IT Management Knowledge Base

CIO and IT Management Planning Tools

It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.

  • News Feed

  • Microsoft takes over more control of user's PCs

    DRP Made Simple

    Patch Management now under more control of Microsoft

    Patch mangement and version controlUsers of Windows 10 Home have been allowed to pause feature upgrades up to 35 days since April 2019, when Microsoft made radical changes to upgrade timing control.  That has been eliminated for unmanaged PCs running Windows 10 Pro, Enterprise and Education, according to recently revised documentation.

    The company said it made the change in Windows 10 May 2020 Update, aka 2004, "to prevent confusion" on the part of customers.

    In versions prior to 2004, users were able to access deferral settings via the graphical user interface (GUI) within Settings  options. Microsoft Pro, Enterprise and Education users could manually defer feature upgrades – the two issued each year in spring and fall – by as many as 365 days. What Microsoft called "quality updates," another name for the monthly Patch Tuesday security updates, could be postponed by up to 30 days.

    Order Patch Management Policy  Download Selected Pages 

     

    - Microsoft takes over more control of user's PCs


    Digital Transformation key CIO Priority

    Cloud Processing is the solution of choice for Digital Transformation Process

    Digital Transformation Top CIO priorityCompanies are going through a digital transformation because of Covid-19 and related shutdowns. The focus CIOs and CTOs to utilize technology to:

    • Drive increased business and top-line revenue growth
    • Support Work From Home (WFH) staff
    • Improve customer experience and satisfaction
    • Improve operational efficiencies
    • Support save separation for employees, suppliers, and customers

    Read on  Order CIO Management Kit

    - Digital Transformation key CIO Priority


    Ransom of data and systems on the rise

    Securfity Policy and Procedure Manual Make Compliance Management Easier

    Security Manual Policies and Procedures8.7% of the more than 1,000 ransomware cases reviewed involved attackers stealing data from an organization and threatening to release it publicly unless victims paid the ransom demand. In addition, every attacker now typically demands a ransom payment only in bitcoins.

    Security and compliance are key to maintaining control of sensitive and confidential information.

    Read on Order Security Manual Template Download sample

    - Ransom of data and systems on the rise


    Stay secure when working remotely

    Mobile User PoliciesMobility Policy Bundle address the top 5 security issues for mobile users

    The top 5 security best practices that mobile users should follow are:

    1. Make sure your home network is secure - make it password-protect your router
    2. Use a separate device or account for work. It's best to keep personal and professional devices and accounts separate.
    3. Encrypt sensitive files in transit and in storage.
    4. Stay informed on cybersecurity and social engineering trends-  scammers will try to pose as your colleagues or managers to try to get you to give up sensitive company information.
    5. Avoid public Wi-Fi, which is far more likely to have malicious actors connected to it or running it, as is the case with a hotspot.

    Read On... Order Mobility Bundle Download Table of Contents

    - Stay secure when working remotely


    Ransomware cost more that $1Billion in the last 12 months

    Impact of Ransomware

    Ransomware is a malicious software that allows a hacker to restrict access to vital information and then demands some form of payment to lift the restriction. Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. The FBI projects ransomware attacks to yield more than $1B in the last 12 months.

    An organization's success in defending against a ransomware attack is largely dependent on the level of preparation and the tools deployed to monitor ystems to detect, respond to and neutralize suspicious activity.

    Read on Order Security Manual Template Download sample

    - Ransomware cost more that $1Billion in the last 12 months