CIO - Job Description - Salary - IT - News


H-1B Visa holders get few security jobs

Median salary for H-1B IT Pros $85,601 versus $87,072 for all IT Pros

Few H-1B visas are used for IT security positions. Visas for information security analysts, for instance, made up .3 percent of all H-1B visas issued for IT jobs, with a mean salary of $99,708, according to data from the U.S. Citizenship and Immigration Service and analysis by Janco Associates. Network and computer systems administrators, who account for 1.9 percent of H-1B visa holders in IT jobs, also bring some security skills, “and may also fill some security analyst positions,” says M. Victor Janulaitis, CEO of Janco. Those H-1B admins earn a mean salary of $76,233, according to the Janco report.

H-1B percentage of jobs by title

Order Salary SurveyDownload Selected Pages

- more info

Verizon slows acquisition of Yahoo

Push back timing of Verizon acquisition of Yahoo

Data breachVerizon’s acquisition of Yahoo will not close until this year’s second quarter. The $4.8 billion deal was originally slated to close in the first quarter, but that was before Yahoo reported two massive data breaches that analysts say may scrap the entire deal.

Although Yahoo continues to work to close the acquisition, there’s still work required to meet closing the deal's closing conditions. Verizon has suggested that the data breaches, and the resulting blow to Yahoo’s reputation, might cause it to halt or renegotiate the deal.

Order Security ManualDownload Selected Pages
- more info

Top 10 Social Network Security Tips

Top 10 tips to improve social networking security

1.       Educate employees 

2.       Have employees use different passwords for different system

3.       Mandate strong passwords

4.       Have employees change passwords regularly

5.       Do not share accounts

6.       Implement two factor authentication

7.       Educate employees to NOT open email attachments or go to links where the originator is not known  

8.       Utilize antivirus and security software

9.       Don't friend people you do not know

10.   Validate and verify

IT Infrastructure PoliciesDownload Selected Pages

- more info

Privacy is lost to half of US adults

Half of U.S. adults are profiled in government facial recognition databases

Half of all US adults -- 117 million people -- are in police facial recognition databases across the country with little regulation over how the networks are searched and used, according to a new study.

In addition to lack of regulation, many question the accuracy of facial recognition algorithms. Meanwhile, state, city, and federal facial recognition databases include 48 percent of U.S. adults.

A few agencies have instituted meaningful protections to prevent the misuse of the technology. In many more cases, no controls on the use of the data.

About 20 states allow police to search drivers license photo databases without a warrent. Police in a handful of other states and cities including San Fransisco, Los Angeles, San Diego and Chicago can search criminal mug shots.

    

- more info

US is dependant on China for its electronic hardware

US is dependant on China for its electronic hardware

About 84% of the world’s electronics are made in Asia, and about 85% of those goods are made in China.

That means that a majority of the world’s electronics -- its servers, PCs, mobile phones -- are now manufactured in China. Any inadvertent escalation over the on-going South China Sea territorial dispute could do more than raise geopolitical tensions. It could easily disrupt electronics manufacturing for the world.

IT Infrastructure, Strategy, and Charter Template

ISO 27000 Series Compliant - SOX, HIPAA and PCI-DSS Compliant 
Now Includes IT Job Family Classification 

Order IT Infrastructure KitDownload Selected Pages
- more info

IT strategy and infrastructure planning key to CO success

IT Strategy and InfrastructureIT strategy and infrastructure planning key to CO success

Organizations that want to win the digital transformation race must leave behind expensive legacy applications while improving access to data and content, ultimately uncovering innovative market advantages and mitigating risk.

Structured data archiving technologies are the engine to help IT leaders retire legacy applications, reduce capital and operating expenses, and meet governance and compliance requirements. In the Gartner Magic Quadrant for Structured Data Archiving and Application Retirement report, Gartner evaluates vendors offering products and services that provide archiving for databases and data from enterprise applications.

Order IT Infrastructure Kit Download Selected Pages

- more info

Cloud disaster recovery planning

Outsourcing TemplateMany companies now are including cloud disaster recovery process in their business continuity plans.   Janco has found that disaster plans that include the cloud if done well will simplify and  improve the success of the recovery process.

 Order Disaster Plan TemplateDisaster Plan Sample

Related posts:

  1. Disaster Recovery Plan in the cloud Paper disaster recovery and business continuity plans are difficult to keep up to date and be available for the recovery process. One solution that we...
  2. Top 10 Reasons Why Disaster Recovery Business Continuity Plans Fail In the recession many organizations put disaster recovery and business continuity on the back burner. As a result those plans are not as functional as...
  3. DRP BCP Best Practices Defined DRP BCP Best Practices Defined Here are some Disaster Recovery Business Continuity best practices   Keep your primary backup  disaster recovery business continuity data in...
  4. Radiological and Nuclear Disaster Planning ...
  5. Disaster Planning - Business Continuity Cost of No Plan Cost of no Plan CIO and the organizations they manage need to place a high value on being prepared for disasters of any kind because...
- more info

IT Job Market Poor at Best

IT Job Market Poor at Best

U.S. employers added 3,800 new IT jobs in March, down from 9,300 in February, and 9,900 a year ago, the management consulting firm Janco Associates Inc. said, based on an analysis of a basket of IT-related jobs data released Friday by the U.S. Department of Labor's Bureau of Labor Statistics. Employers added 215,000 jobs across all sectors in March, down from 245,000 in February. Employers are expected to create only 72,000 more IT jobs by the end of the year, for a year- end total of roughly 91,000, said Janco Chief Executive M. Victor Janulaitis. That compares to a total of 112,000 jobs in 2015.

Mr. Janulaitis blames the downturn on political and economic uncertainties at home and abroad."All the hype of IoT and cloud-based applications is not translating into new IT jobs," says Mr. Janulaitis, who supplements the government data by interviewing CIOs directly. He says the mood among CIOs is less optimistic.

IT Hiring IT Job Descriptions IT Salary SurveyIT Salary SurveyJob Descriptions

- more info

Risk mitigation and service management

IT Service Management (ITSM) Service Oriented Architecture (SOA)

risk mitigation  and service managementMany IT professionals often overlook the usefulness of service management tools that they already have at their fingertips as a way to streamline and effectively manage internal risk processes.

IT Service Management for Service Oriented ArchitectureWhen a system defect or workplace disruption hits, you need to act fast to ensure the enterprise can continue to function, your employees and associates are informed and productivity is maintained . And where better to designate the first responder than your service - help desk with a focus on IT Service Management (ITSM).

ITSM Template Download Selected Pages  

- more info

Disaster Recovery more complex due to Microsoft

Disaster Recovery more complex due to Microsoft

10 commandments of business continuity planning

IT Service ManagementWith Microsoft's push to get everyone on Windows 10 they have made it more difficult for companies that have moved from Windows 7 and 8.  Those verions of the OS wiil not work on new PCs. 

IT Service Management - ITSM

Consider a disaster where PCs are damaged and new equipment is required.  All of applications and functions that have not been migrated to Windows 10 will be at risk.

Before that happens CIOs need to evalaute the risks they face due to this new Microsoft "full-of-fail "clarification" support policy.

ITSM Template Download Selected Pages  

- more info

Disaster and business continuity spending will remain flat in 2016

Business continuity spending in 2016

Disaster and business continuity planningMost organizations are maintaining disaster recovery and business continuity spending levels. Janco reports that in 8%  of organizations business continuity spending will be ‘much higher’ in 2016 compared to 2015 and will be ‘higher’ in 26%. Half of all organizations will maintain business continuity spending at the same level in 2016 as it was in 2015.

Only in 11% percent of respondents will organizational business continuity spending would be lower in 2016 than in 2015.

 Order Disaster Plan Template Download Selected Pages

- more info

Business continuity after a disaster depends on communication

DRP/BCP Security TemplatesWhen a CEO thinks Business Continuity, he thinks of the safeguards that should be in place ensuring business operations are not disrupted. However, due to the heavy dependency on Information Technology, a business leader's first priority is to have adequate data backups in order to enable recovery in case of a disaster or any loss of data, and to ensure that systems remain available 24x7.

Order DRP BCP SecuritySample DRP Security Manual

The right way to evaluate the quality of your system and data protection is to evaluate the Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These metrics define how long you think it will take you to get back online and how current the data has to be.

All Business Continuity Disaster Recovery Planning efforts need to encompass how employees will communicate, where they will go and how they will keep doing their jobs. The details can vary greatly, depending on the size and scope of a company and the way it does business. For some businesses, issues such as supply chain logistics are most crucial and are the focus on the plan. For others, information technology may play a more pivotal role, and the Business Continuity Disaster Recovery Plan may have more of a focus on systems recovery.

Plan Do Act

- more info

CIOs are paid to lead

A CIO is paid to lead. But it's difficult to do so when you don't have the right organizational structure in place. A house, after all, is only as strong as its foundation. So whether you're "the new guy" as a CIO or you've worked within your current position for a year or longer, you should carefully consider the following nine winning organizational moves to implement for your IT department. As compiled by Janco Associates, the best practices here aren't the stuff of rocket science (even if you happen to supervise a number of rocket scientists). Instead, they're a useful collection of suggestions that cover both the big picture, such as alignment with company-wide strategies, and the day-to-day, like assigning key roles to your employees. By putting the following in play, you'll find that you've covered many critical bases, including the need to delegate, develop talent, ensure business continuity, track tech trends and monitor the competition. Better yet: It's not an "all or nothing" list. You can adapt only one or two ideas and still take advantage of results. For more about Janco's list, click here. - See more at: http://www.cioinsight.com/it-management/leadership/slideshows/nine-ways-to-better-organize-your-it-department-08/#sthash.G89cO1jc.dpuf
A CIO is paid to lead. But it's difficult to do so when you don't have the right organizational structure in place. A house, after all, is only as strong as its foundation. So whether you're "the new guy" as a CIO or you've worked within your current position for a year or longer, you should carefully consider the following nine winning organizational moves to implement for your IT department. As compiled by Janco Associates, the best practices here aren't the stuff of rocket science (even if you happen to supervise a number of rocket scientists). Instead, they're a useful collection of suggestions that cover both the big picture, such as alignment with company-wide strategies, and the day-to-day, like assigning key roles to your employees. By putting the following in play, you'll find that you've covered many critical bases, including the need to delegate, develop talent, ensure business continuity, track tech trends and monitor the competition. Better yet: It's not an "all or nothing" list. You can adapt only one or two ideas and still take advantage of results. For more about Janco's list, click here. - See more at: http://www.cioinsight.com/it-management/leadership/slideshows/nine-ways-to-better-organize-your-it-department-08/#sthash.G89cO1jc.dpuf
A CIO is paid to lead. But it's difficult to do so when you don't have the right organizational structure in place. A house, after all, is only as strong as its foundation. So whether you're "the new guy" as a CIO or you've worked within your current position for a year or longer, you should carefully consider the following nine winning organizational moves to implement for your IT department. As compiled by Janco Associates, the best practices here aren't the stuff of rocket science (even if you happen to supervise a number of rocket scientists). Instead, they're a useful collection of suggestions that cover both the big picture, such as alignment with company-wide strategies, and the day-to-day, like assigning key roles to your employees. By putting the following in play, you'll find that you've covered many critical bases, including the need to delegate, develop talent, ensure business continuity, track tech trends and monitor the competition. Better yet: It's not an "all or nothing" list. You can adapt only one or two ideas and still take advantage of results. For more about Janco's list, click here. - See more at: http://www.cioinsight.com/it-management/leadership/slideshows/nine-ways-to-better-organize-your-it-department-09/#sthash.lWy9izzG.dpuf
A CIO is paid to lead. But it's difficult to do so when you don't have the right organizational structure in place. A house, after all, is only as strong as its foundation. So whether you're "the new guy" as a CIO or you've worked within your current position for a year or longer, you should carefully consider the following nine winning organizational moves to implement for your IT department. As compiled by Janco Associates, the best practices here aren't the stuff of rocket science (even if you happen to supervise a number of rocket scientists). Instead, they're a useful collection of suggestions that cover both the big picture, such as alignment with company-wide strategies, and the day-to-day, like assigning key roles to your employees. By putting the following in play, you'll find that you've covered many critical bases, including the need to delegate, develop talent, ensure business continuity, track tech trends and monitor the competition. Better yet: It's not an "all or nothing" list. You can adapt only one or two ideas and still take advantage of results. For more about Janco's list, click here. - See more at: http://www.cioinsight.com/it-management/leadership/slideshows/nine-ways-to-better-organize-your-it-department-09/#sthash.pF2ECXTa.dpuf

A CIO is paid to lead. But it's difficult to do so when you don't have the right organizational structure in place. A house, after all, is only as strong as its foundation. So whether you're "the new guy" as a CIO or you've worked within your current position for a year or longer, you should carefully consider the following nine winning organizational moves to implement for your IT department.

Order CIO Job Description

Highest Paid CIOs in publicly traded companies in 2012 as reported to the SEC in 2013

CIO Lenght of Employment

As compiled by Janco Associates (www.e-janco.com), the best practices here aren't the stuff of rocket science (even if you happen to supervise a number of rocket scientists). Instead, they're a useful collection of suggestions that cover both the big picture, such as alignment with company-wide strategies, and the day-to-day, like assigning key roles to your employees. By putting the following in play, you'll find that you've covered many critical bases, including the need to delegate, develop talent, ensure business continuity, track tech trends and monitor the competition. Better yet: It's not an "all or nothing" list. You can adapt only one or two ideas and still take advantage of results.

- more info

American Express hits privacy head on

American Express hits privacy head on with its "Privacy Center"

After many attack and phishing scams in the past year, American Express has come up with a proactive solution which is focused at provding an easy way for it customers to communicate with them. Customers can:

  • Explore your privacy choices and update communication preferences
  •  Review Privacy Notices and our Online Privacy Statement 
  • Learn how AMX protects customer privacy and keep thier information safe

Privacy readings

Privacy Policy, e-janco.com, Janco Associates, Janco
... Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists Privacy ...
URL: http://www.e-janco.com/privacy.htm
BYOD guidelines are defined
... Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists BYOD ...
URL: http://www.e-janco.com/Press/2013/20130510-BYOD-Policy.html
proposed privacy bill compliance nightmare
... Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists Compliance ...
URL: http://www.e-janco.com/Newsletters/2010/Compliance_Newsletter_100726.htm
Most business transactions and interactions between individuals and business are electronic
... Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists User ...
 
    

- more info

New job title - Chief Digital Officer - CDO

The job of chief digital officer (CDO) has recently emerged as a new role on the leadership team, as organizations are looking to bring in digital capabilities and seeing the need for an executive with a new set of competencies that combines strategy, marketing, and technology. Many are considering hiring or have already hired a digital leader to oversee enterprisewide digital strategy.

Position Descriptions IT Salary Survey

263 IT Job Descriptions and Organization Charts

The Internet and IT Position Descriptions HandiGuide® was completed in 2014 and is over 700 pages; which includes sample organization charts, a job progression matrix, and 263 Internet and IT job descriptions.   The book also addresses Fair Labor Standards, the ADA, and is in a new easier to read format

BuyTable of Contents
- more info

Top 10 Cloud Security practices identified by Janco

necessary security for the data and the application

Outsourcing Template

10 Cloud Security best practices have been identified by Janco.  They are more important today than ever before with the increase in the number of cloud applications and the number of hackers that are out there.

- more info

Since Anti-virus software no longer works why is everyone still using it

Companies have relied on antivirus (AV) software to help detect, prevent and remove malicious code before it becomes a problem. But does it work?

Traditional signature-based anti-malware solutions are increasingly ineffective. In cases where an enterprise is subject to an advanced targeted attack, it may provide no protection at all. [And] in cases where the end user is targeted directly, runs with full administrative rights on their PC and is tricked into running some kind of Trojan, traditional anti-malware solutions are of little value.”
So why do companies still use it?

Standalone AV is no longer effective at stopping today’s increasingly sophisticated barrage of key loggers, backdoors, rootkits, Trojan horses, worms and spyware.

There are two primary reasons why AV is still deployed on enterprise endpoints.

  • Antivirus is required for legal and compliance reasons
  •  Even though AV doesn’t catch everything, it still provides some level of protection. Microsoft has done studies to show that computers without any AV are infected at a much higher rate than computers with AV -- irrespective of what brand.
Order Compliance Kit


Related readings:

  1. CIOs worry more about cyber threats with mobile computing Cyber threats are now a much greater concern with the expansion of the use of mobile devices and services. At the same time online criminals...
  2. Fraud is on the rise CIOs need to address fraud issues with better security For the last three years it has been reported that estimated fraud losses that are doubling...
  3. Anatomy of a Chinese Cyber Attack Cyber Attack — How the Chinese do it… A Chinese cyber Attack (a Stuxnet-style attack) frequently makes its first entry into a company’s secure network...
  4. CIOs Worry More About Cyberthreats CIOs face more cyber threats Cybert hreats are now a much grater concern with the expansion of the use of mobile devices and services. At...
  5. Cyber war breaks out – slows Internet Cyber war pushes need for more security The recent cyber war between Spamhaus and Cyberbunker with commercial Denial of Service Attack (DDoS) pushed the Internet...

 

- more info

Total security is almost impossible to achieve

Total security, protectetion of data and IT invulnerability are impossible at any price. Most companies spend a major portion of their IT budgets on computer security defenses to prevent hackers from taking advantage of known everyday vulnerabilities. The theory is simple: With enough layers of security, the bad guys will look elsewhere for easier targets.

Security Manual - Comprehensive, Detailed, and Customizable

The Security Manual is over 240 pages in length. All versions of the Security Manual Template include both the Business IT Impact Questionnaire and the Threat Vulnerability Assessment Tool (they were redesigned to address Sarbanes Oxley compliance).  

Order Security ManualSample DRP
- more info

Problem with traditional email systems

One of the majors shortcoming of email is it is next to impossible to retrieve a message that you wish you hadn’t sent. Perhaps there is more up-to-date information shortly after you sent the email, maybe you sent it to the wrong person, or maybe you simply said something you should not have.

Electronic Communication

 Who has not realized that offering the CIO a candid assessment of his style was just a bad idea? If the recipient is using a POP3 email system, you can pretty much forget it, because everything is downloaded locally and is no longer influenced by changes to the server. But even when that’s not the case, you’re not likely to have any luck with an email recall attempt. And if you try, the recipient is probably going to know about it, and so your plan will backfire as the recipient will suddenly take an intense interest in what you so very much want to take back.

Defining Your Optimal IT Infrastructure is a critical task that can no longer wait with all of the changes mandated by PCI-DSS, HIPAA, ISO, ITIL, Sarbanes-Oxley, changing economic environment, and changes to enterprise operating environments.

Order PolicySample policy


 

- more info

Shadow IT puts organizations and DR plans at risk

As smartphone and tablet usage continues to grow,  CIOs and companies will continue to see he growth of Shadow IT , fueled by users’ requirements for anytime, anywhere access to files. Furthermore, policy and education alone cannot address the emergence of Shadow IT and resulting unmanaged file sharing and data exposure.

In order to fully address this issue, CIOs must consider providing the tools that deliver the convenient and flexible access to information that users want. Without the proper tools provided, managed, and supported by IT, users will continue to find alternative solutions and work around existing policies, leaving IT in the dark.

Over a six month period Janco Associates interviewed managers and executives in enterprises of all sizes that had experienced a business interruption and had to take some sort of action to continue their operations. Only 72 of the 195 Interviewees were able to recover with no major problems. 123 of the others faced some issue with their recovery efforts.

Why DR and BC plans fail

 Order Disaster Plan TemplateDisaster Plan Sample
- more info