In Case You’re Wondering Why You Haven’t Been Bothered by Viruses and Other Security Problems, Here’s the Answer Our business is upgrading and servicing IBM i (iSeries/AS400) systems, so we get to speak with the CEOs, CFOs and other senior executives of our corporate customers. Every one of them acknowledges that their company has never suffered from virus attacks, hacking or related security issues. When they think about these issues (which is not often), they appreciate how lucky they have … [Read more...]
5 Methods To Secure Your Cloud Hosted IBM i Applications
Every user I speak to about hosting is concerned about the security of their applications and their critical data. This post discusses 5 methods to secure hosted IBM i applications and data. 1) IBM i Secure Foundation The IBM i operating system is proprietary and unique in its design. I have attached a summary of the IBM i Secure Foundation from a very helpful website: http://www-03.ibm.com/systems/power/software/i/security/integrity.html Quite simply, unlike other operating … [Read more...]
Users Remain The Big Security Risk
Recently a prospective cloud client requested us to provide unlimited liability for a data breach, even if we were not responsible. I suggested that they would find no cloud hosting providers that would offer such a provision. I further explained that most data breaches are the consequences of users, not the cloud hosting service. This article below spells it out. You may find the reading a little tough. In essence, 1% of your users are power users that access most of your files and … [Read more...]
An “Inside Job” That Could Have Been Prevented
When most businesses think of security, the most they think about is a firewall between the corporate network and the Internet. The internal corporate network is often very open to make it easy for people to work. The firewall on the outside is kind of like a hard exterior with a squishy inside -- nice for a piece of candy, not so nice for the security of your data. In fact, the IT community has long debated whether the threat of an internal or external attack is of greater concern for … [Read more...]