- 51. Configurations That Will Bite You
- (IBM i (OS/400, i5/OS))
- ... Carol Woodbury In most areas, IBM has done a decent job of making it obvious what the outcome of a particular setting will be, but some outcomes aren’t so obvious. In addition, I’ve seen administrators ...
- Created on 09 June 2020
- 52. Tips for Staying Sane
- (IBM i (OS/400, i5/OS))
- In this crazy, topsy-turvy world we’re in, we’re finding creative ways to stay sane in our personal lives. How does this translate into our work life, specifically to IBM i security? By Carol Woodbury ...
- Created on 12 May 2020
- 53. Practical Security Tips to Survive COVID-19 and Working from Home
- (IBM i (OS/400, i5/OS))
- The move to work from home brings increased security risks. Carol discusses what can be done to detect and defend against these new risks. By Carol Woodbury With the onslaught of the Coronavirus, many ...
- Created on 06 April 2020
- 54. Why Encryption?
- (IBM i (OS/400, i5/OS))
- ... By Carol Woodbury Large financial institutions used to be the only organizations that implemented encryption. Now it’s becoming more commonplace. Why? One reason is because it’s become easier to implement; ...
- Created on 03 March 2020
- 55. Are You Using the Tools IBM Has Provided?
- (IBM i (OS/400, i5/OS))
- IBM ships several tools to make securing the system easier…but are you using them? Carol describes the tools’ features and explains how to use them. By Carol Woodbury I’m still surprised when I describe ...
- Created on 11 February 2020
- 56. Tips for Auditing an IBM i
- (IBM i (OS/400, i5/OS))
- In this article, Carol describes the system values, user profile attributes, and access control settings she'd recommend that auditors pay attention to. By Carol Woodbury I’m dedicating this article ...
- Created on 15 January 2020
- 57. What IBM i Information Should I Be Sending to My SIEM?
- (IBM i (OS/400, i5/OS))
- Use of Security Information and Event Managers (SIEMs) is expanding to include IBM i information, but what is appropriate to send? By Carol Woodbury Many organizations started to use a SIEM to help ...
- Created on 09 December 2019
- 58. Why Do We Ignore the Insider Threat?
- (Analytics & Cognitive)
- Carol provides insights on why the insider threat is being ignored and why that might not be a wise business decision. By Carol Woodbury Whenever I talk to clients or prospective clients and I even ...
- Created on 12 November 2019
- 59. Has My IBM i Been Breached?
- (IBM i (OS/400, i5/OS))
- Carol provides tips for what to examine to help determine if your system’s been breached. By Carol Woodbury This discussion stems from a conversation I had with a friend who asked what information ...
- Created on 04 October 2019
- 60. Tips for Securing the Integrated File System (IFS)
- (IBM i (OS/400, i5/OS))
- Securing the IFS remains a mystery to most, but with more confidential data being stored in the IFS, it’s time to figure it out. By Carol Woodbury Even though the IFS has been part of the system since ...
- Created on 04 September 2019
- 61. Tips for Avoiding Malware on IBM i
- (IBM i (OS/400, i5/OS))
- With more government agencies and organizations being affected by malware, steps need to be taken to ensure IBM i isn’t affected. By Carol Woodbury Some organizations have spent millions of dollars ...
- Created on 12 August 2019
- 62. Carol Answers Her Top 6 Most-Asked Questions
- (IBM i (OS/400, i5/OS))
- I’m guessing that you’ve asked someone (perhaps even yourself) one or more of these questions. By Carol Woodbury I get asked a lot of questions—via email, when I’m presenting at conferences, after ...
- Created on 09 July 2019
- 63. Top Five Misconfigurations That Leave Your IBM i Vulnerable
- (IBM i (OS/400, i5/OS))
- ... Carol describes her top five. By Carol Woodbury I read articles about security breaches all the time. Except for cases when an organization is targeted by a nation-state or a competitor, the cause ...
- Created on 11 June 2019
- 64. New Release! What New Security Features Does IBM i V7R4 Bring Us?
- (IBM i (OS/400, i5/OS))
- IBM has taken more steps to keep the IBM i super securable. By Carol Woodbury IBM recently announced a new release—V7R4—and with it some new integrated security features you’ll want to take advantage ...
- Created on 02 May 2019
- 65. Why Your Business Needs a Security Awareness Program
- (Security - Other)
- Do you have a formal plan for educating employees about ongoing IBM i and IT security threats? by Carol Woodbury This article is excerpted from IBM i Security Administration and Compliance: Second ...
- Created on 15 April 2019
- 66. What Are the IBM i User Profile Attributes That Really Matter?
- (IBM i (OS/400, i5/OS))
- So many attributes, so little time. It’s tempting to just skip over some of them, isn’t it? By Carol Woodbury If any of you have prompted the Create or Change User Profile commands, you’ll know that ...
- Created on 08 April 2019
- 67. How Bad Are Certain IBM i Security Settings? Not So Bad, Pretty Bad, or Really Bad?
- (IBM i (OS/400, i5/OS))
- I realize that I’ve spent a lot of time explaining best practices and what my recommendations are, but I don’t often explain why some settings aren’t the best. By Carol Woodbury Some of my favorite ...
- Created on 12 March 2019
- 68. What Do You Do When Priorities Change? Why Should You Continue to Pay Attention to IBM i Security?
- (IBM i (OS/400, i5/OS))
- Carol describes why securing your IBM i is still a wise investment. By Carol Woodbury The other day, I was challenged by a client to whom I had proposed a consulting contract that would continue to ...
- Created on 07 February 2019
- 69. Why Does It Matter Which Profile Owns IBM i Objects?
- (IBM i (OS/400, i5/OS))
- Carol describes security considerations one should make when deciding which profile will own IBM i objects. By Carol Woodbury We seem to always focus on the *PUBLIC authority of objects and whether ...
- Created on 16 January 2019
- 70. What Is That Obscure IBM i System Value QUSEADPAUT?
- (IBM i (OS/400, i5/OS))
- Carol describes what the QUSEADPAUT is and why you may want to use it. By Carol Woodbury Not too long ago, someone showed me an “exploit” that their auditor had devised that allowed him to take advantage ...
- Created on 11 December 2018
- 71. Things That Make Me Go “Hmm”
- (IBM i (OS/400, i5/OS))
- Carol discusses things that are a bit puzzling when it comes to IBM i security settings. By Carol Woodbury I wish I could link to a video of my 20-month-old niece putting her chubby little index finger ...
- Created on 07 November 2018
- 72. Where Have All My Settings Gone?
- (IBM i (OS/400, i5/OS))
- Carol discusses the areas of IBM i security that, when ignored, may cause your system or data to be exposed. By Carol Woodbury Summer’s over (sad face), kids are going back to school, and your commute ...
- Created on 05 October 2018
- 73. Three Ways to Use IBM i Authority Collection
- (IBM i (OS/400, i5/OS))
- Authority Collection was added to IBM i in V7R3. Carol discusses three practical applications of this powerful feature. By Carol Woodbury The new Authority Collection feature is very easy to use, but ...
- Created on 24 July 2018
- 74. Why the IBM i Community Needs to Pay Attention to GDPR
- (Compliance / Privacy)
- Carol explains why it’s likely you could be affected by GDPR…even if you don’t think you are now or will be later. By Carol Woodbury There are two reasons that the IBM i community needs to pay attention ...
- Created on 17 July 2018
- 75. Observations from My Round-the-World Trip for IBM i
- (IBM i (OS/400, i5/OS))
- Speaking and consulting engagements took Carol around the world—literally. Read about what she learned. By Carol Woodbury Recently, I had consulting engagements in both Singapore and Sydney, and then ...
- Created on 12 July 2018
- 76. Ethical Hacking: What It Is and Why You Should Do It Against Your IBM i
- (IBM i (OS/400, i5/OS))
- Not all hacking is bad. In fact, ethical hacking can reveal vulnerabilities before they’re exploited. By Carol Woodbury If you don’t believe a vulnerability exists, sometimes you need proof. Ethical ...
- Created on 11 June 2018
- 77. Five Tips for Avoiding and Detecting Malware on IBM i
- (IBM i (OS/400, i5/OS))
- The threat of malware infecting your IBM is a real danger. Use these tips to lower your risk of being affected. By Carol Woodbury Several things can be done to reduce your exposure to malware - be ...
- Created on 03 May 2018
- 78. Help! My IBM i Save Security Data (SAVSECDTA) Is Taking Longer and Longer to Complete!
- (IBM i (OS/400, i5/OS))
- Don't cancel or stop running the job that is saving your IBM i security data. Instead, read this article for four steps you can take to reduce the time. By Carol Woodbury Saving your IBM i security ...
- Created on 11 April 2018
- 79. Test Your IBM i Security Knowledge
- (Analytics & Cognitive)
- ... Woodbury Do you think you have a solid grasp of IBM i security concepts? Take this short test and find out how much you really know. The answers are at the end of this article. Several of the magazines ...
- Created on 06 March 2018
- 80. Help! My Audit Journal Is Flooding My System!
- (IBM i (OS/400, i5/OS))
- ... By Carol Woodbury Don't get me wrong. Speaking from a security professional's perspective, the more you audit, the better. Information in the audit journal is invaluable when performing forensics and ...
- Created on 13 February 2018
- 81. Things You Hope Your Auditor Never Understands About IBM i Security
- (IBM i (OS/400, i5/OS))
- ... By Carol Woodbury Because auditors aren't usually IBM i-savvy, administrators will often choose a configuration or provide an answer that, if fully understood by their auditor, would never be allowed. ...
- Created on 05 January 2018
- 82. Hidden Dangers of the Lesser-Known IBM i Special Authorities
- (IBM i (OS/400, i5/OS))
- ... By Carol Woodbury When discussing the concept of "least privilege access" that is, giving users only the authorities necessary to do their jobs it's obvious that only trusted users should be granted ...
- Created on 11 December 2017
- 83. How Can I Determine What an IBM i User Profile Is Used For?
- (IBM i (OS/400, i5/OS))
- Sometimes you run across a user profile and you see that it's being used, but you have no idea of its purpose. This article discusses how to discover a profile's use. By Carol Woodbury When helping ...
- Created on 09 November 2017
- 84. There’s Nothing to Be Scared of…Or Is There?
- (Editor's Letter)
- ... hack was conducted on a “legacy” environment. Hmmm…legacy. You’ve heard that word used to describe the IBM i. Could it have been an IBM i that was hacked? Maybe. Carol Woodbury comments on that possibility ...
- Created on 16 October 2017
- 85. Could IBM i Have Been Part of the Equifax Breach?
- (IBM i (OS/400, i5/OS))
- ... environment.” Many organizations have dubbed their IBM i as “legacy.” By Carol Woodbury We don’t yet know the details of the Equifax breach. But just for fun, let’s assume for the moment that their ...
- Created on 09 October 2017
- 86. It’s September. What Has Your Attention?
- (Editor's Letter)
- ... API article; if you’ve ever looked at anything and wondered just what the heck it is, this API will intrigue you. It’s a touchdown! It’s the kickoff again, and Carol Woodbury takes possession. In a bold ...
- Created on 20 September 2017
- 87. Implementing Compensating Controls When IBM i Security Best Practices Aren’t Possible
- (IBM i (OS/400, i5/OS))
- What can organizations do when using “best practices” settings cause something to break? This article discusses your options. By Carol Woodbury Of course, implementing what is recommended as a “best ...
- Created on 11 September 2017
- 88. Thinking Analytically
- (Editor's Letter)
- ... in this issue of MC Press Magazine include Carol Woodbury’s perspective on “fake news,” but she’s looking at it from an IBM i security point of view. We also have Joe Pluta showing you how to load an array ...
- Created on 15 August 2017
- 89. Debunking the Fake News Surrounding IBM i Security
- (IBM i (OS/400, i5/OS))
- With so much fake news floating around, I thought I’d take the time to debunk the fake news I hear about IBM i security. By Carol Woodbury When I visit new clients, I often find that they have been ...
- Created on 08 August 2017
- 90. Ch-ch-ch-changes
- (Editor's Letter)
- ... debugging. This month, Rafael shows you how to get your debug session going with the ILE Debugger. Carol Woodbury thinks you should change the way you look at the IBM i Audit Journal. Are you putting ...
- Created on 24 July 2017
- 91. Five Hints to Help You Make Better Use of the IBM i Audit Journal
- (IBM i (OS/400, i5/OS))
- With so much information in the IBM i audit journal, you have to know what you’re looking for. Otherwise, you may miss some important information. By Carol Woodbury Whether you’re using a product such ...
- Created on 11 July 2017
- 92. What’s on Your Summer Reading List?
- (Editor's Letter)
- ... IT outages. Aaron Bartell continues to enlighten you about Node.js, this time with a focus on DB2. And if you haven’t ever thought about the relationship between security and backup strategies, Carol Woodbury ...
- Created on 30 June 2017
- 93. Five Security-Related Reasons to Care About Your IBM i Backup Strategy
- (IBM i (OS/400, i5/OS))
- Many IBM i administrators have a comprehensive backup strategy, but for those who don’t, I’m hoping that this article will have you reworking how you approach backups. Written by Carol Woodbury Debbie ...
- Created on 14 June 2017
- 94. MC Press Online Version 2.1
- (Editor's Letter)
- ... you haven’t yet been convinced that your IBM i is not an “impenetrable fortress,” you’ll want to read Steve Pitcher’s article in this issue. Also in this issue, Carol Woodbury reveals why a security-conscious ...
- Created on 31 May 2017
- 95. Why, for Most IBM i Shops, DDM Is Their Worst Vulnerability
- (IBM i (OS/400, i5/OS))
- Most IBM i shops have not secured their DDM implementation. Carol discusses why that’s putting those shops at risk. Written by Carol Woodbury Distributed Data Management (DDM) comes in two flavors: ...
- Created on 25 May 2017
- 96. The Importance of Staying Current
- (IBM i (OS/400, i5/OS))
- Carol discusses why and how staying up to date reduces your company’s security risk. Written by Carol Woodbury You might wonder why I decided to discuss this particular issue. I chose this topic because, ...
- Created on 26 April 2017
- 97. Why IBM i Organizations Should Pay Attention to What Happens in New York
- (Compliance / Privacy)
- Carol discusses how the cybersecurity law in New York will affect organizations running IBM i and how it provides guidance for organizations—even those outside of New York. Written by Carol Woodbury ...
- Created on 16 March 2017
- 98. Insiders Are a Threat to IBM i? No Way! Yes Way!
- (IBM i (OS/400, i5/OS))
- Carol discusses how the current thoughts on insider threats needs to be redefined and how insider threats can leave IBM i vulnerable. I read an interesting article that discussed a study done by the ...
- Created on 15 February 2017
- 99. Compliance Is Dead, Long Live Compliance!
- (Compliance / Privacy)
- Carol discusses how compliance requirements are not going away and, in fact, are increasing for some organizations. Written by Carol Woodbury Why am I talking about compliance? Compliance—in my opinion—is ...
- Created on 25 January 2017
- 100. Carol’s IBM i Security Wish List
- (IBM i (OS/400, i5/OS))
- Carol describes 10 things that she wishes were different when it comes to IBM i security. Written by Carol Woodbury It’s the time of year when all children are making their Christmas wish ...
- Created on 15 December 2016