IT Management Knowledge Base

CIO and IT Management Planning Tools

It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.

  • News Feed

  • Quick Response Key to Security Management

    DRP Made Simple

    Security Policies - Have quick response to fix security issues

    Quick Response Key to SecurityHow Apple addressed a serious security issue with FaceTime that allowed people to listen in, or even view video, from a recipient's iPhone without that person ever answering the FaceTime call.

    Almost immediately, Apple has disabled Group FaceTime capability on the server side so that people are no longer able to exploit this flaw until a software update can be issued. It only took a few hours since the first reports of this issue were discovered for Apple to take action so kudos to them for such a quick response.

    Read on Order Security Manual Template Download sample

    - Quick Response Key to Security Management

    Microsoft takes over more control of user's PCs

    Patch Management now under more control of Microsoft

    Patch mangement and version controlUsers of Windows 10 Home have been allowed to pause feature upgrades up to 35 days since April 2019, when Microsoft made radical changes to upgrade timing control.  That has been eliminated for unmanaged PCs running Windows 10 Pro, Enterprise and Education, according to recently revised documentation.

    The company said it made the change in Windows 10 May 2020 Update, aka 2004, "to prevent confusion" on the part of customers.

    In versions prior to 2004, users were able to access deferral settings via the graphical user interface (GUI) within Settings  options. Microsoft Pro, Enterprise and Education users could manually defer feature upgrades – the two issued each year in spring and fall – by as many as 365 days. What Microsoft called "quality updates," another name for the monthly Patch Tuesday security updates, could be postponed by up to 30 days.

    Order Patch Management Policy  Download Selected Pages 


    - Microsoft takes over more control of user's PCs

    Digital Transformation key CIO Priority

    Cloud Processing is the solution of choice for Digital Transformation Process

    Digital Transformation Top CIO priorityCompanies are going through a digital transformation because of Covid-19 and related shutdowns. The focus CIOs and CTOs to utilize technology to:

    • Drive increased business and top-line revenue growth
    • Support Work From Home (WFH) staff
    • Improve customer experience and satisfaction
    • Improve operational efficiencies
    • Support save separation for employees, suppliers, and customers

    Read on  Order CIO Management Kit

    - Digital Transformation key CIO Priority

    Ransom of data and systems on the rise

    Securfity Policy and Procedure Manual Make Compliance Management Easier

    Security Manual Policies and Procedures8.7% of the more than 1,000 ransomware cases reviewed involved attackers stealing data from an organization and threatening to release it publicly unless victims paid the ransom demand. In addition, every attacker now typically demands a ransom payment only in bitcoins.

    Security and compliance are key to maintaining control of sensitive and confidential information.

    Read on Order Security Manual Template Download sample

    - Ransom of data and systems on the rise

    Stay secure when working remotely

    Mobile User PoliciesMobility Policy Bundle address the top 5 security issues for mobile users

    The top 5 security best practices that mobile users should follow are:

    1. Make sure your home network is secure - make it password-protect your router
    2. Use a separate device or account for work. It's best to keep personal and professional devices and accounts separate.
    3. Encrypt sensitive files in transit and in storage.
    4. Stay informed on cybersecurity and social engineering trends-  scammers will try to pose as your colleagues or managers to try to get you to give up sensitive company information.
    5. Avoid public Wi-Fi, which is far more likely to have malicious actors connected to it or running it, as is the case with a hotspot.

    Read On... Order Mobility Bundle Download Table of Contents

    - Stay secure when working remotely