Unfortunately this is fiction.
In this on-demand webinar, Carol discusses this breach as documented by Verizon in their Data Breach Digest. Despite the many options IBM has provided to protect the system and data, another myth is that the system is inherently secure. Protecting the system and the data residing on it requires action.
Carol describes the steps you can take to avoid the mistakes made in this specific case as well as other configurations that can lead to business disruption due to inadequate or misconfigured security settings.
One FACT is that IBM i is secure-able.
Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.