Newsletter HomePrevious articleNext

Newsletter Topics
  • Disaster Plan updated with Safety Program electronic forms
  • BYOD Policy Released
  • Business Continuity, Security and Safety Program are all needed to meet mandated requirements


Disaster Recovery and SafetyDisaster Recovery Business Continuity Template Version 7.2 Released

Safety Program electronic forms and BYOD implications added to the latest update of the DR/BC Template

Most enterprises have disaster recovery and business continuity plans in place. However in a review of 128 companies that have recently has to activate their disaster plans, Janco has found that 64% do not have and or have not followed the protocols to ensure the safety of their employees and critical security needs of their information assets.

Janco addresses this need by adding all of the electronic forms contained in its safety program.

Included are:

  • Area Safety Inspection
  • Employee Job Hazard Analysis
  • First Report of Injury
  • Inspection Checklist - Alternative Locations
  • Inspection Checklist - Office Locations
  • New Employee Safety Checklist
  • Safety Program Contact List
  • Training Record

Security BYOD UpdateOrder Data Breach Tools


BYOD Policy Released

BYOD Policy ReleasedIf your enterprise does not have a Bring Your Own Device policy, then two types of things are happening - neither good:

  • Personal devices are being blocked - your company is losing productivity associated with an employee making use of a mobile device or your company is paying for each employees access device..
  • Personal devices are already accessing your corporate network, with or without your knowledge, and you are not doing anything to ensure that this is being done securely and is not in compliance with manadated federal, state, local, and industry requirements.

Janco, in concert with a number of world class enterprises had created a policy address these issues and provides solutions for the following questions:

  • What are the legal implication - What is the impact of the Stored Communication Act - Record Retention and Destruction?
  • What happens to the data and audit trail when an employee leaves the company?
  • What about lost or stolen devices?
  • How is a device configured to receive and transmit corporate data?
  • What kind of passwords are acceptable to use?
  • What kind of encryption standards are acceptable?
  • What types of devices are allowed and what types are not?
  • What about jail broken, rooted or compromised devices?

Telecommuting PolicyOrder Data Breach Tools


Disaster Recovery Security and SafteyDisaster Recovery Plan, Security Policies and Procedures, and Safety Program are all required to meet mandated requirements


No Reason to Re-Invent - All the Heavy Lifting has already been done

When recovery from a disaster starts, the environment often is hazardous and froth with danger. No one wants to put their employees at risk and yet the disaster recovery must proceed.

When natural disasters strike, enterprises realize that personnel must take care of themselves and your family first. There are serious problems to deal with before recovery begins. Illness or injury may result from contaminated water, debris-filled roadways, electrical and fire hazards, and displaced wildlife.

At the same time sensitive data often is  often open to attack via damage to it or the unauthorized availability to hackers, competitors or others.  The reality is that many businesses don't truly know where they stand with data security. They usually cover the basics: The firewall is in place, systems are being patched, backups are being made and user accounts have strong passwords. But many managers assume these basic data security measures are enough. But you never really know how well you're protected until you take a look from the perspective of a malicious attacker or a rogue insider who may try to take advantage of the situation.


Read Data BreachOrder Data Breach Tools