3 Ways to Protect Your IBM i from Ransomware
Although ransomware doesn’t attack the IBM i operating system or native DB2 libraries, it can encrypt and rename Integrated File System (IFS) stream files that support native IBM i applications and store user documents.
Ransomware attacks can disable critical IBM i processing by damaging IFS-based configuration settings and data files. Ransomware disables business processing, breaches security, and wastes money and time in recovering from an attack.
In this recorded webinar we discuss:
• How ransomware attacks IFS stream files
• Critical IBM i security settings that protect your IFS from ransomware
• Recovery techniques and best practices to consider when an attack occurs
• Preventing, stopping, and isolating IBM i ransomware activity in real-time
Mel Zucker
Mel Zucker is a 30-year IBM veteran, who worked in AS/400 and IBM i customer engineering, program support, system engineering, and technical consulting.
© 2021 Software Engineering of America
This is your setting for either accepting or rejecting cookies on our site. Select to either accept or reject cookies.