Best Practices for Chief Information Officer - CIO
The Best Practices news feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.
If you wish to subscribe to this news feed the option that you have is:
Information Technology Governance model defined
Implement Proven IT Governance Model for Success
An IT Governance model is the basis for instituting and sustaining information security governance. The process requires comprehensive planning and organizing; robust acquisitions and implementations; effective delivery and support. In addition the as well as continuous monitoring and evaluation to address the myriad of managerial, operational, and technical issues that can thwart satisfying an enterprise's declared mission. Consequently, information security governance requires an adaptive balance between management and applied technology. Management enables assuring adequate asset safeguarding while applied technology can introduce efficiencies for addressing potential external or internal threats. The IT Governance model defines key areas including, responsibilities, data protection management, alternative governance frameworks, organizational structure considerations, governance effectiveness measurement, and much more.Information Technology Governance model defined
IT Job Families Define Structure of IT Teams
Job Classification system is a basis for creating IT Team Structure
A modern IT structure includes team members who are representative of customers or the people engaging customers. For example, a consumer banking IT team should include a teller or bank manager, she contends, and a retail enterprise should enlist a store manager as part of an IT delivery team. Being a business leader means understanding the customer, and you cant do that if all youre doing is wearing an IT hat. You have to create a team that includes some unconventional players.IT Job Families Define Structure of IT Teams
Password Managers provide false sense of security
Most password managers are insecure eventhough they are comprehensive, detailed, and customizable
The most popular password managers for Windows 10 can actually leak your login credentials to the PC's memory. A hacker could potentially snatch up the sensitive data when the password manager turns on.
The research examined the security of four products including 1Password, Dashlane, KeePass, and LastPassFree at LastPass. The company was surprised to find that the products didn't always encrypt and then delete password data in the PC's background processes. Even the master password, which can be used to unlock all your stored passwords, can be exposed.Password Managers provide false sense of security
Best Practices for Recruitng IT Pros
Best Practices for Recruiting IT Pros defined in the 2019 Release of the IT Hiring Toolkit
The IT Hiring Tool kit has just been released with 300 full reviewed and compliant job descriptions, the 2019 IT Salary survey, and the Interview and hiring guide with best practices for the initial candidate selection process, the interview and job offer process, and processes associated with employee orientation thru employee termination.Best Practices for Recruitng IT Pros
Company Fined $16M for data breach
$16M fine mandates Security Policies and Procedures - First Step in Data Breach Protection
The data breach that occured was a result of a cyber attack that enabled hackers to access the electronic protected health information of nearly 79 million individuals. A major HIPPA violation, The company, Anthem reported that the attackers gained access to data that included patient names, Social Security numbers, member identification numbers, addresses, dates of birth, email addresses and employment information.
- Company Fined $16M for data breach
CIO Job Description has just been updated
Chief Information Officer - Available for Immediate Download
The Chief Information Officer (CIO) is accountable for directing the information and data integrity of the enterprise and its groups and for all Information Technology functions of the enterprise. This includes all data centers, technical service centers, production scheduling functions, help desks, communication networks (voice and data), computer program development, mobile device interactions, and computer systems operations. He or she is responsible for maintaining the integrity of all electronic and optical books and records of the enterprise.CIO Job Description has just been updated
Disaster Recovery Business Continuity Questions to ask
The Standard for Disaster Planning and Continuity Planning
- What kinds of threats do we face? Terrorism? Hurricanes? Ransomware?
- How likely are they to strike our organization, and where?
- How secure are our facilities?
- How redundant is our connectivity and power?
- What kind of impact would any resulting disruption have on our business?
- Which systems and apps are most critical to our business?
- Are systems and apps on premises or elsewhere?
- How are they architected (distributed, centralized, cloud, hybrid, Windows, Linux, etc.)?
- How much would downtime cost us? Per minute, hour, day, week?
- Disaster Recovery Business Continuity Questions to ask
iPhone X defects
iPhone X at $1,000 plus has major defects
iPhone X cost over $1,000 has defects. Many users report incoming call delayed and accept and decline does not work. Delays of up to 10 seconds reported - enough time for caller to abandon call. This makes the offering not as good as it could be as a mobility asset
Many users are not happy as this problem has been around since November of last year.iPhone X defects