Although ransomware doesn’t attack the IBM i operating system or native DB2 libraries, it can encrypt and rename Integrated File System (IFS) stream files that support native IBM i applications and store user documents.
Ransomware attacks can disable critical IBM i processing by damaging IFS-based configuration settings and data files. Ransomware disables business processing, breaches security, and wastes money and time in recovering from an attack.
In this recorded webinar we discuss:
• How ransomware attacks IFS stream files
• Critical IBM i security settings that protect your IFS from ransomware
• Recovery techniques and best practices to consider when an attack occurs
• Preventing, stopping, and isolating IBM i ransomware activity in real-time