Workforce Productivity - Best Practices

IT Job Descriptions

Steps to improve IT workforce productivity include:

  • Develop a strong team orientation - Effective teams and the effective planning and execution provide the structure necessary to get the best from all team members.  Well written job descriptions are a first step in that process.

  • Align roles and performance objectives - Change causes by today's business environment causes misalignments of roles and focus of a significant number of the workforce.  Job descriptions that are results and metric driven are an essential tool in the management process.

  • Set performance goals and manage workforce with that as the focus - A majority of the workforce performs better if they have specific goals they must achieve.  Good job description include measurable goals.

  • Evaluate workforce based on defined objectives and goals  - Review job performance based on job content and metrics to see how they can be modified to improved organizational productivity and minimize organizational dysfunction. 






IT Best Practices News and Information

Cybercrime costs businesses millions of dollars

October 23rd, 2015

Cybercrime costs businesses millions of dollars.

A recent survey of US companies reports an average cost at $15 million and in Russian the average cost at $2.4 million. Part of the differance is the dependance of US companies on the Internet.

Order Security Manual Download Selected Pages

Security Policies - Procedures - Audit Tools

Order Security Manual Download Selected Pages

- more info

World Class CIOs are focusing on wearable device Security

August 2nd, 2015

Wearable Device Security -- Janco Associates has determined that most mobile devices have some major vulnerabilities. They include:

  • Insufficient User Authentication/Authorization
  • Data Encryption Missing
  • Insecure Interfaces
  • Software/Firmware Updates Not Secure
  • Privacy Controls are missing

The purpose of the Wearable Device Policy Template is to define standards, procedures, and restrictions for end users who have specific and authorized business requirements to use the devices connected via a wireless or unmanaged network outside of ENTERPRISE’s direct control.

Wearable Device Policy - It is 17 pages in length. It contains everything that an enterprise needs to implement a functioning and compliant Wearable Devices device and use process. Included are forms defining the mobile device environment.

 Download Selected Pages

- more info

Disaster Recovery Digest

July 1st, 2015

Disaster Recovery Digest

Disaster Business Continuity Preparation
  1. Google data center security & disaster recovery This is a great video on physical security as well as the the software security. This is a great primer which all CIOs and Data...
  2. 10 best practices for cloud disaster recovery Cloud Disaster Recovery 10 Best Practices Creating out a complete cloud disaster recovery infrastructure can be cost prohibitive for many organizations.  Ten best practices are:...
  3. Will your disaster recovery provider be in business when you need them? Disaster Recovery plans that depend on outsourcers face significant additional risk What if your were in Florida and the Hurricane season was in full swing...
  4. Options for a data center disaster recovery strategy Data Center disaster recovery strategy – options A critical component of a disaster recovery business continuity is the data center disaster recovery strategy — Hot...
  5. Infrastructure Key to Data Center Management and Disaster Recovery Infrastructure is key to data center management Data Center Management Issues – Your data centers are stuck in a rut. While 90 per cent have...


- more info

IT hiring takes off - Over 140,000 jobs added in the last 12 months

June 13th, 2015

The IT Job Market job market kicked into higher gear in May, with more than 14,000 new jobs added in the field nationwide.

Janco Associates, which tracks IT jobs and CIO hiring trends, crunched the latest employment data released by the Bureau of Labor Statistics and found hiring in the IT sector once again on an upswing after the relative doldrums of the first quarter.

IT Hiring IT Job Descriptions IT Salary SurveyIT Salary SurveyJob Descriptions
Order IT Hiring Kit
- more info

BYOD management key concern of many C-Level executives

June 2nd, 2015

BYOD management key concern of many C-Level executives

Bring Your Own Device Sample

Three concerns for management of BYOD are:

  • Take control of BYOD costs by automatically tracking and billing work-related spend on employee-owned devices on almost any network
  • Enable employees to be more productive by eliminating time-consuming manual processes
  • Reduce the effort and cost of monitoring, processing and reporting BYOD expenses

BYOD Policy Template meets all mandated compliance requirements

Janco, in concert with a number of world class enterprises had created a BYOD Policy Template that addresses these issues and provides solutions for the following questions:

  • What are the legal implication of BYOD - What is the impact of the Stored Communication Act - Record Retention and Destruction?
  • What happens to the data and audit trail on a BYOD when an employee leaves the company?
  • What about a lost or stolen BYOD?
  • How is the BYOD configured to receive and transmit corporate data?
  • What kind of passwords are acceptable to use on a BYOD?
  • What kind of encryption standards are acceptable for BYOD?
  • What types of BYOD are allowed and what types are not?
  • What about jail broken, rooted or compromised BYOD?
- more info