Issue Sponsored By:
> The PowerTech Group -- Definitive iSeries Security
![]()
IN THIS ISSUE:
>
Don't lose sight of the objectives
>
Testing resource security
>
20 ways to improve your system's security
>
Is the light on, but the door unlocked?
>
Free book excerpt: Information Security Best Practices -- 205 Basic Rules
>
User poll
![Headlines]()
![]()
Don't lose sight of the objectives
[Search400.com]
by Rich Loeber
Sometimes we get so wrapped up in what we're doing down in the security trenches that we lose sight of the overall objectives. When that happens, bad things can occur. Often, in our zeal to keep things safe, we make it hard for everyone else to just do their jobs. If that's happening in your shop, you should take a second look at what you're doing.
MORE INFO:
> View previous tips by Rich Loeber
| |
![]() |
![AD]() |
![]() |
The PowerTech Group -- Definitive iSeries Security
Free iSeries Compliance Assessment! Complying with government regulations such as Sarbanes Oxley and HIPAA is top priority for many businesses. Are you prepared? An iSeries compliance assessment from PowerTech will uncover security vulnerabilities and provide recommendations to help your company get ready.
Click here for more information
|
| |
Testing resource security
[Search400.com]
Rich Loeber takes a look at how you can go about testing your resource security setup. There are two things that you need to test and evaluate on your system. First, you have to make sure users have sufficient authority to get all of their work done without a problem. Once that has been established, you then need to go back and make sure users don't have too much authority, thereby compromising the confidentiality issues that
prompted you to secure specific resources in the first place.
20 ways to improve your system's security
[Search400.com]
Is your system as secure as it can be? If you think it can be better, check out these hot expert Q&As. Use them to determine if you should be doing more.
Is the light on, but the door unlocked?
[Search400.com]
iSeries owners regularly boast about the security built into their systems, and rightly so, but if you don't implement and use the features, they're not going to do anything for you. Be safe. Don't leave your system exposed; learn more about locking down your iSeries.
Free book excerpt: Information Security Best Practices -- 205 Basic Rules
[Search400.com]
As a registered member of Search400.com, you're entitled to a complimentary copy of Chapter 9 of Information Security Best Practices - 205 Basic Rules -- written by George L. Stefanek and published by the Morgan Kaufmann division of Elsevier. This chapter, "Operating System Security Rules," addresses best practices for setting up security within operating systems. Authentication, file protection, virus checking,
file sharing, network software and security logging are discussed.
![]()
SURVEY:
User poll
If Oracle takes over PeopleSoft ...
EXPERT ANSWER CENTER:
Fast answers for difficult questions
With more than 12,000 answers from IT experts, the Expert Answer Center KnowledgeBase may just have your question answered before you ask it. Can't find what you're looking for? Our rotating lineup of featured experts are waiting for your
questions (they're writing blog entries instead of twiddling their thumbs); every two weeks, their specific topic changes. So see what's in store this week and what's coming up. If you ask your question early, you'll be among the first to receive a reply.
SECURE YOUR SYSTEMS:
Best Web Links on Security
These Best Web Links provide you with resources to help you
make your system as secure as it can be. Don't waste your time
searching the Web; we've already done that for you.
| |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
![]() |
| |
|
![]() |
| |
![]() |
Free E-Newsletters! Select e-newsletters you would like to receive via e-mail!
Search400: Today's News
Search400: Administrator Tips
Search400: Programmer Tips
![]()
![]()
Not a Member? We?ll activate your membership with your subscription.
|
![]() |
| |
|
|
![]()
![]() |
![TechTarget - The Most Targeted IT Media]() |
![]() |
This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?track=NL-236&ad=491452
Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: Search400 Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
|
![]() |
|
![]() |
|