CIO Areas of Interest

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

    • IT Standard News Feed - 30 items


      WYOD a top concern of C-Level executives

      May 2nd, 2016

      WYOD a top concern of C-Level executives

      Anyone can purchase a wearable device.  If there is an open wi-fi connection that the device can map to sensitive personal and enterprise infromation is at risk. 

      Rules and policies need to be put in place to mitigate this risk.  The question is where to start.  Janco has answered that in its wearable device policy template.  It includes robust rules on wearable devices.  In addition, it provides a specifice road map to be followed when developing a strategy on how to deal with this new potential threat.

      Wearable Device Policy - It is 17 pages in length. It contains everything that an enterprise needs to implement a functioning and compliant Wearable Devices device and use process. Included are forms defining the mobile device environment.

       Download Selected Pages

      Read on...

       

      - more info


      Record Management, Retention, and Destruction Policy

      April 28th, 2016

      Records ManagementThe volume of documents within organization is exploding, managing these documents is a real and pressing challenge. If your organization is like many others, paper documents, emails, faxes, PDFs, CAD and other office documents are left unmanaged and stored in filing cabinets, on file servers or on desktop PCs around the office. This exposes your organization to compliance risks, service delays, cost overruns and a host of other challenges.

      Record Management Policy Download Selected Pages

      Today, software solutions are available that combine document and records management capabilities into a single, complete offering. These solutions enable you to reduce the time, cost and complexity of storing and accessing your documents throughout the information lifecycle. They also give you the power to improve access to critical documents, enhance customer service and operational efficiency - all while reducing risks and addressing compliance demands.

      - more info


      Contract terms for outsource agreemeents

      April 8th, 2016

      Contract terms for outsource agreementsContract terms for outsource agreemeents

      Specific contractual provisions to minimize cyber risk in outsourcing contracts are:

      • Setting security standards for the vendor;
      • Restricting on subcontracting;
      • Employee related protections, such as background checks and training; 
      • Security testing;
      • Security audits;
      • Security incident reporting and investigation;
      • Data retention and use restrictions;
      • Customer data access rights; and
      • Vendor liability for cyber incidents.

      Reasons Why CIOs Recommend Outsourcing

      Order Cloud Outsourcing Template  Download Selected Pages

      - more info


      Ten tips to protect your sensitive personal information

      March 30th, 2016

      Ten tios to protect your sensitive personal informationTen tips to protect your sensitive personal information

      1. Monitor credit reports
      2. Never provide personal information over public Wi-Fi
      3. Protect your password
      4. Don't use the same password on all accounts
      5. Never store passwords on your computer
      6. Watch out for phishing emails
      7. If you do receive a suspicious-sounding email, contact your service provider directly
      8. Take physical precautions
      9. Shred bills, credit offers, and expired credit cards
      10. Layer your cybersecurity

      Order Security Manual Download Selected Pages

      - more info


      Credit card chip usage expanding

      March 23rd, 2016

      Credit card chip usage expanding

      Credit Card ChipCredit card chip usage improves the security landscape.  Some key facts that you need to understand are:

      • Credit card chips reduce counterfeit card fraud: Countries that have been using chip cards for many years have seen significant reductions in counterfeit card fraud. In the UK, for example, counterfeit card losses have been reduced by 70%.
      • An increased number of chip cards in consumers' possession: over 400 million chip cards have been issued in the U.S. as of the end of 2015.
      • Majority of all retail outlets now accept chip cards: almost 90% of all travel, entertainment, and high cost retail operations accepts chip cards

      Things that physical credit card sites need to do to minimize transaction costs are:

      • Swipe and insert: Always make sure to swipe or insert cards whenever possible. Manually keying in card information can cause a higher interchange rate for the transaction.
      • Daily settlement: Settle transactions each day. If you routinely settle transactions more than 24 hours after they are authorized.
      • Get accurate customer information: For online transactions validate customers' billing and address information is entered correctly.

      Order Security Manual Download Selected Pages

      - more info