Every user I speak to about hosting is concerned about the security of their applications and their critical data. This post discusses 5 methods to secure hosted IBM i applications and data. 1) IBM i Secure Foundation The IBM i operating system is proprietary and unique in its design. I have attached a summary of the IBM i Secure Foundation from a very helpful website: http://www-03.ibm.com/systems/power/software/i/security/integrity.html Quite simply, unlike other operating … [Read more...]
Users Remain The Big Security Risk
Recently a prospective cloud client requested us to provide unlimited liability for a data breach, even if we were not responsible. I suggested that they would find no cloud hosting providers that would offer such a provision. I further explained that most data breaches are the consequences of users, not the cloud hosting service. This article below spells it out. You may find the reading a little tough. In essence, 1% of your users are power users that access most of your files and … [Read more...]
An “Inside Job” That Could Have Been Prevented
When most businesses think of security, the most they think about is a firewall between the corporate network and the Internet. The internal corporate network is often very open to make it easy for people to work. The firewall on the outside is kind of like a hard exterior with a squishy inside -- nice for a piece of candy, not so nice for the security of your data. In fact, the IT community has long debated whether the threat of an internal or external attack is of greater concern for … [Read more...]