CIO - Job Description - Salary - IT - News

New expense rates for driving by IT Pros

Employee Expenses Considerations

Employee expensesNew expense rates for driving by IT Pros, beginning on January 1, 2017, the standard mileage rates for the use of a car (also vans, pickups or panel trucks) will be:

  • 53.5 cents per mile for business miles driven, down from 54 cents in 2016
  • 17 cents per mile driven for medical or moving purposes, down from 19 cents in 2016
  • 14 cents per mile driven in service of charitable organizations, unchanged from 2016
Order Interview Hiring GuideDownload Interview Guide

- more info

Compliance is driven from the top down

Compliance is driven from the top down.  Executive Management is the prime mover.

Order Compliance Kit

The tone at the top is vital with communication from top management into the middle management team. Some best practices that can periodically reinforce compliance of various policies include middle management facilitating a short time of staff meeting to discuss a specific policy relative to actual business behavior. Training is great yet people need to know what compliant behavior looks to their daily work.

Compliance Process
- more info

Anti-exploit utility's life extended

Microsoft extends life of anti-exploit utility

Anti-exploit UtilityMicrosoft  announced that it would support its anti-exploit utility - the Enterprise Mitigation Experience Toolkit (EMET) through July 2018, a year-and-a-half extension.

At the same time, Microsoft dismissed EMET as a behind-the-times tool, and again urged customers to upgrade to Windows 10, arguing that the new operating system is much more secure than previous editions when supplemented by EMET.

"EMET hasn't kept pace," wrote the Microsoft principal program manager lead, in a post to a company blog. He added that its effectiveness against modern exploit kits has not been demonstrated, especially in comparison to the many security innovations built into Windows 10. EMET has served multiple masters since its 2009 debut.

Order Security Manual

Download Selected Pages

- more info

Lackluster IT spending 2016

Spending on software and IT services should help the industry rebound

IT SpendingIT is no longer viewed as a cost center.  Leading organizations, as well as those that wish to lead, are spending on IT and nurturing their IT investments as the means to grow their business.

With that in mind there was a decrease in worldwide IT spending in 2016.  Spending should rebound in 2017 with a 2.9 percent increase. Spending on software and IT services should drive the 2017 growth in IT spending to $3.49 trillion. One researcher projects IT spending will drop by 0.3 percent between 2015 and 2016, with the U.K.'s Brexit vote to leave the European Union swinging IT spending from a modest increase to negative numbers.

Order IT Infrastructure KitDownload Selected Pages

- more info

Mobility is key to worker productivity

Mobility is key to worker productivity

Mobility Policy Mobile technology is not just mobile devices with an email that is making more collaborative work possible. Smart phones, tablets, and laptops are he "goto" tools for the modern worker to remotely access documents, files and get work done from anywhere.

Workers striving for better collaboration, such as receiving an electronic signature or editing a document on the go, are key drivers behind the adoption of mobile technologies in the work place.

These tools, in conjunction with access to cloud-based technology and mobile apps, are contributing to a surge in productivity and business growth. Adopting

  • Providing a more responsive service to your clients
  • Being able to hire specialized and sought after talent otherwise unavailable
  • Having reassurance that your technology is there to support you, your managers and your team
  • Order
- more info

What does Brexit mean for DR, BC, cloud processing, data privacy and cyber-security?

What does Brexit mean for DR, BC, cloud processing, data privacy and cyber-security?

Brexit secutiy issuesThe result of the UK referendum was clear, more than a million people tipped the scales in favour of Leave. There will be at least a two-year period (some say five) before the UK decouples from the EU. It will be a time of profound uncertainty and many are concerned about its effects

Order Business Continuity PlanDownload Selected Pages

- more info

Disaster Recovery Planning & Business Continuity Planning Quick Action Steps Defined

Disaster Planning Template

The must do things that your company must do to make sure the disaster recovery and business continuity plan will work when they are need are:

  • Distribute the disaster recovery and business continuity plan or a HandiGuide® to all decision makers and key operating employees who will need access to it when the event occurs.

  • Define the chain of command with single leader but do not limit the people who would have to implement the disaster recovery business continuity plan when the event occurs if that leader is unavailable.
  • Conduct frequent tests and address all areas where shortcomings are found.
  • Conduct the tests in an unannounced mode
  • Validated that mission critical data is at sites other than the primary data center
  • Establish a communication plan that can be implemented after the disaster.

Disaster Planning Security Template

HandiGuide is a Janco Associates registered trademark 

- more info

Top 10 Cloud SLA Best Practices

Top 10 Cloud SLA Best PracticesTop 10 Cloud SLA Best Practices

  1. Define SLA roles and responsibilities for the enterprise and cloud providers
  2. Define key terms
  3. Define specific identifiable metrics for performance by the cloud provider
  4. Specify how and when the enterprise has access to its own data and networks
  5. Specify specific SLA infrastructure and requirements methodology
  6. Provide for disaster recovery and continuity of operations planning and testing
  7. Describe any applicable exception criteria when the cloud provider’s performance measures do not apply
  8. Specify metrics the cloud provider must meet in order to show it is meeting the enterprise’s security performance requirements for protecting data
  9. Specify performance requirements and attributes defining how and when the cloud service provider is to notify the enterprise when security requirements are not being met
  10. Specify a range of enforceable consequences, such as penalties, for non-compliance with SLA performance measures

Change Control - Help Desk - Service Requests Blog - Personal Web Site - Sensitive Information

ITSM Template Download Selected Pages
- more info

Full employment states picture improves even more

Full employment states employment picture improves even more

The states which are in "full employment" continue to improve to the point that there are some labor shortages in those markets.

Full Employment States

Order Salary SurveyDownload Selected Pages

- more info

The Chief Data Officer - CDO - is it a new C-Level job or not?

The Chief Data Officer - CDO - is it a new C-Level job or not ?

The Chief Data Officer (CDO) is responsibility for a company's data-management initiatives, everything that has to do with information quality, information management, information strategy and acquisition. That is not the same as the chief digital officer, whose focus lies more on digital transformation and a company's efforts toward that end.

It's the chief data officer job to assume responsibility for all data while the CIO retains control over all things associated with infrastructure and implementation.

CDO job description2016 Internet and IT Position Description HandiGuide Released

There are now 273 IT Job Descriptions available that that have been updated to meet the latest compliance and new technology requirements. The HandiGuide can be acquired in MS WORD and / or PDF format.  In addition we provide the option to get updates and free custom job descriptions.

The job descriptions that we have added are:

- more info

Security Breach News

Security Breach ProtectionSecurity Breach News

- more info

Value of severance packages declines, but are still offered

Value of severance packages declines, but are still offered

Interview and Hiring GuideThe value of cash severance packages have declined in recent years. However, 69% of companies still provide some top IT pros some kind of severance arrangement. Data shows that only half of companies pay cash severance upon voluntary termination, even if it's for "good reason."
In addition, the prevalence of some other benefits has declined since 2011, reflecting the trend away from perquisites and personal benefits.
Other typical severence benefits :

  • Pay a "stub year" bonus (typically pro rata) for the year in which an individualncurs a qualifying termination of employment.
  • Continue health-care benefits for 24 months the most typical practice
  • Outplacement services.

Order Interview Hiring Guide Download Interview Guide

- more info

First hour after event occurs is critical

First hour after event occurs is critical

Incident Communication PlanManaging the the first hour after a disaster or business interuption occurs is critica.

Getting it right in the first critical stages of any incident is a key determinant of a successful continuity outcome. Janco's  Incident Communication Plan provides road map on how to have an integrated and proactive response.  It includes the processes and tools needed to deliver a well-managed incident communication plan.

Facilitating the overall response is vital: learn how to bring everything together and ensure your response combines the speed, control, leadership and decision making that can meet the needs of a dynamic situation, whatever the scale and scope of the event.

Order PolicySample Policy

- more info

Top BYOD Articles

Top BYOD articles.

  1. Released BYOD Policy Template – Bring-Your-Own-Device  BYOD Policy Template Janco has announced an update to  the “BYOD Policy Template – Bring-Your-Own-Device”. BYOD Policy Template Includes an electronic form for employee agreement...
  2. 10 BYOD Best Practices for CIOs  BYOD Best Practices for CIOs Bring Your Own Devices (BYOD) is exploding all over corporations.  CIOs are in the cross hairs and need to follow...
  3. Top 10 Best Practices for BYOD  Best practices for  BYOD Janco has defined the following 10 best practices to follow as BYOD is implement. Have a BYOD policy in place before...
  4. 60% of all organizations have BYOD policy in place  BYOD Policy – 60% of all organizations have a BYOD policy in place Most organizations are already making the move to BYOD. According to a...

 Download Selected Pages

- more info

FCC fines ISP $750,000

FCC fines ISP $750,000

he FCC's Enforcement Division found that at five conventions across the U.S., the Smart City network sent coded messages called de-authentication frames to devices connected to personal hotspots, such as those created by smartphones.

These messages were sent to Wi-Fi base stations to terminate connections. The FCC said that Smart City was trying to force users to pay its $80 daily fee for Internet connectivity.

"It is unacceptable for any company to charge consumers exorbitant fees to access the Internet while at the same time blocking them from using their own personal Wi-Fi hotspots to access the Internet," said the chief of the FCC’s Enforcement Bureau.

  • Mobility Policy Bundle (more info...) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
    • BYOD Policy Template (more info...) Includes electronic BYOD Access and Use Agreement Form
    • Mobile Device Access and Use Policy (more info...)
    • Record Management, Retention, and Destruction Policy (more info...)
    • Social Networking Policy (more info...) Includes electronic form
    • Telecommuting Policy (more info...) Includes 3 electronic forms to help to effectively manage work at home staff
    • Travel and Off-Site Meeting Policy (more info...)
- more info

North Korea threatens to cyberattack the US

North Korea threatens to cyberattack the US

North Korea was the target of an unsuccessful Stuxnet-style cyber attack and threatened a cyber attack of its own against the U.S.

North Korea goverment said it would wage a cyber war against the U.S.and that country has been blamed for several large attacks in the past.

Disaster Recovery Security Cloud DRP Security Incident Communication Policy Security Audit Program
 Order Disaster Plan TemplateDisaster Plan Sample
- more info

Compensation is a key factor in the retention of millennials and older employees

All employees need to know that they are not only being fairly compensated, but that they have room to grow in the company. While reports of job-hopping millennials may have been exaggerated, it's still important to give your employees a reason to stick around.

Janco finds that when all of these perks are in balance, both young and old employees embrace the company's mission and goals.

In one study on millennials in the work place, 44 percent of millennials polled noted competitive wages as a motivating factor to go with an employer, 52 percent cited growth opportunities. So if you want to make your company attractive to millennials, focus on their ambition and drive.

Salary Survey Job Descriptions IT Job Families IT Hiring Kit Interview Guide

Order Salary Survey    Free Salary Survey
- more info

Outsourcing Does Not Always Work Out

The $5.5 billion Clorox company brought in a new CIO because, among other things, it realized it wasn't getting what it wanted out of an extensive outsourcing deal with Hewlett-Packard.


In quick order, the new CIO and his reformed leadership team fixed some outstanding tech issues and re-established internal control of the company's tech direction.

Clorox is a 98-year-old company based in Oakland, Calif., that has 30-plus global brands. These brands include the namesake bleach and everything from Kingsford Charcoal to KC Masterpiece Barbeque Sauce, Glad bags, Hidden Valley Ranch Salad Dressing and Burt's Bees, a natural personal care product line. The company employs some 8,300 people, and has 120 people in IT. There are another 300 to 400 IT people working on the Clorox account at HP.

Order Cloud Outsourcing Template    Sample Cloud Outsourcing Contract

"How to Guide for Cloud Processing and Outsourcing provides EVERYTHING that is needed to select a vendor, enter into an agreement, and manage the relationship," says a CIO of a Fortune 100 company.

- more info

Rebalancing Strategies For The Real-Time Enterprise

Infrastructure PoliciesThe amount of digital information in our world has been exploding while the speed of business is accelerating. There is an unprecedented convergence in the ability to collect and work with big data, simulate, model and predict with game changing fidelity, and previously unimaginable access to information and markets with billions of people communicating and trading through mobility and social media channels. As enterprises attempt to capture and take action on trillions of bytes of data “real-time” about their customers, suppliers, and operations from millions of people, devices, and embedded sensors which are now connected by digital networks throughout the physical world, the result is a convergence of technology forces that is disrupting the global IT ecosystem.  Like other critical components of production such as hard assets and human capital, today’s economic activity, innovation, and growth could not take place without the information provided by these persistent and converging forces in mobility, big data, social media and cloud computing.

The business and economic opportunities created by each of these forces are significant, but so are the complexities associated with the global deployment of scarce IT resources.  Many executives responsible for these visible initiatives are reassessing their global IT sourcing strategies in order to achieve the right balance of knowledge, quality, risk management, and time to market.

IT Infrastructure PoliciesInfrastructure Policy Sample


- more info

IoT will cause storage requirements to increase dramaitically

IoT will cause storage requirements to increase dramaitically

IoT is the next big thing in technology. As the cost of sensors of many kinds, non-volatile data storage, network connectivity, and computing continue to decrease and the capabilities available at any price point continue to grow, we can instrument “everything.” We can record data about what each thing does or what goes on around it; continuously analyze what’s going on; predict what’s about to happen; and (if appropriate) adjust each “thing” to ensure optimum performance.

Rather than a few billion smar” devices, we will have tens of billions generating tens of trillions of data packets that need to be processed, analyzed, stored, and acted on. That’s not going to work for the kinds of platform architectures we have experience with over the past 50 or so years of computing and networking technologies.

Question that need to be answered are:

  • Is our data safe in transit and at rest?
  • What prevents hackers from gaining access to our data?
  • Is our data properly handled, stored, and deleted?
  • Who can access our data?
  • What are the benchmark measurements?
  • Is our data backup strategy compliant?
  • Will our recovery be successful?
Order PolicySample Policy
- more info