Latest news of interest from Janco's news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

Janco RSS Newsfeed  Janco


WalMart hires over 235,000 new employees in six weeks

Tools that the CIO, CSO, CTO, and CFO can use for Infrastructure, Disaster Recovery, Security, Job Descriptions, ITSM, Salary, Change Control, and Help Desk.

Not all IT Job Market News is Bad

Hiring to bring the economy back to normalThe job statistics are the worst that the US job market has ever seen. From mid-March through April, thousands of organizations laid off over 40 million American workers. But lost in that grim news was a one positive statistic. Walmart hired 235,000 people, an average of more than 5,000 people a day, to meet its dramatic demand for its goods and services.

Not many firms will need to hire the near equivalent of a small city's population in six. In Walmart case, the firm needed to rapidly fill in for those sick or staying home from the virus and new recruits for warehouses, distribution centers and stores. But experts say there is an important lesson here: at some point, the economic disruption caused by the COVID-19 pandemic will fade, and many companies may need to fill many jobs fast. To do that successfully, they say, will take a lot more than just hanging out a bunch of 'Help Wanted' signs.

Read on IT Hiring Kit  Order IT Hiring Kit

- WalMart hires over 235,000 new employees in six weeks


Work From Home (WFH) increases requiremets for Security Audits

Security Audit Program 2020 edition just released 

Security Audit ProgramQuestions such as the following are not uncommon with new emphsis on Work From Home (WFM):

  • How do you know who can access this folder with financial/customer/sensitive data in it?
  • Who authorized a user to have access permission to a file and how?
  • If a key file was deleted, how would you know it happened, or who did it?
  • Who were the last people to access a critical folder, and what did they do?
  • How do you make sure that the right people have access to your data?

Order Security Audit Program Download Selected Pages

- Work From Home (WFH) increases requiremets for Security Audits


Telecommuting puts small to mid-sized companies at risk

Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs

Telecommutions Policy BundleIt is one thing to say that workers will work remotely and access sensitive and confidential information via the internet.  It is quite another to be able to assure executive management that critically sensitive information is protected and compliance mandates are met.

The Mobility Policy bundle contains eight (8) policies:

  1. BYOD Access and Use Policy;
  2. Mobile Device Access and Use Policy;
  3. Privacy Compliance Policy;
  4. Record Management, Retention, and Disposition Policy;
  5. Social Networking Policy;
  6. Telecommuting Policy;
  7. Travel, Laptop, PDA and Off-Site Meeting Policy; and,
  8. Wearable Device Policy.  

All of these policies are supported by 28 electronic forms and 14 full job descriptions from Chief Mobility Officer and Chief Security Officer to the Record Management Coordinator.

Read On Order Mobility Policy Bundle Download Sample

- Telecommuting puts small to mid-sized companies at risk


FBI warns business about cyberattacks

FBI warns that security policies and procedures need to be in place

Security ManualThe FBI has sent a security alert to the US private sector about an ongoing hacking campaign that's targeting supply chain software providers.

Hackers are attempting to infect companies with the Kwampirs malware, a remote access trojan (RAT). As a result, the FBI has sent a security alert to the US private sector about an ongoing hacking campaign that's targeting supply chain software providers.

They said in press release  that software supply chain companies are believed to be targeted in order to gain access to thier strategic partners and/or customers.  This includes entities supporting Industrial Control Systems (ICS) for global energy generation, transmission, and distribution.

Read on Order Security Manual Template Download sample

- FBI warns business about cyberattacks


Top 10 full employment states

Top 10 States with Full Employment Status

Hiring Tool KitTop 10 full employment states December 2019 - Full employment states are those with an unemployment rate 4% or less.  There are ten states that have unemployment rates that are 2.7% or less. These are states that so fully employed that almost anyone can get a job there.

Full employment makes it harder to find people who have the qualifications needed to full High Tech positions.  The states and their unemployment rates are:

  1. Vermont 2.3%
  2. Utah 2.3%
  3. South Carolina 2.3%
  4. North Dakota 2.4%
  5. Colorado 2.5%
  6. Virginia 2.6%
  7. New Hampshire 2.5%
  8. Hawaii 2.6%
  9. Iowa 2.7%
  10. Alabama 2.7%

Order IT Hiring Kit Download IT Hiring Kit TOC

- Top 10 full employment states


2020 IT Salary Survey Released

Mean Compensation for all IT Pros is up 4.9% since January of last year - Executive Management faired the best

Mean salaries for IT Pros 2020

IT Salaries are on the rise. As the general economy improves more companies are investing in information technology. The emphasis over the past several years is in both e-commerce and mobile computing. At the same time with the ever-increasing cyber attacks and data breaches, CIO are looking to harden their sites and lock down data access so that they can protect all of their electronic assets.

Salary Survey Job Descriptions IT Job Families IT Hiring Kit Interview Guide

Order Salary Survey Download Sample Provide Data

- 2020 IT Salary Survey Released


Millennials are taking over the IT Pro job market

As economy continues to expand tenure of CIOs is impacted and median age of IT professionals goes down

Based on BLS data, Gen Y and X (Millenials) make up over 47% of the total labor force, Gen Xers are 37%, and Babyboomers have shrunk to only 16% of the total labor force.

Age Distibution IT Job Market

Order Salary Survey Download Sample Provide Data

 

- Millennials are taking over the IT Pro job market


Security Manual Designed to Manage Risk

Security Manual Makes Risk and Compliance Management Easy

Risk Management made easyAs the threat landscape continues to evolve, organizations must abandon traditional defensive postures for proactive strategies designed to mitigate risks and help them quickly recover.

The Security Manual documents Janco's research and perspectives from industry leaders on recent threat trends, risk mitigation strategies, and lessons learned from those in the security trenches.

The IT Security Manual Template provides CIOs, CSOs, and IT Managers all of the essential materials with real live use-able text for a complete security manual. Detailed language addressing more than a dozen security topics.

Read on Order Security Manual Template Download sample

 

- Security Manual Designed to Manage Risk


VPNs are exposed to security breaches

NordVPN and TorGuard VPN both were hit with major security breaches - Five actions that CIOs and CTOs can take. . .

VPNs cna be breachedThe opening for the hackers occurred because their servers did not contain user activity logs.

The hacker stole a Transport Layer Security key, which temporarily opened the door for a 'man in the middle' attack. The hackers may have also gained root access to the server, enabling them to potentially view and modify VPN traffic.
At NordVPN the hacks were unnoticed for at least a year.  This raised security doubts about the affected VPN services.  The hack prevented internet service providers from collecting details on your website lookups. The attacker gained access to the server by exploiting an insecure remote management system left by the data center provider while we were unaware that such a system existed.
How do you defend against system attacks and security breaches?  Janco Associates has defined a set of steps that enterprises of all sizes can follow to help to achieve a safe and secure computing environment. The steps that CIOs and CSOs should follow are:

  1. Access the network and computing environment 
  2. Conduct in-depth system and network security
  3. Establish network access rules that allow on valid access
  4. Mechanize and retain detail logs 
  5. Assume someone is attacking you now

Read onÂ…

Order Security Manual Template Download sample

- VPNs are exposed to security breaches


How to keep safe on the Internet while being productive

Keeping data safe and secureSecurity Tools to keep you safe

Security and compliance are key to maintaining control of sensitive and confidential information. Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

Read on Order Security Manual Template Download sample

- How to keep safe on the Internet while being productive

Read On...