While the IBM i is known to be secureable, it isn’t secure out of the box. In fact, there are many default options that leave you vulnerable to potential attacks. What can you do to secure your IBM i better? What are the exposures and risks? Phil will discuss the various security vulnerabilities that many IBM i customers are exposed to, and how you can protect yourself.