XML News Feed   eJobDescription

CIO - Job Description - Salary - IT - News


Park Service Twitter accounts not controlled

Password Rules, Tips, and Best Practices

Controlling passwordsAn unauthorized user had an old password in the San Francisco office and went in and started retweeting things that were in violation of US government policy.

One incident took place on inauguration day when the main National Park Service account retweeted images from a CNN reporter that compared unfavorably the crowd size at President Donald Trump's inauguration with that of President Barack Obama's in 2009.

When Trump began to openly dispute the images and smaller crowd sizes, the National Park Service deleted the retweet and apologized.

Order Security ManualDownload Selected Pages
- more info

76% of companies did not know they were hacked

76% of companies did not know they were hacked

Secrity Manual TemplateOver 3/4s of all companies hacked did not know for over seven months that they were hacked.  The average time between an attacker breaching a network and its owner noticing the intrusion is 205 days.  There little doubt that criminals and pranksters are thriving by attacking computers and networks that companies are struggling to cope, and that businesses offering answers are thriving.

Janco's Security Manual Template is a step in the right direction to get control of this problem.

Order Security Manual Download Selected Pages

- more info

Why CIO are moving to the cloud

Why CIO recommend cloud processing

The primary reasons CIOs are moving to cloud computing are:

Why CIO Recommend Outsourcing

  • Reduce the total cost of ownership
  • Replace on-premise legacy systems
  • Improve disaster recovery and business continuity processes
  • Improve the speed of development

Currently:

  • 70% have already moved at least one application or a portion of their infrastructure to the cloud.
  • 16% plan to do so in the next 12 months
  • 14% plan to move applications or infrastructure to the cloud within the next three years.

Order Cloud Outsourcing Template

Download Selected Pages

- more info

Ransomware scourge focus of C-Level executives

Ransomware scourge focus of C-Level executives
 
With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files. Consumers, businesses, and government agencies are falling prey to these schemes, including hospitals whose servers may contain sensitive patient data.

Security Manual Template

Policy and Procedure Manual 
Compliance Management Made Easy
ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Supports Meaningful Use Compliant Stage Implementation - Meets HIPAA Ransomware Guidelines

Includes 24 Electronic Forms that are ready to use and User Bill of Rights for Sensitive Data and Privacy

Order Security ManualDownload Selected Pages

 

- more info

Top 10 Lists for IT Managers and CIO

Top 10 Lists for IT Managers and CIO

  • 10 Tips to protect your personal information 10 Tips to protect your personal information 10 Tips to protect your personal information – According to the Identity Theft Resource Center, it takes 600 hours...
  • Password Requirements and Management IssuesPassword Requirements and Management Issues The passwords should not be reused across many accounts, but should preferably be unique to each account. (single-sign-on services & password...
  • Top 10 Worst Passwords Top 10 Worst Passwords Users have continued to use the same worst passwords to access secure systems for several years Top 10 worst passwords –...
  • 10 Best Practices for Sensitive Data Text Messaging Text Messaging Top 10 Best Practices Text Messaging 10 Best Practices – As more data is moved from one mobile device user to another more...
  • Wearable Device Security Concerns Wearable Device Security Concerns Wearable Device Security – Over 300,000,000 wearable devices are going to be deployed in the next several years Wearable Device Security –...
  • - more info

    Cloud helps to improve productivity

    Cases where cloud helps to improve productivity:

    • Cloud productivityWeather forecaster triples his productivity using the cloud to forecast potentially severe winter snowstorms.
    • Biotech company reduces delivery times and gets much higher data throughput using the cloud to design high quality primers.
    • Auto research company experiences 20% faster run times while using the cloud to supplement existing in-house HPC resources.
    • Mechanical and industrial engineering professor receives the software it needs on the cloud to conduct his research.

    Order Cloud Outsourcing Template  Download Selected Pages

    - more info

    Security and Disaster Recovery are primary concens of CIOs

    Security and Disaster Recovery are primary concens of CIOs.  Here are some recent artilces that stress this:

    1. Top 10 Selection Criteria for a Disaster Recovery Cloud Provider  Cloud disaster recovery business continuity When looking for cloud providers of Disaster Recovery and Business Continuity Services you need to establish that they will be...
    2. Many CIOs have not addressed cloud security issues  Less than 50% of all organizations have policies in place that for vetting cloud computing applications for possible security risks before deploying them. The number...
    3. Cloud Technology Impacts Outsourcing  Cloud Technology Impacts Outsourcing What makes cloud computing different from this “ordinary” system of computing is that the cloud functions as a collective computer that...
    4. ISO 31000 Compliance – Risk Management  ISO 31000 Compliance – Risk Management Cloud processing and outsourcing add external risks to a business’ operation. The International Standards Organization (ISO) has implemented a...
    5. 10 Best Practices for Staffing  10 Best Practices to Staff – Hire and Retain World Class Creative IT Professionals 10 Best Practices  – Janco Associates has found the top ten...
    - more info

    What are the security, privacy and reputation management for new personal devices

    As smartwatches gain traction, personal data privacy worries mount. Growing interest in smartwatches has sparked user privacy concerns as companies find ways to collect and use personal health, location and purchasing data found on the wearable devices of their customers and workers.

    If your enterprise does not have a Google Glass/Personal Device Policy, then many things are happening:

    • Personal data is being shared in a way that has not been approved by the individual
    • Your company is losing productivity and missing out on a truely unique tool
    • Users have Google Glass  and similiar personal devices they are using and are already accessing or being accessed by your corporate network -- The issue is that many CIOs are not doing anything to ensure that this is being done securely and in compliance with mandated federal, state, local, and industry requirements.

    Janco's Policy addresses these issue and much more - It is ready to use out of the box

    Google Glass Policy Sample
    - more info

    H-1B visa program is eliminating IT jobs for US employees

    H-1B visa program is eliminating IT jobs for US employees

    A Senate Subcommittee will hold a hearing on "The Impact of High-Skilled Immigration on U.S. Workers." Its first witness will be an ex-Disnesy IT worker who trained his visa-holding replacement.

    The IT worker at Disney was laid off in January 2015, along with 200 to 300 co-workers, is one of six scheduled to testify.

    Order Salary Survey

    - more info

    Fortune 500 companies have a hard time surviving

    52% of the Fortune 500 have gone bankrupt, been acquired, or ceased to exist since 2000. A big reason is the new digital economy.

    CIO and IT Manager Tools

    You can get all of Janco's templates in its IT Management Suite. When you do that you save over $2,500 and when implemented your enterprise is positioned to have a "WORLD CLASS" Information Technology function. You will be in compliance with all mandated requirements including all US and International requirements.

    - more info

    France expands police power over the cloud

    Cloud secuirytFrance expands police power over the cloud

    France has extended police powers over the cloud for three more month.  Thgis includes extension of warrantless searches of cloud storage services accessible from computers in France: Those were among the changes voted unanimously by French senate. 

    There is talk that this exteension could be made permanent.

    Order Cloud Outsourcing Template  Download Selected Pages

    - more info

    Email archving is mandated - but is is done correctly

    Driving electronic communication is the fact that data is easier to find when it is a click away than when it is stacked in folders. E-mail is a great source of easy-to-access information. When faxes and paper communication are integrated into the email automation framework, there is little fear of losing them.

    Order Policy Download Selected Pages  

    Several research firms have estimated that as much as 60% of this business-critical information is stored in email and other electronic messaging tools. This has driven new demands on email archives as they not only work to protect organizations from compliance and litigation risk, but also become the conduit for information insight that can transform business productivity.

    - more info

    20% of insurance company's IT bugets go to outsourcing and cloud processing

    Insurance companies do a lot of IT outsourcing services. Estimates are that outsourcing typically consumes around 20% of insurers’ IT budgets, and represent between 20-40% of IT headcount. A survey of 95 insurance companies, conducted last year, found 85% outsource application development, 64% seek infrastructure support, and 62% outsource to gain access to specialized skills.

    Reasons Why CIOs Recommend Outsourcing

    Many insurance CIOs are rethinking their outsourcing strategies. While outsourcing remains “an important part of insurer CIOs’ toolkits, and usage is widespread,” there may be a retrenchment underway. “While many of those that currently outsource at a moderate level are planning to expand their use of outsourcing, some heavy users are planning to cut back,” analysts said.

    Order Cloud Outsourcing Template  Download Selected Pages

    - more info

    Cloud and Disaster Recovery Digest

    Cloud and Disaster Recovery Digest

     Order Disaster Plan TemplateDisaster Plan Sample

    1. Disaster Recovery Business Continuity Tools Tools available for Disaster Recovery and Business Continuity planning There are several tools available for Disaster Recovery and Business continuity. Follow the links below for...
    2. Finding Disaster Recovery Tools – Adobe falls short Adobe is not a good source for Disaster Recovery tool development Janco has just updated it Threat Vulnerability Assessment tool as it updates it Disaster...
    3. 10 reasons to move Disaster Recovery to the Cloud Top 10 reasons why the cloud makes sense for disaster recovery planning Cloud data disaster recovery protection solutions offer a combination of the latest advancements...
    4. 10 Commandments of Disaster Recovery and Business Continuity 10 commandments of disaster recovery and business continuity planning As requirements for avoiding downtime become increasingly stringent, administrators need tools and platforms that can help...
    5. Cloud Improves Disaster Recovery planning Cloud Improves Disaster Recovery and Business Continuity planning Today’s distributed and dynamic enterprises for disaster recovery need to plan for  24×7 access to a growing...
    1. Disaster Recovery Business Continuity Tools Tools available for Disaster Recovery and Business Continuity planning There are several tools available for Disaster Recovery and Business continuity. Follow the links below for...
    2. Finding Disaster Recovery Tools – Adobe falls short Adobe is not a good source for Disaster Recovery tool development Janco has just updated it Threat Vulnerability Assessment tool as it updates it Disaster...
    3. 10 reasons to move Disaster Recovery to the Cloud Top 10 reasons why the cloud makes sense for disaster recovery planning Cloud data disaster recovery protection solutions offer a combination of the latest advancements...
    4. 10 Commandments of Disaster Recovery and Business Continuity 10 commandments of disaster recovery and business continuity planning As requirements for avoiding downtime become increasingly stringent, administrators need tools and platforms that can help...
    5. Cloud Improves Disaster Recovery planning Cloud Improves Disaster Recovery and Business Continuity planning Today’s distributed and dynamic enterprises for disaster recovery need to plan for  24×7 access to a growing...
    1. Disaster Recovery Business Continuity Tools Tools available for Disaster Recovery and Business Continuity planning There are several tools available for Disaster Recovery and Business continuity. Follow the links below for...
    2. Finding Disaster Recovery Tools – Adobe falls short Adobe is not a good source for Disaster Recovery tool development Janco has just updated it Threat Vulnerability Assessment tool as it updates it Disaster...
    3. 10 reasons to move Disaster Recovery to the Cloud Top 10 reasons why the cloud makes sense for disaster recovery planning Cloud data disaster recovery protection solutions offer a combination of the latest advancements...
    4. 10 Commandments of Disaster Recovery and Business Continuity 10 commandments of disaster recovery and business continuity planning As requirements for avoiding downtime become increasingly stringent, administrators need tools and platforms that can help...
    5. Cloud Improves Disaster Recovery planning Cloud Improves Disaster Recovery and Business Continuity planning Today’s distributed and dynamic enterprises for disaster recovery need to plan for  24×7 access to a growing...
    - more info

    Top tool to manage cloud apps now available

    How to Guide for Cloud Processing and Outsourcing provides EVERYTHING that is needed to select a vendor, enter into an agreement, and manage the relationship," says a CIO of a Fortune 100 company

    Once moved to the cloud, applications become more challenging to manage. Cloud app performance management and performance monitoring tools help identify bottlenecks and other performance metrics.Good tools can help determine if bottlenecks are isolated to the application itself or if there are system-wide issues with a particular provider.

    ISO Compliant - Including ISO 31000

    Order Cloud Outsourcing Template    Sample Cloud Outsourcing Contract
    - more info

    Is the recession continuing?

    Is the recession continuing?

    Microsoft last week said that Windows revenue was down in the first quarter, with sales of licenses to computer and device makers falling $698 million, or 22%, compared to the same period in 2014.

    The quarter's downturn was the second straight double-digit decline, following a 13% drop in revenue during the last three months of 2014 that represented a $455 million weakening.

    CIO concerns are constantly changing but the solutions are always centered around three factors: technology, infrastructure and people

    Threat Vulnerability AssessmentDownload Threat AssessementDownload Threat Assessement
    - more info

    National Cybersecurity Protection Advancement NCPA Act will help to CSOs

    National Cybersecurity Protection Advancement NCPA Act

    Security Manual

    A new bill designed to encourage businesses and government agencies to share information about cyberthreats with each other may go farther in protecting the privacy of Internet users than other recent legislation in Congress.

    The National Cybersecurity Protection Advancement NCPA Act introduced in the House of Representatives appears to do a much better job at protecting privacy than two bills that have passed through the House and Senate Intelligence Committees.

    The bill differs from the House Intelligence Committee's Protecting Cyber Networks Act [PCNA] and the Senate Intelligence Committee's Cybersecurity Information Sharing Act [CISA] in that it doesn't allow government agencies to share cyberthreat information they've received from private companies with law enforcement for purposes unrelated to cybersecurity.

    Order Security ManualTable of Contents

    - more info

    IT infrastructure and business impact are driven by the age of the customer

    BIA Business Impact Analysis

    The business world has now move to the age of the consumer.  Thus organizations need to implement processes and governance structures to support that. However, recent analysis of the current IT and business infrastructure and practices show there is little consistency across organizations - even within the same industry and geographies. Firms that trail their peers in establishing clear processes, incentives, and governance for their innovation programs risk losing market share and competitive advantage - in particular, as corporate strategies shift to the digital business.

     

     

    Janco's IT Infrastructure policy bundle helps to address those issues.  In addition it complies with all mandated requirements and includes electronic forms that can be e-mailed, filled out completely on the computer, routed and stored electronically.

    • CIO IT Infrastructure Policy Bundle (more info...) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
      • Backup and Backup Retention Policy (more info...)
      • Blog and Personal Web Site Policy (more info...) Includes electronic Blog Compliance Agreement Form
      • BYOD Policy Template (more info...) Includes electronic BYOD Access and Use Agreement Form
      • Google Glass Policy Template (more info...) Includes electronic Google Glass Access and Use Agreement Form
      • Incident Communication Plan Policy (more info...) Updated to include social networks as a communication path
      • Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy (more info...) Includes 5 electronic forms to aid in the quick deployment of this policy
      • Mobile Device Access and Use Policy (more info...)
      • Patch Management Policy (more info...)
      • Outsourcing and Cloud Based File Sharing Policy (more info...)
      • Physical and Virtual Security Policy (more info...)
      • Record Management, Retention, and Destruction Policy (more info...)
      • Sensitive Information Policy (more info...) HIPAA Compliant and includes electronic Sensitive Information Policy Compliance Agreement Form
      • Service Level Agreement (SLA) Policy Template with Metrics (more info...)
      • Social Networking Policy (more info...) Includes electronic form
      • Telecommuting Policy (more info...) Includes 3 electronic forms to help to effectively manage work at home staff
      • Text Messaging Sensitive and Confidential Information (more Info...)
      • Travel and Off-Site Meeting Policy (more info...)
      • IT Infrastructure Electronic Forms (more info...)

    IT Infrastructure PoliciesInfrastructure Policy Sample

    - more info

    Symantec moves into the commericaly cyber security market

    Symantec moves into the commercial cyber security market by acquiring staff and technology licenses from Boeing’s Narus Inc. unit.

    Narus, was purchased by Boeing four years ago, specializes in Internet-filtering software for intelligence agencies. Boeing executives indicated recently that commercial markets were proving tough to crack.

    Symantec announced ealiers that it would split into two publicly traded companies, one for computer security and the other for data storage. With this acauisition Symantec will gain approximately 65 Narus engineers and data scientists with expertise in machine learning, security, big data analytics and networking.

    - more info

    Cloud Computing for CIOs

    Outsourcing TemplateAs interest in cloud computing continues to gain momentum,there is increasing confusion about what cloud computing represents. Without a common, defined vocabulary and a standardized frame of reference, organizations cannot have a cogent discussion about cloud computing. The practical guide for cloud computing outsourcing addresses this challenge by providing a context for productive discussion and a structure for planning, both short- and long-term, for a successful implementation.

    With the growth of cloud computing and software-as-a-service initiatives--there is a disturbing trend of some enterprises trusting performance monitoring to the vendors.

    Order Cloud Outsourcing Template    Sample Cloud Outsourcing Contract
    - more info