Information Technology News - XML News Feed

Security, Disaster Planning, ITSM, Metrics, and Salary Survey

The Information Technology News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:


Cloud Backup and Data Protection

Cloud Backup and Data Protection

Cloud backup and data protectionCloud backup, data protection and recovery remain a significant challenge. Data centers are growing in complexity and the volumes of data requiring protection are adding to the pressure on IT teams to guarantee quicker recoveries.

Restoring to a remote data center from backup tapes will likely take too long, assumes that the tapes were not affected by the original problem and still leaves the risk of only recovering old data. Instead, replication software can be used to keep the backup systems constantly updated.

Order Cloud and Business Continuity PlanDownload Selected Pages
- more info


One in five workers work at home

Telecommuting is a reality for one quarter of the workforce

Telecommuting PolicyAccording to the BLS in the US, in 2016, 22 percent of workers did some or all of their work at home on days they worked. Workers 25 and over with an advanced degree were more likely to work at home than were persons with less education--43 percent compared with 12 percent of those with a high school diploma.

With the rise of the Internet, and the increase in affordable bandwidth came a new type of worker, the telecommuter. Available technologies, in certain cases, have allowed some companies to offer the ability for certain employees to work from home instead of the office. This can be not only a benefit for the employee, but also for the company itself. As more and more employees clamor for the ability to telecommute, it is imperative for companies to have an in place a viable telecommuting policy. 

Order Telecommuting PolicyDownload Selected Pages

 

- more info


CIO are at the forefront of digital transformation

CIOs digital transformationChief Information Officer - Chief Technology Officer are key to digital transformation

CIOs now have as a priority meeting their companies’ digital business goals. CIO are the change agents for digital transformation. They create and operate in an environment that’s more flexible and responsive.

The perfect infrastructure takes new approaches to understanding needs and delivering capabilities. IT’s changing role is paving a new path - one that offers CIOs a chance to evangelize digital opportunities and reshape their career paths. Janco has the tools needed by CIOs to align their approaches to business engagement and delivery with digital transformation.  This produces impressive results.

Order CIO Job Description
- more info


DevOps basics are core of Infrastructre, Strategy and Charter Template by Janco

DevOps foundation infrastructure is defined by Janco's Infrastructure, Strategy, and Charter Template 

DevOps InfrastructureWith the explosion of technology into every facet of the day-to-day business environment there is a need to define an effective infrastructure to support operating environment; have a strategy for the deployment and technology; and clearly define responsibilities and accountabilities for the use and application of technology.

In order to implement an effective DevOps environment, CIOs can look at the foundation that is established with the IT Infrastructure, Strategy, and Charter Template.

In most industries today, CEOs need a CIO who can be a true business partner, someone who can not only drive out costs from day-to-day operations, but strategically manage IT to enhance revenue and profits.

Order IT Infrastructure Architecture Download Selected Pages
- more info


Enterprise Wide security weaknesses identified in recent survey

Security Weakness at the enterprise level identified

Once an attacker is on the inside, his or her work is significantly easier since on most networks, systems on the inside are trusted.   To that end, in a review of over 300 security audits Janco has found a list of the greatest security weaknesses.

Enterprise Wde Security Weaknesses

The weaknesses are:

  • Using only single level verification for access to sensitive data
  • Having “public” workstations or access point is connected to a secure network 
  • Sharing login credentials 
  • Data validation for forms is contained in client-side JavaScript
  • Connect to network from an unsecure access point
  • Corporate web site is encrypted but the login process is not
  • Using weak encryption for back end management
  • Using unencrypted or weak encryption for Web site or Web server  management

Order Security Policies and ProceduresDownload TOC security policies

- more info