Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources. Subscribe to the blog for the latest technology tips and trends.
HelpSystems today announced the winners of its 2nd annual Partner Awards. These prestigious accolades acknowledge the dedication and remarkable growth of companies that strive to further the HelpSystems brand in key markets around the globe.
Organizations that allow the use of free or unsecured file transfer services not only leave themselves vulnerable to data loss, ransomware and a whole range of other cyber threats, but they have no control or visibility of what information is being transferred and who receives it.
The coronavirus (COVID-19) situation is changing rapidly on a day-to-day basis, so we wanted to take this opportunity to address what it means for Clearswift and HelpSystems as a global organization and an employer, and how it might impact on our customers, prospects and partners.
Take a guided tour of Intermapper's features and benefits, including a live product demonstration. We host a bi-weekly Feature Tour on Thursdays.
IBM i is highly secure—when you have appropriate system settings in place. Watch this recorded webinar and find out what security vulnerabilities are most common and most dangerous. You'll also learn how to fix them!
A recent government-commissioned report claims that the average cost of a cyber-breach for medium to large UK businesses and charities is a mere £5,220 – despite other industry surveys estimating this number to be closer to £4 million. But industry experts like Alyn Hockey, VP of Product Management at Clearswift, warn that the figure appears to be misleadingly low.
In the wrong hands, IBM i special authorities can do serious damage, but the latest research shows far too many users have more access and authority than they need. Learn the best practices and how you can implement them.
Password security issues are critical because they represent the most obvious—and most easily exploited—method to compromise your system. But an alarming number of users rely on the simplest passwords possible on IBM i.
The system security level (QSECURTY) sets the overall tone for your IBM i security posture. Read this blog post to learn how many organizations are following IBM's best practices.
Inactive user profiles pose a serious threat to more IBM i systems than you might expect. Get the latest data and learn how to protect your systems.
Invalid sign-on attempts happen to everyone from time to time, but large numbers of invalid attempts could indicate a cyber attack in progress.
If you're responsible for IBM i security, you don't want to miss the top 6 expert tips pulled from the 2020 State of IBM i Security Study!
Take 30 minutes to learn how to plan for document and forms management.
Watch this recorded webinar to learn the advanced IBM i (iSeries, AS/400) job management techniques in the Robot scheduling software that deliver measurable ROI.
Think your IBM i is hacker-proof? It may well be, but only a handful of systems have escaped the wrath of Carol Woodbury, the HelpSystems IBM i security expert who previously was the platform’s security architect at IBM.
Watch this webinar for a unique opportunity to hear how a data warehouse can help you further your company's data access.
Learn how document automation and an electronic document management system (EDMS) enables your team to easily collaborate from anywhere with secure, standardized workflows, and remote access.
Learn how to protects IBM i from security issues related to Covid-19 and working from home.