CIO Areas of Interest

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

    • IT Standard News Feed - 30 items


      Over 1/3 of IT pros do work from home

      June 24th, 2016

      Over 1/3 of IT pros do work from home

      38 percent of workers in management, business, and financial operations
      occupations, and 35 percent of those employed in professional and related occupations,did some or all of their work from home on days they worked, according to the U.S. Bureau of Labor Statistics. Workers employed in other occupations were less likely to work from home on days they worked.

      Order IT Job Description
      Sample job description
       Download Selected IT Job Descriptions

      - more info


      Importance of infrastructure policies and a focused security program is critical

      June 17th, 2016

      Importance of infrastructure and security programImportance of infrastructure policies and a focused security program is critical

      The digital landscape today is now open to increased cyber-attacks. The increase in frequency of attacks need a well-developed set of infrastructure procedures and a focused security program. IT pros need a focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy.

      Cyber-attacks cannot be prevented but with concentrated awareness and efforts, organizations can arm their customers, partners, and employees with safeguard measures require focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy. Cyber-attacks cannot be prevented but with concentrated awareness and efforts, organizations can arm their customers, partners, and employees with safeguard measures.

      Order Security ManualDownload Selected PagesVersion History

      - more info


      Microsoft’s browsers are getting ready to bite the dust

      June 1st, 2016

      Microsoft’s browsers are getting ready to bite the dust

      Back in November 2015, IE accounted for more than half of the global browser user share. Currently, IE and Edge combined to account for 38.7% of the global user share.

      In the last six months alone, IE -- a bucket into which Net Applications also throws in Windows 10's Edge -- has lost 11.4 percentage points, an unprecedented decline for any browser at any point in the last 11 years.

      Order Browser Market Share StudyDownload Selected Pages

      - more info


      Cost of security breaches escilates

      May 26th, 2016

      Cost of security breaches escalates

      Cost of Security breachAttacks by malicious insiders arethe costliest to fix ($145,000), followed by denial of service ($127,000) and Web-based attacks ($96,000).

      The top 10 drivers of security shortcomings include:

      1. Insufficient funding for security
      2. Lack of commitment by senior executive management
      3. Lack of leadership in the security arena by the CIO
      4. Belief that the organization will not be targeted
      5. Lack of internal resources who are "security" experts
      6. Lack of an effective IT security strategy
      7. Lack of an action plan on how to implement a solution before an event
      8. Infrastructure for IT that does not easily lend itself to security implementation including complex and disjointed applications and data
      9. No central focus with the enterprise that focuses on security
      10. Lack of a good termination policy for employees and contractors
      Order Security ManualDownload Selected Pages
      - more info


      Privacy lost with new audio fingerprint tracking

      May 20th, 2016

      Privacy Lost

      It no longer is just the NSA, now some websites using audio fingerprinting for identifying and monitoring web users. A number of sites use the AudioContext API to identify an audio signal that reveals a unique browser and device combination.

      The method doesn't require access to a device's microphone, but rather relies on the way a signal is processed. The researchers, Using the AudioContext API to fingerprint does not collect sound played or recorded by your machine. An AudioContext fingerprint is a property of your machine's audio stack itself.
      In addition, researchers have found 715 of the top one million websites are using WebRTC to discover the local IP address of users. Most of these are third-party trackers.

      Order Sensitive Information PolicyDownload Selected Pages

      - more info