Workforce Productivity - Best Practices

IT Job Descriptions

Steps to improve IT workforce productivity include:

  • Develop a strong team orientation - Effective teams and the effective planning and execution provide the structure necessary to get the best from all team members.  Well written job descriptions are a first step in that process.

  • Align roles and performance objectives - Change causes by today's business environment causes misalignments of roles and focus of a significant number of the workforce.  Job descriptions that are results and metric driven are an essential tool in the management process.

  • Set performance goals and manage workforce with that as the focus - A majority of the workforce performs better if they have specific goals they must achieve.  Good job description include measurable goals.

  • Evaluate workforce based on defined objectives and goals  - Review job performance based on job content and metrics to see how they can be modified to improved organizational productivity and minimize organizational dysfunction. 






IT Best Practices News and Information

Disaster Planning has been impacted by Ebola

October 23rd, 2014

Ebola shows how exotic threats filed in the ‘it will never happen’ folder can impact anyone and cause major disruption.

Another such threat is from Solar flares traveling from the sun to the earth which contain massive amounts of energy can disrupt electronic systems. This along with a man made high altitude electromagnetic pulse could be just as devastating as solar storms.

The question for business continuity managers is how can we prepare for these events? Is it possible to build a business continuity and/or disaster recovery plan that addresses a long-term power outage and inability to operate most electronic devices?

Disaster Recovery Security Cloud DRP Security Incident Communication Policy 
 Order Disaster Plan TemplateDisaster Plan Sample
- more info

Cloud Computig shifts computing model for many corporatrions

September 3rd, 2014

IT InfrastructureCloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is not whether the cloud is part of their infrastructure plans, but which applications and workloads to move to the cloud and when. But even as the benefits of cloud and hosted models have become apparent, concerns persist about security, and an assumption lingers that the cloud is inherently less secure than an enterprise data center environment.

Order Outsourcing PolicySample Outsourcing Policy
- more info

Infrastructure updates planned for 2015 by CIOs

August 19th, 2014

InfrastructureCIOs plan to update their IT and application infrastructure for 3 reasons:

  • Legacy systems need to be able to be accessed via the cloud and be available for BYOD
  • Bridge the gap between the IT application infrastructure and security compliance requirements
  • Focus on gaining competitive advantages and improving productivity at the same time

IT Infrastructure PoliciesInfrastructure Policy Sample

- more info

New Net Neutrality Rules Will Increase the Size of the FCC

April 24th, 2014

The U.S. Federal Communications Commission (FCC) proposed new rules for net neutrality that will increase the federal bureaucracy and government oversight of the internet.

The FCC proposed new net neutrality rules that will allow broadband providers to charge companies like Netflix for preferential traffic management, according to a news report.

The FCC's proposal would prohibit broadband providers from slowing down or blocking traffic to specific websites, but allow them to give some traffic preferential treatment based on commercially reasonable terms. The FCC would determine what's commercially reasonably on a case-by-case basis.

You can get all of Janco's templates in its IT Management Suite. When you do that you save over $2,500 and when implemented your enterprise is positioned to have a "WORLD CLASS" Information Technology function. You will be in compliance with all mandated requirements including all US and International requirements.

CIO Management Suite

- more info

Hackers are attacking mobile devices

April 2nd, 2014

Primarily because mobile device applications have the potential to interact with confidential or sensitive information, many organizations see this area as a primary technology challenge to address and a main focus for security initiatives. Hackers have taken notice to this fact and have started targeting these mobile applications - which can ultimately lead to decreased trust in an application or an organization that uses it.

  • Mobility Policy Bundle (more info...) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
    • BYOD Policy Template (more info...) Includes electronic BYOD Access and Use Agreement Form
    • Mobile Device Access and Use Policy (more info...)
    • Record Management, Retention, and Destruction Policy (more info...)
    • Social Networking Policy (more info...) Includes electronic form
    • Telecommuting Policy (more info...) Includes 3 electronic forms to help to effectively manage work at home staff
    • Travel and Off-Site Meeting Policy (more info...)
- more info