Unfortunately this is fiction.
In this webinar, Robin Tatam explores a well-documented IBM i breach. Despite the many options IBM has provided to protect the system and data, many organizations still struggle to apply appropriate security controls. Protecting the system and the data residing on it requires action.
Robin describes the steps you can take to avoid the mistakes made in this specific case as well as other configurations that can lead to business disruption due to inadequate or misconfigured security settings.
One FACT is that IBM i is secure-able.
Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.