iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on January 23, 2019

Sure you can use ANZDFTPWD (Analyze Default Passwords) to get a list of IBM i users with default passwords. You can also use some simple SQL in conjunction with the USER_INFO IBM i service in QSYS2 to do the same thing…but better. To get the standard ANZDFTPWD report you can run the following statement: So why use SQL? ANZDFTPWD gets you everything you really need to determine who has a default password right? Well, yes. However, ANZDFTPWD doesn’t give you the full picture or allow you to be proactive. It

6 Steps to Execute an IBM i Security Project
Posted on November 26, 2018

Regulations (FISMA, HIPPA, SOX, and more) are forcing companies to evaluate how they protect their sensitive data. Industries such as finance, insurance, and healthcare have the most pressure to comply with these regulations which are geared towards protecting consumer’s private information.  The issue is that companies may not understand how to properly secure their data to protect their consumers. Any good security plan takes a layered approach to protect data.  You have to consider where the data resides and how someone could gain access to it.  Then you have to

Posted on October 12, 2018

If you’re looking to make improvements to your IBM i security, then you need to be able to get your whole team on the same page, which sometimes can mean common oppositions. But, does your team know the scary truth on the other side of those rebuttals? Here are a number of counterpoints to help you make security a priority in your shop. 1. We trust our employees It is important to hire those you trust and to maintain relationships to continuing to vet security worthiness. However, realism is called

Posted on August 28, 2018

We have to ask ourselves…what can we do to protect our organizations? In his book “Scouting for Boys” (1908), the founder of the Boy Scouts, Robert Baden-Powell said: “Be Prepared… the meaning of the motto is that a scout must prepare himself by previous thinking out and practicing how to act on any accident or emergency so that he is never taken by surprise.” It should be our goal to not only prevent security breaches, but to prepare for them, and to manage them to the least possible impact to

Posted on May 23, 2018

DANBURY, CONN. – iTech Solutions announces it has been shortlisted for a prestigious Cyber Security award. The category is for the best “Cyber Awareness Plan of the Year”. The winning plan will be presented to the world’s media at a prestigious black tie event in London on June 21st 2018, sponsored by Cyber Security Awards, a leading awards event for the cyber security industry. The Cyber Security Awards, established in 2014, reward the best individuals, teams and companies within the cyber security industry.

In Archive