IT Management Knowledge Base

CIO and IT Management Planning Tools

It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.

  • News Feed

  • Top 5 security best practices defined

    Top 5 Security Best Practices:Security Best Practices

    1. Educate users on current threats in the digital landscape, including phishing campaigns, malware and malicious websites;
    2. Implement layered security - adopting a layered security approach is the best way to ensure your business is covered from all angles.
    3. Shield your systems from as many vulnerabilities to your network as possible is essential to staying ahead of hackers.
    4. Stay current wth software and firmware updates; these often contain security patches for vulnerabilities. The longer you go without updating your software, the more susceptible your network is to malware.
    5. Upgrade software and OS before end of life. While it may seem expensive, it can save you from lost productivity, costly fines and lawsuits on the backend.
    Order Security ManualDownload Security Table of Contents
    - more info


    Securing sensitive and personally identifiable information now a priority

    World Class Best Practices Policies for securing sensitive and personally identifable information

    Securing sensitive and personally identifiable information now a prioritySecurity policiesCIO now are focusing on Securing customer's and employees' personally identifiable information (PII) and sensitive personal information (SPI). To ensure the security of customer information, Janco has recently updated it IT Infrastructure Policy bundle to focus on this.

    Managing the activities of end-users with today's tech-savvy workforce is a huge challenge. The temptation is always there for employees to abuse social networking sites, instant-messaging, telecommuting privileges and install personal software on company equipment. Lost productivity, slow service, viruses and worse are inevitable unless you are able to develop and enforce clear IT policies throughout your company.

    Order IT Infrastructure PoliciesDownload Selected Pages 
     
    - more info


    Historic unemployment rates in IT job market

    IT job market prospects are tied to the US national employment data

    Posts on the unemployment rate in the IT Job market:

    - more info


    How to stay secure when you are traveling

    Protect your data from lost and theft - Best Practices for International Travel

    Security when you are on the roadMan-in-the-middle attacks easy to pull off. At public Wi-Fi locations, the airwaves are open and any attacker with a simple antenna can mount an attack.

    To improve overall online security:

    1. Browse secured sites only.
    2. Use a VPN. This will protect traffic where it is most vulnerable, the last mile between a user and a server.
    3. Know what your vulnerabilities are and use tools needed to combat them.
    4. Keep your devices up-to-date with latest software.
    5. Be cautious about opening or replying to emails from unknown senders.


    Order Travel asnd off-site meeting policyDownload Selected Pages

    - more info


    Best Practices for Text Messaging Marketing

    BEST PRACTICES for Text Messaging Marketing defined

    Test Message Marketing Best PracticesText Message Marketing is in addition to data that is sensitive or confidential, users need to have rule of how to use this tool.  Ten best practices are:

    • Send only to opt in number - do not use purchased number
    • Not too early in the morning and not too late at night. Think about when users would want to accept a phone call. A text message has a similar alert method and people typically don't want to be bothered at those times.
    • Always keep local time zones in mind. Send messaging out at the times most impactful to those in each local market. Particularly effective for TV /radio shows, retail sales, and time sensitive offers.
    • The bigger the news, the more lenient you can be with messaging outside of "mobile business hours."
    • Reminders should be sent at least 24 hours before the appointment and contain all necessary information.
    • Daily/monthly reminders on any subject are popular in this increasingly busy world. Send at the time that best fits your goals: horoscopes in the morning and high school football score alerts on Friday evening.
    • Trying to drive people into your establishment during lunch hours? Send messages at 11 :30 AM local time to catch those who are making lunch plans. Include a coupon for higher redemption rates
    • Thursdays are popular dates to send text messages with strong response rates and Fridays between 2-5 PM have shown great success for driving retail traffic on Saturday mornings.
    • Send reminders to increase RSVPs and attendance. Include specific event information to assist attendees with planning and logistics.
    • Send holiday messages of with valuable content up to a week before the event to allow customers time to plan (upcoming sales, in-store events etc.)
    Order text messaging policyDownload Selected Pages

     

    - more info


    CIOs role expands as hackers steal more data

    CIOs role expands as hackers steal more data

    CIO Security role expandsAfter several high-profile hacks last few months, CIOs in all industries still find themselves learning about the hackers aggressively hunting customer's personally identifiable information (PII) data, financial records and medical histories.

    Order CIO Job Description

    In the Healthcare and Insurance industry alone over 100 million health records were illegally accessed last year. As a result, the National Association of Insurance Commissioners Cybersecurity Task Force has proposed a new Insurance Data Security Model Law.

    Because insurance is a data-driven industry, regulators must understand what data is being collected and for what purpose the NAIC said. Today, regulators and companies have a need for data beyond what has been traditionally collected. But what regulators need is greater insight, not just more data.

    All information is valuable. Hackers want whatever data they can monetize. CIO already know that breaches can happen to anybody. There is no such thing as 100% security, no matter the education or tech you throw at it. It is just a question of how we handle it, when it happens.

    Currently, anti-malware and encryption stand as two big ways CIOs protect information. Nonetheless, protecting data going forward may be directly tied to CIOs ability to adapt to the changing roles of the position.

    The role of CIO is very business driven now. There are so many avenues for hackers to come in that you can’t just focus on tech. CIOs need to understand the entire business and be able to talk to the CEO and the board as well.

    IT Job Family Classification System

    IT Job Family Classification

    Career path definition and compensation planning made easy

    - more info


    Mobility policies and procedures are the focus of many CIOs

    Mobility Policy BundleMobility Policy Bundle

    Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs around the world. . .

    A major challenge for CIOs and C-Level executives is how to respond to major technology shifts in a way that both benefits and protects the business. One of the major shifts in recent years has come from the demands of people to use thier own mobile devices (BYOD and WYOD) and cloud-based apps and services.

    As mobile working becomes the new normal, it's essential that businesses manage their mobile devices and mobile applications effectively. Employees are more demanding than ever, expecting on-the-go access to their core data and applications across a range of devices.

    Read on moble computing policiesOrderDownload Table of Contents
    - more info


    78.5% of H-1Bs are for IT jobs

    IT Pros with H-1B visas are paid less than US Nationals

    78.5% of  all the H-1B visas were issued for IT Jobs. The median compensation for those IT jobs was $85,601. In Janco's January 2017 IT Salary Survey the median compensation for all IT professionals was $87,072.   When comparing the data from IT Salary Survey it is clear that many H-1B visas are used to reduce costs.

    Media IT Salaries

    Order Salary SurveyDownload Selected Pages

     

    - more info