Four Reasons to Implement MFA For Your IBM i

As I like to say, “IBM i runs the world.” The major industries such as Financials, Manufacturing, Distribution, Trucking, Healthcare, and Insurance all run their core business functions on IBM i. They do this because it is the most reliable, available, and secure platform. If all the IBM i data disappeared, I’m not sure what would happen. I know it wouldn’t be good.

#1 Data Protection

Data is your company’s most critical asset, and protecting your data should be on the top of your list. Ransomware attacks continue to rise worldwide, making data protection the most crucial area companies should focus on today. Companies spend lots of money to ensure their IBM i systems are reliable and available, but sometimes they neglect the security because they believe it’s secure out of the box. A false sense of security has been the cause of successful ransomware attacks on IBM i.

Compromised credentials continue to be a leading cause of data breaches, followed by misconfigured software settings and third-party software vulnerabilities. When Steve Pitcher does a penetration test, he looks for users with default passwords. That is often the foot in the door he needs to be able to exploit the vulnerability of a system. If compromised credentials are part of the problem, then this is where we need a solution.

What is Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) can help prevent bad actors from accessing your sensitive data even if they can compromise the credentials of one of your IBM i users. MFA isn’t a new concept. We’ve all logged into an application and have had to enter a code we receive in our email or cell phones. In some cases, you may even have a physical token you need to use to access data. While we see companies have adopted MFA for some of their environments, many have not implemented it on IBM i.

The basic premise of MFA is that you sign on with something you know, have, or are. Your password and user ID is typically the thing you know. It’s also the easiest thing for someone else to know. Something you have is typically your email or your phone. The assumption is that someone else doesn’t have access to your password, email, or phone. Something you are refers to biometrics, such as your fingerprint or facial recognition. This added layer of protection is meant to stop someone …

The post Four Reasons to Implement MFA For Your IBM i first appeared on iTech Solutions Group.

Copying multiple spool files into one PDF

The task came in: I needed to take many spool files from an output queue and convert them into just one PDF. I have written about converting individual spool files into PDF, but now there was the need for the to be only one PDF.

My solution would need to:

Merge all of the spool files into one spool fileConvert the one spool file into a PDF in the IFS

Both of these I have done separately on many occasions; this was the first time to do them together.

I cannot use the spool files I used for this task, but I have two spool files in my personal output queue:

Read more »

Excellent, informative talk Charles @charlieguarino and Andrew @arcad_software! #IBMi #DevOps #MERLIN

Excellent, informative talk Charles @charlieguarino and Andrew @arcad_software! #IBMi #DevOps #MERLIN twitter.com/charlieguarino…

– OCEAN User Group (@OCEANUserGroup)10:38 – Jul 27, 2022Quoted Tweet:

A #podcast of our June’22 #iChime meeting with #IBMi #DevOps #expert Andrew Clark of @arcad_software.
A great introduction to #IBM‘s #MERLIN product. soundcloud.com/user-691966179…
Register to join future meetings centralparkdata.com/ichime-dates.h… #IBMChampion pic.twitter.com/s2QrBIPcx6

– Charles Guarino (@charlieguarino)07:52 – Jul 27, 2022

Verified by MonsterInsights