Chief Information Officer and IT Managers Areas of Interest

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

Chief Information Officer and IT Managers Areas of Interest - The CIO and IT management news feed is one that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed add the link below to your reader:

Janco RSS Newsfeed  Chief Information Officer News Feed


Chief Data Officer (CDO) Job Desxription

The Chief Data Officer job description has just been updated.

Chief Data Officer Job DescriptionChief Data Officer (CDO), a newly created postion, is responsible for developing and overseeing data strategy and governance for the enterprise.

The CDO is not only a data expert but also a seasoned operational manager. As the role is transformational, the CDO is responsible for the adoption of data technologies across the entire business. As with most senior executive titles, the responsibilities are set by the organization's board of directors or other authority, depending on the organization's legal structure.

Growth in the number of CDO's has been dynamic. There now are over 4,500 individuals filling that role today.

Growth in the number of CDO's

Order Chief Data Officer Job Description

- Chief Data Officer (CDO) Job Desxription


IT Salaries Skyrocket

IT Salaries Skyrocket - Mean Compensation for all IT Pros is up 4.9%

IT Salaries Skyrocket - 2020 IT Salary Survey by company size and metro area. Janco and eJobDescription.com has conducted salary surveys of the IT Job market over 30 years. The data from this survey has been published in the Computer Industry Almanac, the Wall Street Journal, the New York Times, eWeek, and many other business and industry publications.

2020 IT Salary Survey

Order Salary Survey Download Sample

- IT Salaries Skyrocket


Security threat warning to HP laptop users

Security threats addressedSecurity Policies - Procedures - Audit Tools

Several Hewlett-Packard (HP) laptops have been shipped with a keylogger in an audio driver package, creating a major security risk. A keylogger - surveillance software that has the ability to record every keystroke you make to a log file - can record if a password is entered, even if that password is not displayed on the screen.

Security and compliance are key to maintaining control of sensitive and confidential information. All of the product offerings of Janco are geared toward proving tools to help C-Level executives and top IT professionals maintain the privacy of its users and enterprise data.

Read on Order Security Manual Template Download sample

 

 

- Security threat warning to HP laptop users


Security Best Practices

Security Best Practices

  1. Security ManualUnderstand who is accessing data via frequent auditing and real-time monitoring of data access.
  2. Keep current records on data access permissions .
  3. Classify data by sensitivity.
  4. Minimize and remove global access rights.
  5. Identify data owners and users.
  6. Include data access reviews when individuals are transferred, promoted, or terminated .
  7. Align groups to data ownership and management.
  8. Audit permissions and group changes.
  9. Lock down, delete or archive stale, unused data.
  10. Clean up security groupings.

Order Security Manual Template Download Sample

- Security Best Practices


Disaster Recovery Planning & Business Continuity Planning Quick Action Steps Defined

Disaster Planning Template

The must do things that your company must do to make sure the disaster recovery and business continuity plan will work when they are need are:

 

Order Disaster Plan Template Download Sample

  • Distribute the disaster recovery and business continuity plan or a HandiGuide® to all decision makers and key operating employees who will need access to it when the event occurs.

  • Define the chain of command with single leader but do not limit the people who would have to implement the disaster recovery business continuity plan when the event occurs if that leader is unavailable.
  • Conduct frequent tests and address all areas where shortcomings are found.
  • Conduct the tests in an unannounced mode
  • Validated that mission critical data is at sites other than the primary data center
  • Establish a communication plan that can be implemented after the disaster.

Disaster Planning Security Template

HandiGuide is a Janco Associates registered trademark 

Order DRP BCP Security Bundle Download Sample

- Disaster Recovery Planning & Business Continuity Planning Quick Action Steps Defined