Latest news of interest from the CIO's primary news feed
Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA
The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.
If you wish to subscribe to this news feed the options that you have are:
- IT Standard News Feed - 30 items
- Americans pay four times as much as the French for an Internet triple-play package - phone, cable TV and Internet - at an average of $160 per month versus $38 per month.
- The French get global free calling and worldwide live television. Their Internet is also 10 times faster at downloading information and 20 times faster uploading it.
- America has gone from #1 in Internet speed (when we invented it) to 29th in the world and falling.
- Bulgaria is among the countries with faster Internet service.
- Americans pay 38 times as much as the Japanese for Internet data.
- Protect federal networks using the NIST Framework
- Mandate federal IT to move to the cloud
- Centralize federal IT as one enterprise network
How to keep safe on the Internet while being productive
Security and compliance are key to maintaining control of sensitive and confidential information. Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.more info
Chinese have a more secure version of Windows 10
Security and Privacy are the core of the Chinese version of Windows 10
Security and Privacy are key to a Chinese government-approved version of Windows 10. It was developed in partnership with the Chinese technology and defense company China Electronics Technology Group Corp (CETC).
This version strips telemetry and data collection from Windows; thus, in a bit of irony, the Chinese Government-mandated edition is the only version of Windows since XP (or Windows 7 before updates/patches) that respects the privacy rights of its users and is not, as of today, a data-collection machine.more info
Net Neutrality and cost of Internet in the US
Anti Net-Neutrality will raise the cost of Internet
If the services providers have their way, the cost of internet and data usae will skyrocket. Currently:
Security Architect is a hot new job
How to get value out of your enterprise's infrastructure with a Security Architect
With all of the recent cyber-attacks and ransomware hack, there now is a hot new job. The Security Architect is responsible for maintaining the security of an enterprises computer and application systems. They must anticipate all of the moves and tactics that hackers will use to try and gain unauthorized access to the enterprise's data and application resources. They must stay current with the latest developments in the arena of security and mandated compliance.
The job description for this hot new role has just been released by Janco and eJobDescriptions.com.more info
Focus of new federal cybersecurity order clarified
Security Policies - Procedures - Audit Tools
Updated Patch Management - Version Control Policy Template Released
New with Version of Patch Management - Version Control focus on DevOps
DevOps is the way to build, test and maintain applications and systems. To that end, patch management and version control are key. The lastest update of that policy template now included three (3) key job descriptions: Manager Change Control, Change Control Supervisor, and Change Control Analyst.
Also included in this update aree ten (10) best practices for security compliance and patch management.
- more info
IoT makes everything more complex including DR and BC
IoT - Almost half of companies that had to activate their DR/BC plans were able to do it with limited difficulty
The internet of things (IoT) is in a very bright spotlight. Not only because of recent security breaches, but because of the way it has completely iniltrated our lives not only through our smart phones, but through our smart TVs, smart refrigerators, smart thermostats, and every other smart device you can think of. And all of these things are likely to be in our workplaces as well.
All Business Continuity Disaster Recovery Planning efforts need to encompass how IoT devices will communicate, where they will go and how they will keep doing their jobs. The details can vary greatly, depending on the size and scope of a company and the way it does business.more info
Hackers target non-chip magnetic credit card readers
CIOs are challenged with data security and protection as hackers target non-chip magnetic credit card readers in retail outlets, restuarants and bars.
Stolen credit and debit cards are on the rise at U.S. restaurants where older magnetic stripe cards are in use instead of more secure chip cards. The number of attacks on e-commerace sites is on the rise.
Most breaches are from users whose cards were read by magnetic stripe credit and debit cards at payment terminals -- not chip readers. Mag-stripe cards rely on an older and less secure payment technology than do the newer chip cards. U.S. banks and card networks like Visa, MasterCard and other card companies have been giving customers new cards embedded with smart chips in recent years, although the U.S. is one of the last countries to convert to chip card technology.
Nearly all chip cards also have magnetic stripes containing card data, which are still vulnerable to hackers who can strip the data with special counterfeit readers. Even PIN and chip is vulnerable to internal breaches.
The best defense for companies is to utilize point-to-point encryption of data and not to store sensitive data. The migration from swipe cards to PIN and chip and further to point to point encrypted (P2PE) solutions must be a priority. Unfortunately, P2PE solutions are not widely available and can be costly.more info