Technology – Proactive or Reactive Perspectives

Information Technology – Proactive or Reactive Perspectives

I’ve been working in sales and sales management roles in the IT field for my entire career.  Along the way I’ve noticed there are very...

Consuming-Journal-Receiver-Data-Easily-with-SQL

Consuming Journal Receiver Data Easily with SQL

A few weeks ago we were tasked with helping a customer log all IBM i user profile changes and deletes for audit and historical purposes....

Yes or No to Managed Service Providers?

CIOs are tasked with many important duties and responsibilities, two of which include the management of IT personnel and maintaining IT systems and operations.  The...

Securing Spool Files

Let’s chat a little on the security buzzwords you need to know to access and how it affects Spool files. The good thing is we...

IBM i, FSP, and HMC release levels and PTFs (April 2022)

Below is a table of the major group PTFs for the last few releases. This is what we are installing for our customers on iTech...

How Good Are Your Backups?

How Good Are Your Backups?

How good are your backups? Wait, don’t answer too quickly. Today March 31st is World Backup Day.  It’s probably a good day to review your...