Protect Your Organization by Preventing Ransomware

Ransomware attacks have been prominent in the news lately, but for every such breach that is widely publicized, there are many others that go unreported in the press. Companies of all sizes are affected by the problem.

Unfortunately, many don’t take proactive steps to limit their exposure until they have been victimized. A single ransomware attack can cost hundreds of thousands (or even millions) of dollars and can frequently lead to the dismissal of senior IT personnel. To make matters worse, paying hackers a ransom to unlock your data and systems doesn’t necessarily provide a solution.  Even when you pay ransomware, the tools provided by the ransomware hacker may not immediately allow the recovery of your data.  You can run into issues like getting the wrong key, a bad decryption utility, compatibility issues and other challenges can delay the recovery of your data.

If your organization is running IBM i systems, you may think that your risk is limited by virtue of its history as a relatively secure platform. Hackers have traditionally sought out targets running Windows-based systems or Linux variants that are in more widespread use. In fact, there is currently no malware in existence that is known to target the IBM i operating system per se, but businesses running IBM i should not take that as an assurance that they’re not at risk.

Many IBM i systems are plagued by poor security practices that leave them exposed to potential attackers. Here’s a review of some of the common sources of security risk on the IBM i platform, along with the experts’ recommendations on protecting against intrusions and malware infection.

How IBM i Systems May be Infected

There are two fundamental ways in which malware might be introduced into an IBM i system. First, it may be stored on the integrated file system (IFS) by a hacker who gains direct access. Second, malware may be introduced through a workstation where there is a mapped drive to an IFS share. The worst possible scenario is to have a read-write share to Root, which exposes your entire system to hackers. In this scenario, anyone with a user profile can compromise your entire system.

Unlike Windows, IBM i systems do not apply permissions to a shared directory. Instead, all shares are defined as being read-write or read-only, and users are granted authority to either access the directory or not and are granted authorities on specific objects within the directory.

Watch our Webcast

Configuration Tips to Reduce the Risk of IBM i Malware Infection

To learn more about securing your IBM i systems against ransomware and other malware attacks, watch our free on-demand webcast.

Controlling Access Via File Shares

To reduce risk, system administrators should remove unused shares and restrict existing shares to read-only status wherever possible. In addition, they should restrict user access to the objects within those shares, being careful to limit access on an as-needed basis. Very often, we see systems in which shares were created at some point in the past, but are not currently needed, and, in fact, have not been used for quite a long time.

As a first step, system administrators should perform an audit of existing file shares (either by using the IBM Navigator, or with the SQL tool (QSYS2.server_share_info service) to return a list of existing shares. Remove any unused shares, and wherever possible, set existing shares to read-only status. To the extent that shares must allow write access, limit authorities to those users who absolutely require it. This limits exposure to only those users who have access to the path, including users with *ALLOBJ permissions.

It’s also a good practice to set up shares so that they do not automatically reconnect at logon, unless they are used very frequently by the users at the workstation in question. It is common to find users who have not accessed such shares in a very long time, including those who have changed jobs and no longer require access to it.

Whenever possible, it is also a good practice to set up file shares to be hidden. By appending the sharing with the “$” character, the share will be invisible to attackers (or anyone else) who is simply browsing the system looking for open directories. This is commonly known as “security through obscurity.” Hackers cannot get information if they do not know that it even exists. While this does not prevent someone from connecting to the share per se, it does require that they be aware of its existence, know its exact name, and enter that information to connect.

Likewise, it’s good practice to turn off broadcasting of the NetServer. Again, this provides some protection by making it difficult for hackers to discover and navigate your systems. If a Guest profile is assigned to the NetServer, remove it.

The Risk of Read-Only Shares

Although much of the attention is focused on preventing hackers from gaining read-write access, system administrators should not neglect security with respect to read-only directories. In ransomware attacks, it is common practice for hackers to download information and retain a copy before they encrypt your data. Furthermore, attackers can do considerable damage to your organization simply by reading and exposing information in your IBM i system. If customer names and personally identifiable information are revealed, for example, your organization may suffer severe reputational damage and is likely to experience legal consequences as well.

Other Security Measures

A critically important security measure is to secure Root, which is open by default when IBM i systems ship. New directories created under Root inherit those permissions, which creates a security risk.

Experts also recommend securing your QPWFSERVER authorization list to restrict access to “QSYS.lib” from Windows Explorer and Navigator in cases where a share to Root is absolutely required.

It’s also good practice to segment your network, making it difficult for hackers to navigate and gain access to all of your systems.

Finally, educating your users is critical. Everyone in your organization should understand what a phishing email looks like, should know to avoid opening links within those emails, and should know who to call in the event that they receive potentially malicious messages.

A Proactive Approach to Security

Precisely has been working with IBM i systems for years. Our Assure security solution provides comprehensive malware defense, monitoring and reporting, data privacy, and access control capabilities for IBM i. If you are concerned about ransomware specifically, as every system administrator should be, then our Assure Security products can help you proactively manage security and establish confidence that your organization can operate with multiple layers of defense and minimal risk.

To learn more about securing your IBM i systems against ransomware and other malware attacks, watch our free on-demand webcast, Configuration Tips to Reduce the Risk of IBM i Malware Infection.

The post Protect Your Organization by Preventing Ransomware appeared first on Precisely.

SAP on IBM Power – RedHat Edition

On this page we are collecting information and links regarding SAP and Redhat on IBM Power!

TCO Linux on Power
https://www.ibm.com/blogs/systems/lowering-tco-with-linux-on-ibm-power-systems/

IDC White Paper
Who Can Benefit from SAP HANA Database ans S/4HANA on IBM Power Systems?

https://www.ibm.com/downloads/cas/W4VKZJMO

“Since late 2015, SAP HANA has also been available on IBM Power Systems with IBM’s innovative IBM Power Systems architecture and processors, and IBM says that to date it has more than 3,000customers running SAP HANA on IBM Power Systems. IDC believes that IBM Power Systems is a strong differentiator for SAP HANA and S/4HANA. IBM Power Systems is designed for very data-intensive workloads such as SAP HANA, with powerful built-in virtualization that is SAP certified aswell as numerous reliability features”

References – Redhat + SAP

Blanc und Fischer IT Services GmbH
https://www.ibm.com/case-studies/blanc-und-fischer-it-services-systems-hardware-sap

Metalloinvest

https://www.ibm.com/case-studies/metalloinvest/
By adopting the SAP S/4HANA platform, Metalloinvest was able to shut down 100 IT systems and slash operating costs. More than 7,000 employees are using the new platform, which has improved efficiency and manageability. More than 2,400 employees use the SAP S/4HANA platform daily to plan and execute more than 34,000 maintenance orders each month.

Targeted audience (From IDC Whitepaper)

Businesses with SAP HANA Appliances Due for a Refresh

“Many businesses started their SAP HANA journey as many as six years ago with SAP HANA appliances on commodity architecture. This was the only solution available at the time. Those businesses are now facing a costly scale-out expansion or possibly a complete technology refresh”

Businesses on Commodity Architecture Moving to SAP HANA

“Businesses that are running their datacenter on commodity architecture that have not yet moved to SAP HANA have a choice between appliances on commodity architecture and IBM Power Systems. Even if they have never had IBM Power Systems in the datacenter, bringing the platform in today provides a powerful Linux system with significant processor benefits.”

Businesses with a Traditional Database and SAP Applications onIBM Power Systems

“There are many businesses that run their SAP business applications on IBM Power Systems with a traditional database, such as Oracle or DB2. For them, a move to SAP HANA (BW on SAP HANA, Suite on SAP HANA, SAP BW/4HANA, or SAP S/4HANA) involves their mission-critical processes and data. On the other hand, migrating to SAP HANA on IBM Power Systems will provide businesses with a significant database performance boost, easier administration and processing of vast volumes of business data, and faster user response time for transactional in-memory processing”

Businesses on IBM Power Systems That Currently Do Not Have SAP
“Many of these businesses prefer to remain on IBM Power Systems because they are invested and know IBM Power Systems, which makes migration easier. What’s more, once they have started a discussion to migrate off their traditional relational database management system (RDBMS), they are typically not looking to replace it with another traditional RDBMS. This essentially leaves them with two options: an open source database solution (e.g., EnterpriseDB) or SAP HANA on IBM Power Systems”

Businesses with On-Premises SAP Apps That Want to Expand Off Premises

“SAP expects its customers to move to a cloud or hybrid cloud model. Businesses can extend their environment to IBM Cloud using Power Virtual Servers. IBM Cloud provides a wide varietyof SAP-certified options for running SAP workloads, including IBM Power Systems. SAP infrastructure services are available in 58 IBM Cloud datacenters around the globe”

Here’s how regional firms can simplify the cloud migration process

Most regional companies – across industries – have either already adopted digital transformation strategies or are in the process of embarking on them. And the shift to the cloud is a key component of that process – spending on public cloud services across the Middle East, Africa and Turkey will grow 26.7 per cent this year to top $3.7bn, IDC predicted earlier this year.

However, many organisations find the cloud migration process to be quite daunting, especially considering the increasing regulatory requirements coupled with technology and security concerns. Companies have to decide whether to opt for public, private or on-premises solutions. And then they have to find ways to migrate their traditional IT infrastructure to the cloud.

It is to streamline and simplify that process that global IT firm Comarch offers its multi-cloud management services. The company manages IT for several large enterprises, where multiple cloud platforms interact alongside legacy and traditional IT environments. Some of the advantages of this include:

• The multi-cloud strategy enables users to mix and match services based on their organisational goals and specific needs
• With Comarch handling the ongoing management of the multi-cloud environment, internal IT staff can focus on business initiatives
• Ability to handle legacy applications, next-generation applications and specific workloads
• Various managed services on both cloud and legacy IT platforms
• Aligning the activities of various teams to maintain security and compliance
• Ensuring smooth migrations to the cloud thanks to consultations and guidance
• Single point of contact in any IT-related case

“Comarch multicloud services help you to move your organisation’s infrastructure and applications to the cloud and, as a result, let your IT resources focus on more business related aspects of IT. Our solutions mitigate risk, maximise performance and invoke robust, repeatable processes leading to future business growth,” says Marcin Geroch, Comarch ICT consulting director.

Comarch PowerCloud

One of Comarch’s ready-to-use cloud solutions is the Comarch PowerCloud platform, which allows IBM i and AIX systems users to migrate their on-premise IT infrastructures to the cloud.

The platform, which is based on the company’s proprietary infrastructure, also offers full technical support and delivers a full portfolio of managed services. Comarch PowerCloud  incorporates the latest virtualisation features and facilitates deployment processes for IBM AIX, IBM i, and Linux virtual machines (VMs) running on IBM Power Systems environments. It is available in a pay-as-you-go model, allowing users to cut costs – a study by Comarch found that migrating the traditional IBM Power infrastructure to the cloud may help reduce costs by as much as 30-40 per cent.

The solution is also flexible, meaning users can purchase as much processor power and storage space as required and change the values if their needs evolve. All the data is stored in Comarch’s own data centres, which offers high level of information protection and security compliance.

Comarch PowerCloud also incorporates the latest virtualisation features and facilitates deployment processes for IBM AIX, IBM i, and Linux virtual machines (VMs) running on IBM Power Systems environments.

To know more about the PowerCloud, click here

Rocket Software Names Barbara Goose Chief Marketing Officer

U.S. markets open in 6 hours 19 minutes

WALTHAM, Mass., September 20, 2021–(BUSINESS WIRE)–Rocket Software, a global technology leader that develops enterprise modernization and optimization solutions for Fortune 500 companies and government agencies, has named Barbara Goose Chief Marketing Officer. In this role, Barbara will join the Rocket® executive leadership team overseeing the marketing organization including brand, marketing operations, corporate communications, demand generation, field marketing, channel marketing and analytics.

Goose joins Rocket with over 20 years of experience in the digital marketing space leading innovative and strategic programs for national and multi-national brands. Most recently, she served in the CMO role at John Hancock, a unit of leading international financial services group Manulife Financial Corporation, where she implemented customer experience programs, led digital transformation leveraging human-centered design skills to drive growth, and established a brand ROI model to measure the business benefit of brand spend.

“Barbara has a proven track record of implementing transformational marketing initiatives that deliver on both innovation and impact,” said Andy Youniss, CEO, Rocket Software. “Her emphasis on customer experience is a fantastic fit for our customer-centric culture. I know her addition to the team will enable legendary outcomes for Rocket and our customers and partners.”

“I’m thrilled to be joining Rocket Software at such a pivotal time in the company’s evolution,” said Goose. “I’m excited about the opportunities ahead to help further elevate Rocket’s awareness and reputation in the market, as well accelerate business growth.”

Prior to her role at John Hancock, Goose was responsible for driving the overall marketing and communications programs as Global Chief Marketing Officer of Altisource. She also spent 15 years at DigitasLBi, where as president of the company’s Boston and Detroit locations she was responsible for driving the overall growth of both offices as well as the strategy and execution of DigitasLBi services across the offices’ client bases. Under her leadership, she oversaw the most significant expansion of DigitasLBi Boston, adding such clients as Dunkin’ Donuts, ZipCar, and Lenovo, while recruiting some of the industry’s top talent to become the largest agency in Greater Boston.

Additionally, she has served on the boards of the Massachusetts Innovation & Technology Exchange (MITX), the Greater Boston Chamber of Commerce, and the Citi Arts Center/Wang Center. Goose is currently on the advisory board of Glasswing Ventures, a private equity fund focused on AI and frontier technologies.

Goose holds an MBA from Harvard University and a BA in Economics, summa cum laude, Phi Beta Kappa, from the University of Pennsylvania.

About Rocket Software

Rocket Software empowers organizations to create legendary impact in the world through innovation in legacy technologies. With deep expertise in IBM Z®, IBM Power®, and database and connectivity solutions, Rocket provides solutions that power tens of thousands of global businesses, solving real problems and making real-world impact. Rocket is a privately held U.S. corporation headquartered in the Boston area with centers of excellence strategically located throughout North America, Europe, Asia, and Australia. Rocket is a portfolio company of Bain Capital Private Equity.

Legacy Powers Legendary™

© 2021 Rocket Software, Inc. or its affiliates. All Rights Reserved.

Rocket® is a trademark of Rocket Software, Inc. and its subsidiaries, registered in the United States and other jurisdictions worldwide. All other trademarks cited herein are the property of their respective owners.

View source version on businesswire.com: https://www.businesswire.com/news/home/20210920005095/en/

Contacts

Jessica Hohn-Cabana
[email protected]

AdHow CO2 is being changed from waste to resource

Forward-thinking Saudi Arabian scientists want to capture carbon dioxide and transform it into products we use every day.

Fortunes Tumble From Seattle to Shenzhen in $135 Billion Wipeout

(Bloomberg) — A global rout in stock markets sparked by concerns over China Evergrande Group hit the world’s biggest fortunes Monday, with the richest 500 people losing a combined $135 billion.Most Read from BloombergThe Global Housing Market Is Broken, and It’s Dividing Entire CountriesMerkel’s Legacy Comes to Life on Berlin’s ‘Arab Street’Is There Room for E-Scooters in New York City?Istanbul Turns Taps on Old Fountains, Joining Global Push for Free DrinksAmazon, Microsoft Swoop In on $24 Bil

AdSvenskar födda före 1981 bör genast göra detta

Svenskar födda mellan 1941 och 1981 kan få betalt varje dag

Will the Stock Market Selloff Get Worse? Watch This Number.

The S&P 500 had its worst day in months Monday, tumbling 1.7% on fears that property giant China Evergrande Group ‘s (ticker: 3333.Hong Kong) troubles may spill over into other markets. Friday, the S&P 500 fell below its 50-day moving average, a technical indicator that shows investors are losing confidence in the market outlook. The S&P 500 is 3.9% below its all-time high as of Monday’s close, at its lowest level since mid-June.

Evergrande Tumbles Further After S&P Says Default Is Likely

(Bloomberg) — China Evergrande Group slid deeper in equity and credit markets Tuesday, fueling concerns about broader contagion after S&P Global Ratings said the developer is on the brink of default.Most Read from BloombergThe Global Housing Market Is Broken, and It’s Dividing Entire CountriesMerkel’s Legacy Comes to Life on Berlin’s ‘Arab Street’Is There Room for E-Scooters in New York City?Istanbul Turns Taps on Old Fountains, Joining Global Push for Free DrinksAmazon, Microsoft Swoop In on $

AdJapansk kökskniv tar Sverige med storm

Därför är alla galna i dessa handgjorda supervassa japanska köksknivar

Why Rare Earth and Lithium Stocks Crashed Today

Monday put investors in lithium and rare earth metal stocks on the edge. While Standard Lithium (NYSEMKT: SLI) and Lithium Americas (NYSE: LAC) sank 10.7% and 13.3%, respectively, by 2:30 p.m. EDT, rare earth stock MP Materials (NYSE: MP) was down 8.5% by then. With concerning news from China and an electric-vehicle (EV) manufacturer slashing its outlook on supply shortages hitting electric-vehicle stocks hard, lithium and rare earth stocks were bound to feel the heat.

AdBli av med ditt synfel – på 30 sekunder

…och åtgärda samtidigt närsynthet, översynthet och brytningsfel.

4 Ultra-High-Yield Dividend Stocks to Buy Hand Over Fist Right Now

Not many know what a powerful wealth compounding machine dividend stocks are. With reinvested dividends, those gains more than doubled to over 2,400%, proving time and again why dividend stocks are so worthy of your money. While you must never chase yields blindly, there’s nothing like it if you can invest in dividend stocks that support their high yields with stable and growing dividends.

S&P 500’s Late Bounce Came on Extreme Volume in Futures Market

(Bloomberg) — The late-afternoon bounce in U.S. stocks came amid a trading frenzy in the futures contracts. Most Read from BloombergThe Global Housing Market Is Broken, and It’s Dividing Entire CountriesMerkel’s Legacy Comes to Life on Berlin’s ‘Arab Street’Is There Room for E-Scooters in New York City?Istanbul Turns Taps on Old Fountains, Joining Global Push for Free DrinksAmazon, Microsoft Swoop In on $24 Billion India Farm-Data TroveMore than 320,000 contracts changed hands in the 30 minutes

AdHelt nya RENAULT Arkana E-Tech hybrid

Sportig, smart, generös, innovativ. upptäck alla sidor hos nya Arkana.

Chinese Property Developer Sinic Halts Trading After Sinking 87%

(Bloomberg) — Sinic Holdings Group Co. has halted trading after an 87% slump in its shares Monday afternoon. Most Read from BloombergThe Global Housing Market Is Broken, and It’s Dividing Entire CountriesMerkel’s Legacy Comes to Life on Berlin’s ‘Arab Street’Is There Room for E-Scooters in New York City?Amazon, Microsoft Swoop In on $24 Billion India Farm-Data TrovePalm Oil Giant’s Industry-Beating ESG Score Hides Razed ForestsThe Shanghai-based developer didn’t give any reason for the trading

Morning Brief: This is why September stinks for stocks

Brian Sozzi and Emily McCormick break down Monday’s Morning Brief, which details how September is living up to its persona of being a historically weak time for the market as stocks continue to slip and the other factors that could continue to affect the market during September.

AdYou Won’t Use an Ordinary Backpack Again

This convertible bag will take you from the beach or mountain hike to the gym or office in no time with its sleek design that will fit any lifestyle.

Rio Tinto Group’s (LSE:RIO) Dividend may be Threatened by the Fall of Iron Ore Prices

Rio Tinto Group (LON:RIO) investors are taken on a rollercoaster ride with the high success in the last 12 months, followed by the recent downfall of Iron Ore prices. Dividend yields for investors reached some 14%, however, the seemingly attractive yield may not be sustainable in light of the changing macro situation. We are going to overview the dividend policy and earnings potential for Rio Tinto, in order to see if the recent market volatility represents an opportunity or a convergence to tru

Can Lucid Stock Clear Up? This Is What You Need to Know

EV stocks have witnessed quite a decent amount of interest from investors over the past few years. Several factors contributed to the surging investor enthusiasm for these stocks. Among the top contributors to investors’ appetite for EV stocks has been the incredible growth seen with incumbents such as Tesla (TSLA), as well as the recently bullish political landscape for electric vehicles spurred by President Biden’s American Jobs Plan. Of course, this narrative remains strong for growth investo

Verified by MonsterInsights