CTO - CIO Management Articles

Security, Disaster Planning, ITSM, Metrics, and Salary Survey

Chief Technology Officer Job DescriptionThe CTO Toolkits News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

Read on Chief Technology Officer Job DescriptionOrder CTO Job Description

The XML newsfeed is:

Data transparancy and compliance an issue for many CIOs

Security and Compliance are ever greater issue

data transparancyData transparancy and compliance an issue for many CIOs. A survey of over 200 companies in more than 122 countries, found only 51 percent of businesses had accurate inventories of where their data was getting stored.  Also how it was collected and transmitted, regardless of whether the information related to customers or employees. That means most of them fell short with sufficient data transparency.

How do you comply with security and privacy mandates if you do not know where you data is located?

Order Server Security Policy Server Security Policy sample
- Data transparancy and compliance an issue for many CIOs

XML is not displayed with Chrome like IE or Firefox

XML is not displayed with Chrome like IE or Firefox

For whatever reason, Chrome does not have an automatic way to disply XML and RSS file.  They also make it hard to find the extension to do that.  There is one that we found that works - RSS Subscription Extension (by Open Source).  With that extension you can see the rss and xml format in a way that a person can read it.

IT Infrastructure Policies and Procedures - One of the best ways to communicate and understand a company and its operating culture is through its policies. Designing and writing policy and communicating it effectively is an essential skill for professionals to have. By having policy carefully developed and communicated, employees will clearly know what the organization expects from them, the degree of control and independence they will have, and what the benefits and consequences are in regard to adhering to policy.

Order IT Infrastructure PoliciesDownload Selected Pages



- XML is not displayed with Chrome like IE or Firefox

CTO Job Description

CTO - Chief Technology Officer Job Description

CTO Job DescriptionThe Chief Technology Officer (CTO) is responsible for overall direction of all technology functions with the enterprise.  This includes Information Technology applications, communications (voice, data, and wireless), and computing services within the enterprise that impact both the enterprise, its products, and its customers. 

Read on Chief Technology Officer Job Description
Order CTO Job Description


- CTO Job Description

Windows systems more likely to be hacked than Andriod

Patch management and change control polices and procedures are the nemesis of IT executives around the world

Patch Management and Version ControlThe first important step in a patch management operation is to know when there is a need for a patch to be made. A patch management policy should have a section detailing what must be done to ensure the security personnel know what to do in this situation.

In the latest round of hacking, systems hacked were still running on Windows XP. Microsoft stopped supporting Windows XP with updates in early 2014, leaving many vulnerable to the last three years of new malware.

Google follows a different philosophy with its old operating systems. Since 2015, Android users going all the way back to version 4.4 receive monthly security updates, covering more than 735 million devices.

So while a person using a Samsung Galaxy Note S3 might not get the latest features like Google Assistant, they're still protected from security flaws through Google's support.

It's why when WikiLeaks claimed it released the CIA's Android exploits, Google came out and said it had already patched the vulnerabilities. Companies like Samsung and BlackBerry also offer their own regular security updates.

Order Patch Management PolicyDownload Version control Selected Pages

- Windows systems more likely to be hacked than Andriod

Telecommuters Internet Misuse Costly

Telecommuters Internet misuse is costly to enterprises

Internet misuse can have serious implications for enterprises:

  • Reduced productivity. If employees spend their time on a social networking sites such as Facebook, they’re not spending it doing their job.
  • Security problems. Malware hides on websites and can install itself as users browse infected pages.
  • Legal risks. When users download inappropriate material to their computers other employees may take serious offense which in turn can create legal liabilities for managers.
  • Wasted bandwidth. Internet connections cost money. If half your bandwidth is taken up with non-work relatd web traffic, you could potentially be paying significaltly more for business-critical communications and/or could be running at degregated speeds.
  • Unlicensed software. When users download and install software from the internet, they create a legal risk. Software piracy is illegal. If an organization uses illegal copies of software, it may face a civil suit and company directors risk criminal penalties.
  • Reputation risk. Social networking can create opportunities for employees to leak confidential information or spread damaging rumors online. Bad behavior by a single employee can reflect on the reputation of the whole organization.

Order Telecommuting PolicyDownload Selected Pages

- Telecommuters Internet Misuse Costly