Despite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
Editor's note: This article introduces the November 2020 Webinar: Lessons Learned from IBM i Cyber Attacks, which is On-Demand and available to download and view from the MC Webcast Center.
In this webinar, IBM i security expert and IBM Champion Robin Tatam explores cyber attacks on IBM i. You'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.
- Learn which security gaps cyber criminals love most
- Find out how other IBM i organizations have fallen victim
- Get the details on policies and processes you can implement to protect your organization, even when staff works from home
Robin will describe the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.
Lessons Learned from IBM i Cyber Attacks
Despite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
Want to learn more? Visit HelpSystems today.
LATEST COMMENTS
MC Press Online