First, what "IBM systems" are you running? IBM i? Z? Other?
If you mean all, then this involves education, email monitoring, and in the words of Alastor Moody, constant vigilance. We have courses we subscribe to geared towards training end users on this. We also subscribe to a service which sends out phishing emails to end users and if they click on the link you get a nasty gram and have to retake the training. We have buttons on their email to report emails as possible phishing attacks. If they report one of our traps they get an immediate "attaboy" response. Granted, some users get in the habit of reporting every external email as a phishing attack just to vex us after they've had to retake the training. All users retake the training at least annually. It does get refreshened.
Giancarlo's response seems geared towards one particular IBM system, IBM i. My favorite. I would add, monitor share creation. Creating a share over the root directory is accepted as a letter of resignation.
------------------------------
Robert Berendt IBMChampion
Business Systems Analyst, Lead
Dekko
Fort Wayne
------------------------------
Original Message:
Sent: Mon February 10, 2025 06:22 AM
From: Ella Grant
Subject: How to Detect and Mitigate Phishing Attacks on IBM Systems?
Hi everyone,
We've been seeing an uptick in phishing attempts targeting our organization, and I'd like to know what tools or methods are most effective in detecting and mitigating phishing attacks within IBM systems.
Has anyone successfully implemented a solution for this within their IBM environment?
Thanks!
------------------------------
Ella Grant
------------------------------