Yes, IBM i is Vulnerable to Ransomware - Joe Hertvik & Mel Zucker

Ransomware can encrypt and rename Integrated File System (IFS) stream files that support native IBM i applications and store user documents. Ransomware can also attack native IBM i objects, when the QSYS.LIB file system is exposed to network attacks.  

Ransomware disables business processing, breaches security, and wastes money and time in recovering from an attack. As attacks become more prevalent, corporations, governments, auditors and regulators are increasingly requiring stronger protection against ransomware.

Join this webinar where we’ll discuss how ransomware attacks the IBM i, steps you can take to protect against ransomware and how to respond when you’re attacked. You’ll learn:  

• How ransomware attacks IBM i file systems

• Critical IBM i security settings that protect your system from ransomware

• Recovery techniques and best practices to consider when an attack occurs

• Preventing, stopping, and isolating IBM i ransomware activity in real-time

Joe Hertvik

Hertvik & Associates

Joe Hertvik, PMP is the owner of Hertvik & Associates, an IT administration and infrastructure consultancy, specializing in IBM i and network management. He has managed IBM i hardware and network systems for Fortune 500 and private companies for 20+ years. 

Joe has written more than 1000 articles covering IBM I, networking & project management topics, making him a go-to reference for IBM i & infrastructure information.

Mel Zucker

Senior IBM i Solutions Engineer, Software Engineering of America

Mel Zucker has been a Senior IBM i Solutions Engineer with Software Engineering of America for the past 9 years. Prior to joining SEA, Mel was a member of the IBM team supporting their line of midrange products for over 30 years. While at IBM, Mel was the recipient of multiple IBM Means Service and System Engineering Achievement awards.

Key:

Complete
Failed
Available
Locked
Video
Open to view video.
Open to view video.