CIO Areas of Interest

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

    Distaster Plans need to consider impact of solar storms

    March 31st, 2014

    Disaster Planning - Solar Flares

    The sun emitted what NASA is calling a "significant" solar flare on Saturday that could affect communications systems on Earth on Wednesday.

    The National Weather Service's Space Weather Prediction Center is calling the eruption a radio blackout event. The center reported that the solar flare could affect satellites and cause GPS errors. Electrical power lines could be hit by extra current, and high frequency communications could be blocked when the radiation hits Earth.

    Solar flares are powerful bursts of radiation, according to NASA, but the harmful radiation from a flare cannot pass through the Earth's atmosphere to physically hurt humans. However, powerful flares can affect the Earth's atmosphere in the layer where GPS and communication signals travel.

    - more info

    Focus of CIOs IT spending will be mobile computing and BYOD in 2014

    March 23rd, 2014

    Spending on cloud and mobile will dominate technology investments for finance departments this year, but while the potential ROI in those areas is huge, so are the risks. By now most companies have adopted some cloud systems, and the good news is the process of implementing these solutions has gotten easier and more predictable. Unfortunately, for some organizations the process still has unexpected but significant complexities.

    Mobile is also on track to reach new productivity heights over the next two years, but CFOs still have concerns, particularly about device security management. While some companies have moved forward with BYOD solutions, others are still trying to make buying mobile devices for their employees a more-coordinated effort. Finance chiefs must also grapple with due diligence prior to rolling out a new company-wide plan, as well as regulatory and compliance issues once that plan is in place.

    Infrastructure Policy Sample

    • Mobility Policy Bundle (more info...) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
      • BYOD Policy Template (more info...) Includes electronic BYOD Access and Use Agreement Form
      • Mobile Device Access and Use Policy (more info...)
      • Record Management, Retention, and Destruction Policy (more info...)
      • Social Networking Policy (more info...) Includes electronic form
      • Telecommuting Policy (more info...) Includes 3 electronic forms to help to effectively manage work at home staff
      • Travel and Off-Site Meeting Policy (more info...)
    - more info

    IoE Internet of Everything is the next "hot" thing

    March 17th, 2014

    IT InfrastructureThe fast pace of technology is changing our notion of the modern organization.  As barriers to market entry are falling, customers, employees, and citizens alike are demanding new ways to interact.  This trend is moving us into the next wave of Internet evolution known as the "Internet of Everything" (IoE). 

    Connecting people, data, processes, and things, IoE is creating a digital disruption with great societal value as everything is coming online.  Organizations of all types are realizing the benefit of this increased connectedness through operational efficiency and improved customer and citizen experiences.  Many organizations are using IoE connections to run - not just monitor - complex operations in manufacturing, healthcare, financial services, utilities, and the public sector to generate and deliver significant value. Is IT ready for this shift?

    Order IT Infrastructure KitDownload Infrastructure
    - more info

    Security Professionals are in Demnad

    March 10th, 2014

    According to recent data, 25% of enterprise (i.e. more than 1,000 employees) and mid-market (i.e. 250 to 999 employees) organizations claim that they have a "problematic shortage" of IT security skills. In addition, of those organizations planning to add IT headcount in 2014, 42% say they will hire IT security professionals. This is also the highest percentage of all. In other words, more organizations plan to hire IT security professionals than any other role within IT.

    Order Salary Survey

    Clearly, organizations are under-staffed when it comes to cybersecurity, but that's not their only problem. Many firms employ security professionals who lack the right skills to get the job done. When ESG asked enterprise security professionals to identify their biggest challenges around incident detection/response, 39% said that they lacked an adequate staff while 28% claimed that they lacked the adequate analytics skills. Alarmingly, many organizations are under-staffed AND under-skilled.

    Salary Survey Job Descriptions IT Hiring Kit Interview Guide

    - more info

    University records breached - 300,000 impacted

    February 20th, 2014

    Security Manual

     The sensitive personal information for more than 300,000 faculty, staff, and students at the University of Maryland were stolen in a "sophisticated" cyberattack on the school's recently bolstered security defenses, the school's president revealed late Wednesday.

    The names, Social Security numbers, and birth dates of 309,079 individuals affiliated with school's College Park and Shady Grove campuses who were issued a university identification card since 1998 were exposed in Tuesday's attack, according to an apology issued Wednesday by university President Wallace Loh. However, no financial, academic, or contact information was compromised, Loh said.

    The university said state and federal law enforcement authorities are investigating the cyberattack and that computer forensics investigators were working to determine how the university's defenses were breached.

    Order Security ManualTable of Contents

    - more info