Today’s IT threat landscape is constantly changing, with more new unforeseen threats each day. Data breaches, hacks, ransomware, and malware are more prevalent than ever before. System monitoring and prevention of these attacks has become a top concern of company leaders. Until recently, security has not been a concern for IBM i shops. Many IBM…
Prioritizing Threats and staying ahead of the Cybercriminals
The methods of attack and the strategies of the people that attack our networks and data resources continue to evolve. Those of us responsible for protecting resources need to stay ahead of the threats. And as the threats change, the cybercriminals are using new tools to obscure their existence and evade detection. Ransomware is a…
Endpoint Security
Endpoint security is the weak link in many organization’s security strategy. We spend time securing the network assets, including company-owned endpoint devices and then we allow personal devices access to these same networks. It might be a manufacturing company that hosts a sales meeting for people from across the region. Or it might be a…