Previous Webinar- 3-Ways-to-Protect-Your-IBM-i-from-Ransomware

3 Ways to Protect Your IBM i from Ransomware

Although ransomware doesn’t attack the IBM i operating system or native DB2 libraries, it can encrypt and rename Integrated File System (IFS) stream files that support native IBM i applications and store user documents.   

Ransomware attacks can disable critical IBM i processing by damaging IFS-based configuration settings and data files. Ransomware disables business processing, breaches security, and wastes money and time in recovering from an attack.   

In this recorded webinar we discuss:

• How ransomware attacks IFS stream files

• Critical IBM i security settings that protect your IFS from ransomware

• Recovery techniques and best practices to consider when an attack occurs

• Preventing, stopping, and isolating IBM i ransomware activity in real-time

Mel Zucker

Mel Zucker is a 30-year IBM veteran, who worked in AS/400 and IBM i customer engineering, program support, system engineering, and technical consulting. 

© 2021 Software Engineering of America

This is your setting for either accepting or rejecting cookies on our site. Select to either accept or reject cookies.

Verified by MonsterInsights