CIO - Productivity Kit
IT and Internet Job Descriptions
Disaster Recovery Template
IT Service Management Template
Sensitive Information Policy -
Salary Survey - Security Template
The CIO productivity kit Standard edition contains
- 243 job descriptions in MS WORD .docx format
- Current IT Salary Survey for US and Canada (by city) PDF
- IT Infrastructure, Strategy, and Charter Template in MS WORD .docx format
- Disaster Recovery Template which is Sarbanes Oxley compliant in MS WORD .docx format
- Security Template which is Sarbanes Oxley and ISO 27000 compliant in MS WORD .docx format
- IT Service Management Template (Change Management, Help Desk, and Service Requests) in MS WORD .docx format
- Sensitive Information Policy (Protect Credit Card Card and Personal Information) in MS WORD .docx format
The CIO productivity kit Metric edition contains
- Practical Guide for Cloud Outsourcing in MS WORD .docx format
- Metrics for Internet and IT (metric kit) in MS WORD .docx format
- Service Level Policy Agreement Policy Template (metric kit) in MS WORD .docx format
The Disaster Recovery Plan template (DRP) can be used for any enterprise. DRP Template is sent to you via e-mail in WORD and/or PDF format. Included is a Business Impact Questionnaire as well as a full Job Description for the Disaster Recovery Manager
The plan is 178 pages and includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement. The electronic document includes proven written text and examples for your security plan.
The 239 Internet and IT Position Descriptions are in Word for Windows format (.docx). Includes positions from CIO and CTO to Wireless and Metrics Managers. All of the positions in the book have been created to reflect the technology world of today.
The Service Level Agreement Policy Template is a nine page policy for a single application, It defines specific SLAs and metrics that are both internally and externally focused. The sample contain over 70 possible metrics presented graphically in PDF format.
IT Salary Survey
The Janco Associates, Inc. survey draws on data collected throughout the year (data as of January 2011) by extensive internet-based and completed survey forms sent to businesses throughout the United States and Canada. Our database contains over 85,000 data points.
CIO - CTO - CSO News
Distaster Plans need to consider impact of solar stormsMarch 31st, 2014
The sun emitted what NASA is calling a "significant" solar flare on Saturday that could affect communications systems on Earth on Wednesday.
The National Weather Service's Space Weather Prediction Center is calling the eruption a radio blackout event. The center reported that the solar flare could affect satellites and cause GPS errors. Electrical power lines could be hit by extra current, and high frequency communications could be blocked when the radiation hits Earth.
Solar flares are powerful bursts of radiation, according to NASA, but the harmful radiation from a flare cannot pass through the Earth's atmosphere to physically hurt humans. However, powerful flares can affect the Earth's atmosphere in the layer where GPS and communication signals travel.- more info
Focus of CIOs IT spending will be mobile computing and BYOD in 2014March 23rd, 2014
Spending on cloud and mobile will dominate technology investments for finance departments this year, but while the potential ROI in those areas is huge, so are the risks. By now most companies have adopted some cloud systems, and the good news is the process of implementing these solutions has gotten easier and more predictable. Unfortunately, for some organizations the process still has unexpected but significant complexities.
Mobile is also on track to reach new productivity heights over the next two years, but CFOs still have concerns, particularly about device security management. While some companies have moved forward with BYOD solutions, others are still trying to make buying mobile devices for their employees a more-coordinated effort. Finance chiefs must also grapple with due diligence prior to rolling out a new company-wide plan, as well as regulatory and compliance issues once that plan is in place.
- Mobility Policy Bundle (more info...) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
- BYOD Policy Template (more info...) Includes electronic BYOD Access and Use Agreement Form
- Mobile Device Access and Use Policy (more info...)
- Record Management, Retention, and Destruction Policy (more info...)
- Social Networking Policy (more info...) Includes electronic form
- Telecommuting Policy (more info...) Includes 3 electronic forms to help to effectively manage work at home staff
- Travel and Off-Site Meeting Policy (more info...)
IoE Internet of Everything is the next "hot" thingMarch 17th, 2014
The fast pace of technology is changing our notion of the modern organization. As barriers to market entry are falling, customers, employees, and citizens alike are demanding new ways to interact. This trend is moving us into the next wave of Internet evolution known as the "Internet of Everything" (IoE).
Connecting people, data, processes, and things, IoE is creating a digital disruption with great societal value as everything is coming online. Organizations of all types are realizing the benefit of this increased connectedness through operational efficiency and improved customer and citizen experiences. Many organizations are using IoE connections to run - not just monitor - complex operations in manufacturing, healthcare, financial services, utilities, and the public sector to generate and deliver significant value. Is IT ready for this shift?more info
Security Professionals are in DemnadMarch 10th, 2014
According to recent data, 25% of enterprise (i.e. more than 1,000 employees) and mid-market (i.e. 250 to 999 employees) organizations claim that they have a "problematic shortage" of IT security skills. In addition, of those organizations planning to add IT headcount in 2014, 42% say they will hire IT security professionals. This is also the highest percentage of all. In other words, more organizations plan to hire IT security professionals than any other role within IT.
Clearly, organizations are under-staffed when it comes to cybersecurity, but that's not their only problem. Many firms employ security professionals who lack the right skills to get the job done. When ESG asked enterprise security professionals to identify their biggest challenges around incident detection/response, 39% said that they lacked an adequate staff while 28% claimed that they lacked the adequate analytics skills. Alarmingly, many organizations are under-staffed AND under-skilled.more info
University records breached - 300,000 impactedFebruary 20th, 2014
The sensitive personal information for more than 300,000 faculty, staff, and students at the University of Maryland were stolen in a "sophisticated" cyberattack on the school's recently bolstered security defenses, the school's president revealed late Wednesday.
The names, Social Security numbers, and birth dates of 309,079 individuals affiliated with school's College Park and Shady Grove campuses who were issued a university identification card since 1998 were exposed in Tuesday's attack, according to an apology issued Wednesday by university President Wallace Loh. However, no financial, academic, or contact information was compromised, Loh said.
The university said state and federal law enforcement authorities are investigating the cyberattack and that computer forensics investigators were working to determine how the university's defenses were breached.more info
Updated infrastructure needed to meet digitization demandsFebruary 13th, 2014
As the global trend towards digitization accelerates, organizations need to reinvent their digital enterprises, again. More than new technologies are required; a whole cultural transformation is needed. Strong leadership will be essential to identifying and implementing compelling new technologies and to overcoming organizational obstacles.
CIO IT Infrastructure Policy and Procedure Bundle
Janco has assembled the policies that it has developed over time with some of the best IT organizations around the globe into a single package. With this bundle you get a PDF file that has all of the procedures in a single document that is over 300 pages long. In addition you get a separate MS-Word document for each procedure which can easily be modified.
Electronic Infrastructure Policy Forms - The electronic forms that Janco has developed can be e-mailed to users, completed on the computer, and then stored electronically. Forms comply with all mandated requirements for electronic records.more info
Text Messaging Sensitive and Confidential Information Policy released by JancoFebruary 1st, 2014
Text Messaging Sensitive and Confidential Information Policy released by Janco
Janco has added a critical security component to its CIO IT Infrastructure Policy Bundle with a policy that focuses on how to send secure sensitive data text messages via mobile devices
Park City, UT -- Janco Associates has developed a policy for managing security and compliance for clear text messages being sent via email or messaging apps that contain sensitive and confidential enterprise information. In addition, this new policy has been added to Jancos CIO IT Infrastructure Policy Bundle to complete the set of policies that every CIO needs to have in place to meet the expanding compliance and security requirements of today.
The CEO of Janco, Victor Janulaitis said, Leakage of data is an issue that everyone is aware of, be it accidental or intentional. Policies need to be put in place so everyone minimizes the risks that organizations face as the points of potential security breaches expand outside of the traditional office environment. The CEO added, As the more people work outside of the confines of an office, use mobile devices, communicate via social networks, and compliance requirements expand, organizations are faced with a dilemma. How can they balance security and compliance needs with the requirement of users to have both sensitive and confidential information away from the office and at their fingertips. That is why we have developed this complete set of rules that minimize the risks that organizations are facing.
The Text Messaging Sensitive and Confidential Information Policy as well as the other 16 policies in the CIO IT Infrastructure Policy Bundle are provided in MS WORD and PDF formats. The policies in the bundle are: Backup and Backup Retention Policy; Blog and Personal Web Site Policy; BYOD Access and Use Policy; Google Glass Policy; Incident Communication Plan Policy ; Internet, Email, Social Networking, Mobile Device, and Electronic Communication Policy; Mobile Device Access and Use Policy; Outsourcing Policy; Patch Management Policy; Physical and Virtual Server Security Policy; Record Management, Retention, and Disposition Policy; Sensitive Information Policy; Service Level Agreement Policy; Social Networking Policy; Telecommuting Policy; Text Messaging Sensitive and Confidential Policy; and, Travel, Laptop, PDA and Off-Site Meeting Policy.
All of Jancos products are delivered electronically for more information go to:
· Text Messaging Sensitive and Confidential Information Policy - http://www.e-janco.com/Text-Messaging-Policy.htm
· Infrastructure Policies - http://www.e-janco.com/Products-Policies.html
· Electronic Forms - http://www.e-janco.com/IT-Infrastructure-Forms.htmlJob Descriptions - http://www.e-janco.com/Job_Book.htm - more info
Some large companies were looking for IT Pros in the last 12 monthsJanuary 22nd, 2014
The employers with the most IT job postings last year were:
- Amazon.com - 16,146 ads;
- Accenture - 14,240 ads;
- Deloitte - 13,077 ads;
- Microsoft - 12,435 ads;
- Best Buy - 10,725 ads;
- IBM - 10,221 ads;
- General Dynamics - 9,705 ads;
- Science Applications International Corp. - 7,146 ads;
- Lockheed Martin - 6,995 ads; and
- Hewlett-Packard - 6,923 ads.
Last year, there were about 200,000 posted job ads in IT that did not require a bachelor's degree.
Both HP and IBM have been laying off employees as well as hiring.
The Conference Board recently reported that advertised vacancies were up 125,600 in December to 5.3 million, but government labor data said the economy only added 74,000 jobs in December.more info
Planning for retirement of COBOL based baby boomersJanuary 7th, 2014
Now's the time to plan for the retirement of key talent -- and the legacy systems they built -- before those pros leave the workforce.
Straightforward knowledge transfer -- having senior IT pros teach junior hires how to run the old systems -- isnt going to cut it. Your bright young things dont want to learn your creaky old operating system and programming language. And if you do teach them COBOL, youll soon discover everybody will cheerfully poach them.
Instead, the savvy CIOs will make the most of talent -- young and old -- while advancing their enterprise technology strategy. Bring in the new people and say, see these mainframes sitting in the basement? In five years they need to be gone. Figure out how were going to perform those same functions using state-of-the-art technology. Work with this 50 to 60-year-old guy who can tell you whats going to break and what you can and cant do.more info
FBI moves past fingerprints to identify criminalsDecember 19th, 2013
FBI moves past fingerprints to identify criminals and nearly 80 years after it began collecting fingerprints on index cards as a way to identify criminals, the FBI is moving to a new system that improves the accuracy and performance of its existing setup while adding more biometrics.
By adding palm print, face and iris image search capabilities, the FBI's Criminal Justice Information Services Division (CJIS) hopes to improve the accuracy of identity searches, make it easier to positively identify and track criminals as they move through the criminal justice system and provide a wider range of tools for crime scene investigators.
To take full advantage of all of the new capabilities, however, federal, state and local law enforcement agencies may need to update their own systems to be able to capture the data, forward it to the FBI and search against the nationwide database.- more info