Index  Back  Next


Newsletter Topics
  • Business Continuity Planning 101
  • Compliance Kit Updated
  • IT Infrastructure Management - Premium Edition has 22 Electronic Forms
  • Security Manual Updated with Electronic Forms
  • CIO and IT Manager Productivity Tools

Business Continuity Planning 101

DR/BC Best of Breed

Many businesses have never tested the business continuity process in the event of a server or site failure

The basic process for developing a business continuity plan is:

  • Create a business continuity planning team: Members should be from operations management, the chief security officer, the IT department, legal staff, and human resources.
  • Define leadership roles: Determine which executives and employees are critical to operating the business (and supporting customers) that need to have access to key systems and information at all time.
  • Assume the worst and plan for needed extra capacity: Before an event occurs, businesses need to plan ahead for increased network bandwidth and secured remote access requirements.
  • Define emergency voice and data communications solutions: There are many to choose from, but a SSL VPN is one of the leading solutions to provide flexible, remote access, which is essential to any business continuity plan.
  • Define access points for operations, network and IT: Create a business continuity portal for employees and partners. If the company has an Intranet, this site becomes command central from which employees can access information - HR policies, emergency contacts and a "start here" feature should be included.
  • Contract for a secondary back-up site: Should the primary site be unavailable, companies should have a real-time mirror of data and staff housed at a secure facility.
  • Backup data: In the event that the secondary site is unavailable, organizations should plan for multiple layers of failover.
  • Plan to utilize smartphones and tablets: With mobile devices and “wireless networks”, IT departments can leverage these tools to ensure complete connectivity in times of emergencies.
  • Pre-arrange Internet based meeting capabilities: In the event of an office closure, employees still need to communicate internally or with external parties (i.e. suppliers, customers). Implement the technology before it is needed
  • Review number of sites and VPN gateways: Conducting an annual audit to provide a complete picture of your network and the ability to address problem areas before a disaster strikes.
  • Test and  test again: These ‘fire drills' enable the business continuity team to see how the current system is working, especially when employees are accessing information from remote locations (i.e. from home, a relative's house, and hotel). Once complete, those in management, IT and human resources can modify their business continuity plan accordingly.

All of this is defined in Janco's "Disaster Recovery - Business Continuity Template".

Read On... Order Now...


Compliance Kit Updated

Compliance Management Kit Compliance Program -10 Step program to follow

CIOs and CSOs are now under a great deal of scrutiny not only from their executive management but also from a range of governmental and industry regulatory bodies. Janco has created a ten step program that helps them address compliance issues directly. The program, when used in concert with Janco's Compliance Management products gets them in front of the issue.

More small and mid-sized business are impacted by state mandated (i.e. California, Massachusetts, New York, and others) than federal and SEC mandates.

Compliance Mandate Product Offerings

Read On  Order Compliance Management Kit  Download TOC


IT Infrastructure Management -- Premium Edition Has 22 Electronic Forms

Infrastructure PoliciesIn many enterprises, CIOs are perceived as mere technology managers, while in reality they should beviewed as business leaders. The CIO's focus should be on reducing costs and improving profitability through the strategic usage of IT. It is very important for the Information Technology organization to get out of a transactional mode. If the CIO has the right infrastructure in place, then the CIO can help in directing the strategy of the enterprise, and even shape its destiny. The CIO brings his own perspective, and without IT, you cannot build a robust and business.

The CIO Infrastructure Management Tool Kit is comprised of a collection of Janco products that CIOs and IT Managers can use to create a strategy and manage in the ever changing business environment.

Read on...

Or you can get the CIO Infrastructure Policy Bundle which includes the following policies with Electronic forms. The policies have just been updated to comply with all mandated requirements and include electronic forms that can be Emailed, filled out completely on the computer, routed and stored electronically. A totally solution that uses technology at its best.

The policies have just been updated to comply with all mandated requirements and include electronic forms that can be Emailed, filled out completely on the computer, routed and stored electronically -- a total solution.

We have just completed a major update of all the individual polices and all of the electronic forms.

With Premium Edition - 22 Electonic Forms:

  • Company Asset Employee Control Log
  • Disaster Recovery - Business Continuity LAN Node Inventory
  • Disaster Recovery - Business Continuity Location Contact Numbers
  • Disaster Recovery - Business Continuity Off-Site Inventory
  • Disaster Recovery - Business Continuity Personnel Location
  • Disaster Recovery - Business Continuity Plan Distribution
  • Disaster Recovery - Business Continuity Remote Location Contact Information
  • Disaster Recovery - Business Continuity Team Call List
  • Disaster Recovery - Business Continuity Vendor List
  • Email - Employee Acknowledgement
  • Employee Termination Checklist
  • Internet & Electronic Communication Employee Acknowledgement
  • Internet Access Request
  • Internet Use Approval
  • Mobile Device Access and Agreement
  • New Employee Security Acknowledgement and Release
  • Preliminary Security Audit Checklist
  • Security Access Application
  • Security Audit Report
  • Security Violation
  • Sensitive Information Policy Compliance Agreement

Read On  Order ERP Job Descriptions  Get Sample Job Description


Electronic Forms Added to Security Policies and Procedure Template

Version 9.1 of the Security Manual Template has been updated with fourteen electronic forms

Security Manual TemplateJanco Associates has just released version 9.1 of its popular Security Manual Template. Included with this update are fourteen electronic forms which are needed by any organization that wants to manage its security policies and procedures. The CEO of Janco said, “We have found that it is much easier and less costly to use electronic forms which can be emailed, filled out on a computer or tablet, and filed electronically than using traditional paper forms. “ In addition, “This also paves the way to a very green solution which utilizes technology to reduce the overhead in managing the security requirements of enterprises of all sizes.” He added, “With the ever increasing mandated compliance requirements we have updated this template four times in the last twelve months. We continue to update all of our products to meet both management requests and mandated requirements.”

Forms that can be Emailed, completed via a computer or tablet, and stored electronically including:

  • Application & File Server Inventory
  • Blog Policy Compliance Agreement
  • BYOD Access and Use Agreement
  • Company Asset Employee Control Log
  • Email – Employee Acknowledgement
  • Employee Termination Checklist
  • Internet Access Request
  • Internet & Electronic Communication Employee Acknowledgement
  • Internet Access Request
  • Internet Use Approval
  • Mobile Device Access and Agreement
  • Mobile Device Security and Compliance Checklist
  • New Employee Security Acknowledgement and Release
  • Outsourcing and Cloud Security Compliance Agreement
  • Outsourcing Security Compliance Agreement
  • Preliminary Security Audit Checklist
  • Privacy Compliance Policy Acceptance Agreement
  • Security Access Application
  • Security Audit Report
  • Security Violation
  • Sensitive Information Policy Compliance Agreement
  • Social Network Compliance Agreement
  • Telecommuting Work Agreement
  • Text Messaging Sensitive Information Agreement
  • Threat and Vulnerability Assessment
  • Work From Home Work Agreement
  • Plus more

Read on Order Security Manual Template Download sample