iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on July 31, 2019

We get asked this question all the time: “how can I protect IBM i against ransomware?” Ransomware is a hot button topic. It should be. The average ransom that companies paid in Q1 2019 rose to $12,762 from $6,733 the previous quarter. In some instances, ransoms are in the six-figure range or higher for large organizations with a low tolerance for downtime. So, how do you protect the data on your IBM i partitions from being held hostage? The first step is to acknowledge that your IBM i may be

Posted on October 19, 2018

There is an audit log to monitor service function use by service tools users.  You can monitor the use of service functions through the dedicated service tools (DST) security log or through the IBM i security audit log. These logs help you trace unusual access patterns or potential security risks.  Below is information on how to access these logs for reference and use. To work with the Service Tools security log, complete the following steps: 1) Access service tools using DST on the console (To force a Dedicate Service Tools

Posted on October 12, 2018

If you’re looking to make improvements to your IBM i security, then you need to be able to get your whole team on the same page, which sometimes can mean common oppositions. But, does your team know the scary truth on the other side of those rebuttals? Here are a number of counterpoints to help you make security a priority in your shop. 1. We trust our employees It is important to hire those you trust and to maintain relationships to continuing to vet security worthiness. However, realism is called

Posted on August 22, 2018

Many companies want to improve the state of their IBM i security, but they often don’t know where to start. They also might not understand the long-term impact of recommended changes. Let’s take a closer look at six steps to properly execute a security improvement project.

In Archive