IT Management Knowledge Base
CIO and IT Management Planning Tools
It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.
- News Feed
- Educate users on current threats in the digital landscape, including phishing campaigns, malware and malicious websites;
- Implement layered security - adopting a layered security approach is the best way to ensure your business is covered from all angles.
- Shield your systems from as many vulnerabilities to your network as possible is essential to staying ahead of hackers.
- Stay current wth software and firmware updates; these often contain security patches for vulnerabilities. The longer you go without updating your software, the more susceptible your network is to malware.
- Upgrade software and OS before end of life. While it may seem expensive, it can save you from lost productivity, costly fines and lawsuits on the backend.
- Browse secured sites only.
- Use a VPN. This will protect traffic where it is most vulnerable, the last mile between a user and a server.
- Know what your vulnerabilities are and use tools needed to combat them.
- Keep your devices up-to-date with latest software.
- Be cautious about opening or replying to emails from unknown senders.
Send only to opt in number - do not use purchased number
Not too early in the morning and not too late at night. Think about when users would want to accept a phone call. A text message has a similar alert method and people typically don't want to be bothered at those times.
Always keep local time zones in mind. Send messaging out at the times most impactful to those in each local market. Particularly effective for TV /radio shows, retail sales, and time sensitive offers.
The bigger the news, the more lenient you can be with messaging outside of "mobile business hours."
Reminders should be sent at least 24 hours before the appointment and contain all necessary information.
Daily/monthly reminders on any subject are popular in this increasingly busy world. Send at the time that best fits your goals: horoscopes in the morning and high school football score alerts on Friday evening.
Trying to drive people into your establishment during lunch hours? Send messages at 11 :30 AM local time to catch those who are making lunch plans. Include a coupon for higher redemption rates
Thursdays are popular dates to send text messages with strong response rates and Fridays between 2-5 PM have shown great success for driving retail traffic on Saturday mornings.
Send reminders to increase RSVPs and attendance. Include specific event information to assist attendees with planning and logistics.
Send holiday messages of with valuable content up to a week before the event to allow customers time to plan (upcoming sales, in-store events etc.)
Top 5 security best practices defined
Securing sensitive and personally identifiable information now a priority
World Class Best Practices Policies for securing sensitive and personally identifable information
CIO now are focusing on Securing customer's and employees' personally identifiable information (PII) and sensitive personal information (SPI). To ensure the security of customer information, Janco has recently updated it IT Infrastructure Policy bundle to focus on this.
Managing the activities of end-users with today's tech-savvy workforce is a huge challenge. The temptation is always there for employees to abuse social networking sites, instant-messaging, telecommuting privileges and install personal software on company equipment. Lost productivity, slow service, viruses and worse are inevitable unless you are able to develop and enforce clear IT policies throughout your company.- more info
Historic unemployment rates in IT job market
IT job market prospects are tied to the US national employment data
Posts on the unemployment rate in the IT Job market:- more info
How to stay secure when you are traveling
Protect your data from lost and theft - Best Practices for International Travel
Man-in-the-middle attacks easy to pull off. At public Wi-Fi locations, the airwaves are open and any attacker with a simple antenna can mount an attack.
To improve overall online security:
Best Practices for Text Messaging Marketing
BEST PRACTICES for Text Messaging Marketing defined
- more info
CIOs role expands as hackers steal more data
CIOs role expands as hackers steal more data
After several high-profile hacks last few months, CIOs in all industries still find themselves learning about the hackers aggressively hunting customer's personally identifiable information (PII) data, financial records and medical histories.
In the Healthcare and Insurance industry alone over 100 million health records were illegally accessed last year. As a result, the National Association of Insurance Commissioners Cybersecurity Task Force has proposed a new Insurance Data Security Model Law.
Because insurance is a data-driven industry, regulators must understand what data is being collected and for what purpose the NAIC said. Today, regulators and companies have a need for data beyond what has been traditionally collected. But what regulators need is greater insight, not just more data.
All information is valuable. Hackers want whatever data they can monetize. CIO already know that breaches can happen to anybody. There is no such thing as 100% security, no matter the education or tech you throw at it. It is just a question of how we handle it, when it happens.
Currently, anti-malware and encryption stand as two big ways CIOs protect information. Nonetheless, protecting data going forward may be directly tied to CIOs ability to adapt to the changing roles of the position.
The role of CIO is very business driven now. There are so many avenues for hackers to come in that you cant just focus on tech. CIOs need to understand the entire business and be able to talk to the CEO and the board as well.more info
Mobility policies and procedures are the focus of many CIOs
Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs around the world. . .
A major challenge for CIOs and C-Level executives is how to respond to major technology shifts in a way that both benefits and protects the business. One of the major shifts in recent years has come from the demands of people to use thier own mobile devices (BYOD and WYOD) and cloud-based apps and services.
As mobile working becomes the new normal, it's essential that businesses manage their mobile devices and mobile applications effectively. Employees are more demanding than ever, expecting on-the-go access to their core data and applications across a range of devices.more info
78.5% of H-1Bs are for IT jobs
IT Pros with H-1B visas are paid less than US Nationals
78.5% of all the H-1B visas were issued for IT Jobs. The median compensation for those IT jobs was $85,601. In Janco's January 2017 IT Salary Survey the median compensation for all IT professionals was $87,072. When comparing the data from IT Salary Survey it is clear that many H-1B visas are used to reduce costs.
- more info