One of the (many) things that I find alarming in my line of work is the number of companies that expect to respond to a data breach without a solid and tested response plan. As an ex-systems engineer, I know that the best-intentioned plans have little chance of succeeding unless they’ve been thoroughly tested, updated, and then tested again; perhaps multiple times.
Powertech helps customers with security solutions that address many of the security challenges encountered in shops running on IBM i-based servers. We’ve developed solutions to remediate audit visibility, to permit access control, and to provide alerting. These solutions augment the IBM i integrated security controls. However, despite the best of intentions, you should always assume that someone, somewhere, eventually will find a way to access information that they shouldn’t. That’s when you’re going to need to put your plan into effect.
Last week, while I was in Atlanta to work on a security proof-of-concept for a large IBM i enterprise, I hiked up the gorgeous Stone Mountain. It’s a pretty steep trail that ascends almost 800 feet over a 1.3 mile distance. My hike wasn’t made any easier by the 20 lbs of camera equipment I had slung over my shoulder, but I made it up—and back down—without incident. While my heart was pumping hard, I still was able to see some humor in this emergency call box that wasn’t providing much assistance. It made me contemplate how many companies don’t realize that their incident response plan isn’t working until they need to use it—and by then it’s too late. Hopefully, none of the many hikers walking the trail from dawn to dusk will need assistance anywhere near this particular station. And, I hope your company has only working and tested responses waiting to kick into action.
If you’d like information on the solution modules that comprise the Powertech portfolio, please contact me at firstname.lastname@example.org.