Latest news of interest from Janco's news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

Janco RSS Newsfeed  Janco


Security needs to manage off-site data

Tools that the CIO, CSO, CTO, and CFO can use for Infrastructure, Disaster Recovery, Security, Job Descriptions, ITSM, Salary, Change Control, and Help Desk.

Policy and Procedure Manual Compliance Management Made Easy 

Security Manual TemplateMany organizations fail to realize the benefits of security information management due to the often exhaustive financial and human resource costs of implementing and maintaining the software.

Business information is not just in storage systems on-site. It’s in the cloud with applications like Box, Dropbox, Salesforce, Office365, Slack or ServiceNow. It’s even in the laptops, smartphones, tablets and other mobile devices that we and our colleagues travel with. Like it or not, we all have information sprawl, and that reinforces risks and challenges that many IT teams still have problems with for on-site systems, such as backup and recovery, and data governance.

Read on Order Security Manual Template Download sample

- Security needs to manage off-site data


IT Infrastructure Governance

IT Governance Infrastructure, Strategy, and Charter Template

IT Governance InfrastructureGovernance professionals in large corporations with subsidiaries expend an appropriate amount of resources on robust corporate governance at the parent corporation level but neglect providing the same level of governance services at the subsidiary level. This is a trap for the unwary.

Areas that IT governance strategy that need to be answered are:

  • Role of subsidiary vs. the parent company
  • IT infrastructure Stategy
  • IT Infrastructure Compliance
  • Compliance and risk management responsibilities
  • Protecting the corporation
  • Proper oversight of subsidiaries
  • Models of corporate governance
  • Role of the CIO in subsidiary IT governance
  • Controls relating to subsidiary IT Infrastructure Governance

 Read On  Order IT Governance Infrastructure Strategy Download Selected Pages 

- IT Infrastructure Governance


Ransomware attack on University of California SF

Security Manual Template which includes best practices for security including ransomware protection

Protect Servers from RansomwareRansomware can be particularly destructive as once a system is compromised, content is encrypted and rendered inaccessible. Victims are then faced with a choice: potentially lose their files, or pay a ransom demand. Cyberattackers will often include a time limit for a decision to be made to ramp up the pressure to pay.

The University of California at San Francisco (UCSF) paid a partial ransom demand of $1.14 million to recover files locked down by a ransomware infection. UCSF servers used by the school of medicine are encrypted.

UCSF was attacked on June 1, malware was found in the UCSF School of Medicine's IT systems. Administrators quickly attempted to isolate the infection and ringfence a number of systems that prevented the ransomware from traveling to the core UCSF network and causing further damage.

While the school says the cyberattack did not affect "...patient care delivery operations, overall campus network, or COVID-19 work,"

Order Security Manual Template Download sample

- Ransomware attack on University of California SF


Omni Commerce changes traditional IT strategy

Omni Commerce Strategic Planning Tool Kit Updated

Omni commerce strategyHow to Implement Omni Commerce -- Covid-19 and shift away from "brick and mortar" has changed the way people and business browse the Internet, shop, provide service and communicate with suppliers, customers and associates.

Order Omni Commerce Planning Toolkit

Download Selected Pages Omni Commerce Strategy

- Omni Commerce changes traditional IT strategy


Work from Home changes housing requirements

WFH is changing living space requirements

Work from Home impacts mobility infrastructureWith Work from Home (WFH) as a new way to do business, house requirements are changing.  Now may are looking for apartments and homes that have room for an office and broadband Internet access.

Having a dedicated space acting as an alternative to home and the office seems a fitting concept in current times. Government guidelines are staying clear of any encouragement to return to the office, and many workers will now have fully embraced their telecommuting routines. That is not to say, however, that every aspect of remote work is thrilling.

Sure, you may have requested the appropriate lumbar cushion, keyboard or monitor from your employer to help with your back pain; or carefully stuck to expert tips to stay healthy, happy and productive, even during a global pandemic. 

Mobility Policies

Comes as a downloaded electronic document in MS Word, PDF, and ePub formats

  • 8 Policies
  • 28 electronic forms
  • 14 full job descriptions

Order Mobility Bundle  Download Table of Contents

- Work from Home changes housing requirements


WalMart hires over 235,000 new employees in six weeks

Not all IT Job Market News is Bad

Hiring to bring the economy back to normalThe job statistics are the worst that the US job market has ever seen. From mid-March through April, thousands of organizations laid off over 40 million American workers. But lost in that grim news was a one positive statistic. Walmart hired 235,000 people, an average of more than 5,000 people a day, to meet its dramatic demand for its goods and services.

Not many firms will need to hire the near equivalent of a small city's population in six. In Walmart case, the firm needed to rapidly fill in for those sick or staying home from the virus and new recruits for warehouses, distribution centers and stores. But experts say there is an important lesson here: at some point, the economic disruption caused by the COVID-19 pandemic will fade, and many companies may need to fill many jobs fast. To do that successfully, they say, will take a lot more than just hanging out a bunch of 'Help Wanted' signs.

Read on IT Hiring Kit  Order IT Hiring Kit

- WalMart hires over 235,000 new employees in six weeks


Work From Home (WFH) increases requiremets for Security Audits

Security Audit Program 2020 edition just released 

Security Audit ProgramQuestions such as the following are not uncommon with new emphsis on Work From Home (WFM):

  • How do you know who can access this folder with financial/customer/sensitive data in it?
  • Who authorized a user to have access permission to a file and how?
  • If a key file was deleted, how would you know it happened, or who did it?
  • Who were the last people to access a critical folder, and what did they do?
  • How do you make sure that the right people have access to your data?

Order Security Audit Program Download Selected Pages

- Work From Home (WFH) increases requiremets for Security Audits


Telecommuting puts small to mid-sized companies at risk

Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs

Telecommutions Policy BundleIt is one thing to say that workers will work remotely and access sensitive and confidential information via the internet.  It is quite another to be able to assure executive management that critically sensitive information is protected and compliance mandates are met.

The Mobility Policy bundle contains eight (8) policies:

  1. BYOD Access and Use Policy;
  2. Mobile Device Access and Use Policy;
  3. Privacy Compliance Policy;
  4. Record Management, Retention, and Disposition Policy;
  5. Social Networking Policy;
  6. Telecommuting Policy;
  7. Travel, Laptop, PDA and Off-Site Meeting Policy; and,
  8. Wearable Device Policy.  

All of these policies are supported by 28 electronic forms and 14 full job descriptions from Chief Mobility Officer and Chief Security Officer to the Record Management Coordinator.

Read On Order Mobility Policy Bundle Download Sample

- Telecommuting puts small to mid-sized companies at risk


FBI warns business about cyberattacks

FBI warns that security policies and procedures need to be in place

Security ManualThe FBI has sent a security alert to the US private sector about an ongoing hacking campaign that's targeting supply chain software providers.

Hackers are attempting to infect companies with the Kwampirs malware, a remote access trojan (RAT). As a result, the FBI has sent a security alert to the US private sector about an ongoing hacking campaign that's targeting supply chain software providers.

They said in press release  that software supply chain companies are believed to be targeted in order to gain access to thier strategic partners and/or customers.  This includes entities supporting Industrial Control Systems (ICS) for global energy generation, transmission, and distribution.

Read on Order Security Manual Template Download sample

- FBI warns business about cyberattacks


Top 10 full employment states

Top 10 States with Full Employment Status

Hiring Tool KitTop 10 full employment states December 2019 - Full employment states are those with an unemployment rate 4% or less.  There are ten states that have unemployment rates that are 2.7% or less. These are states that so fully employed that almost anyone can get a job there.

Full employment makes it harder to find people who have the qualifications needed to full High Tech positions.  The states and their unemployment rates are:

  1. Vermont 2.3%
  2. Utah 2.3%
  3. South Carolina 2.3%
  4. North Dakota 2.4%
  5. Colorado 2.5%
  6. Virginia 2.6%
  7. New Hampshire 2.5%
  8. Hawaii 2.6%
  9. Iowa 2.7%
  10. Alabama 2.7%

Order IT Hiring Kit Download IT Hiring Kit TOC

- Top 10 full employment states

Read On...