IT Management Knowledge Base
CIO and IT Management Planning Tools
It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.
- News Feed
- With the move towards more mobile and office site computing users are challenged to keep their BYOD device safe and secure
- Purchase Android devices only from suppliers who release Android patches quickly.
- Implement the locking feature on all mobile devices
- Utilize applications on the device from the vendor (Apple or Google) application store
- When possible utilize two-factor authentication or bio metrics
- Use device encryption
- Connect to Wi-Fi via a Virtual Private Network (VPN)
- Utilize a Password management system
- Utilize anti-virus software
- Turn off un-used features like connections that are not used. If you don't use an application, uninstall it.
- Educate users on current threats in the digital landscape, including phishing campaigns, malware and malicious websites;
- Implement layered security - adopting a layered security approach is the best way to ensure your business is covered from all angles.
- Shield your systems from as many vulnerabilities to your network as possible is essential to staying ahead of hackers.
- Stay current wth software and firmware updates; these often contain security patches for vulnerabilities. The longer you go without updating your software, the more susceptible your network is to malware.
- Upgrade software and OS before end of life. While it may seem expensive, it can save you from lost productivity, costly fines and lawsuits on the backend.
- Browse secured sites only.
- Use a VPN. This will protect traffic where it is most vulnerable, the last mile between a user and a server.
- Know what your vulnerabilities are and use tools needed to combat them.
- Keep your devices up-to-date with latest software.
- Be cautious about opening or replying to emails from unknown senders.
Send only to opt in number - do not use purchased number
Not too early in the morning and not too late at night. Think about when users would want to accept a phone call. A text message has a similar alert method and people typically don't want to be bothered at those times.
Always keep local time zones in mind. Send messaging out at the times most impactful to those in each local market. Particularly effective for TV /radio shows, retail sales, and time sensitive offers.
The bigger the news, the more lenient you can be with messaging outside of "mobile business hours."
Reminders should be sent at least 24 hours before the appointment and contain all necessary information.
Daily/monthly reminders on any subject are popular in this increasingly busy world. Send at the time that best fits your goals: horoscopes in the morning and high school football score alerts on Friday evening.
Trying to drive people into your establishment during lunch hours? Send messages at 11 :30 AM local time to catch those who are making lunch plans. Include a coupon for higher redemption rates
Thursdays are popular dates to send text messages with strong response rates and Fridays between 2-5 PM have shown great success for driving retail traffic on Saturday mornings.
Send reminders to increase RSVPs and attendance. Include specific event information to assist attendees with planning and logistics.
Send holiday messages of with valuable content up to a week before the event to allow customers time to plan (upcoming sales, in-store events etc.)
Top 10 Mobile Security Best Practices
Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs around the world
Top 10 Mobile Device Security Best practices
Security is more than technology
Security Takes Skills Beyond Technology
Trust is the most important element in your client relationships, and effective data and network security require you to build a security chain of trust that links together every step - from the origin of a data transmission to the destination and back.
The security chain starts at the endpoint client device, travels from the edge across the network to its core - where your firewall, intrusion detection and prevention systems, and anti-malware await - and then ends with servers and storage.more info
Top 5 security best practices defined
Securing sensitive and personally identifiable information now a priority
World Class Best Practices Policies for securing sensitive and personally identifable information
CIO now are focusing on Securing customer's and employees' personally identifiable information (PII) and sensitive personal information (SPI). To ensure the security of customer information, Janco has recently updated it IT Infrastructure Policy bundle to focus on this.
Managing the activities of end-users with today's tech-savvy workforce is a huge challenge. The temptation is always there for employees to abuse social networking sites, instant-messaging, telecommuting privileges and install personal software on company equipment. Lost productivity, slow service, viruses and worse are inevitable unless you are able to develop and enforce clear IT policies throughout your company.- more info
Historic unemployment rates in IT job market
IT job market prospects are tied to the US national employment data
Posts on the unemployment rate in the IT Job market:- more info
How to stay secure when you are traveling
Protect your data from lost and theft - Best Practices for International Travel
Man-in-the-middle attacks easy to pull off. At public Wi-Fi locations, the airwaves are open and any attacker with a simple antenna can mount an attack.
To improve overall online security:
Best Practices for Text Messaging Marketing
BEST PRACTICES for Text Messaging Marketing defined
- more info
CIOs role expands as hackers steal more data
CIOs role expands as hackers steal more data
After several high-profile hacks last few months, CIOs in all industries still find themselves learning about the hackers aggressively hunting customer's personally identifiable information (PII) data, financial records and medical histories.
In the Healthcare and Insurance industry alone over 100 million health records were illegally accessed last year. As a result, the National Association of Insurance Commissioners Cybersecurity Task Force has proposed a new Insurance Data Security Model Law.
Because insurance is a data-driven industry, regulators must understand what data is being collected and for what purpose the NAIC said. Today, regulators and companies have a need for data beyond what has been traditionally collected. But what regulators need is greater insight, not just more data.
All information is valuable. Hackers want whatever data they can monetize. CIO already know that breaches can happen to anybody. There is no such thing as 100% security, no matter the education or tech you throw at it. It is just a question of how we handle it, when it happens.
Currently, anti-malware and encryption stand as two big ways CIOs protect information. Nonetheless, protecting data going forward may be directly tied to CIOs ability to adapt to the changing roles of the position.
The role of CIO is very business driven now. There are so many avenues for hackers to come in that you cant just focus on tech. CIOs need to understand the entire business and be able to talk to the CEO and the board as well.more info