Information Technology News Feed

Security, Disaster Planning, ITSM, Metrics, and Salary Survey

The Information Technology News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • Information Technology News

  • Top 10 Causes of Security Shortfalls

    Information Technology News Protal

    Security Manual Template Defines Best Practices

    one out of ten CIOs and CFOs feel they do not have an adequate security strategy in place and are reactive when an incident does occur. The top 10 reasons for security shortfalls are:

    1. Insufficient funding for security
    2. Lack of commitment by senior executive management
    3. Lack of leadership in the security arena by the CIO
    4. Belief that the organization will not be targeted
    5. Lack of internal resources who are "security" experts
    6. Lack of an effective IT security strategy
    7. Lack of an action plan on how to implement a solution before an event
    8. Infrastructure for IT that does not easily lend itself to security implementation including complex and disjointed applications and data
    9. No central focus with the enterprise that focuses on security
    10. Lack of a good termination policy for employees and contractors

    Janco reviewed of over 200 incidents found the frequency of these types of breach losses:

    Types of Losses Due to Security Shotfalls

    Read On... Order Security Manual Template Download Sample

    - Top 10 Causes of Security Shortfalls

    76% of companies did not know they were hacked

    76% of companies did not know they were hacked

    Secrity Manual Template3 out of 4 companies hacked did not know for over seven months that they were hacked.  The average time between an attacker breaching a network and its owner noticing the intrusion is 205 days.  There little doubt that criminals and pranksters are thriving by attacking computers and networks that companies are struggling to cope, and that businesses offering answers are thriving.

    Janco's Security Manual Template is a step in the right direction to get control of this problem.

    Read on Order Security Manual Template Download sample 

    - 76% of companies did not know they were hacked

    How to build the digital workforce

    Building the digital workforce tied to IT job market prospects

    Gen Z employees do not have the skills necessary to become IT Pros. More has to be done to improve these Gen Z individuals confidence in technology careers and their own digital abilities.

    A survey of 500 IT decision makers and 542 16 to 24-year-olds by major IT Puablication found that 16 to 24-year-olds feel they lack the necessary skills and knowledge to pursue a career in tech, despite the fact many see it as a promising career path.

    The survey found that young people also undervalue their role in closing the widening tech skills gap and view the industry as inaccessible, either because they view it as too complicated or because they feel limited by other factors such as their age or gender.

    Building digital workforce - Gen Z key

    Read on IT Hiring Kit  Order IT Hiring Kit

    - How to build the digital workforce

    IT Governance Infrastructure Defined

    IT Governance InfrastructureIT Governance checklist and employee termination electronic forms

    Information Technology is undergoing a rapid evolution as the importance of social media and the digital resources are changing the ways that enterprises operate, employees and enterprise associates interact on a day-to-day basis, and customers and suppliers access enterprise assets remotely.

    The WFH options available for service centers and help desk support are driving change and IT infrastructure needs to adapt.

    IT Governance and other CIO and IT Management Products are available for immediate down load @ITManagerCIO

    Order IT Governance Infrastructure   

    Download Selected Pages

    - IT Governance Infrastructure Defined

    Major DDoS attack takes EU country off line

    Policy and Procedure Security Manual Provides Protection from DDoS 

    Protect against DDoS attacksSecurity incidents are rising at an alarming rate every year. As the complexity of the threats increases, so do the security measures required to protect networks and critical enterprise data.

    For example, a DDoS attack eearlier this month overwhelmed the web sites with traffic, rendering their public-facing sites unusable for visitors.  At the same time the attack overwhelmed internal systems, cutting them off from the internet.

    The attack targeted Belnet, the government-funded ISP provider for the county's educational institutions, research centres, scientific institutes and government services.  This included all of its government ministries and parliament. Debates and committee meetings were postponed until users could access the virtual services required to take participate

    Read on Order Security Manual Template Download sample

    - Major DDoS attack takes EU country off line