IT Job Market to expand as CIO and CFO confidence is high
Year to year comparisons show IT Jobs increased at double the rate of 2017
Jancos forecast of 136,500 new IT jobs stays firm
Information Technology job market spiked up with double the number new jobs
in January of this year versus January of last year. The CEO of Janco
Associates said, This increased demand for Information Technology professions
remains firm with more hiring on tap for at least the next several months.
From our conversations with many CIOs, CFOs, and CEOs we feel this is the start
of a boom in demand for IT professionals. Jancos forecast of 136,500 new
Information Technology jobs for 2017 is on track with 11,800 new jobs added in
CIOs and CEOs will demand Security Policies and Compliance Tools be
The rash of high-profile data breaches have exposed customers'
personal information, created reputation nightmares and cost CIOs their jobs.
CIOs, CEOs, and CFOs should have security at the top of their priority list. But
while businesses are saying the right things about giving IT security more
attention and budget, is that talk being put into useful action?
for CIO in Disaster Recovery Planning in the new year
What will be the
Disaster Recovery Business Continuity issues of 2017?
Over 55% of the CIO we talked to expect that 2017 will see few changes being
made in the way their organization manages business continuity. On the other
hand, more than a 30% expect to see large changes.
One of the emerging is that greater attention is being given to cyber risks
and cyber incident response. Most CIO feel this as the main area which will
drive business continuity change in 2017.
Lack of budget and lack of senior management buy-in are emerging as the
greatest challenges, with 22.5 percent and 27.5 percent of respondents stating
that these issues will hold back business continuity developments within their
organization during 2017.
Over eighty percent of IT's effort is focused on routine operational task,
while barely 20% spent on innovation. But bots promise to change all that by
taking on the bulk of the routine, dismal work that makes IT workers feel like
One example is an international communication conglomerate that is using bots
to automate humdrum data-entry activities. And companies have rolled out bots to
help customers place online orders, while some TV network use bots to deliver
breaking news and personalized stories.
In today's fast-paced business environment, downtime is unacceptable. Even an
hour of downtime can have a huge impact on productivity, reputation and profits.
That's why backup and recovery needs to be a critical priority. Top 10 best
practices puts big-business backup and recovery capabilities within reach of
every business, no matter how big or small.
Weak Passwords-User's create bad passwords, based upon common words they can
remember. Creating bad passwords based upon words found in natural language
allows hackers to do dictionary attacks against passwords. In other words,
hackers can keep on guessing words or word-pairs until they've guessed the
Requiring the User To Know Their Passwords Creates Vulnerability, because
user's have to memorize their passwords, they end up creating weak passwords (so
they can remember them). Or, they end up writing them down. Saving them in
a file or use other methods which create additional vulnerabilities.
U.S. Supreme Court Rules Against Employers on Overtime Pay
U.S. Supreme Court Rules Against Employers on Overtime
The U.S. Supreme Court ruled in favor of employees on a class action case
dealing with overtime pay. The court decided that employees can use statistical
data to establish a class action suit against their employer.
In a ruling on Tyson Foods v. Bouaphakeo, the US Supreme Court upheld a $5.8
million jury award against the Tyson for failing to compensate their
employees adequately for the time that it takes them to put on and remove
specialized clothing or gear needed to do their jobs.
In the case, Tyson did not dispute that the workers should have been paid;
rather, the company argued the statistical method used by the lower court to
determine damages was unfair. Tyson lost the two lower court battles, taking it
to the U.S. Supreme Court.
Tyson's employees were paid on a time system fixed to production processes.
The workers claimed that the process of garbing themselves with specialized
safety clothing, walking to their workstations, and washing up afterward
lengthened their workweek beyond 40 hours and made them eligible for overtime
"Employers should use this case as a reminder to keep accurate overtime
records, including periods of uncompensated work. They should also be aware that
the threat of a lawsuit based on statistical sampling, or 'trial by formula,'
remains a viable option for plaintiff's attorneys," said Melissa Sharp Murdock,
senior manager of external affairs at WorldatWork.
Life cycle of a cyber attack -- stages of a cyber attack
Stages of a cyber attack's life cycle need to be understood so that CIO's can
create an effective defence strategy. Malicious cyber attacks continue to
threaten sensitive data - whether it is personal data or company sensitive
data - one facy remains: attackers will continue to exploit weakness to
infiltrate systems and extract data that they can turn into money. The life
cycle of attacks is as follows
Identify and define potential attack vectors
Command and control
Discover and spread
Extract and ex-filtrate
Discovery and clean up
When the organization finally discovers the compromise, typically more than
200 days to detect a breach, stopping the attack begins.
Security Manual Template
Policy and Procedure Manual Compliance Management Made
Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant
Hyatt credit card processing compromized for almost 5 months
Hyatt credit card processing compromized for almost 5
compromised payment cards used at 250 Hyatt Hotels locations in around 50
countries after infecting the company's payment processing systems with malware.
In addtion Hyatt systems were compromised for almost 5 months.
Manual Template and Compliance Tools
Hyatt discovered the data breach back in December and launched an
investigation. Hyatt has now published the full list of affected locations and
the time interval during which the payment cards were exposed: Aug 13. to Dec.
Hyatt is the latest in a long string of organizations whose payment systems
were infected with malware. Other companies from the hospitality industry that
suffered similar breaches include Hilton Worldwide, Mandarin Oriental and
Starwood Hotels & Resorts Worldwide
There are many new roles and responsibilities in the IT group. The
latest one that was added is the Manager of IoT
Until recently few organizations had a dedicated executive focused on IoT
matters. Today, many companies have dedicated IoT organizations and executive
leaders. A few data points will serve to illustrate the emergence of role.
1,300+: The number of Manager IoT in the United States who list that as
their job title on LinkedIn.
Organizations with Manager IoT experience are in the forefront of
$89,323: The median annual salary for Manager IoT in the United States
according to Jancos latest IT salary survey.
VTech reported that nearly 6.4 million child profiles were exposed in a data
breach with the majority of them in the U.S. and France.
It was not reported where the servers storing the data were located. Given
the impact on France, the UK, and Germany -- three European nation states, where
data protection and privacy laws are some of the strictest in the world - the EU
Security issues often are overlooked when mergers are talked about
Security, mandated compliance requirements, and PCI are issues
that need to be considered as merger and acquistion activity is on the rise.
Mergers and acqusitions are on the rise due to low interest rates and high
cash reserves, a desire for new markets, new products, as well as cost-saving
consolidations. These deals always involve a balance of speed and risk: speed to
get the deal closed before valuations increase versus the risk of not doing
adequate due diligence, especially with regard to information risk management
BLS forecasts by 2020 there will be 1.4 million computing jobs
The BLS forecasts that by 2020 there will be 1.4 million computing jobs and
only 400,000 computer science students to fill them. According to Janco
Associates, in the US there is a shortage of 1of almost 200,000 people with
analytical expertise and 1.5 million managers and analysts with the skills to
understand and make decisions based on the analysis of big data.
The question is how will this shortfall be addressed?
Cost of data breach now $3.79 Million according to study
According to a recent study the average cost of a single data beach is now
$3.79 million. However it can extend way beyond that if something like what
happened to Sony occurs.
Your investment for risk should be based on the axiom that your network is
critical to your organization's survival and success; without it, you are out of
business. Unfortunately, Internet access is also vital, and there is no denying
that Internet-borne security threats are real and relentless, and they are
becoming much more sophisticated and more numerous. It is certain that your
network is being attacked all the time and sometime an attack is going to be
Microsoft recently announced Data Loss Prevention (DLP) capabilities to
secure and protectsensitive business content, such as PII, in Office 365 and
OneDrive for Business. Metalogixenhances and extends the Microsoft DLP
capabilities to provide greater protection from dataloss.