CIO - Productivity Kit

Sarbanes-Oxley Compliant

IT and Internet Job Descriptions -- Disaster Recovery Template  -- IT Service Management Template -- Sensitive Information Policy -- Salary Survey -- Security Template 

Order Now SAVE $850 to $1,140

CIO ProductivityThe CIO productivity kit Standard edition contains

  • 273 job descriptions in MS WORD .docx format
  • Current IT Salary Survey for US and Canada (by city) PDF
  • IT Infrastructure, Strategy, and Charter Template in MS WORD .docx format
  • Disaster Recovery Template which is Sarbanes Oxley compliant in MS WORD .docx format
  • Security Template which is Sarbanes Oxley and ISO 27000 compliant in MS WORD .docx format
  • IT Service Management Template (Change Management, Help Desk, and Service Requests) in MS WORD .docx format
  • Sensitive Information Policy (Protect  Credit Card Card and Personal Information) in MS WORD .docx format

The CIO productivity kit Metric edition contains

  • Practical Guide for Cloud Outsourcing in MS WORD .docx format
  • Metrics for Internet and IT (metric kit) in MS WORD .docx format
  • Service Level Policy Agreement Policy Template (metric kit) in MS WORD .docx format

Order Now SAVE $850 to $1,140CIO Productivity Kit Table of Contents


Disaster Plan

Disaster Recovery Template (DRP) 

The Disaster Recovery Plan template (DRP) can be used for any enterprise.   DRP Template is sent to you via e-mail in WORD and/or PDF format. Included is a Business Impact Questionnaire as well as a full Job Description for theDisaster Recovery Manager

Order Disaster Recovery Plan TemplateDownload Selected Pages


Security Manual Template

Security Manual 

The plan is 178 pages and includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement.  The electronic document includes proven written text and examples for your security plan.

Order Security Manual Template


IT Job DescriptionsInternet and  IT Job Descriptions     

The Internet and IT Position Descriptions are in Word for Windows format (.docx).  Includes positions from CIO and CTO to Wireless and Metrics Managers. All of the positions in the book have been created to reflect the technology world of today.


Metrics for ITMetrics for the Internet & IT 

The Metrics for the Internet and Information Technology HandiGuide® is over 320 pages, defines 540 objective metrics, and contains 83 metric reports that show over 240 objective metrics.

Order MetricsDownload IT Metrics selected pages


Sevice Level Agreement MetricsService Level Agreement Policy Template


The Service Level Agreement Policy Template is a nine page policy for a single application,  It defines specific SLAs and metrics that are both internally and externally focused. The sample contain over 70 possible metrics presented graphically in PDF format.

Order Service Level Agreement MetricsDownload SLA metrics

Salary Survey

IT  Salary Survey

The Janco Associates, Inc. survey draws on data collected throughout the year (data as of January 2011) by extensive internet-based and completed survey forms sent to businesses throughout the United States and Canada.  Our database contains over 85,000 data points.

Order IT Salary SurveyDownload IT Salary Survey


  

 

 

 

 

 

CIO - CTO - CSO News


Over 1/3 of IT pros do work from home

June 24th, 2016

Over 1/3 of IT pros do work from home

38 percent of workers in management, business, and financial operations
occupations, and 35 percent of those employed in professional and related occupations,did some or all of their work from home on days they worked, according to the U.S. Bureau of Labor Statistics. Workers employed in other occupations were less likely to work from home on days they worked.

Order IT Job Description
Sample job description
 Download Selected IT Job Descriptions

- more info

Importance of infrastructure policies and a focused security program is critical

June 17th, 2016

Importance of infrastructure and security programImportance of infrastructure policies and a focused security program is critical

The digital landscape today is now open to increased cyber-attacks. The increase in frequency of attacks need a well-developed set of infrastructure procedures and a focused security program. IT pros need a focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy.

Cyber-attacks cannot be prevented but with concentrated awareness and efforts, organizations can arm their customers, partners, and employees with safeguard measures require focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy. Cyber-attacks cannot be prevented but with concentrated awareness and efforts, organizations can arm their customers, partners, and employees with safeguard measures.

Order Security ManualDownload Selected PagesVersion History

- more info

Microsoft’s browsers are getting ready to bite the dust

June 1st, 2016

Microsoft’s browsers are getting ready to bite the dust

Back in November 2015, IE accounted for more than half of the global browser user share. Currently, IE and Edge combined to account for 38.7% of the global user share.

In the last six months alone, IE -- a bucket into which Net Applications also throws in Windows 10's Edge -- has lost 11.4 percentage points, an unprecedented decline for any browser at any point in the last 11 years.

Order Browser Market Share StudyDownload Selected Pages

- more info

Cost of security breaches escilates

May 26th, 2016

Cost of security breaches escalates

Cost of Security breachAttacks by malicious insiders arethe costliest to fix ($145,000), followed by denial of service ($127,000) and Web-based attacks ($96,000).

The top 10 drivers of security shortcomings include:

  1. Insufficient funding for security
  2. Lack of commitment by senior executive management
  3. Lack of leadership in the security arena by the CIO
  4. Belief that the organization will not be targeted
  5. Lack of internal resources who are "security" experts
  6. Lack of an effective IT security strategy
  7. Lack of an action plan on how to implement a solution before an event
  8. Infrastructure for IT that does not easily lend itself to security implementation including complex and disjointed applications and data
  9. No central focus with the enterprise that focuses on security
  10. Lack of a good termination policy for employees and contractors
Order Security ManualDownload Selected Pages
- more info

Privacy lost with new audio fingerprint tracking

May 20th, 2016

Privacy Lost

It no longer is just the NSA, now some websites using audio fingerprinting for identifying and monitoring web users. A number of sites use the AudioContext API to identify an audio signal that reveals a unique browser and device combination.

The method doesn't require access to a device's microphone, but rather relies on the way a signal is processed. The researchers, Using the AudioContext API to fingerprint does not collect sound played or recorded by your machine. An AudioContext fingerprint is a property of your machine's audio stack itself.
In addition, researchers have found 715 of the top one million websites are using WebRTC to discover the local IP address of users. Most of these are third-party trackers.

Order Sensitive Information PolicyDownload Selected Pages

- more info

WYOD a top concern of C-Level executives

May 2nd, 2016

WYOD a top concern of C-Level executives

Anyone can purchase a wearable device.  If there is an open wi-fi connection that the device can map to sensitive personal and enterprise infromation is at risk. 

Rules and policies need to be put in place to mitigate this risk.  The question is where to start.  Janco has answered that in its wearable device policy template.  It includes robust rules on wearable devices.  In addition, it provides a specifice road map to be followed when developing a strategy on how to deal with this new potential threat.

Wearable Device Policy - It is 17 pages in length. It contains everything that an enterprise needs to implement a functioning and compliant Wearable Devices device and use process. Included are forms defining the mobile device environment.

 Download Selected Pages

Read on...

 

- more info

Record Management, Retention, and Destruction Policy

April 28th, 2016

Records ManagementThe volume of documents within organization is exploding, managing these documents is a real and pressing challenge. If your organization is like many others, paper documents, emails, faxes, PDFs, CAD and other office documents are left unmanaged and stored in filing cabinets, on file servers or on desktop PCs around the office. This exposes your organization to compliance risks, service delays, cost overruns and a host of other challenges.

Record Management Policy Download Selected Pages

Today, software solutions are available that combine document and records management capabilities into a single, complete offering. These solutions enable you to reduce the time, cost and complexity of storing and accessing your documents throughout the information lifecycle. They also give you the power to improve access to critical documents, enhance customer service and operational efficiency - all while reducing risks and addressing compliance demands.

- more info

Contract terms for outsource agreemeents

April 8th, 2016

Contract terms for outsource agreementsContract terms for outsource agreemeents

Specific contractual provisions to minimize cyber risk in outsourcing contracts are:

  • Setting security standards for the vendor;
  • Restricting on subcontracting;
  • Employee related protections, such as background checks and training; 
  • Security testing;
  • Security audits;
  • Security incident reporting and investigation;
  • Data retention and use restrictions;
  • Customer data access rights; and
  • Vendor liability for cyber incidents.

Reasons Why CIOs Recommend Outsourcing

Order Cloud Outsourcing Template  Download Selected Pages

- more info

Ten tips to protect your sensitive personal information

March 30th, 2016

Ten tios to protect your sensitive personal informationTen tips to protect your sensitive personal information

  1. Monitor credit reports
  2. Never provide personal information over public Wi-Fi
  3. Protect your password
  4. Don't use the same password on all accounts
  5. Never store passwords on your computer
  6. Watch out for phishing emails
  7. If you do receive a suspicious-sounding email, contact your service provider directly
  8. Take physical precautions
  9. Shred bills, credit offers, and expired credit cards
  10. Layer your cybersecurity

Order Security Manual Download Selected Pages

- more info

Credit card chip usage expanding

March 23rd, 2016

Credit card chip usage expanding

Credit Card ChipCredit card chip usage improves the security landscape.  Some key facts that you need to understand are:

  • Credit card chips reduce counterfeit card fraud: Countries that have been using chip cards for many years have seen significant reductions in counterfeit card fraud. In the UK, for example, counterfeit card losses have been reduced by 70%.
  • An increased number of chip cards in consumers' possession: over 400 million chip cards have been issued in the U.S. as of the end of 2015.
  • Majority of all retail outlets now accept chip cards: almost 90% of all travel, entertainment, and high cost retail operations accepts chip cards

Things that physical credit card sites need to do to minimize transaction costs are:

  • Swipe and insert: Always make sure to swipe or insert cards whenever possible. Manually keying in card information can cause a higher interchange rate for the transaction.
  • Daily settlement: Settle transactions each day. If you routinely settle transactions more than 24 hours after they are authorized.
  • Get accurate customer information: For online transactions validate customers' billing and address information is entered correctly.

Order Security Manual Download Selected Pages

- more info