Latest news of interest from Janco's news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

Janco RSS Newsfeed  Janco


Security Manual Designed to Manage Risk

Security Manual Makes Risk and Compliance Management Easy

Risk Management made easyAs the threat landscape continues to evolve, organizations must abandon traditional defensive postures for proactive strategies designed to mitigate risks and help them quickly recover.

The Security Manual documents Janco's research and perspectives from industry leaders on recent threat trends, risk mitigation strategies, and lessons learned from those in the security trenches.

Read on...

Order Security Policies and ProceduresDownload TOC security policies

- Security Manual Designed to Manage Risk


Universities Work Together On Payment System

Universities Work Together On Payment System - Shades of Internet Development 

Universities Work Together On Payment System just like they did when the Internet was developed by them in the late 1960's with ARPAnet.

Several universities, including MIT and Stanford, are working together to develop a digital currency network that solves blockchain's scalability and performance problems before public confidence in the technology erodes.

Funded by a Swiss-based non-profit organization, the cryptocurrency application, called Unit-e, and its blockchain-based payment system is expected to launch in the second half of this year; if successful, it would surpass even mainstream financial networks like Visa's VisaNet in transactional capability.

Security Manual TemplateOrder Security ManualDownload Selected Security Manual  Pages

- Universities Work Together On Payment System


2019 Version of 300 IT Job Descriptions Released

Internet and Information Technology Positions Description HandiGuide with 300 Full Job Descriptions Released

The Internet and IT Position Descriptions HandiGuide was just updated and is over 800 pages.  The Internet and IT Position Descriptions HandiGuide is a complete HR Toolkit.  It includes sample organization charts, a job progression matrix, and 300 Internet and IT job descriptions.

The 2019 version of this tool is availabe for immediate purchase and download.  It is delivered electronically. This along with the 2019 IT Salary Survey are key elements of the IT Hiring Kit.

IT Hiring KitOrder IT Hiring Kit

IT Job DescriptionIT Salary SurveyInterview & Hiring Guide

- 2019 Version of 300 IT Job Descriptions Released


CIOs will be critical to the new enterprise model

Chief Information Officer - An Ever Expanding Set of Responsibilities

CIO Job DescriptionCIOs are waging a three-front battle: addressing aging systems and long-standing data issues; driving a business strategy that harnesses the value of a wide range of new, powerful technologies; and maximizing the value and security of today’s environment. In 2019, more CEOs will demand that one executive - the CIO - will lead and orchestrate this vital effort; CIOs will spend the time to build their leadership teams, empowering trusted operators to handle much of the day-today.

In 2019 leading CIOs will build a technology infrastructure that translates tech-led innovation into customer value.

- CIOs will be critical to the new enterprise model


Employees are an orgaizations last layer of security

Fortifing your organization’s last layer of security – your employees

Security Management Tool KitPeople impact security outcomes, much more often than any technology, policy or process. Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. When it comes to combating these growing risks, most organizations continue to place more trust in technology-based solutions than on training their employees to be more aware of the threat landscape and able to recognize the red flags in cyber breach attempts.

To fortify your organization's last layer of security - your employees - get the Security Manual Template to implement complete solutions.

Order Security Policies and ProceduresDownload TOC security policies

 

- Employees are an orgaizations last layer of security