CIO - Job Description - Salary - IT - News


IT Job Market to expands in 2017

 

IT Job Market to expand as CIO and CFO confidence is high

Year to year comparisons show IT Jobs increased at double the rate of 2017 – Janco’s forecast of 136,500 new IT jobs stays firm

Information Technology job market spiked up with double the number new jobs in January of this year versus January of last year.  The CEO of Janco Associates said, “This increased demand for Information Technology professions remains firm with more hiring on tap for at least the next several months.  From our conversations with many CIOs, CFOs, and CEOs we feel this is the start of a boom in demand for IT professionals. Janco’s forecast of 136,500 new Information Technology jobs for 2017 is on track with 11,800 new jobs added in January. ”

Projected IT job market growth
Janco forecasts that over 124,700 new Information Technology Jobs will be added in the remaining 11 months of 2017
YTD IT Job Market growth
January 2017 had double he number of Information Technology jobs created than January 2016
Order Salary SurveyDownload Selected PagesDownload Selected Pages

IT Job Market to expand

- more info

Security with be CIO and CEO focus in 2017

2017 CIOs and CEOs will demand Security Policies and Compliance Tools be implemented

Security PoliciesThe rash of high-profile data breaches have exposed customers' personal information, created reputation nightmares and cost CIOs their jobs. CIOs, CEOs, and CFOs should have security at the top of their priority list. But while businesses are saying the right things about giving IT security more attention and budget, is that talk being put into useful action?

Order Security ManualDownload Selected Pages

- more info

News for the Disaster Recovery Planning

Issues for CIO in Disaster Recovery Planning in the new year

Disaster Recovery Planning IssuesWhat will be the Disaster Recovery Business Continuity issues of 2017?

Over 55% of the CIO we talked to expect that 2017 will see few changes being made in the way their organization manages business continuity. On the other hand, more than a 30% expect to see large changes.

One of the emerging is that greater attention is being given to cyber risks and cyber incident response. Most CIO feel this as the main area which will drive business continuity change in 2017.

Lack of budget and lack of senior management buy-in are emerging as the greatest challenges, with 22.5 percent and 27.5 percent of respondents stating that these issues will hold back business continuity developments within their organization during 2017.

Order Disaster Plan Template Download Selected Pages

- more info

Automation is eliminating routine jobs

Automation is eliminating routine jobs

Over eighty percent of IT's effort is focused on routine operational task, while barely 20% spent on innovation. But bots promise to change all that by taking on the bulk of the routine, dismal work that makes IT workers feel like human robots.

One example is an international communication conglomerate that is using bots to automate humdrum data-entry activities. And companies have rolled out bots to help customers place online orders, while some TV network use bots to deliver breaking news and personalized stories.

Order IT Infrastructure KitDownload Selected Pages

- more info

10 Backup Best Practices White Paper

10 Backup Best Practices White Paper

In today's fast-paced business environment, downtime is unacceptable. Even an hour of downtime can have a huge impact on productivity, reputation and profits. That's why backup and recovery needs to be a critical priority. Top 10 best practices puts big-business backup and recovery capabilities within reach of every business, no matter how big or small.

Download this white paper of the top 10 best practices.

Order PolicyDownload Selected Pages

- more info

IT Salary News

IT Salary News - latest news

  1. IT Salaries Rise IT Salaries Rise In 2015 IT Salaries will increase across the board for IT Pros.  In preliminary results of Janco Associates 2015 IT Salary survey...
  2. 2015 Mid-Year Salary Survey Released by Janco 2015 Mid-Year Salary Survey Released by Janco 2015 Mid-Year Salary Survey – Janco Associates, Inc. has just released its 2015 mid-year salary survey.  To read about...
  3. 2016 IT Salary Survey Released  2016 IT Salary Survey Released Janco has just released its 2016 IT Salary Survey.  The major finding of the survey are: In 2015 the IT job...
  4. 10 findings in 2013 IT Salary Survey by Janco 2013 IT Salary Survey Released -10 major findings Janco has just released its 2013 IT Salary Survey and had ten (10) major findings.  You can...
  5. ERP Salaries are up  ERP Salaries are up in preliminary data from Janco’s 2014 IT Salary Survey ERP salaries seem to be on the rise according to the latest...
- more info

Passwords are weak link in security

Passwords are weak link in security

Passwords are weak linkUser's Create Weak Passwords-User's create bad passwords, based upon common words they can remember. Creating bad passwords based upon words found in natural language allows hackers to do dictionary attacks against passwords.  In other words, hackers can keep on guessing words or word-pairs until they've guessed the user's password.

Requiring the User To Know Their Passwords Creates Vulnerability, because user's have to memorize their passwords, they end up creating weak passwords (so they can remember them).  Or, they end up writing them down. Saving them in a file or use other methods which create additional vulnerabilities.

Order Security ManualDownload Selected Pages

- more info

DR BC Articles

DR BC articles

Order DRP BCP Download Selected Pages

  1. Disaster Planning – Business Continuity Cost of No Plan Cost of no Plan CIO and the organizations they manage need to place a high value on being prepared for disasters of any kind because...
  2. BIA – Business Impact Analysis necessary for BC/DR  First step for BC/DR is BIA – Business Impact  Analysis BIA is a necessary step if an enterprise want to be certain its business continuity...
  3. Life cycle for business continuity and security breaches are the same When a security breach or business interruption occur, the life cycle from the start to the end are the same.  First and foremost you must...
  4. More IT Jobs in Health Care – Business Interruption Planning Information Management Magazine and Insurance Networking News both report that there was significant growth in the Health Care field in the number of IT jobs...
  5. 10 Points of CIO focus in Disaster Recovery and Business Continuity Planning  Top 10 points of CIO focus in planning 10 points of CIO focus that need to be addressed in Disaster Recovery and Business Continuity Planning...

Order DRP BCP Download Selected Pages

- more info

U.S. Supreme Court Rules Against Employers on Overtime Pay

U.S. Supreme Court Rules Against Employers on Overtime Pay

The U.S. Supreme Court ruled in favor of employees on a class action case dealing with overtime pay. The court decided that employees can use statistical data to establish a class action suit against their employer.

In a ruling on Tyson Foods v. Bouaphakeo, the US Supreme Court upheld a $5.8 million jury award against the Tyson  for failing to compensate their employees adequately for the time that it takes them to put on and remove specialized clothing or gear needed to do their jobs.

In the case, Tyson did not dispute that the workers should have been paid; rather, the company argued the statistical method used by the lower court to determine damages was unfair. Tyson lost the two lower court battles, taking it to the U.S. Supreme Court.

Tyson's employees were paid on a time system fixed to production processes. The workers claimed that the process of garbing themselves with specialized safety clothing, walking to their workstations, and washing up afterward lengthened their workweek beyond 40 hours and made them eligible for overtime pay.

"Employers should use this case as a reminder to keep accurate overtime records, including periods of uncompensated work. They should also be aware that the threat of a lawsuit based on statistical sampling, or 'trial by formula,' remains a viable option for plaintiff's attorneys," said Melissa Sharp Murdock, senior manager of external affairs at WorldatWork.

Salary Survey Job Descriptions IT Job Families IT Hiring Kit Interview Guide

Order Salary SurveyDownload Selected Pages
- more info

Life cycle of a cyber attack

Life cycle of a cyber attack -- stages of a cyber attack defined

Stages of a cyber attack's life cycle need to be understood so that CIO's can create an effective defence strategy.  Malicious cyber attacks continue to threaten sensitive data - whether it is personal data or company sensitive data - one facy remains: attackers will continue to exploit weakness to infiltrate systems and extract data that they can turn into money. The life cycle of attacks is as follows

  1. Identify and define potential attack vectors
  2. Initial attack
  3. Command and control
  4. Discover and spread
  5. Extract and ex-filtrate
  6. Discovery and clean up

When the organization finally discovers the compromise, typically more than 200 days to detect a breach, stopping the attack begins.

Security Manual Template

Policy and Procedure Manual 
Compliance Management Made Easy
ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Supports Meaningful Use Compliant Stage Implementation

 

Order Security Manual Download Selected Pages 
- more info

Hyatt credit card processing compromized for almost 5 months

Hyatt credit card processing compromized for almost 5 months

Security ProceduresHackers compromised payment cards used at 250 Hyatt Hotels locations in around 50 countries after infecting the company's payment processing systems with malware. In addtion Hyatt systems were compromised for almost 5 months.

Security Manual Template and Compliance Tools

Order Security Manual Download Selected Pages

Hyatt discovered the data breach back in December and launched an investigation. Hyatt has now published the full list of affected locations and the time interval during which the payment cards were exposed: Aug 13. to Dec. 8.

Hyatt is the latest in a long string of organizations whose payment systems were infected with malware. Other companies from the hospitality industry that suffered similar breaches include Hilton Worldwide, Mandarin Oriental and Starwood Hotels & Resorts Worldwide

- more info

Manager IoT - hot new job title

Manager IoT

There are many new roles and responsibilities in the IT group.  The latest one that was added is the Manager of IoT

Until recently few organizations had a dedicated executive focused on IoT matters. Today, many companies have dedicated IoT organizations and executive leaders. A few data points will serve to illustrate the emergence of role.

  • 1,300+: The number of Manager IoT in the United States who list that as their job title on LinkedIn.
  • Organizations with Manager IoT experience are in the forefront of developing technologies
  • $89,323: The median annual salary for Manager IoT in the United States according to Janco’s latest IT salary survey.
- more info

6.4 million childrens' profiles breached

Breach protection - Security Policies6.4 million childrens' profiles breached

VTech reported that nearly 6.4 million child profiles were exposed in a data breach with the majority of them in the U.S. and France.

It was not reported where the servers storing the data were located. Given the impact on France, the UK, and Germany -- three European nation states, where data protection and privacy laws are some of the strictest in the world - the EU will investigate.

Order Security Manual Download Selected Pages

- more info

Fingerprint data on 5.6 mil federal employees hacked

Biometric data is not safe as over 5.6 million fingerprints of federal employees were hacked. That means the some could use that data to access phones and computer systems that depend on it. 


Security Policies
Security Policies - Procedures - Audit Tools

Security Manual Purchase Options

Order Security Manual
 Download Selected Pages
- more info

Security issues often are overlooked when mergers are talked about

Security IssuesSecurity, mandated compliance requirements, and PCI are issues that need to be considered as merger and acquistion activity is on the rise.

Mergers and acqusitions are on the rise due to low interest rates and high cash reserves, a desire for new markets, new products, as well as cost-saving consolidations. These deals always involve a balance of speed and risk: speed to get the deal closed before valuations increase versus the risk of not doing adequate due diligence, especially with regard to information risk management (IRM). 

Order DRP BCP Security Download Selected Pages

- more info

CIO and executive managment roles and responsibilities defined

CIO and executive managment roles and responsibilities defined

CIO Role Responsibilities CTO
Click image to enlarge 

Order CIO Job Description

 

Related posts:

- more info

Full employment in 10 states with Utah IT at 3.5% unemployment

Full employment in 10 states with Utah IT at 3.5% unemployment

10 states are now at full employment levels.  Utah, based on its IT job market has an unemployment level of 3.5% and many IT jobs are unfilled because there is a lack of qualified candidates.

States with full employment

Salary Survey Job Descriptions IT Job Families IT Hiring Kit Interview Guide

Order Salary Survey    Free Salary Survey

 

- more info

BLS forecasts by 2020 there will be 1.4 million computing jobs

The BLS forecasts that by 2020 there will be 1.4 million computing jobs and only 400,000 computer science students to fill them. According to Janco Associates, in the US there is a shortage of 1of almost 200,000 people with analytical expertise and 1.5 million managers and analysts with the skills to understand and make decisions based on the analysis of big data.

The question is how will this shortfall be addressed?

Salary Survey Job Descriptions IT Job Families IT Hiring Kit Interview Guide

Order Salary Survey    Free Salary Survey
- more info

Cost of data breach now $3.79 Million according to study

According to a recent study the average cost of a single data beach is now $3.79 million. However it can extend way beyond that if something like what happened to Sony occurs.

Your investment for risk should be based on the axiom that your network is critical to your organization's survival and success; without it, you are out of business. Unfortunately, Internet access is also vital, and there is no denying that Internet-borne security threats are real and relentless, and they are becoming much more sophisticated and more numerous. It is certain that your network is being attacked all the time and sometime an attack is going to be successful.

Order Security ManualSample DRP
- more info

Data loss prevention key to security management

Microsoft recently announced Data Loss Prevention (DLP) capabilities to secure and protectsensitive business content, such as PII, in Office 365 and OneDrive for Business. Metalogixenhances and extends the Microsoft DLP capabilities to provide greater protection from dataloss.

Order Security ManualSample DRP

Security Policies - Procedures - Audit Tools

- more info