CIO Areas of Interest
Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA
The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.
If you wish to subscribe to this news feed the options that you have are:
- IT Standard News Feed - 30 items
- IT Standard News Feed- 25 items
- IT Standard News Feed- 10 items
- IT Standard News Feed- 5 items
- IT Historic News Feed- 40 items
- 66.1 percent of the 218 respondents to the survey answered Yes
- 28.4 percent answered No.
- 28.8% - Are still developing our first business continuity plan
- 20.3% - It is too complex to carry out
- 16.9% - It is not required or necessary
- 8.5% - It is too expensive to carry out
- 82.9% - Auditing by an internal audit process
- 74.4% - Align to a business continuity standard
- 55.6% - Defined Key Performance Indicators which we monitor and measure
- 46.2% - Auditing by an external audit process
- 24.8% - Benchmark against a Maturity Model
- 23.1% - Benchmark against industry peers (e.g other companies in the same industry sector)
- 19.7% - Formal certification to a business continuity standard
10 factors in making an IT organization that works
May 21st, 2013
10 factors that impact the reporting structure of an IT organization. The structure must support the goals of the organization and be consistent with its culture and capabilities. Well-defined reporting structures are based on the IT and business direction; take into account organizational barriers; and consider the effect of combining or separating the functions that are targeted for change.more info
Quality Contol Disaster Recovery Survey results
May 17th, 2013
Continuity Central survey asked the following question: "Does your organization have clear processes or methods for the quality control of business continuity plans and systems?"
Of those who said that their organization did not have clear processes or methods for the quality control of business continuity plans and systems the top reasons given so far are:
Respondents whose organization did undertake business continuity quality control were asked to list the quality processes and methods that are in place.
To achieve these goals for Information Technology Janco has combined some of its most popular products to help CIO and IT organizations to meet the most strigent Quality Asssurance and Contol Standards.
The Quality Assuarance and Quality Control Bundle includes:more info
CIO top 5 hot topics
May 15th, 2013
Read on - Chief Information Officer(CIO)more info
Disaster Recovery versus Business Continuity
May 14th, 2013
Disaster Recovery is the process of fixing a failing, degraded or completely damaged infrastructure. For example, the 2nd floor of a building was on fire; the fire is now out so the initial crisis is over. Now the damage caused by fire must be dealt with; there is water and smoke on the 2nd floor, the 3rd floor has damages caused by smoke and the 1st floor has water damage. The cleanup, replacement of furniture, repair of the building and its structure, painting, plastering, etc. are all part of the disaster recovery plan.
On the other hand, Business Continuity is how you continue to maintain critical business functions during that crisis. Back to the example, when the fire started, the alarm went off and people were evacuated from the building. Let say you had a Call Center on the 2nd floor and this just happens to be a critical area of your business. How would you continue to answer calls while people are being evacuated? How would you answer calls while the building is being inspected, repaired or rebuilt? Keeping the business running during this time is Business Continuity.more info
Chief Mobility Officer is challenged to address mobile threats
May 9th, 2013
One of the reasons why a corporation would want to create an office of the chief mobility officer is to improve coordination of mobile initiatives.
In the past few yeas social media and mobility have become an integral part of our professional and personal lives, and is used for much more than just talking to other people. One study last year found that mobile users spent almost 50 percent more time using their mobile devices for social networking than for phone calls.
Social media applications are more popular than ever, reflecting users preference to access the web on their mobile devices. Data shows that 73.6 percent of iPhone users actively connect to Facebook using the Facebook application for iPhone, and the Android version of the application has a 30 percent higher penetration rate. In January of 2013, the number of total mobile Facebook users was 680 million.
It is clear that those who treat mobile threats, email threats, web threats and other cyberthreats as separate and distinct risks are at greater risk than those who adopt a more holistic and integrated security posture. Security solutions that focus solely on mobile, email, web threats or similarly siloed security approaches can no longer be trusted to defend against complex, multistage attacks that can move between attack vectors.more info