CIO - Productivity Kit


Sarbanes-Oxley Compliant

IT and Internet Job Descriptions 
Disaster Recovery Template 
IT Service Management Template
Sensitive Information Policy - Salary Survey - Security Template 

Order Now SAVE $850 to $1,140

 

CIO ProductivityThe CIO productivity kit Standard edition contains

  • 243 job descriptions in MS WORD .docx format
  • Current IT Salary Survey for US and Canada (by city) PDF
  • IT Infrastructure, Strategy, and Charter Template in MS WORD .docx format
  • Disaster Recovery Template which is Sarbanes Oxley compliant in MS WORD .docx format
  • Security Template which is Sarbanes Oxley and ISO 27000 compliant in MS WORD .docx format
  • IT Service Management Template (Change Management, Help Desk, and Service Requests) in MS WORD .docx format
  • Sensitive Information Policy (Protect  Credit Card Card and Personal Information) in MS WORD .docx format

The CIO productivity kit Metric edition contains

  • Practical Guide for Cloud Outsourcing in MS WORD .docx format
  • Metrics for Internet and IT (metric kit) in MS WORD .docx format
  • Service Level Policy Agreement Policy Template (metric kit) in MS WORD .docx format

Order Now SAVE $850 to $1,140

 

 


Disaster Plan

Disaster Recovery Template (DRP) 

The Disaster Recovery Plan template (DRP) can be used for any enterprise.   DRP Template is sent to you via e-mail in WORD and/or PDF format. Included is a Business Impact Questionnaire as well as a full Job Description for the Download Disaster Recovery TemplateDisaster Recovery Manager





Order Security Manual TemplateSecurity Manual 

The plan is 178 pages and includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement.  The electronic document includes proven written text and examples for your security plan.Download Security Manual Template

 



Order IT Job DescriptionsInternet and  IT Job Descriptions     

The 239 Internet and IT Position Descriptions are in Word for Windows format (.docx).  Includes positions from CIO and CTO to Wireless and Metrics Managers. All of the positions in the book have been created to reflect the technology world of today.Download IT Job Descriptions

 



Order MetricsMetrics for the Internet & IT 

The Metrics for the Internet and Information Technology HandiGuide® is over 320 pages, defines 540 objective metrics, and contains 83 metric reports that show over 240 objective metrics.Download IT Metrics

 



Sevice Level Agreement MetricsOrder Service Level Agreement MetricsService Level Agreement Policy Template


The Service Level Agreement Policy Template is a nine page policy for a single application,  It defines specific SLAs and metrics that are both internally and externally focused. The sample contain over 70 possible metrics presented graphically in PDF format.

 


Salary SurveyOrder IT Salary Survey

IT  Salary Survey

The Janco Associates, Inc. survey draws on data collected throughout the year (data as of January 2011) by extensive internet-based and completed survey forms sent to businesses throughout the United States and Canada.  Our database contains over 85,000 data points.

Free Summary Of Our Salary Survey


  

 

 

 

 

 

CIO - CTO - CSO News


Over 100,000 PINs hacked from IRS

February 12th, 2016

PINs hackedOver 100,000 PINs hacked from IRS

In January there was an attack on IRS using stolen Social Security numbers yielded 100,000 plus PINs that can be used to file tax returns electronically.

Using a robot (automated bot), attackers attempted to obtain E-file PINs corresponding to 464,000 unique SSNs, and did so successfully for 101,000 SSNs before the IRS blocked it.

Order Security Manual Download Selected Pages Version History

- more info

Forecast for fewer new jobs in 2016 than 2015 and 2014

February 8th, 2016

Forecast for fewer new jobs in 2016 than 2015 and 2014

Hiring has slowed for the last several months, as a result Janco has just issued a forecast for the number of new IT jobs the US will see over 100,000 new IT jobs in 2016.

IT Job Market Forecast

Janco reported that the BLS revised it data so that only 113,000 new IT jobs were created in 2015 and 2014.  That data adjustment by the BLS magnifies the slowing in new IT job creation.

Order Salary SurveyDownload Selected Pages

- more info

CIO's productivity is the key to success and compensation

January 22nd, 2016

CIO's productivity is the key to success and compensation

For CIO's productivitgy the organizational structure must support the goals of the organization and be consistent with its culture and capabilities. Well-defined reporting structures are based on the IT and business direction; take into account organizational barriers; and consider the effect of combining or separating the functions that are targeted for change.

Order CIO Job Description

Other Readings:

CIO and IT Manager Tools

You can get all of Janco's templates in its IT Management Suite. When you do that you save over $2,500 and when implemented your enterprise is positioned to have a "WORLD CLASS" Information Technology function. You will be in compliance with all mandated requirements including all US and International requirements.

- more info

IT Job Descriptions

January 8th, 2016

IT Job Descriptions

The Internet and IT Position Description HandiGuide has just been released.  The 2016 Edition includes 273 FULL JOB DESCRIPTIONS.  They have all been updated to meet the latest mandated requirements, BYOD support and a full set of Enterprise Resource Planning positions.  New in the 2016 edition are the following:

  • Updated job descriptions to meet compliance requirements
  • Updated Employee Termination Form to include BYOD and Personal Computer data removal
  • Added 3 job descriptions; Manager IoT; Manager Green Initiatives; and Android Programmer

BuySample Description Download Selected Pages

- more info

What factors need to be considered in a disaster recovery plan

December 16th, 2015

What factors need to be considered in a disaster recovery plan

Disaster Recovery TemplateJanco Associates has developed a data recovery plan template that businesses can use to build their own plan together with guidance on what needs to be included.  Janco recommends that any plan should take into account the following:

  • IT services: Which business processes are supported by which systems? What are the risks?
  • People: Who are the stakeholders, on both the business and IT side, in a given DR process?
  • Suppliers: Which external suppliers would you need to contact in the event of an IT outage? Your data recovery provider, for example.
  • Locations: Where will you work if your normal premises are rendered inaccessible?
  • Testing: How will you test the DR plan?
  • Training: What training and documentation will be provided to end users?

 Order Disaster Plan Template Download Selected Pages

- more info

CIOs continue to spend more on security

November 25th, 2015

CIOs continue to spend more on security

Security ManualCorporate spending on IT security reached a record $81 billion in 2015. This represents an 8% increase, and it’s predicted to increase another 8% in 2016. With an accelerated increase in spending on cybersecurity you would think companies are winning the battle against cybercriminals – but they’re not. Virus infections, network penetrations, and data breaches continue at alarming rates, and with greater consequence.

One key component is Janco's Security Manual Template see http://www.e-janco.com/Security.htm.

Order Security Manual Download Selected Pages

- more info

BYOD policy lacking in over 50% of all organizations

November 13th, 2015

BYOD policy lacking in over 50% of all organizations

BYOD policy25% of business have have no systematic security approach for dealing with BYOD. In addition, 53% of businesses do not have a formal BYOD policy.

Mobile security best practices have been pushed by analysts and security firms for more than a decade to protect sensitive corporate data.  But how companies implement security for BYOD workers falls short.

It is clear that a growing need exists for a more robust application of security policies and procedures in modern businesses.  Janco's BYOD Policy Template is the one took that can help achieve this. 

 Download Selected Pages

- more info

Is a cloud based DR plan workable?

November 9th, 2015

Is a cloud based DR plan workable?

There are several things that need to be considered before you can answered.  Included are:

Reasons Why CIOs Recommend Outsourcing

  • Public cloud versus private cloud including all of the mandated security, privacy and confidentiality requirements.
  • Bandwidth requirements and processing speeds of the data that is to be accessed
  • Location of the cloud processing site and availability of the the cloud after the event has happened

All of these questions are answered in Janco’s How to Guide Cloud and Outsourcing

Order Cloud Outsourcing Template  Download Selected Pages

- more info

Record Management is difficult with Shadow IT

October 30th, 2015

Record Management is difficult with Shadow IT

Record ManagementCloud Application and shadow IT put organizations at risk. Many cloud-based applications, don’t have the level of security process and controls to meet mandated compliance requirements.  For example, data stored in a cloud storage application may not be secured using security best practices.  If someone uploads sensitive or confidential information to that cloud application, not only is the data vulnerable to a breach but the organization may be non-compliant with corporate governance or regulatory requirements for record management.

Record Management Policy Download Selected Pages 

- more info

Congress to create one more govt agency for security

October 19th, 2015

Security PolicyU.S. Congress (House of Representatives) is proposing that the National Highway Traffic Safety Administration set up an Automotive Cybersecurity Advisory Council to develop cybersecurity best-practices for manufacturers of cars sold in the U.S.

In addition they are looking in to requiring vehicle manufacturers to state their privacy policies, besides providing for civil penalties of up to $100,000 for the hacking of vehicles.

Order Security Manual Download Selected Pages

 


 


- more info