IT Management Knowledge Base

CIO and IT Management Planning Tools

It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.

  • News Feed

  • Wearable device benefitis are easily defined

    Wearable devices can capture and broadcast video, voice, data and location information

    WYOD benefitsWYOD benefits are clear; wearables can serve as:

    • A non-invasive underwriting evidence source - gathering metrics to assess risk in less time than a full medical exam.
    • A tool to improve in-force management - helping insureds maintain a healthy lifestyle and reduce lapse experience.
    • A cnsumer engagement opportunity - providing customer value beyond insurance protection.
    • A way to improve mortality experience - reducing the incidence of early deaths from chronic conditions such as diabetes and heart disease
    • A signal to identify super-fit, active people - encouraging life insurance purchase from consumers who feel invincible.

    Order Wearable device WYOD policy Download Selected Wearable device WYOD policy Pages

    - Wearable device benefitis are easily defined

    Top 10 Mobile Security Best Practices

    Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs around the world

    Top 10 Mobile Device Security Best practices

    1. With the move towards more mobile and office site computing users are challenged to keep their BYOD device safe and secure
    2. Purchase Android devices only from suppliers who release Android patches quickly.
    3. Implement the locking feature on all mobile devices
    4. Utilize applications on the device from the vendor (Apple or Google) application store
    5. When possible utilize two-factor authentication or bio metrics
    6. Use device encryption
    7. Connect to Wi-Fi via a Virtual Private Network (VPN)
    8. Utilize a Password management system
    9. Utilize anti-virus software
    10. Turn off un-used features like connections that are not used. If you don't use an application, uninstall it.

    Order Mobile computing policy bundleDownload Mobility Bundle Table of Contents

    - Top 10 Mobile Security Best Practices

    Security is more than technology

    Security Takes Skills Beyond Technology

    Secuity policiesTrust is the most important element in your client relationships, and effective data and network security require you to build a security chain of trust that links together every step - from the origin of a data transmission to the destination and back.

    The security chain starts at the endpoint client device, travels from the edge across the network to its core - where your firewall, intrusion detection and prevention systems, and anti-malware await - and then ends with servers and storage.

    Order Security Policies and Procedures

    Download TOC security policies

    - Security is more than technology

    Top 5 security best practices defined

    Top 5 Security Best Practices:Security Best Practices

    1. Educate users on current threats in the digital landscape, including phishing campaigns, malware and malicious websites;
    2. Implement layered security - adopting a layered security approach is the best way to ensure your business is covered from all angles.
    3. Shield your systems from as many vulnerabilities to your network as possible is essential to staying ahead of hackers.
    4. Stay current wth software and firmware updates; these often contain security patches for vulnerabilities. The longer you go without updating your software, the more susceptible your network is to malware.
    5. Upgrade software and OS before end of life. While it may seem expensive, it can save you from lost productivity, costly fines and lawsuits on the backend.
    Order Security ManualDownload Security Table of Contents
    - Top 5 security best practices defined

    Securing sensitive and personally identifiable information now a priority

    World Class Best Practices Policies for securing sensitive and personally identifable information

    Securing sensitive and personally identifiable information now a prioritySecurity policiesCIO now are focusing on Securing customer's and employees' personally identifiable information (PII) and sensitive personal information (SPI). To ensure the security of customer information, Janco has recently updated it IT Infrastructure Policy bundle to focus on this.

    Managing the activities of end-users with today's tech-savvy workforce is a huge challenge. The temptation is always there for employees to abuse social networking sites, instant-messaging, telecommuting privileges and install personal software on company equipment. Lost productivity, slow service, viruses and worse are inevitable unless you are able to develop and enforce clear IT policies throughout your company.

    Order IT Infrastructure PoliciesDownload Selected Pages 
    - Securing sensitive and personally identifiable information now a priority

    Historic unemployment rates in IT job market

    IT job market prospects are tied to the US national employment data

    Posts on the unemployment rate in the IT Job market:

    - Historic unemployment rates in IT job market

    How to stay secure when you are traveling

    Protect your data from lost and theft - Best Practices for International Travel

    Security when you are on the roadMan-in-the-middle attacks easy to pull off. At public Wi-Fi locations, the airwaves are open and any attacker with a simple antenna can mount an attack.

    To improve overall online security:

    1. Browse secured sites only.
    2. Use a VPN. This will protect traffic where it is most vulnerable, the last mile between a user and a server.
    3. Know what your vulnerabilities are and use tools needed to combat them.
    4. Keep your devices up-to-date with latest software.
    5. Be cautious about opening or replying to emails from unknown senders.

    Order Travel asnd off-site meeting policyDownload Selected Pages

    - How to stay secure when you are traveling

    Best Practices for Text Messaging Marketing

    BEST PRACTICES for Text Messaging Marketing defined

    Test Message Marketing Best PracticesText Message Marketing is in addition to data that is sensitive or confidential, users need to have rule of how to use this tool.  Ten best practices are:

    • Send only to opt in number - do not use purchased number
    • Not too early in the morning and not too late at night. Think about when users would want to accept a phone call. A text message has a similar alert method and people typically don't want to be bothered at those times.
    • Always keep local time zones in mind. Send messaging out at the times most impactful to those in each local market. Particularly effective for TV /radio shows, retail sales, and time sensitive offers.
    • The bigger the news, the more lenient you can be with messaging outside of "mobile business hours."
    • Reminders should be sent at least 24 hours before the appointment and contain all necessary information.
    • Daily/monthly reminders on any subject are popular in this increasingly busy world. Send at the time that best fits your goals: horoscopes in the morning and high school football score alerts on Friday evening.
    • Trying to drive people into your establishment during lunch hours? Send messages at 11 :30 AM local time to catch those who are making lunch plans. Include a coupon for higher redemption rates
    • Thursdays are popular dates to send text messages with strong response rates and Fridays between 2-5 PM have shown great success for driving retail traffic on Saturday mornings.
    • Send reminders to increase RSVPs and attendance. Include specific event information to assist attendees with planning and logistics.
    • Send holiday messages of with valuable content up to a week before the event to allow customers time to plan (upcoming sales, in-store events etc.)
    Order text messaging policyDownload Selected Pages


    - Best Practices for Text Messaging Marketing