Configuration Tips to Reduce the Risk of IBM i Malware Infection

Logo
Presented by

Carol Woodbury, DXR Security & Bill Hammond, Precisely

About this talk

Not a week goes by that there isn’t a headline regarding a ransomware attack that has affected another organization. Ransomware and other malware can, and has, infected IBM i via a drive mapped to the system using a file share. While you can’t stop someone from falling prey to phishing and clicking on the wrong link, there are steps you can take to reduce the risk of infection. During this session Carol will describe the IBM i configuration settings you can use to reduce the risk of malware infecting your IBM i. Join us to learn about: • The current malware threats and tactics • How file shares and directory permissions work together to provide access from the network • Why sharing root (‘/’) puts your entire system at risk
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (159)
Subscribers (10895)
Precisely is the global leader in data integrity, providing accuracy and consistency in data for 12,000 customers in more than 100 countries, including 90 percent of the Fortune 100. Precisely’s data integration, data quality, location intelligence, and data enrichment products power better business decisions to create better outcomes. Learn more at www.precisely.com