Information Technology News - XML News Feed
Security, Disaster Planning, ITSM, Metrics, and Salary Survey
The Information Technology News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.
If you wish to subscribe to this news feed the options that you have are:
Cloud Backup and Data Protection
Cloud Backup and Data Protection
Cloud backup, data protection and recovery remain a significant challenge. Data centers are growing in complexity and the volumes of data requiring protection are adding to the pressure on IT teams to guarantee quicker recoveries.
Restoring to a remote data center from backup tapes will likely take too long, assumes that the tapes were not affected by the original problem and still leaves the risk of only recovering old data. Instead, replication software can be used to keep the backup systems constantly updated.more info
One in five workers work at home
Telecommuting is a reality for one quarter of the workforce
According to the BLS in the US, in 2016, 22 percent of workers did some or all of their work at home on days they worked. Workers 25 and over with an advanced degree were more likely to work at home than were persons with less education--43 percent compared with 12 percent of those with a high school diploma.
With the rise of the Internet, and the increase in affordable bandwidth came a new type of worker, the telecommuter. Available technologies, in certain cases, have allowed some companies to offer the ability for certain employees to work from home instead of the office. This can be not only a benefit for the employee, but also for the company itself. As more and more employees clamor for the ability to telecommute, it is imperative for companies to have an in place a viable telecommuting policy.
- more info
CIO are at the forefront of digital transformation
CIOs now have as a priority meeting their companies digital business goals. CIO are the change agents for digital transformation. They create and operate in an environment thats more flexible and responsive.
The perfect infrastructure takes new approaches to understanding needs and delivering capabilities. ITs changing role is paving a new path - one that offers CIOs a chance to evangelize digital opportunities and reshape their career paths. Janco has the tools needed by CIOs to align their approaches to business engagement and delivery with digital transformation. This produces impressive results.more info
DevOps basics are core of Infrastructre, Strategy and Charter Template by Janco
DevOps foundation infrastructure is defined by Janco's Infrastructure, Strategy, and Charter Template
With the explosion of technology into every facet of the day-to-day business environment there is a need to define an effective infrastructure to support operating environment; have a strategy for the deployment and technology; and clearly define responsibilities and accountabilities for the use and application of technology.
In order to implement an effective DevOps environment, CIOs can look at the foundation that is established with the IT Infrastructure, Strategy, and Charter Template.
In most industries today, CEOs need a CIO who can be a true business partner, someone who can not only drive out costs from day-to-day operations, but strategically manage IT to enhance revenue and profits.more info
Enterprise Wide security weaknesses identified in recent survey
Security Weakness at the enterprise level identified
Once an attacker is on the inside, his or her work is significantly easier since on most networks, systems on the inside are trusted. To that end, in a review of over 300 security audits Janco has found a list of the greatest security weaknesses.
The weaknesses are:
- Using only single level verification for access to sensitive data
- Having public workstations or access point is connected to a secure network
- Sharing login credentials
- Connect to network from an unsecure access point
- Corporate web site is encrypted but the login process is not
- Using weak encryption for back end management
- Using unencrypted or weak encryption for Web site or Web server management