Information Technology News Feed

Security, Disaster Planning, ITSM, Metrics, and Salary Survey

The Information Technology News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:


Feds should set national privaty and security rules

Privacy and Security should be set by the Feds not individual states or tech giants.

Technology ompanies should not be the prime movers for security. If we let the tech leaders write the laws that are supposed to regulate them, then it defeats the purpose. Security and privacy regulation needs to be consistent and therefore, it has to be federal. State laws are set up to fail because they all have boundaries attached, and the flow of data today has no boundaries. A federal law would address that.

Feds should set privacy and security mandates

Order Industry Standard Compliance Kit

- Feds should set national privaty and security rules


Version Control for Desktops Critical

Version Control Policy Critical For Desktops and Laptops

Cyber Security Key to Internet IntegerityMicrosoft again has proved that both enterprises and individuals be aware of the impact of system patches and version upgrades.  If they are not completely tested or from unsecure sources you systems are at risk.  Cyber Security and  protection from cyberattacks is key to maintaining the integreity of you Internet connected devices.

When Microsoft pullled its latest roll out they posted the following:

  • Microsoft has paused the rollout of the Windows 10 October 2018 Update (version 1809) for all users as we investigate isolated reports of users missing some files after updating.
  • Users who have manually downloaded the Windows 10 October 2018 Update installation media, please don't install it and wait until new media is available.
  • Microsoft will provide an update when we resume rolling out the Windows 10 October 2018 Update to customers.

Order Security Policies and Procedures

Download TOC security policies

- Version Control for Desktops Critical


Not a good idea to depend on Tech Giants Products

Tech Giants cannot be depended on rather IT Infrastructure Policies and Procedures are the solution

Companies need to depend on thier own infrastructureTech Giants will create new products that are linked to thier infratructure and if they do not create enough value, they will just abandon them.  For example, Google is killing off Inbox, its experimental email app that's lived alongside Gmail for the past four years. The service is set to shut down for good this coming March.

When Inbox was announced in October of 2014, Google described it as something that was years in the making and a completely different type of inbox, designed to focus on what really matters.They also said it was designed for the problems we're going to see in the next 10 years. The company is sending the app away to its increasingly crowded virtual graveyard.

Companies and individuals need to depend on thier own infrastructure.

Read on Infrastructure Policies

- Not a good idea to depend on Tech Giants Products


IT infrastructure and business impact are driven by the age of the customer

BIA Business Impact Analysis

The business world has now move to the age of the consumer.  Thus organizations need to implement processes and governance structures to support that. However, recent analysis of the current IT and business infrastructure and practices show there is little consistency across organizations - even within the same industry and geographies. Firms that trail their peers in establishing clear processes, incentives, and governance for their innovation programs risk losing market share and competitive advantage - in particular, as corporate strategies shift to the digital business.

Janco's IT Infrastructure policy bundle helps to address those issues.  In addition it complies with all mandated requirements and includes electronic forms that can be e-mailed, filled out completely on the computer, routed and stored electronically.

  • CIO IT Infrastructure Policy Bundle All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
    • Backup and Backup Retention Policy
    • Blog and Personal Web Site Policy  Includes electronic Blog Compliance Agreement Form
    • BYOD Policy Template  Includes electronic BYOD Access and Use Agreement Form
    • Google Glass Policy Template  Includes electronic Google Glass Access and Use Agreement Form
    • Incident Communication Plan Policy  Updated to include social networks as a communication path
    • Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy  Includes 5 electronic forms to aid in the quick deployment of this policy
    • Mobile Device Access and Use Policy
    • Patch Management Policy 
    • Outsourcing and Cloud Based File Sharing Policy
    • Physical and Virtual Security Policy 
    • Record Management, Retention, and Destruction Policy
    • Sensitive Information Policy HIPAA Compliant and includes electronic Sensitive Information Policy Compliance Agreement Form
    • Service Level Agreement (SLA) Policy Template with Metrics 
    • Social Networking Policy  Includes electronic form
    • Telecommuting Policy  Includes 3 electronic forms to help to effectively manage work at home staff
    • Text Messaging Sensitive and Confidential Information 
    • Travel and Off-Site Meeting Policy
    • IT Infrastructure Electronic Forms
Order IT Infrastructure PoliciesDownload Selected Pages
- IT infrastructure and business impact are driven by the age of the customer


Implementing a GRC strategy

Implementing a Governance, Risk, and Compliance (GRC) Strategy

Implementing GRC StrategyImplementing a GRC strategy (governance, Risk and Compliance) will improve your overall security and decrease your risks. It is an important step in keeping your customers, your employees, and your company better protected from cybercrime and data breaches while remaining in compliance with industry regulations. The most successful GRC will permeate the entire organization, from the C-suite level to entry-level staff, filtering through every business unit and affecting every employee. 

Steps should include:

  • Define what matters
  • Identify your risks
  • Design a plan
  • Start small, focusing on key processes.Create a system for continuous monitoring

Order Compliance Managment KitDownload Selected Pages

 

 

- Implementing a GRC strategy