Latest news of interest from the CIO's primary news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

News of interest from CIO's primary news feed - The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • IT Standard News Feed

  • Security needs to manage off-site data

    Tools that the CIO, CSO, CTO, and CFO can use for Infrastructure, Disaster Recovery, Security, Job Descriptions, ITSM, Salary, Change Control, and Help Desk.

    Policy and Procedure Manual Compliance Management Made Easy 

    Security Manual TemplateMany organizations fail to realize the benefits of security information management due to the often exhaustive financial and human resource costs of implementing and maintaining the software.

    Business information is not just in storage systems on-site. It’s in the cloud with applications like Box, Dropbox, Salesforce, Office365, Slack or ServiceNow. It’s even in the laptops, smartphones, tablets and other mobile devices that we and our colleagues travel with. Like it or not, we all have information sprawl, and that reinforces risks and challenges that many IT teams still have problems with for on-site systems, such as backup and recovery, and data governance.

    Read on Order Security Manual Template Download sample

    - Security needs to manage off-site data

    IT Infrastructure Governance

    IT Governance Infrastructure, Strategy, and Charter Template

    IT Governance InfrastructureGovernance professionals in large corporations with subsidiaries expend an appropriate amount of resources on robust corporate governance at the parent corporation level but neglect providing the same level of governance services at the subsidiary level. This is a trap for the unwary.

    Areas that IT governance strategy that need to be answered are:

    • Role of subsidiary vs. the parent company
    • IT infrastructure Stategy
    • IT Infrastructure Compliance
    • Compliance and risk management responsibilities
    • Protecting the corporation
    • Proper oversight of subsidiaries
    • Models of corporate governance
    • Role of the CIO in subsidiary IT governance
    • Controls relating to subsidiary IT Infrastructure Governance

     Read On  Order IT Governance Infrastructure Strategy Download Selected Pages 

    - IT Infrastructure Governance

    Ransomware attack on University of California SF

    Security Manual Template which includes best practices for security including ransomware protection

    Protect Servers from RansomwareRansomware can be particularly destructive as once a system is compromised, content is encrypted and rendered inaccessible. Victims are then faced with a choice: potentially lose their files, or pay a ransom demand. Cyberattackers will often include a time limit for a decision to be made to ramp up the pressure to pay.

    The University of California at San Francisco (UCSF) paid a partial ransom demand of $1.14 million to recover files locked down by a ransomware infection. UCSF servers used by the school of medicine are encrypted.

    UCSF was attacked on June 1, malware was found in the UCSF School of Medicine's IT systems. Administrators quickly attempted to isolate the infection and ringfence a number of systems that prevented the ransomware from traveling to the core UCSF network and causing further damage.

    While the school says the cyberattack did not affect "...patient care delivery operations, overall campus network, or COVID-19 work,"

    Order Security Manual Template Download sample

    - Ransomware attack on University of California SF

    Omni Commerce changes traditional IT strategy

    Omni Commerce Strategic Planning Tool Kit Updated

    Omni commerce strategyHow to Implement Omni Commerce -- Covid-19 and shift away from "brick and mortar" has changed the way people and business browse the Internet, shop, provide service and communicate with suppliers, customers and associates.

    Order Omni Commerce Planning Toolkit

    Download Selected Pages Omni Commerce Strategy

    - Omni Commerce changes traditional IT strategy

    Work from Home changes housing requirements

    WFH is changing living space requirements

    Work from Home impacts mobility infrastructureWith Work from Home (WFH) as a new way to do business, house requirements are changing.  Now may are looking for apartments and homes that have room for an office and broadband Internet access.

    Having a dedicated space acting as an alternative to home and the office seems a fitting concept in current times. Government guidelines are staying clear of any encouragement to return to the office, and many workers will now have fully embraced their telecommuting routines. That is not to say, however, that every aspect of remote work is thrilling.

    Sure, you may have requested the appropriate lumbar cushion, keyboard or monitor from your employer to help with your back pain; or carefully stuck to expert tips to stay healthy, happy and productive, even during a global pandemic. 

    Mobility Policies

    Comes as a downloaded electronic document in MS Word, PDF, and ePub formats

    • 8 Policies
    • 28 electronic forms
    • 14 full job descriptions

    Order Mobility Bundle  Download Table of Contents

    - Work from Home changes housing requirements

    WalMart hires over 235,000 new employees in six weeks

    Not all IT Job Market News is Bad

    Hiring to bring the economy back to normalThe job statistics are the worst that the US job market has ever seen. From mid-March through April, thousands of organizations laid off over 40 million American workers. But lost in that grim news was a one positive statistic. Walmart hired 235,000 people, an average of more than 5,000 people a day, to meet its dramatic demand for its goods and services.

    Not many firms will need to hire the near equivalent of a small city's population in six. In Walmart case, the firm needed to rapidly fill in for those sick or staying home from the virus and new recruits for warehouses, distribution centers and stores. But experts say there is an important lesson here: at some point, the economic disruption caused by the COVID-19 pandemic will fade, and many companies may need to fill many jobs fast. To do that successfully, they say, will take a lot more than just hanging out a bunch of 'Help Wanted' signs.

    Read on IT Hiring Kit  Order IT Hiring Kit

    - WalMart hires over 235,000 new employees in six weeks

    Work From Home (WFH) increases requiremets for Security Audits

    Security Audit Program 2020 edition just released 

    Security Audit ProgramQuestions such as the following are not uncommon with new emphsis on Work From Home (WFM):

    • How do you know who can access this folder with financial/customer/sensitive data in it?
    • Who authorized a user to have access permission to a file and how?
    • If a key file was deleted, how would you know it happened, or who did it?
    • Who were the last people to access a critical folder, and what did they do?
    • How do you make sure that the right people have access to your data?

    Order Security Audit Program Download Selected Pages

    - Work From Home (WFH) increases requiremets for Security Audits

    Telecommuting puts small to mid-sized companies at risk

    Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs

    Telecommutions Policy BundleIt is one thing to say that workers will work remotely and access sensitive and confidential information via the internet.  It is quite another to be able to assure executive management that critically sensitive information is protected and compliance mandates are met.

    The Mobility Policy bundle contains eight (8) policies:

    1. BYOD Access and Use Policy;
    2. Mobile Device Access and Use Policy;
    3. Privacy Compliance Policy;
    4. Record Management, Retention, and Disposition Policy;
    5. Social Networking Policy;
    6. Telecommuting Policy;
    7. Travel, Laptop, PDA and Off-Site Meeting Policy; and,
    8. Wearable Device Policy.  

    All of these policies are supported by 28 electronic forms and 14 full job descriptions from Chief Mobility Officer and Chief Security Officer to the Record Management Coordinator.

    Read On Order Mobility Policy Bundle Download Sample

    - Telecommuting puts small to mid-sized companies at risk