IT Management Knowledge Base

CIO and IT Management Planning Tools

It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.

  • News Feed

  • Harder to fill open positions

    IT job market prospects are tied to the US national employment data

    Harder to fill open positionsJob openings for IT Professionals are rising. CIO and IT managagers are now concerned about matching the right canidates to open jobs. One key to a profitable business is the ability to hire qualified workers into open positions. An enterprise can suffer if there are not enough applicants, if the applicants do not have the needed skills, or if for some other reason, the applicants do not accept offers made.

    Janco's data show that as the economy slowed before the Great Recession, businesses were not as successful filling open jobs. But during the recession, as job openings declined steeply and hires less steeply, the ratio increased as businesses were better able to fill the remaining jobs they had open. After the recession, the ratio declined as job openings increased at a much greater pace than hires in many industries. That is, as the economy has improved, businesses are not filling their open jobs as efficiently.

    Read on...

    Order IT Hiring Kit

    - Harder to fill open positions

    Data Distruction via Software Update

    Microsoft Upate Pulled - Data Distruction

    Backup PolicyMicrosoft just pulled back it latest update from Windows 10 after it was discoved that data on the recieving machines was LOST.

    That proves a point that you really do not want to be a leader when major rollouts of updates are sent to your computer. 

    Micosoft posted the following message:

    • "We have paused the rollout of the Windows 10 October 2018 Update (version 1809) for all users as we investigate isolated reports of users missing some files after updating."
    • "If you have manually downloaded the Windows 10 October 2018 Update installation media, please don't install it and wait until new media is available."
    • "We will provide an update when we resume rolling out the Windows 10 October 2018 Update to customers."

    Order Backup Policy Backup Policy Download Selected Pages


    - Data Distruction via Software Update

    Wearable device benefitis are easily defined

    Wearable devices can capture and broadcast video, voice, data and location information

    WYOD benefitsWYOD benefits are clear; wearables can serve as:

    • A non-invasive underwriting evidence source - gathering metrics to assess risk in less time than a full medical exam.
    • A tool to improve in-force management - helping insureds maintain a healthy lifestyle and reduce lapse experience.
    • A cnsumer engagement opportunity - providing customer value beyond insurance protection.
    • A way to improve mortality experience - reducing the incidence of early deaths from chronic conditions such as diabetes and heart disease
    • A signal to identify super-fit, active people - encouraging life insurance purchase from consumers who feel invincible.

    Order Wearable device WYOD policy Download Selected Wearable device WYOD policy Pages

    - Wearable device benefitis are easily defined

    Top 10 Mobile Security Best Practices

    Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs around the world

    Top 10 Mobile Device Security Best practices

    1. With the move towards more mobile and office site computing users are challenged to keep their BYOD device safe and secure
    2. Purchase Android devices only from suppliers who release Android patches quickly.
    3. Implement the locking feature on all mobile devices
    4. Utilize applications on the device from the vendor (Apple or Google) application store
    5. When possible utilize two-factor authentication or bio metrics
    6. Use device encryption
    7. Connect to Wi-Fi via a Virtual Private Network (VPN)
    8. Utilize a Password management system
    9. Utilize anti-virus software
    10. Turn off un-used features like connections that are not used. If you don't use an application, uninstall it.

    Order Mobile computing policy bundleDownload Mobility Bundle Table of Contents

    - Top 10 Mobile Security Best Practices

    Security is more than technology

    Security Takes Skills Beyond Technology

    Secuity policiesTrust is the most important element in your client relationships, and effective data and network security require you to build a security chain of trust that links together every step - from the origin of a data transmission to the destination and back.

    The security chain starts at the endpoint client device, travels from the edge across the network to its core - where your firewall, intrusion detection and prevention systems, and anti-malware await - and then ends with servers and storage.

    Order Security Policies and Procedures

    Download TOC security policies

    - Security is more than technology