Workforce Productivity - Best Practices

IT Job Descriptions

Steps to improve IT workforce productivity include:

  • Develop a strong team orientation - Effective teams and the effective planning and execution provide the structure necessary to get the best from all team members.  Well written job descriptions are a first step in that process.

  • Align roles and performance objectives - Change causes by today's business environment causes misalignments of roles and focus of a significant number of the workforce.  Job descriptions that are results and metric driven are an essential tool in the management process.

  • Set performance goals and manage workforce with that as the focus - A majority of the workforce performs better if they have specific goals they must achieve.  Good job description include measurable goals.

  • Evaluate workforce based on defined objectives and goals  - Review job performance based on job content and metrics to see how they can be modified to improved organizational productivity and minimize organizational dysfunction. 

 

 

 

 

 

IT Best Practices News and Information


Every Business Needs Security

January 22nd, 2016

Every Business Needs Security

 

Every business needs securityOf the hundreds of data breaches that occurred in 2015, most people can only name those that targeted major corporations: BlueCross BlueShield, Experian, Ashley Madison, etc. However, just because these massive thefts were the only ones to make the news doesn’t mean smaller businesses are safe from cyberattacks; in fact, oftentimes they are even more vulnerable to digital disasters.

 

A majority of small businesses are woefully under-protected against cyberthreats, but erroneous feelings of invincibility are preventing businesses from correcting their cybersecurity mistakes. Learning why security is important for every business - no matter how small - will help companies stay alive in this dangerous digital climate.

 

Order Security Manual Download Selected Pages

- more info

Cost of averge security breach $3.8 million

January 7th, 2016

Cybersecurity threats are on the rise. In 2015 the average cost of a data breach was $3.79 million, and that figure is expected to grow to close to $5 million by the end of this year.

Security RisksAreas of concern are:

  • Cloud Services - danger that they’re bypassing security protocols and systems in the process
  • Ransomware - Kits for this software are now readily availalbe. The attack encrypts important files, rendering data inaccessible until you pay the ransom.
  • Spear phishing - Phishing attacks are growing more sophisticated all the time, as official-looking messages and websites, or communications that apparently come from trusted sources, are employed to gain access to your systems.
  • Known vulnerabilities - Once these are published everyone is exposed
  • Internet of Things - As connectivity spreads into every corner of our lives and businesses, it becomes more and more challenging to maintain a clear view of entry points and data flow.

Order Security Manual Download Selected Pages

- more info

FBI can demand web history without a warrant

December 1st, 2015

FBI can demand web history without a warrant

The FBI can compel companies and individuals to turn over vast sums of personal data without a warrant. The FBI has used its authority to force companies and individuals to turn over complete web browsing history; the IP addresses of everyone a person has corresponded with; online purchase information, and also cell-site location information, which he said can be used to turn a person's phone into a "location tracking device.

Security Policies - Procedures - Audit Tools

Order Security Manual Download Selected Pages


- more info

Cybercrime costs businesses millions of dollars

October 23rd, 2015

Cybercrime costs businesses millions of dollars.

A recent survey of US companies reports an average cost at $15 million and in Russian the average cost at $2.4 million. Part of the differance is the dependance of US companies on the Internet.

Order Security Manual Download Selected Pages

Security Policies - Procedures - Audit Tools

Order Security Manual Download Selected Pages

- more info

World Class CIOs are focusing on wearable device Security

August 2nd, 2015

Wearable Device Security -- Janco Associates has determined that most mobile devices have some major vulnerabilities. They include:

  • Insufficient User Authentication/Authorization
  • Data Encryption Missing
  • Insecure Interfaces
  • Software/Firmware Updates Not Secure
  • Privacy Controls are missing

The purpose of the Wearable Device Policy Template is to define standards, procedures, and restrictions for end users who have specific and authorized business requirements to use the devices connected via a wireless or unmanaged network outside of ENTERPRISE’s direct control.

Wearable Device Policy - It is 17 pages in length. It contains everything that an enterprise needs to implement a functioning and compliant Wearable Devices device and use process. Included are forms defining the mobile device environment.

 Download Selected Pages

- more info