Newsfeed for blog.e-janco.com

The blog is managed by Janco and does accept articles from others that relate directly to the management of the IT function.

Topics covered on the blog tend to be shorter than the articles section of our site.

If you wish to subscribe to this news feed click on CTO RSS Newsfeed Blog Feed


Top 10 BYOD Security Best Practices

June 22nd, 2019

Top 10 BYOD Security Best Practices Implemented  by “World Class” CIOs Top 10 BYOD Security Best Practices have been implemented by almost all “World Class” CIOs and CTOs.  The importance of these is only magnified by the implementation of Blockchain and DLT applications. The Best Practices are: Implement a formal written BYOD policy Set up […]

The post Top 10 BYOD Security Best Practices appeared first on Janco Associates, Inc..

- Top 10 BYOD Security Best Practices


Employment Still Strong — But

June 21st, 2019

Employment Still Strong — But it may be slowing Employment Still Strong — But not as strong as earlier.  In the past month one state dropped out of full employment status – Ohio.  Full employment as defined by Janco Associates is 4.0% or less. In addition to this, there still are only two states with […]

The post Employment Still Strong — But appeared first on Janco Associates, Inc..

- Employment Still Strong — But


Blockchain DLT career path

June 13th, 2019

Blockchain DLT career path included as a job family Blockchain DLT career path has been added to the IT Job Family Classification System.  Not only is it included as an individual job family, it is also linked to all of the other IT job families in that offering.  Having clearly defined job paths a the […]

The post Blockchain DLT career path appeared first on Janco Associates, Inc..

- Blockchain DLT career path


Cloud Security Vulnerabilities

June 12th, 2019

Top 10 Cloud Security Vulnerabilities Top 10 Cloud Security Vulnerabilities have been identified and ranks by level of importance and impact by a panel of 57  CIOs, CTOs, and CSOs. The top 10 are: Data breaches Weak Security Non-Secure Interfaces & API OS vulnerabilities Account hijacking Insider breach as System Administrator Parasitic code on server […]

The post Cloud Security Vulnerabilities appeared first on Janco Associates, Inc..

- Cloud Security Vulnerabilities


Right time to hire IT Pros

June 11th, 2019

Right time to hire IT Pros – Almost 100K new jobs to be created this year The right time to hire IT Pros is now before the labor maket gets tighter. In the first five (5) months of 2019, 34,600 new IT jobs were created.  Almost 70,000 more new  jobs will be added in the […]

The post Right time to hire IT Pros appeared first on Janco Associates, Inc..

- Right time to hire IT Pros

These posts are controlled by Janco Associates, Inc.'s CIO and prior to submission are reviewed by our executive management team. There never are any posts which are not directly related to the mission of the firm.

The firm's mission is to be a source of tools which IT Professionals and Human Resource Professionals can utilize. We never post any negative comments about individuals or organization. It is not forum for political statements or violations of individual or corporate privacy. If you ever see any such post for these tweets, please notify us immediately as we will take immediate steps to correct the situations.

All of the approved items posted are in compliance with our corporate policy. All of our employees have read and signed statements on file which say they understand this policy. In our firm violation of these policies are grounds for immediate termination.