Newsfeed for blog.e-janco.com
The blog is managed by Janco and does accept articles from others that relate directly to the management of the IT function.
Topics covered on the blog tend to be shorter than the articles section of our site.
If you wish to subscribe to this news feed click on Blog Feed
FBI warns business about cyberattacks
February 11th, 2020 Tools that the CIO, CSO, CTO, and CFO can use for Infrastructure, Disaster Recovery, Security, Job Descriptions, ITSM, Salary, Change Control, and Help Desk.
FBI warns that security policies and procedures need to be in place
Hackers are attempting to infect companies with the Kwampirs malware, a remote access trojan (RAT). As a result, the FBI has sent a security alert to the US private sector about an ongoing hacking campaign that's targeting supply chain software providers.
They said in press release that software supply chain companies are believed to be targeted in order to gain access to thier strategic partners and/or customers. This includes entities supporting Industrial Control Systems (ICS) for global energy generation, transmission, and distribution.FBI warns business about cyberattacks
Top 10 full employment states
February 5th, 2020
Top 10 States with Full Employment Status
Top 10 full employment states December 2019 - Full employment states are those with an unemployment rate 4% or less. There are ten states that have unemployment rates that are 2.7% or less. These are states that so fully employed that almost anyone can get a job there.
Full employment makes it harder to find people who have the qualifications needed to full High Tech positions. The states and their unemployment rates are:
Top 10 full employment states
- Vermont 2.3%
- Utah 2.3%
- South Carolina 2.3%
- North Dakota 2.4%
- Colorado 2.5%
- Virginia 2.6%
- New Hampshire 2.5%
- Hawaii 2.6%
- Iowa 2.7%
- Alabama 2.7%
2020 IT Salary Survey Released
January 7th, 2020
Mean Compensation for all IT Pros is up 4.9% since January of last year - Executive Management faired the best
IT Salaries are on the rise. As the general economy improves more companies are investing in information technology. The emphasis over the past several years is in both e-commerce and mobile computing. At the same time with the ever-increasing cyber attacks and data breaches, CIO are looking to harden their sites and lock down data access so that they can protect all of their electronic assets.2020 IT Salary Survey Released
Millennials are taking over the IT Pro job market
December 5th, 2019
As economy continues to expand tenure of CIOs is impacted and median age of IT professionals goes down
Based on BLS data, Gen Y and X (Millenials) make up over 47% of the total labor force, Gen Xers are 37%, and Babyboomers have shrunk to only 16% of the total labor force.
- Millennials are taking over the IT Pro job market
Security Manual Designed to Manage Risk
October 28th, 2019
Security Manual Makes Risk and Compliance Management Easy
As the threat landscape continues to evolve, organizations must abandon traditional defensive postures for proactive strategies designed to mitigate risks and help them quickly recover.
The Security Manual documents Janco's research and perspectives from industry leaders on recent threat trends, risk mitigation strategies, and lessons learned from those in the security trenches.
The IT Security Manual Template provides CIOs, CSOs, and IT Managers all of the essential materials with real live use-able text for a complete security manual. Detailed language addressing more than a dozen security topics.
- Security Manual Designed to Manage Risk
These posts are controlled by Janco Associates, Inc.'s CIO and prior to submission are reviewed by our executive management team. There never are any posts which are not directly related to the mission of the firm.
The firm's mission is to be a source of tools which IT Professionals and Human Resource Professionals can utilize. We never post any negative comments about individuals or organization. It is not forum for political statements or violations of individual or corporate privacy. If you ever see any such post for these tweets, please notify us immediately as we will take immediate steps to correct the situations.
All of the approved items posted are in compliance with our corporate policy. All of our employees have read and signed statements on file which say they understand this policy. In our firm violation of these policies are grounds for immediate termination.