Telecommuting Internet Productivity

Top 10 Factors Impacting Internet Telecommuting Productivity

Telecommuting Internet Productivity  – The top 10 things that Janco has found that impacts telecommuters Internet productivity are:

  1. Ads & Popups – 43% – while working random ads appeared that deflected the intention of the telecommuter
  2. Personal Surfing – 32% – Sites and activities that were not in an approved list were included in this factor
  3. Games – 25% – a standard list of game names and sites were processed against the activity of the user.
  4. Blogs – 23% – identified by WordPress sites and blog in the url.
  5. Spam – 22% – mail that was tagged as Spam or marked as trash
  6. Streaming Media – 21% – streamed data that was not work related
  7. Downloads – 15% – inactivity of telecommuter during the download process – includes some of the auto updates
  8.  Auto Updates – 10% – When this occured during a telecommuters work cycle
  9.  On-line Chat – 6% -Non-work related chat activity
  10. Misc – 12% – various actvitivies that were not work related

Telecommuting Internet Productivity

The data was captured via key log monitor when devices were active and the event took place that consumed more than ten (10) minutes of the Telecommuters time.   623 telecommuters were monitored over a period of two weeks.

The importance of policies and rules that need to be applied to both the telecommuters and the devices they used is one of the best ways to improve the productivity of telecommuters. Factors not included in this survey were the speed and quality of Internet connectivity.

Order Telecommuting PolicyDownload Selected Pages

2017 IT Job Market

2017 IT Job Market Summary shows 60,400 IT Job Created

2017 IT Job Market Summary data reported by Janco Associates is a good sign for IT Professional. Even though the number of new IT jobs lagged behind the prior four years, most of the lost jobs were in the Telecommunications field. Much of that can be attributed to automation of that function.
IT Job Market growth 2017 Computer and Systems design IT professionals saw the greatest increase in jobs with 46,800 new jobs added. That was followed by other Information Services with 10,700 and 6,300 in Data Processing, hosting and related services. After adjuments by the BLS Telecommunications was flat and 60,400 net new jobs were added in for IT Professionals.

There some differences in the data between the various charts as the number in the final reflect an adjustment in the November 2017 data of 20,700 additions to the telecommunication job market.

Top 10 Press Release Best Practices

Top 10 Press Release Best Practices that authors should follow

  1. Top 10 Press Release Best PracticesPerform extensive research.  Spend the time to read and subscribe to press releases not only in the niche you work within but from some of the larger and more successful companies in the world.
  2. Don’t assume anything.  Your reader may not know what it is they are getting, and since your goal is to have your reader generate buzz to their readers or media outlet, lay out the specifics for them.
  3. Don’t belittle or talk down to anyone.  While number 2 says to be specific about what you are writing, don’t write in a condescending manner, which almost always ends in a delete from the reader.
  4. Don’t oversell your product or service.  The purpose of a press release is to put it into the hands of those who have influence and a crowd to share it with.
  5. Don’t over-write or bloat the release.  A press release is not an article, it’s meant to be informative and easily digestible; keep the fluff to a minimum and focus on the details that pertain to the service or product
  6. Create a clever subject line.  Log into your email and check the messages you have deleted but never opened.  Chances are the subject line didn’t entice you to open it.
  7. Don’t jump the gun with sending your release.  Wait until you have all the facts, specifics and proper information for the contents within, then send it.
  8. Optimize the Press Release for Internet Search Engines. Once your release is issued it will be published on the Internet by a number of the media that receive it. For this reason, the author should communicate with internal Internet specialists.
  9. Maintain an internal list of reporters and editors. Over time authors will contact or be contacted by various members of the media. On-going relationships should be fostered with these contacts.
  10. Be available and responsive right after a press release is issued. Questions will be asked by interested media contacts. They have deadlines typically need to have their questions answered quickly.

Read onOrder media communication Policy

States unemployment

States unemployment in December 2017 higher in one more state

States Unemployment – The December BLS data shows there are 4 states with high unemployment number.  The states are Alaska 7.3%, District of Columbia 6.0%, New Mexico 6.0% and West Virginia 5.5%.

States with high unemployment

The question is what is the impact of this change on the IT Job Market?  Our answer is none as we still have 23 states in “full-employment” with full employment being defined as an unemployment rate of 4% or less.

Full Employment states
the bellwether states of Utah, Colorado, Massachusetts, Virginia, Florida, and Texas are all at unemployment rates of 3.9% or less

BYOD Management

BYOD Management and Ownership Issues

BYOD Management
BYOD Management

The era of the company-owned and company-provisioned mobile device seems to be closed, however, there is still a permissions issue. This issue applies to more than just mobile devices, though it’s a rare company that seems to think them through for employees’ home PCs and other devices. This also extends to the telephone number used on a SmartPhone.Order BYOD PolicyDownload Selected Pages

Organizations in government, health care, and defense especially face the legal question of who actually needs to own the device. Some more conservative organizations often decide they need legal ownership of the device.

There are three different approaches to handling ownership, in order of popularity:

  • Shared management. The organization’s policies boil down to “if you access business resources from a personal device, you give us the right to manage, lock, and even wipe that device, even if you end up losing personal data and apps as a result.
  • Corporate ownership and provisioning. The organization buys and owns the device, even if it allows nonbusiness use on it. Employees who don’t like the phone service on such devices (they may not get free minutes when calling family members and friends) are free to carry a personal device as well that has no corporate access.
  • Legal transfer. The organization buys the device from the user. In some cases, that ownership is permanent. In other cases, the organization buys the device for a token amount (say, a dollar) and gives the user the right to use it for personal purposes, then commits to selling it back for the same price when the employee leaves the organization. That’s more likely to gain user acceptance than a one-way purchase.

The real questions that arise are when an employee leaves either voluntarily or involuntarily.  Janco’s BYOD Policy template addresses this directly

Top 10 High Demand IT Jobs

Top 10 High Demand IT Jobs

Top 10 IT Jobs in High Demand

Janco has just released it 2018 IT Salary and has identified the top 10 IT Jobs in high demand.  While the overall median salary for IT professionals now is over $90K, these in-demand jobs command more.  (FYI full job descriptions for the top 10 jobs are contained in Janco IT Job Descriptions HandiGuide)

  1. Big Data Programmer/Analyst – $135K to $196K . A big data programmer/analyst’s job is to turn these mountains of data into actionable insight.  Exponential data growth is a reality and will double every two years at least, representing massive growth from 2010 to 2020.
  2. Data Scientist – $116K to $163K. A Data Scientist interprets, analyses, and scrubs data at an advanced level.
  3. Database Specialist – $108K to $161K. A Data Specialist selects and implements database solutions.
  4. Data Security Analyst – $118K to $169K.  A Data Security Analysts are cybersecurity professionals who manage security software, instruct users on best practices and ensure the enterprise system is free of breaches.
  5. Software Programmers – $93K to $155K. Software developers create, advance and maintain web, mobile and systems applications. Skills in demand are included C++, iOS, and Android.
  6. Software Engineers (System Programmers) – $108K to $166K.  Software engineers create advanced-level applications for computer systems, web applications, and mobile devices. These IT professionals are experts in both code and computer science.
  7. Web Designers – $70K to $118K – Designers, unlike their non-tech colleagues, leverage both their creativity and coding skills to create full stack websites. These technology mavens are experts at creating more meaningful user experiences with advanced coding, leading to higher conversions and better traffic data.
  8. Wi-Fi and LAN Network Engineers – $99K to 146K. Network engineers make enterprise operations work by designing, managing and securing complex infrastructures.
  9. Network Security Administrators – $107K to $155K. Network Security Administrators use their extensive knowledge of networks to provide security to complex infrastructures. Their primary focus is combating phishing scams, ransomware, and other hacking attempts by cybercriminals.
  10. Network Security Engineer $115K – $162. Network Security Engineers are responsible for implementation, maintenance, and integration of the corporate WAN, LAN and server architecture.

Security Pros Salaries

Security Pros Salaries are up

Security Pros Salaries are driven by the ever increase in security attacks on both public and private Internet sites.  Recent data from Janco IT Salary survey show that CSOs are now paid on average between $139,000 to $168,000.

Security Pros Salaries
Based on Janco’s latest IT Salary Survey security pros are seeing both an increase in demand as well as fairly substantial increases in compensation
Job Descriptions
The 2018 version of the Internet and IT Position Description HandiGuide now contains 288 full job descriptions

In addition, almost everyone in the IT organization is now cognizant of the role that they must play in order to meet the strategic security objectives of the enterprise.  Janco, for its part, has updated all 288 of its job description to include security and compliance as major components of the each of the individual job descriptions.

For those who do not have a need for the full set of job description but only those specifically related to security,  Janco offers a Security Management Job Description Bundle which contains 21 job descriptions.

Included are job descriptions for Chief Security Officer (CSO), Chief Compliance Officer (CCO), Chief Digital Officer (CDO), Chief Mobility Officer (CMO), VP Strategy – Architecture, Director e-Commerce, Database Administrator, Data Security Administrator, Manager Data Security, Manager Facilities and Equipment, Manager Network – Computing Services, Manager Network Services, Manager Security and Workstations, Manager Training – Documentation, Manager Voice and Data Communication, Manager Wireless Systems, Network Security Analyst, System Administrator – Linux, System Administrator – Unix, System Administrator – Windows, and Wi-Fi Administrator.

Order Now

Top 10 Security Predictions

Top 10 Security Predictions

Security will be the focus of CSOs and CIOs in 2018

Top 10 Security Predictions
Security Manual Template addresses how to handle the Top 10 Security Predictions

Top 10 security predictions are:

  1. Executive Management will set security as a top priority
  2. Ransomware attacks will continue and increase in scope
  3. IoT is a security hack waiting to happen
  4. More attacks from hackers
  5. European Union’s General Data Protection Regulation (GDPR)  businesses must address
  6. GDPR blackmail will become the new ransomware
  7. DDoS on the rise
  8. Cloud breaches will expand in both number and scope
  9. The insider threat
  10. Complex passwords will become the standard

Read on SecurityOrder Security ManualDownload Selected Security Manual  Pages

IT Professional Mean Pay exceeds $90,000

Mean Compensation for all IT Pros in 2018 now is $90,116 up by 3.5% from 2017

IT Professional Mean Pay now is well over $90,000 in both large enterprises and Mid-Sized ones.  IT executives in large enterprised now command a mean salary of $159,748 – which is up 2.53% from last year and rising.

IT professionals are now among the highest paid staff level individuals in many organizations.

IT Professional Mean Pay

IT Professional Mean Pay
IT Professional Mean Pay

Salaries for qualified IT Pros will continue to increase as there currently is a short supply of individuals who have the skill sets necessary to work with several new and advancing technologies.

The positions in the greatest demand are for Executive and Middle Management positions with experience and working knowledge of Iop, Blockchain, and migration of applications to SmartPhones and Tablets in both the iOS and Android worlds.

IT Job in Demand

Janco released its full suite of IT Recruiting, Hiring, and Job Description suites of offerings to help HR departments and IT management teams to help them have the tools at hand as the IT job market continues to expand.

Human Resources – IT Professional Mean Pay

IT Job Descriptions

IT Job Descriptions Updated

IT Job Descriptions Updated

IT Job Descriptions
The 2018 version of the Internet and IT Job Description HandiGuide now contains 288 full job descriptions

The Internet and IT Position Description Handiguide 2018 edition has just been released.  It now has 288 full job descriptions,  They have all been reviewed and updated to include social media and blockchain development and operational considerations.

Each of the job descriptions has been reviewed and updated to meet the latest security and mandated compliance requirements.  Added to this edition is a section on sexual harassment.  In addition, the electronic version of the termination checklist has been updated  to reflect all of the mandated and security requirements that have recently come about,

The  job descriptions that have been added this year include:

    • Blockchain Developer
    • BYOD Support Supervisor
    • Information Assurance Analyst
    • IT Security Engineer
    • Manager Data Center
    • Manager Device Technology
    • Security Architect

Read Job DescriptionBuy Job DescriptionSample Job Description

Security is a pipe-dream

Security Pipe Dream for many

Security is a pipe-dream,  few enterprises are fully protected from events that have occurred in the past several months.  All one has to do is to look at the recent cyber attacks at Uber and Experian. In both of those cases, the CIO and/or  CSO were blamed and left the organization.

Not many CIOs and CSOs feel they have 100% of their security risks covered. In a recent survey that was published in NetworkWorld:

  • 55% said that was the case
  • 40% said they hope the had all of their security bases covered
  • 6% said that they did

With only 6% saying they had all of their bases covered there are many opportunities for security hackers and data breachers to attack the systems in place.

Now that we know that a security breach may occur, how sure are these same CIOs and CSOs that they will be able to react in time? The first step is detection that a hack or breach has occurred. In another survey by Janco Associates, we found that in midsized and large enterprises:

  • 35% had a detection solution in place and they automatically quarantined the server(s)
  • 43% had a detection solution in place but had to “manually” quarantine the server(s)
  • 23% had to “manually” put the server(s) offline when they found out they had a problem

When you put these two sets of data together, you conclude that less than 2% of enterprises are protected adequately enough to prevent a major security hack or breach occurs.

Disaster Recovery / Business Continuity &
Security Template Bundle

ISO 27000, Sarbanes-Oxley, and HIPAA Compliant
PCI-DSS Compliant

Order DRP BCP SecuritySample DRP Security Manual

Experts Agree You Should Update Your Plan Annually

Security is a critical concern during the recovery process

It goes without saying that every company, regardless of size, needs a concise business continuity plan in case of an emergency. If you don’t have a disaster recovery plan or haven’t updated yours recently, now is the time to take this critical step to protect your business.

Highest Unemployment States

Highest Unemployment States are in unrelated job markets

Highest Unemployment States are Alaska, District of Columbia, and New Mexico.  Two of the job markets that have unemployment rates higher today than a year ago are Alaska (6.6% – 2016 and 7.2% – 2017) and the District of Columbia (5.8% – 2016 and 6.6% – 2017).

Highest Unemployment States - Graphic

The interesting fact about these three states is that they have seen little of the positive effects of the improvement in the national job market with its low unemployment numbers.

National Unemployment Rate - Graphic
The U.S. national unemployment rate is at the lowest levels that it has been at in over seven (7) years.

The current unemployment rate for the U.S. is just about the full employment rate (4.1% versus 4.0%).  At that level companies typically begin to increase salaries to help acquire and maintain the necessary staffing levels to meet operational objectives.

Order Salary SurveyDownload Sample salary survey

 

At Risk e-Mail Accounts

At risk e-mail accounts are Gmail, Yahoo, and Hotmail

Security Manual Template
Security Manual Template contains all of the procedures needed to support a world class security infrastructure. Contain BIA and Threat Assessment Tools.

At risk e-mail accounts according to the University of California (Berkeley) and Google are Gmail.com, Yahoo.com and Hotmail.com.  Users who use those email  account have the highest probability of being  victims of hacking attacks. The types of attacks are credential exposure, phishing, and keylogging.

Much of the expose is due to the multitudes of “unsophisticated” users who are not well trained in how to avoid those attacks.  In addition, there is the exposue they face due to the loss of their credentials because of a lack of adequate security at hosting sites from where their credentials and personal data can be extracted.  The cases in point are the recent massive hacks at Yahoo and Experian.

The summary results of the study are:

At Risk e-mail accountsThe data does NOT reflect the victims of the Yahoo and Experian attacks.

Read on SecurityOrder Security ManualDownload Selected Security Manual Pages

 

 

Security Vulnerability Analysis Tool

Security Vulnerability Analysis Tool and BIA in Template

Security Manual Template
Security Manual Template contains all of the procedures need to support a world class security infrastructure. Contain BIA and Threat assessment tools.

Security Vulnerability Analysis Tool is not included as part of Janco’s Security Manual Template.  Firewalls have become ubiquitous across enterprises over the past decade, but the combination of new and varied access methods combined with increasingly sophisticated attacks has forced network operators and security professionals to constantly evaluate their defenses. When deploying a next-generation firewall there are many  factors to consider.

The Security Manual template now includes the latest Threat Vulnerability Analysis Tools.  They are proven and ready to use.

One of the really great features are all of the electronic forms that come with the Security Manual Template.

Read on SecurityOrder Security ManualDownload Selected Security Manual Pages

Blockchain Developer Job Description

Blockchain Developer Job Description added to Janco’s HandiGuide

Blockchain Job DescriptionBlockchain Developer Job Description has been added to Janco’s HandiGuide and will appear in the 2018 Edition.  Until that time anyone who orders the Job Description HandiGuide will get the MS WORD version as a separate file.

The Blockchain Developer is currently one of the hottest jobs out there.  Individuals with that skill set can easily command $125K to $150K as a starting salary.  The developer is responsible for

  • Developing innovative solutions to challenging problems, including command and control and high integrity solutions.
  • Performing complex analysis, design, development, testing, and debugging of computer software for distinct product hardware or technical service lines of businesses.
  • Performng software design, operating architecture integration, and computer system selection.
  • Having the ability to operate on multiple systems and apply knowledge of one or more platforms and programming languages.

The Blockchain Developer is challenged with legacy infrastructure that will be the main obstacle to successful implementations. This is coupled with the challenges of technical understanding – the practicality of implementing decentralized cryptosystems that fall outside of the traditional IT development skill-set.

Order digital brand manager job description

%d bloggers like this: