|
||
June 6, 2012 - Vol 2, Issue 10
|
||
|
||
|
Feature Article
By Dan Riehl Have your ultra-sensitive files been stolen today? How can you tell? Our IBM i (iSeries and AS/400) has long been considered a security strongbox—a hacker's worst nightmare. Some even consider it to be un-hackable. This perception has caused some to become complacent in the area of due diligence related to system and database security. But security through perceived obscurity is insufficient protection in a world of wily and very well-financed cyber criminals and the malicious insiders. According to the Open Security Foundation Year-to-Date 2011, a total of 126,749,634 people have had their personal information hacked, stolen, lost, or misplaced. Hundreds of computer-related data thefts occur every year—often one or more per day. To view those of public record, you can visit the OSF's Data Loss Database. According to their Data Loss Database's published list of compromised companies, we can tell that some of these incidents are occurring at IBM i shops, both large and small. |
|
In This Issue
Quick Links
Please Visit Our Sponsors
Platinum Sponsor |
IBM i Security and Audit ResourcesIBM i Security Videos from SecureMyi.com SecureMyi Newsletter Home and ArchivesIBM i Security Reference - IBM i 6.1 IBM i Security Reference - IBM i 7.1 QAUDJRN Audit Types By AUDLVL 6.1 QAUDJRN Entry Type Record Layout 6.1 RedBook - Security Guide for IBM i 6.1 PCI SSC Data Security Standards |
|
IBM i Security News Bytes
Skyview Partners Introduces Managed Services for IBM i and AIX Compliance
Linoma adds FIPS 140-2 Encryption Module to GoAnyWhere IBM i Security Calendar of Events
|
|
|
Featured YouTube Educational VideoIBM i Security
|
||
Security Shorts -
|
Sponsored Links
IBM i, iSeries and AS/400
|
|
|
||
Send your IBM i Security Related News and Events! Advertise in SecureMyi.com Security Newsletter Copyright 2012 - SecureMyi.com, all rights reserved SecureMyi.com | St Louis MO 63017 |