Title: Security Tip
Issue Sponsored By:
> The PowerTech Group -- Definitive iSeries Security
![]()
IN THIS ISSUE:
>
Time for your annual checkup
>
Watch your profiles
>
The importance of testing user profiles
>
Testing resource security
>
Top 10 security tips
>
Whoops! I can't believe I did that!
>
User poll: Which seasonal character does your boss resemble?
![Headlines]()
![]()
Time for your annual checkup
[Search400.com]
by Rich Loeber
Your iSeries is not unlike the average middle-aged man, according to Rich. They both need annual checkups to make sure there are no surprises lurking. This tip provides a list of items to check for your annual system audit. Rich guarantees you'll find something.
MORE INFO:
> View previous tips by Rich Loeber
| |
![]() |
![AD]() |
![]() |
The PowerTech Group -- Definitive iSeries Security
Free iSeries Compliance Assessment! Complying with government regulations such as Sarbanes Oxley and HIPAA is top priority for many businesses. Are you prepared? An iSeries compliance assessment from PowerTech will uncover security vulnerabilities and provide recommendations to help your company get ready.
Click here for more information.
|
| |
Watch your profiles
[Search400.com]
The user profile is your first line of defense in the ongoing battle of protecting your system. When a new employee shows up for work, you go to great lengths to get their profile set up just right. What about subsequent changes to those profiles? Are you watching these updates to make sure that your carefully engineered security scheme is being maintained over the life of each user profile?
The importance of testing user profiles
[Search400.com]
Don't let everything you learned about the principals of testing fall by the wayside. Security testing is just as important as application testing. In this tip, Rich Loeber takes a look at testing your user profiles
Testing resource security
[Search400.com]
Security guru Rich Loeber looks at how you can go about testing your resource security setup. There are two things that you need to test and evaluate on your system. First, you have to make sure users have sufficient authority to get all of their work done without a problem. Once that has been established, you then need to go back and make sure users don't have too much authority, thereby compromising the confidentiality issues
that prompted you to secure specific resources in the first place.
Top 10 security tips
[Search400.com]
Not surprisingly, security is even more of an issue than ever -- especially with Sarbanes-Oxley compliance deadlines. Here are 10 hot tips to ensure your security is all it can be.
![Also on Search400.com]()
![]()
SHARE YOUR STORY:
Whoops! I can't believe I did that!
We've all been there at one time or another, having to explain how or why on Earth we did something so stupid. And when it comes to working with your iSeries, I'm sure you all have one or two blooper stories to share. So, what do you say? Care to share your biggest goof-up of the year?
Do you have the "whopper of all whoops?" Don't delay. Don't be shy. Claim your fame. Remember: By sharing your tale, you'll help other iSeries users avoid the same mistakes.
ITKNOWLEDGE EXCHANGE:
Get answers to your questions fast
Now you can ask any one of your fellow TechTarget members -- 1.2 million strong -- specific questions on technology, best practices or other IT issues. Just tell us who you are and the subjects you're interested in (iSeries, RPG, DB2, WebSphere, etc.) and then ask your questions or offer advice to other IT professionals. Our ITKnowledge Exchange brings members from all 22 TechTarget Web sites together to share information and
experiences.
SURVEY:
User poll: Which seasonal character does your boss resemble?
In the spirit of the holiday season, we would like to know which seasonal character your boss resembles the most.
* The Grinch
* Jolly Old St. Nick
* Clark Griswold
* Rudolph
* The Abominable Snowman
* Ebineezer Scrooge (McDuck version)
| |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
![]() |
| |
|
![]() |
| |
![]() |
Free E-Newsletters! Select e-newsletters you would like to receive via e-mail!
Search400: Today's News
Search400: Administrator Tips
Search400: Programmer Tips
![]()
![]()
Not a Member? We'll activate your membership with your subscription.
|
![]() |
| |
|
|
![]()
![]() |
![TechTarget - The Most Targeted IT Media]() |
![]() |
This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
To unsubscribe from "Security Tip":
Go to unsubscribe: http://search400.techtarget.com/unsubscribe?cid=499982&lid=460581&track=NL-236&ad=499982
Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: Search400 Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
|
![]() |
|
![]() |
|