IT Management Knowledge Base
CIO and IT Management Planning Tools
It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.
- News Feed
- Make sure your home network is secure - make it password-protect your router
- Use a separate device or account for work. It's best to keep personal and professional devices and accounts separate.
- Encrypt sensitive files in transit and in storage.
- Stay informed on cybersecurity and social engineering trends- scammers will try to pose as your colleagues or managers to try to get you to give up sensitive company information.
- Avoid public Wi-Fi, which is far more likely to have malicious actors connected to it or running it, as is the case with a hotspot.
Ransom of data and systems on the rise
DRP Made Simple
Securfity Policy and Procedure Manual Make Compliance Management Easier
8.7% of the more than 1,000 ransomware cases reviewed involved attackers stealing data from an organization and threatening to release it publicly unless victims paid the ransom demand. In addition, every attacker now typically demands a ransom payment only in bitcoins.
Security and compliance are key to maintaining control of sensitive and confidential information.
Read on Order Security Manual Template Download sample
- Ransom of data and systems on the rise
Stay secure when working remotely
Mobility Policy Bundle address the top 5 security issues for mobile users
The top 5 security best practices that mobile users should follow are:
Read On... Order Mobility Bundle Download Table of Contents
- Stay secure when working remotely
Ransomware cost more that $1Billion in the last 12 months
Impact of Ransomware
Ransomware is a malicious software that allows a hacker to restrict access to vital information and then demands some form of payment to lift the restriction. Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. The FBI projects ransomware attacks to yield more than $1B in the last 12 months.
An organization's success in defending against a ransomware attack is largely dependent on the level of preparation and the tools deployed to monitor ystems to detect, respond to and neutralize suspicious activity.
Read on Order Security Manual Template Download sample
- Ransomware cost more that $1Billion in the last 12 months
Computer Security Salary Data
Computer Security Salary Data
Along with the security job descriptions, Janco has identified a number of standard IT Job Families that can be used for career planning and settin compensation levels. One of these is the Information Security Job Family.
Along with semi-annual Salary Survey, Janco produces a number a job family salary ranking. One that was included in the 2020 IT Salary Survey was that of Information Security Job Family.
Order Salary Survey Download Sample
#computersecurity #janco #itmanagercio
- Computer Security Salary Data
Goverment Actors Generate Malware
Security Policies may not be enough
Goverment Actors Generate Malware. A number of security professionals have identified a strain of destructive data-wiping malware that was developed by Iranian state-sponsored hackers and deployed in cyber-attacks against energy companies active in the Middle East.
They are not the only company creating such malware. Russia and China are both active in that field.
Read on Order Security Manual Template Download sample
- Goverment Actors Generate Malware