European law dictates that companies, financial corporations and government agencies are required to secure their sensitive personal data. Although every sector has their own security regulations they all work in similar way: software and hardware must comply to strict and detailed rules and procedures. The organisations have to prove their continuous efforts to comply to these regulations, failures to comply are heavily fined. Every organisation is responsible for their own security, meaning that risk assessments are essential. In this article Infosecurity Magazine asked SRC Secure Solutions about their field experiences with independent risk assessments.
The answer to “how much security is enough?” all depends on the data that the organization possesses. And then what must be considered is: does the data fall under any regulatory requirement and how valuable is the data to the organization? Let’s consider these points.
Following the success of our second seminar on security and compliance for the IBM i we have published the presentation sheets in PDF form. You can download these PDF's using the links on the right.
How secure is your data on IBM i?
How and why should you secure your IBM i
How does IBM i become compliant in 15 minutes?
How do you meet the demands of the auditors?
If you want more information please contact us
If you want more information please contact us
If you want more information please contact us
If you want more information please contact us
If you want more information please contact us
If you want more information please contact us