The safest way to live test your ransomware, malware, virus defenses

You aren’t going to release a live virus on your production system, so how do you test your defenses? In the article “The State of Ransomware in 2020“, research suggests that every 11 seconds, some business is being attacked by a cybercriminal. And in the report “The State of Ransomware 2021“, the frequency of attacks

Prove your IBM i Backup is Recoverable: The Cloud Way

Beyond having checklists and runbooks, what else can you do to test your backups? In the comprehensive article called “How to Prove Your IBM i is Recoverable without a Real DR Test,” Tom Huntington from HelpSystems details all the IBM i Save Commands and system objects that should be included within a comprehensive backup. By

Log4J and IBM i

Over the last few months, there have been many blog posts and technical breakdowns written on the vulnerability of the Log4j exploit. There are even memes about it, as it has permeated popular culture with the exploit affecting the highly popular game Minecraft. The Log4J vulnerability is one that had the potential to create mass

Cloud Taxonomy for Non-Production Use Cases for the Cloud

The following use cases are potential ways to use the cloud for non-production use cases. The key is to deliver “quickly” the infrastructure needed to perform a specific need or task. Waiting weeks for infrastructure delivery should be considered an “anti-pattern” since the cumulative time of waiting over the course of a project would be

Join our email list for news, product updates, and more.