XML News Feed   eJobDescription
Toggle Menu

CIO - Productivity Kit


Sarbanes-Oxley Compliant

IT and Internet Job Descriptions 
Disaster Recovery Template 
IT Service Management Template
Sensitive Information Policy - Salary Survey - Security Template 

Order Now SAVE $850 to $1,140

 

CIO ProductivityThe CIO productivity kit Standard edition contains

  • 243 job descriptions in MS WORD .docx format
  • Current IT Salary Survey for US and Canada (by city) PDF
  • IT Infrastructure, Strategy, and Charter Template in MS WORD .docx format
  • Disaster Recovery Template which is Sarbanes Oxley compliant in MS WORD .docx format
  • Security Template which is Sarbanes Oxley and ISO 27000 compliant in MS WORD .docx format
  • IT Service Management Template (Change Management, Help Desk, and Service Requests) in MS WORD .docx format
  • Sensitive Information Policy (Protect  Credit Card Card and Personal Information) in MS WORD .docx format

The CIO productivity kit Metric edition contains

  • Practical Guide for Cloud Outsourcing in MS WORD .docx format
  • Metrics for Internet and IT (metric kit) in MS WORD .docx format
  • Service Level Policy Agreement Policy Template (metric kit) in MS WORD .docx format

Order Now SAVE $850 to $1,140

 

 


Disaster Plan

Disaster Recovery Template (DRP) 

The Disaster Recovery Plan template (DRP) can be used for any enterprise.   DRP Template is sent to you via e-mail in WORD and/or PDF format. Included is a Business Impact Questionnaire as well as a full Job Description for the Download Disaster Recovery TemplateDisaster Recovery Manager





Order Security Manual TemplateSecurity Manual 

The plan is 178 pages and includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement.  The electronic document includes proven written text and examples for your security plan.Download Security Manual Template

 



Order IT Job DescriptionsInternet and  IT Job Descriptions     

The 239 Internet and IT Position Descriptions are in Word for Windows format (.docx).  Includes positions from CIO and CTO to Wireless and Metrics Managers. All of the positions in the book have been created to reflect the technology world of today.Download IT Job Descriptions

 



Order MetricsMetrics for the Internet & IT 

The Metrics for the Internet and Information Technology HandiGuide® is over 320 pages, defines 540 objective metrics, and contains 83 metric reports that show over 240 objective metrics.Download IT Metrics

 



Sevice Level Agreement MetricsOrder Service Level Agreement MetricsService Level Agreement Policy Template


The Service Level Agreement Policy Template is a nine page policy for a single application,  It defines specific SLAs and metrics that are both internally and externally focused. The sample contain over 70 possible metrics presented graphically in PDF format.

 


Salary SurveyOrder IT Salary Survey

IT  Salary Survey

The Janco Associates, Inc. survey draws on data collected throughout the year (data as of January 2011) by extensive internet-based and completed survey forms sent to businesses throughout the United States and Canada.  Our database contains over 85,000 data points.

Free Summary Of Our Salary Survey


  

 

 

 

 

 

CIO - CTO - CSO News


CIO best practices readings

August 22nd, 2014

CIO best practices readings:

CIO - CTO  Changing Role

Chief Information Officer - Chief Technology Officer

Order CIO Job Description
  • CIO Issues with workload, budgeting, and staffing CIO issues are made more complex as staffing levels and budgets remain flat As the 2014 budgeting cycle starts, CIOs clearly have their hands full...
  • 10 BYOD Best Practices for CIOs BYOD Best Practices for CIOs Bring Your Own Devices (BYOD) is exploding all over corporations.  CIOs are in the cross hairs and need to follow...
  • IT Staffing 2015 IT staffing 2015 IT staffing companies and researchers released a flurry of information as the  first half of the year ended.  2015 is looking great...
  • Top 10 Backup Best Practices 10 Backup Best Practices – Rules of the Road for CIOs and DR/BC Managers Top 10 Backup Best Practices – Many CIOs want to improve...
  • Top 10 IT Professional Staff Issues for CIO Top 10 IT Professional Staff Issues for CIO As budgeting starts for 2015, the top 10 IT professional staff issues that CIOs and HR departments...
- more info

CIOs in the million dollar club get stock

August 13th, 2014

Janco Associates has identified 29 CIOs who made over $1,000,000 in 2013. Interestingly not get to that number via base compensation.  Almost all get grants of stock which by itself is over $1,000,000.

CIO Compensation

Order Salary Survey    Free Salary Survey
- more info

Many data breaches take over 1 year to fix after the first intrusion

July 28th, 2014

Security Audit Program

ISO 28000, 27001, & ISO 27002 / HIPAA / SOX PCI-DSS Compliant

Severs and coprorate data are breached on a daily basis.  While this is happening most companies are  unaware that their propritary information is being stolen. Janco has found that over 90% of cybercrime victims find out about the compromise only after a 3rd party notifies them.  Then after a cybercriminal gains access to an enterprise's network it takes an average 416 days to detect the intrusion.

OrderTable of Contents

- more info

Policies are critical for mobile computing

July 25th, 2014

Telecommuting, BYOD, and other mobile technologies have revolutionized the way millions of people do their jobs. Employees now have the flexibility to work anytime from anywhere. For enterprises, the increase in employee productivity does often translate into faster response time, more revenue and higher margins.

Mobility Policy Bundle (more info...) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable

  • BYOD Policy Template (more info...) Includes electronic BYOD Access and Use Agreement Form
  • Mobile Device Access and Use Policy (more info...)
  • Record Management, Retention, and Destruction Policy (more info...)
  • Social Networking Policy (more info...) Includes electronic form
  • Telecommuting Policy (more info...) Includes 3 electronic forms to help to effectively manage work at home staff
  • Travel and Off-Site Meeting Policy (more info...)
Order
- more info

Top 10 CIO Staff Issues

July 16th, 2014

The top 10 concerns of CIOs in staffing are:

  1. Retaining existing staff
  2. Improving employee morale
  3. Adding new technical skills to staff
  4. Providing competitive compensation
  5. Maintaining and improving existing productivity and service levels
  6. Providing competitive benefits
  7. Reducing employee burn-out
  8. Managing organization culture
  9. Providing viable career path
  10. Utilizing social networking in the recruiting process
Order CIO Job Description
- more info

Top 5 Firewall Management Best Practices

July 11th, 2014

Top 5 best practices to address some of the most common firewall challenges that lead to misconfigurations or other problems that cause firewalls to fail in their crucial missions.

  • Keep the enterprise security policy manager or compliance manager in the loop on firewall changes.
  • Clean up unused rules.
  • Eliminate conflicting rules.
  • Follow a consistent workflow for requesting and implementing firewall changes.
  • Get application developers or the dev ops team on the same page with the firewall administrator.

Order Security ManualTable of Contents

- more info

2014 Mid-Year IT Salary Survey Now Available

July 5th, 2014

T Salaries up less than 1%

IT Pros see little improvement in pay according to Janco's Mid-Year 2014 IT Salary Survey

IT Job DescriptionsThe Mid-Year 2014 Salary Survey, just released by Janco Associates and eJobDescription.com, is not good news for IT Professionals.  The survey shows that hiring and salaries has not significantly improved for IT professionals in most North American metropolitan areas.

Order Salary Survey    Free Salary Survey
- more info

Top 5 issues CIOs need to address

June 23rd, 2014

Top 5 issues that are causing friction between business users and CIOs are:

  1. Gaps in customer satisfaction and the perceived value of services
  2. Excessive bureauacy  in dealings with IT by users
  3. Slowness in adapting and implementing new technology solutions
  4. Dissatisfaction with  chargeback systems that are arbitrary and do not reflect business value
  5. Inadequate IT support, which decreases productivity and revenue
Order CIO Job Description
- more info

Business Continuity Disaster Recovery Planning Guide

June 9th, 2014

HandiGuide - Business Continuity Disaster Recovery Planning Guide

Janco's HandiGuide offers a business perspective on what is often mistakenly considered a technological issue.

Disaster Recovery

The most crucial disaster recovery considerations are determined more by business needs than IT requirements. The most important disaster recovery decisions are not about technology, but are about the business demands that drive technology choices.

This document looks at the following topics:

  • Assess Your Business Needs  
  • Disaster Recovery vs Business Continuity    
  • Compliance Requirements 
  • Going Beyond Business Impact Analysis 
  • Review Your Options  
  • Match Your Service Level Agreements to Your Priority  
  • Set Your Expectations
  • A Dive into Data Replication                       
  • Test Your Plan  

 Order Disaster Plan TemplateDisaster Plan Sample

- more info

Insiders cause over 35% of all data breaches

May 6th, 2014

Research shows that more than 35% of data breaches were perpetrated by an insider, including employees, contractors and trusted business partners. On average, an attack by an insider is likely to cost an average of $412K per incident.

The intentions of these insiders can be sabotage, fraud, intellectual property theft or espionage. However, in many cases, patterns of detectable behavior and network activity emerge that provide indicators of risk, assist in early detection and in speeding up response time of an actual incident.

- more info