Latest news of interest from the CIO's primary news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

News of interest from CIO's primary news feed - The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • IT Standard News Feed

  • FBI warns business about cyberattacks

    Tools that the CIO, CSO, CTO, and CFO can use for Infrastructure, Disaster Recovery, Security, Job Descriptions, ITSM, Salary, Change Control, and Help Desk.

    FBI warns that security policies and procedures need to be in place

    Security ManualThe FBI has sent a security alert to the US private sector about an ongoing hacking campaign that's targeting supply chain software providers.

    Hackers are attempting to infect companies with the Kwampirs malware, a remote access trojan (RAT). As a result, the FBI has sent a security alert to the US private sector about an ongoing hacking campaign that's targeting supply chain software providers.

    They said in press release  that software supply chain companies are believed to be targeted in order to gain access to thier strategic partners and/or customers.  This includes entities supporting Industrial Control Systems (ICS) for global energy generation, transmission, and distribution.

    Read on Order Security Manual Template Download sample

    - FBI warns business about cyberattacks


    Top 10 full employment states

    Top 10 States with Full Employment Status

    Hiring Tool KitTop 10 full employment states December 2019 - Full employment states are those with an unemployment rate 4% or less.  There are ten states that have unemployment rates that are 2.7% or less. These are states that so fully employed that almost anyone can get a job there.

    Full employment makes it harder to find people who have the qualifications needed to full High Tech positions.  The states and their unemployment rates are:

    1. Vermont 2.3%
    2. Utah 2.3%
    3. South Carolina 2.3%
    4. North Dakota 2.4%
    5. Colorado 2.5%
    6. Virginia 2.6%
    7. New Hampshire 2.5%
    8. Hawaii 2.6%
    9. Iowa 2.7%
    10. Alabama 2.7%

    Order IT Hiring Kit Download IT Hiring Kit TOC

    - Top 10 full employment states


    2020 IT Salary Survey Released

    Mean Compensation for all IT Pros is up 4.9% since January of last year - Executive Management faired the best

    Mean salaries for IT Pros 2020

    IT Salaries are on the rise. As the general economy improves more companies are investing in information technology. The emphasis over the past several years is in both e-commerce and mobile computing. At the same time with the ever-increasing cyber attacks and data breaches, CIO are looking to harden their sites and lock down data access so that they can protect all of their electronic assets.

    Salary Survey Job Descriptions IT Job Families IT Hiring Kit Interview Guide

    Order Salary Survey Download Sample Provide Data

    - 2020 IT Salary Survey Released


    Millennials are taking over the IT Pro job market

    As economy continues to expand tenure of CIOs is impacted and median age of IT professionals goes down

    Based on BLS data, Gen Y and X (Millenials) make up over 47% of the total labor force, Gen Xers are 37%, and Babyboomers have shrunk to only 16% of the total labor force.

    Age Distibution IT Job Market

    Order Salary Survey Download Sample Provide Data

     

    - Millennials are taking over the IT Pro job market


    Security Manual Designed to Manage Risk

    Security Manual Makes Risk and Compliance Management Easy

    Risk Management made easyAs the threat landscape continues to evolve, organizations must abandon traditional defensive postures for proactive strategies designed to mitigate risks and help them quickly recover.

    The Security Manual documents Janco's research and perspectives from industry leaders on recent threat trends, risk mitigation strategies, and lessons learned from those in the security trenches.

    The IT Security Manual Template provides CIOs, CSOs, and IT Managers all of the essential materials with real live use-able text for a complete security manual. Detailed language addressing more than a dozen security topics.

    Read on Order Security Manual Template Download sample

     

    - Security Manual Designed to Manage Risk


    VPNs are exposed to security breaches

    NordVPN and TorGuard VPN both were hit with major security breaches - Five actions that CIOs and CTOs can take. . .

    VPNs cna be breachedThe opening for the hackers occurred because their servers did not contain user activity logs.

    The hacker stole a Transport Layer Security key, which temporarily opened the door for a 'man in the middle' attack. The hackers may have also gained root access to the server, enabling them to potentially view and modify VPN traffic.
    At NordVPN the hacks were unnoticed for at least a year.  This raised security doubts about the affected VPN services.  The hack prevented internet service providers from collecting details on your website lookups. The attacker gained access to the server by exploiting an insecure remote management system left by the data center provider while we were unaware that such a system existed.
    How do you defend against system attacks and security breaches?  Janco Associates has defined a set of steps that enterprises of all sizes can follow to help to achieve a safe and secure computing environment. The steps that CIOs and CSOs should follow are:

    1. Access the network and computing environment 
    2. Conduct in-depth system and network security
    3. Establish network access rules that allow on valid access
    4. Mechanize and retain detail logs 
    5. Assume someone is attacking you now

    Read onÂ…

    Order Security Manual Template Download sample

    - VPNs are exposed to security breaches


    How to keep safe on the Internet while being productive

    Keeping data safe and secureSecurity Tools to keep you safe

    Security and compliance are key to maintaining control of sensitive and confidential information. Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

    Read on Order Security Manual Template Download sample

    - How to keep safe on the Internet while being productive


    No recession signs for US IT jobs

     

    With the US trade war with China and slowing growth, particularly in manufacturing, some economists believe the US is heading towards recession as 2020 approaches. According to the National Association for Business Economics, there's a 60 percent chance the country's decade run of expansion will see a downturn at the end of next year.

    But the IT industry seems unabated by such forecasts. According to research and data collected by Janco Associates, 102,400 IT jobs will be added in 2019, as CIOs and CEOs budget for increased headcounts and approve the use of outside contractors and consultants for 2020.

    At the same time, there is an ample supply of skilled and qualified professionals to fill those roles - while more active recruiting in the sector seeing a compression of pay grades for some key positions.

    No recession for IT

    Order Salary Survey Download Sample

    - No recession signs for US IT jobs