Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 1 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Legacy skills shortages are opening the door to mainframe security risks, warns TmaxSoft

by The Gurus
August 8, 2018
in Editor's News
Share on FacebookShare on Twitter

Although the mainframe has historically been one of the most secure platforms available to businesses, changes in the technology landscape and shortages in legacy skills have opened the door to new risks. This is according to software innovator TmaxSoft, who argues that this is a blind spot for many mainframe-dependent businesses who have a false sense of security about their IT infrastructure.

Commenting on the potential security risks, Carl Davies, CEO of TmaxSoft UK, said: “Mainframes have been the bedrock of many large businesses for decades. The mainframe rose to prominence not only for its ability to hand enormous amounts of data, but also because it was virtually impenetrable to the outside world, and therefore a natural home for business-critical applications. One of the historical reasons for this was the physical security around the mainframe, with little or no access to the internet, which meant that there were few ways in for cybercriminals. In addition, there was a limited number of people with the skills needed to ‘hack’ the mainframe.

“However, things have changed in recent years, opening the door to new security risks. Firstly, the mainframe is now likely to be connected to the internet and therefore exposed to the ever-growing risk of hacks and cyberattacks.

“Second is the lack of mainframe skills. Recent research suggests that organisations have lost 23 per cent of their skilled mainframe workers in the past five years alone, and this is only going to continue. While this means that there aren’t many people with the ability to ‘hack’ the mainframe, the flip side is that security isn’t as stringently applied as it once was.

“Although the mainframe has a limited number of security weaknesses due to the closed nature of the architecture, best practice security measures still need to be applied to keep data and IT systems safe, and we are seeing that skills shortages are leading to costly mistakes. Many businesses fail to follow good security hygiene practices, like revoking old user IDs and requiring passwords to be updated on a regular basis.

“Businesses need to consider re-hosting as a viable option that could take their security to the next level by opening up an additional layer of protection provided by SQL databases. Additionally, re-hosting enables businesses to lift their existing mainframe assets and move them to open platforms, quickly and with minimal risk. This helps businesses cut unnecessary, expensive mainframe contracts and leverage critical data effectively, while gaining a more flexible and transparent environment that is secure and moving with the times.” concludes Davies. 

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweetShare
Previous Post

Americans value their personal data above their wallets

Next Post

Over half of UK consumers to activate GDPR rights within a year

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information