IT Productivity Center News and Information

Metrics, Productivity, Salary Survey, Job Descriptions, Business Continuity, ITSM, SOA, White Papers, Compliance, SOX, and HIPAA

The IT Productivity Center feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

Janco RSS Newsfeed IT Productivity Center News


Ransomware protection is not inexpensive

Tools for CIO, CSO, and CFO can use for Sarbanes Oxley, Disaster Recovery, Security, Job Descriptions, IT Service Management, Change Control, Help Desk, Service Requests, SLAs, and Metrics.

Janco's Security Manual Template includes best practices for security including ransomware guidelines

Ransomware protection best practicesThere is no guarantee that an approach that works for one enerprise will also work for another.  But here are five fundamental steps your company can take to curb its chances of its falling victim to a ransomware attack:

  1. Adopt prevention programs. Prevention training and awareness programs can help employees recognize telltale signs of phishing scams and how to handle them. Guide your employees on how to recognize and avoid fraudulent e-mails or what to do in the event of a social engineering attack. Keep testing internally to prove the training is working.
  2. Strengthen e-mail controls. Strengthening e-mail controls can often prevent malicious e-mails from reaching employees. Make sure you have strong spam filters and authentication. Scan incoming and outgoing e-mails to detect threats and filter executable files. Consider a cloud-based e-mail analytics solution and how e-mail is configured and file extensions are displayed.
  3. Improve CMDB. Companies need to be very diligent about building a complete configuration management data base (CMDB).  It may be surprising, but most companies do not know all the IT systems in their environment across all subsidiaries and business lines.  If you don't know what you have, how can you protect it?
  4. Insulate your infrastructure: There are a host of solutions here, from removing or limiting local workstation administration rights to seeking out the right configuration combinations (including virus scanners, firewalls, and so on).  Regular patches of operating systems and applications can foil known vulnerabilities: Microsoft patches related to this particular threat was one kind of measure that Accenture used as part of our normal patching cycle.
  5. Plan for continuity. Have a strong business continuity plan for recovery - one that's regularly reviewed, updated, and tested - makes it easier to avoid paying ransom. Recovery objectives must be aligned to the critical tasks within an acceptable timeframe. Workstations and file servers shouldnÂ’t be constantly connected to backup devices. Further, the backup solution should store periodic snapshots rather than regular overwrites of previous backups, so that in the event of a successful attack, backups will not be encrypted.

Read on Order Security Manual Template Download sample

- Ransomware protection is not inexpensive


Companies now depeding on selected cloud providers

How to Guide for Cloud Processing and Outsourcing provides everything that is needed to select a vendor, enter into an agreement, and manage the relationship

Cloud Processing on the riseMany businesses are doing more in the cloud these days. It has some good and bad points, like being locked into various vendors has they have done in the past. It is important for business leaders to actually learn rather than just keep moving on to the new thing.

Read on  Order Cloud Outsourcing How To

- Companies now depeding on selected cloud providers


Re-opeing after the shutdown top 10 IT HR issues

Top 10 things CIOs and IT Managers need to consider as the shutdown

IT HR issues associated with reopening after the shutdownCIO and IT Managers need to

  1. Learn from up-to-the-moment issues and concerns which are affecting the workplace during crisis
  2. Have a strategy in place to address safety and health concerns
  3. Address implications of hiring new employees versus bringing back original employees
  4. Understand the impact of crisis on workforces and how to proactively manage a reduction process
  5. Work through the precautions employers and managers can take to mitigate employee stress and avoid potential legal action due to poorly executed workforce reduction
  6. Learn how to effectively and clearly communicate the issues surrounding the crisis with employees through company-wide communication channels and trained managers
  7. Discover how to avoid the risks of miscommunication, hasty decisions made from ambiguity, and the spread of fear
  8. How to manage both exempt and non-exempt employees when reducing the workforce
  9. Define a consistent recall and rehire process and strategy for the future to ensure clear communication and expectation
  10. Have predefined answeres for specific questions regarding reducing your workforce

Read on IT Hiring Kit Order IT Hiring Kit

- Re-opeing after the shutdown top 10 IT HR issues


Mobile IT Pros are positioned well in IT Labor Market

Mobile IT Pros are at the right place in pandemic times

Telecommuting IT ProsJanco reported on  the U.S. Department of Labor data. Nearly 3.3 million initial unemployment claims were filed in the last full week of March 2020. That smashed previous records of 665,000 in March 2009 and the all-time mark of 695,000 in October 1982.

How is that impacting tech sector employment?

The CEO of Janco Associates, Victor Janulaitis, Janco Associates, says any IT pro who already is working remotely is probably in a much safer position and more protected from a layoff. On the reverse side, IT pros working on legacy systems at companies that have not moved toward mobile computing for enterprise operations are at the greatest risk for losing thier jobs.

 IT Job Market Order Salary Survey Sample Survey 

- Mobile IT Pros are positioned well in IT Labor Market


Top 10 Technologies 2019

Top 10 Technology Trends according to Janco

Janco has identified 10 technologies with the potential to make the greatest impact on business operations, customer interactions, and can create business opportunities. Staffing will be the constraining factor.

They are:

  1. 5G Wireless
  2. 3D Printing
  3. IoT
  4. AI
  5. VR
  6. Drone based applications
  7. Biometrics
  8. Blockchain
  9. Quantum Computing

Read On Order Policies Download Selected Pages

 

- Top 10 Technologies 2019