Information Technology and Infrastructure News

This feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is. If you wish to subscribe to this news feed the options that you have are:

Password Managers provide false sense of security

Most password managers are insecure eventhough they are comprehensive, detailed, and customizable

Password ManagerThe most popular password managers for Windows 10 can actually leak your login credentials to the PC's memory. A hacker could potentially snatch up the sensitive data when the password manager turns on.

The research examined the security of four products including 1Password, Dashlane, KeePass, and LastPassFree at LastPass. The company was surprised to find that the products didn't always encrypt and then delete password data in the PC's background processes. Even the master password, which can be used to unlock all your stored passwords, can be exposed.

Order Security ManualDownload Security Table of Contents

- Password Managers provide false sense of security

Best Practices for Recruitng IT Pros

Best Practices for Recruiting IT Pros defined in the 2019 Release of the IT Hiring Toolkit 

The IT Hiring Tool kit has just been released with 300 full reviewed and compliant job descriptions, the 2019 IT Salary survey, and the Interview and hiring guide with best practices for the initial candidate selection process, the interview and job offer process, and processes associated with employee orientation thru employee termination.

IT Job DescriptionIT Salary SurveyInterview & Hiring Guide

Order IT Hiring Kit

- Best Practices for Recruitng IT Pros

Company Fined $16M for data breach

$16M fine mandates Security Policies and Procedures - First Step in Data Breach Protection

Data Breach Results in $16M fineThe data breach that occured was a result of a cyber attack that enabled hackers to access the electronic protected health information of nearly 79 million individuals. A major HIPPA violation, The company, Anthem reported that the attackers gained access to data that included patient names, Social Security numbers, member identification numbers, addresses, dates of birth, email addresses and employment information.

Security Manual TemplateOrder Security Manual


- Company Fined $16M for data breach

CIO Job Description has just been updated

Chief Information Officer - Available for Immediate Download

CIO Job DescriptionThe Chief Information Officer (CIO) is accountable for directing the information and data integrity of the enterprise and its groups and for all Information Technology functions of the enterprise.  This includes all data centers, technical service centers, production scheduling functions, help desks, communication networks (voice and data), computer program development, mobile device interactions, and computer systems operations.  He or she is responsible for maintaining the integrity of all electronic and optical books and records of the enterprise. 

Read on CIO Job Description...

Order CIO Job Description

- CIO Job Description has just been updated

Disaster Recovery Business Continuity Questions to ask

The Standard for Disaster Planning and Continuity Planning

Disaster Recovery Business Continuity Questions to askDisaster Recovery Business Continuity Questions to ask:

  • What kinds of threats do we face? Terrorism? Hurricanes? Ransomware?
  • How likely are they to strike our organization, and where?
  • How secure are our facilities?
  • How redundant is our connectivity and power?
  • What kind of impact would any resulting disruption have on our business?
  • Which systems and apps are most critical to our business?
  • Are systems and apps on premises or elsewhere?
  • How are they architected (distributed, centralized, cloud, hybrid, Windows, Linux, etc.)?
  • How much would downtime cost us? Per minute, hour, day, week?

Disaster Recovery Plan TemplateOrder Disaster Plan TemplateDownload Selected Pages Disaster Plan Template

- Disaster Recovery Business Continuity Questions to ask

iPhone X defects

iPhone X at $1,000 plus has major defects

iPhone DefectsiPhone X cost  over $1,000 has defects.  Many users report incoming call delayed and accept and decline does not work. Delays of up to 10 seconds reported - enough time for caller to abandon call. This makes the offering not as good as it could be as a mobility asset

Many users are not happy as this problem has been around since November of last year.

Order Mobile computing policy bundleDownload Mobility Bundle Table of Contents

- iPhone X defects

The new age market place will be driven by rapid deployment

Business to Business systems are now moving towards the new e-commerce paradigm  - an ERP that covers both internal and external  applications

How to implement omni Commerce - Wave of the FutureWeb-inspired consumer values are penetrating every corner of the commericial maketplace, and compamies who fail to meet these new customer expectations are putting their businesses at risk.

Companies need to digitize and simplify their application processes to reduce end-to-end turnaround time from weeks to minutes. Companies that do that will increase customer satisfaction and successfully transition to the new age.

- The new age market place will be driven by rapid deployment

Blockchain Developer is the hot new job

Blockchain Developer Job Description Released

Blockchain developer is an in high demand job.  Individuals who have the skills command high starting salaries.  The base for that postion in most markets is now $125K and in some markets go as high as $150K. 

Order digital brand manager job description

One of the major challenges of blockchain is the existing legacy infrastructure of each of the enterprises engaged in this development and implementation process. Increasingly, it appears for financial services blockchain applications, such as cross-border lending and settlement records, where blockchain's core strengths - rapid record verification and an ability to do deals with untrusted parties - outweigh the complexity of deploying it. But for other cases, especially those involving internal records, banks and other institutions will likely stick with existing software solutions.

- Blockchain Developer is the hot new job