Top 10 Effective Feedback Best Practices

Top 10 Effective Feedback Best Practices

Effective Feedback Best Practices are based on the employer communicating with the staff member, the staff member listening, agreeing with the feedback, and (with luck) changing or improving performance and behavior.

The key to effective feedback is that it is given regularly and in an informal way so that the employee feels that the conversations are open and that you as a manager are concerned about them as individuals.

Feedback will be will work when:

  1. Feedback is given
  2. Well timed
  3. Given with respect for the employee’s opinion and judgement
  4. Clear and is accurate
  5. Given to an employee who is committed to their job and understands what is expected of them
  6. Given and when improvement is shown that fact is communicated
  7. Given with consideration for the employee’s best interests
  8. Communicated in a positive manner
  9. Provided with a proposed method of solving an issue
  10. Given and the employee takes responsibility for implementing a solution

IT Job Family Classification System HandiGuide – This HandiGuide provides a step by step methodology and architecture to define job families and and align them with pay grades.

The core of Janco’s IT Job Family Classification System are four (4) IT specifiic career families, broad meaningful grouping of jobs commonly clustered within a career emphasis.

To develop a functional set of classifications, the IT job family classification system provides the tools to identify the content of the task performed within a job which is the key criteria in determining the family into which a job falls. This process is how jobs are marketed in the recruiting process and conforms to how individuals and enterprises define overall career paths.

Included in the HandiGuide is a template that has been proven to work in over 100 organizations world wide. A core IT Job Family Classification is included along with operational tools to layer the levels within each of the defined job families.

 

Posted in Career, Job Descriptions | Tagged , , , , | Leave a comment

10 Interview Questions that the interviewee should ask

10 Interview Questions That Should be Asked by the Interviewee

In preparing for an interview there are 10 interviewee questions that should be asked either directly or indirectly.  They will provide a good benchmark for the environment of the job that the candidate in interviewing for.

They are:

  1. How will this position change after I’ve been here a while?
  2. If this is not a new position where has the prior person gone? Did they get promoted or leave? How stable is the group that I am being hired for?
  3. How will you use my skills if the activity I am being hired for is stalled or something unexpected arises?
  4. What is the career path for this position? — Jobs with more responsibility? Management positions? Positions that require specific technical expertise?
  5. What is the project/product road map for the next one to three years?
  6. What kind of training and support for ongoing education does the organization offer?
  7. Is there an open door policy to communicate with upper management levels within he organization? Does the company offer mentorships with senior leaders?
  8. How will my role contribute to the overall mission of the company?
  9. What outcomes will you use to measure those contributions? What metrics will be in place to measure personal and team performance
  10. Will I have opportunities to work directly with the line organization outside of my group?
  • Information Technology Salary Survey – Janco collects IT salary and benefit data on a continual basis and publishes that data twice a year.  Once in January and a second time in June.
Order Salary SurveyFree Salary Survey

IT Job Descriptions

Posted in Career, Job Descriptions | Tagged , , | Leave a comment

Top 10 Best Practices to meet IT governance and compliance requirements

Top 10 Best Practices to meet IT governance and compliance requirements

Top 10 best practices to meet governance and compliance requirements are a baseline tat “World Class” CIOs and enterprises all follow.

  1. Understand all existing and proposed regulation and compliance requirement.  This includes industry, state, local, federal and international regulations and mandates
  2. Have clear definition of duties (job descriptions) that meet all infrastructure, security and compliance requirements. These should be well documented and distributed throughout the enterprise.
  3. Continually assess the internal controls of IT that are in place. This requires interaction with both internal and external auditors.
  4. Establish a baseline of IT internal controls – include a definition of baseline policies and procedures that need to be in place in IT function.  Infrastructure policies and procedures must be constantly reviewed and updated.
  5.  Audit compliance to baseline of IT internal controls and governance requirements. All levels of management need to be involved.
  6.  Track access to all “protected” and confidential data. This has to be real time and responsive as the exposure the enterprise faces continues to increase over time.
  7.  Preserve audit data in secure long term storage.  After the fact reviews can not take place unless this occurs.
  8.  Establish and enforce separation of duties and management accountability are key.
  9.  Implement metrics that support the alignment of IT with enterprise requirements. To measure is to modify behavior.  The right metrics need to be in place.
  10.  Implement a function which focuses on implications of new technology on infrastructure and governance of IT.

One of the best ways to communicate and understand a company and its operating culture is through its policies. Designing and writing policy and communicating it effectively is an essential skill for professionals to have. By having policy carefully developed and communicated, employees will clearly know what the organization expects from them, the degree of control and independence they will have, and what the benefits and consequences are in regard to adhering to policy.

  • CIO IT Infrastructure Policy Bundle (more info…) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
    • Backup and Backup Retention Policy (more info…)
    • Blog and Personal Web Site Policy (more info…) Includes electronic Blog Compliance Agreement Form
    • BYOD Policy Template (more info…) Includes electronic BYOD Access and Use Agreement Form
    • Google Glass Policy Template (more info…) Includes electronic Google Glass Access and Use Agreement Form
    • Incident Communication Plan Policy (more info…) Updated to include social networks as a communication path
    • Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy (more info…) Includes 5 electronic forms to aid in the quick deployment of this policy
    • Mobile Device Access and Use Policy (more info…)
    • Patch Management Policy (more info…)
    • Outsourcing and Cloud Based File Sharing Policy (more info…)
    • Physical and Virtual Security Policy (more info…)
    • Record Management, Retention, and Destruction Policy (more info…)
    • Sensitive Information Policy (more info…) HIPAA Compliant and includes electronic Sensitive Information Policy Compliance Agreement Form
    • Service Level Agreement (SLA) Policy Template with Metrics (more info…)
    • Social Networking Policy (more info…) Includes electronic form
    • Telecommuting Policy (more info…) Includes 3 electronic forms to help to effectively manage work at home staff
    • Text Messaging Sensitive and Confidential Information (more Info…)
    • Travel and Off-Site Meeting Policy (more info…)
    • IT Infrastructure Electronic Forms (more info…)

IT Infrastructure PoliciesInfrastructure Policy Sample

Posted in Disaster Recovery, Infrastructure, Policies & Procedures, Security & Compliance | Tagged , , , , , , | Leave a comment

35 high risk IT projects identified by GAO

35 high risk IT projects identified by GAO

35 high risk IT projects have been identified by the GAO in a recent audit of federal IT projects.  They fall in the following six areas which cover the breath of the entire federal government:

  • Government infrastructure Improvement projects
  • Transforming DOD Program Management
  • Ensuring Public Safety and Security
  • Managing Federal Contracting More Effectively
  • Assessing the Efficiency and Effectiveness of Tax Law Administration
  • Modernizing and Safeguarding Insurance and Benefit Programs

The 35 high risk IT projects are:

  • Strengthening the Foundation for Efficiency and Effectiveness
  • Limiting the Federal Government’s Fiscal Exposure by Better Managing Climate Change Risks
  • Management of Federal Oil and Gas Resources
  • Modernizing the U.S. Financial Regulatory System and the Federal Role in Housing Finance
  • Restructuring the U.S. Postal Service to Achieve Sustainable Financial Viability
  • Funding the Nation’s Surface Transportation System
    Strategic Human Capital Management
  • Managing Federal Real Property
  • Improving the Management of IT Acquisitions and Operations (new)
  • DOD Approach to Business Transformation
  • DOD Business Systems Modernization
  • DOD Support Infrastructure Management
  • DOD Financial Management
  • DOD Supply Chain Management
  • DOD Weapon Systems Acquisition
  • Mitigating Gaps in Weather Satellite Data
  • Strengthening Department of Homeland Security Management Functions
  • Establishing Effective Mechanisms for Sharing and Managing Terrorism-Related Information to Protect the Homeland
  • Ensuring the Security of Federal Information Systems and
  • Cyber Critical Infrastructure and Protecting the Privacy of Personally Identifiable Information
  • Ensuring the Effective Protection of Technologies Critical to U.S. National Security Interests
  • Improving Federal Oversight of Food Safety
  • Protecting Public Health through Enhanced Oversight of Medical Products
  • Transforming EPA’s Processes for Assessing and Controlling Toxic Chemicals
  • DOD Contract Management
  • DOE’s Contract Management for the National Nuclear
  • Security Administration and Office of Environmental Management
  • NASA Acquisition Management
  • Enforcement of Tax Laws
  • Managing Risks and Improving VA Health Care (new)
  • Improving and Modernizing Federal Disability Programs
  • Pension Benefit Guaranty Corporation Insurance Programs
  • Medicare Program
  • Medicaid Program

CIO IT Infrastructure Policy Bundle (more info…) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable

  • Backup and Backup Retention Policy (more info…)
  • Blog and Personal Web Site Policy (more info…) Includes electronic Blog Compliance Agreement Form
  • BYOD Policy Template (more info…) Includes electronic BYOD Access and Use Agreement Form
  • Google Glass Policy Template (more info…) Includes electronic Google Glass Access and Use Agreement Form
  • Incident Communication Plan Policy (more info…) Updated to include social networks as a communication path
  • Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy (more info…) Includes 5 electronic forms to aid in the quick deployment of this policy
  • Mobile Device Access and Use Policy (more info…)
  • Patch Management Policy (more info…)
  • Outsourcing and Cloud Based File Sharing Policy (more info…)
  • Physical and Virtual Security Policy (more info…)
  • Record Management, Retention, and Destruction Policy (more info…)
  • Sensitive Information Policy (more info…) HIPAA Compliant and includes electronic Sensitive Information Policy Compliance Agreement Form
  • Service Level Agreement (SLA) Policy Template with Metrics (more info…)
  • Social Networking Policy (more info…) Includes electronic form
  • Telecommuting Policy (more info…) Includes 3 electronic forms to help to effectively manage work at home staff
  • Text Messaging Sensitive and Confidential Information (more Info…)
  • Travel and Off-Site Meeting Policy (more info…)
  • IT Infrastructure Electronic Forms (more info…)

IT Infrastructure PoliciesInfrastructure Policy Sample

Posted in Infrastructure, Policies & Procedures | Tagged , , , , , | Leave a comment

IT job description bundles available in MS WORD format

IT job descriptions bundles are available in MS WORD format

IT job descriptions bundles have just been updated to meet the latest compliance and security requirements

IT Job DescriptionsIT job descriptions bundles have just been updated.  The bundles are:

  • C-Level IT Job Description Bundle \
    • Chief Information Officer(CIO), Chief Information Officer (CIO) – Small Enterprise, Chief Security Officer (CSO), Chief Compliance Officer (CCO), Chief Mobility Officer (CMO), Chief Technology Officer (CTO), and Chief Digital Officer (CDO)
  • Compliance Management Job Description Bundle
    • Chief Compliance Officer (CCO), Director Electronic Commerce, e-Commerce Specialist, Internet-Intranet Administrator, Manager BYOD Support, Manager Internet – Intranet Activities, Manager Internet Systems, Manager Point of Sale, Manager Record Administration, Manager Transaction Processing, Manager Video and Website Content, Manager Web Content, Manager Wireless Systems, BYOD support anaylst, On-Line Transaction Processing Analyst, PCI-DSS Administrator, PCI-DSS Coordinator, POS Coordinator, POS Hardware Coordinator, POS Senior Coordinator, Record Management Coordinator, System Administrators – UNIX – Windows Linix, Web Analyst, Web Site Designer, Webmaster, and Wireless Coordinator.
  • eCommerce, Wireless, and Internet Job Description Bundle
    • Director Electronic Commerce, e-Commerce Specialist, Internet-Intranet Administrator, Manager Internet – Intranet Activities, Manager Internet Systems, Manager Point of Sale, Manager Record Administration, Manager Transaction Processing, Manager Video and Website Content, Manager Web Content, Manager Wireless Systems, On-Line Transaction Processing Analyst, PCI-DSS Administrator, PCI-DSS Coordinator, POS Coordinator, POS Hardware Coordinator, POS Senior Coordinator, Record Management Coordinator, System Administrator – Linux, System Administrator – UNIX , System Administrator – Windows, Web Analyst, Web Site Designer, Webmaster, and Wireless Coordinator.
  • Enterprise Architecture and IT Executives Job Description Bundle
    • Vice President Strategy and Architecture, Chief Information Officer- CIO, Chief Information Officer – Small Enterprise – CIO, Chief Compliance Officer – CCO, Chief Mobility Officer(CMO), Chief Security Officer – CSO, Chief Technology Officer – CTO, Manager Change Control, Manager Competitive Intelligence, Manager Database, Manager Enterprise Architecture, Manager Sarbanes-Oxley Compliance, Manager Video and Website Content, Project Manager Enterprise Architecture, Capacity Planning Supervisor, Change Control Supervisor, Database Administrator, Enterprise Architect, PCI-DSS Coordinator, and Cloud Computing Architect
  • Enterprise Resource Planning (ERP) Job Description Bundle
    • Project Manager, Enterprise Resource Planning (ERP); Enterprise Resource Planning (ERP) – Architect; Enterprise Resource Planning (ERP) – Business Analyst; Enterprise Resource Planning (ERP) – Data Architect; Enterprise Resource Planning (ERP) – Decision Support Analyst; Enterprise Resource Planning (ERP) – Developer; Enterprise Resource Planning (ERP) – Functional Lead; Enterprise Resource Planning (ERP) – Infrastructure Administrator; Enterprise Resource Planning (ERP) – Master Data Analyst; Enterprise Resource Planning (ERP) – Process Owner; Enterprise Resource Planning (ERP) – Security Administrator; Enterprise Resource Planning (ERP) – Security Analyst; Enterprise Resource Planning (ERP) – Subject Matter Expert; Enterprise Resource Planning (ERP) – Team Lead; Enterprise Resource Planning (ERP) – Technical Lead; and Enterprise Resource Planning (ERP) – Trainer
  • Disaster Recovery and Business Continuity Job Description Bundle
    • Chief Information Officer; Chief Security Officer; Chief Compliance Officer; Chief Mobility Officer; VP Strategy and Architecture; Director Disaster Recovery and Business Continuity; Director e-Commerce; Director Media Communications; Manager Disaster Recovery; Manager Disaster Recovery and Business Continuity; Disaster Recovery Coordinator; Disaster Recovery – Special Projects Supervisor; Manager Database; Capacity Planning Supervisor; Manager Media Library Support; Manager Record Administration; Manager Site Management; and Pandemic Coordinator
  • IT Service Management – SOA Job Description Bundle
    • Director Sarbanes-Oxley Compliance; Manager Change Control; Manager Customer Service Center<; Manager Help Desk Support; Manager Metrics; Manager Quality Control; Manager Service Level Reporting; Manager User Support; Capacity Planning Supervisor; Change Control Analyst; Change Control Supervisor; Help Desk Analyst; Key Performance Indicatior Analyst; Metrics Measurement Analys; and Quality Measurement Analyst
  • Metrics, Service Level Agreement & Outsourcing Job Description Bundle
    • VP Administration; VP Strategy and Architecture; Director IT Management and Control; Manager Contracts and Pricing;Manager Controller; Manager Metrics; Manager Outsourcing; Manager Service Level Reporting; Manager Vendor Management; Key Performance Indicator Analyst; Metrics Measurement Analyst; Quality Measurement Analyst; System Administrator Linux; System Administrator Unix; and System Administrator Windows
  • Security Management Job Description Bundle
    • Chief Compliance Officer (CCO); Chief Security Officer (CSO); VP Strategy and Architecture; Director e-Commerce; Database Administrator; Data Security Administrator; Manager Data Security; Manager Facilities and Equipment; Manager Network and Computing Services; Manager Network Services; Manager Training and Documentation; Manager Voice and Data Communication; Manager Wireless Systems; Network Security Analyst; System Administrator – Linux; System Administrator – Unix; and System Administrator – Windows
  • Salary Survey Job Description Bundle
    • Executive – VP – Chief Information Officer (CIO), Chief Security Officer (CSO), VP – Administration, VP – Consulting Services, VP – Information Services, VP – Technical Services, Director – IT Planning, Director – Production/Data Center, and Director – Systems & Programming.
    • Middle Management: Manager Computer Operations, Manager Customer Service, Manager Data Communications, Manager Data Warehouse, Manager Database, Manager Internet Systems, Manager Network Services, Manager Office Automation Applications, Manager Operating Systems Production, Manager Production Services, Manager Production Support, Manager Quality Control, Manager Security and Workstations, Manager Systems and Programming, Manager Technical Services, Manager Training and Documentation, Manager Voice and Data Communications, Manager Voice/Wireless Communication, Project Manager Applications, Project Manager Distributed Systems, Project Manager Network Technical Services, Project Manager Systems, Capacity Planning Supervisor, Change Control Supervisor, Computer Operations Shift Manager Computer Operations Shift Supervisor, Hardware Installation Supervisor, Microcomputer Support Supervisor, Network Services Supervisor, Production Control Specialist, Production Services Supervisor, and Webmaster.
    • Staff: Change Control Analyst, Computer Operator, Data Center Facility, Administrator, Data Entry Clerk, Data Entry Supervisor, Data Security Administrator, Data Base Specialist, Disaster Recovery Coordinator, e-Commerce Specialist, Forms and Graphics Designer, Hardware Installation Coordinator, Internet Developer, IT Planning Analyst, LAN Application Support Analyst, Librarian, Network Control Analyst, Network Services Administrator, Network Specialist Senior, Network Technician, Object Programmer, Operations Analyst, Personal Computer Specialist, Production Control Analyst, Programmer/Analyst, Software Engineer, Systems Analyst, Systems Programmer, System Support Specialist, Technical Services Specialist, Technical Specialist, Voice/Wireless Communications Coordinator, and Web Analyst

For more information go to http://www.e-janco.com/jobdescriptions.html

Posted in Career, Disaster Recovery, Infrastructure, Job Descriptions, Policies & Procedures, Security & Compliance | Tagged , | Leave a comment

Top 10 Reasons Cloud Fails

Top 10 reasons Cloud fails

Applications are moving to the cloud and CIOs are striving to make the cloud they use as private and secure as possible.

Outsourcing Template
The top 10 reasons cloud fails are:

  1. Changing infrastructure but not changing the operational processes
  2. Ignoring what others are doing
  3. Real benefits are not understood
  4. Alignment of IT and business in the private cloud not done
  5. The wrong staff resources assigned to the design, implementation and operation of the cloud
  6. Benefits are not measured
  7. Charging is not done fairly for services rendered
  8. Benefits are not communicated
  9. The application is not really a cloud based solution – just a conversion of an existing mainframe solution
  10. Organization is not geared to support cloud applications and cloud users
Order Cloud Outsourcing Template    Sample Cloud Outsourcing Contract

Posted in Infrastructure | Tagged , , | Leave a comment

Best Practices – 5 keys on how to harness employee creativity

Best Practices – CIOs need to harness employees’ creativity. Here are five ways they can do that

Best practices to harness creativity include these 5 key elements.

  1. Listen to opinions that are not positive to the proposed solution – CIOs tout the value of employee engagement, but you can’t have one without the other. You have to let people be more open in the workplace.If CIOs do not let dissenting opinions be expressed then team members become less engaged.
  1. Utilize non-traditional solutions – CIOs are good at putting people in positions, and expecting them to do the same thing year after year, and then thinking they’re just going to get better and better at it. But it doesn’t work that way, creative juices dry up. They need to have novelty. They need to do something different.
  1. Make the work environment a fun place to be – Adding an element of fun to the workday can help employees release tension and get reinvigorated.
  1. Stress mastery vs. performance – If a company is all about performance metrics, then employees will focus on achieving those metrics via the same old routines. Employees who are encouraged to become masters of their domain are much more open to new and creative ways of doing things.
  1. Build bonds between people – People who work together day after day want to feel something more than just the work. Personal relationships are the best form of team building

Human Resources

  • CIO HR and Staffing Management Kit – Save over $3,000 with this kit that contains
    • Internet and IT Job Descriptions
    • All of the Job Descriptions as individual MS Word files
    • IT Job Classification HandiGuide
    • Interview and Hiring Guide
    • Latest IT Salary Survey
  • IT Job Family Classification HandiGuide – An architecture to define job families and and align them with pay grades

Posted in Career, Infrastructure, Job Descriptions | Tagged , , , | Leave a comment

Mobile device FCC regulations for 2015 help the mobile user

Mobile Device FCC regulations for 2015 help the user

Mobile Device Access and Use Policy

Mobile device policy including the latest tables and smartphones and FTC guidelines

Order Mobile Device Access Use PolicySample Mobile Device Policy

1. Carriers can’t throttle ‘unlimited” data plans

The FTC made it clear this week in a statement that it will now consider throttling of “unlimited” plans a clear-cut case of false advertising. Both throttled plans and unlimited plans will still be legal. But they can no longer be the same plans.

2. Carriers can’t sell you slow data connectivity as ‘broadband’

The Federal Communications Commission on Thursday unceremoniously redefined what “broadband” means. The previous definition of “broadband” was a meager 4Mbps for downloads and 1Mbps for uploads. That standard was set four years ago.

The new minimums are 25Mbps for downloads and upload speeds of at least of 3Mbps.

As with cases that involve throttling of “unlimited” plans, this is a marketing matter. Providers can sell connectivity at any speed they want, but they can’t advertise it as “broadband” unless it meets the new criteria.

The fact even that 25Mbps is legally considered “broadband” hints at the pathetically low standards that data providers are held to in the U.S. Still, it’s a lot better than nothing.

3. Hotels can’t block your personal Wi-Fi hotspots

Long story short: Some hotels and other businesses, and most famously Marriott hotels, wanted to force hotel guests to pay up for a separate Wi-Fi connection for every device used in the hotel.

FCC Commissioner Jessica Rosenworcel and FCC Chairman Tom Wheeler both said in no uncertain terms that such blocking should not be allowed. Further, Rosenworcel said that even more unlicensed spectrum should be opened up for personal use.

4. You don’t have to die needlessly because emergency personnel can’t locate you indoors.

When you’re in a crisis situation — one that involves, say, a medical emergency or criminal activity — a 911 call enables first responders to use your smartphone’s GPS to find out where you are with some degree of accuracy — as long as you’re outside. They do this through your carrier, and it’s information that carriers are required to provide.

This week, the FCC approved new rules that require carriers to, within two years, start using technology that’s able to provide the location of a 911 caller within 50 meters in at least 40% of cases.

5. You don’t have to tolerate slow airplane Wi-Fi anymore.

Gogo, which provides Wi-Fi service on airplanes, recently got approval from the FCC for a new service called 2Ku to be installed on 1,000 aircraft. The new service is satellite-based and several times faster than most airplane Wi-Fi systems — up to 70Mbps.

6. The entertainment industry can’t use emergency alerts in movie promotions

The FCC recently fined Viacom and ESPN $1.4 million for using official emergency alert tones in a promotion for a movie called Olympus Has Fallen. The warning sound was part of the movie, but people who heard it might have thought there was a real emergency.

In levying the fine, the FCC made it clear that, well, you just can’t do that.

7. It now is easier to file a complaint

The FCC this month launched a new website where consumers can complain about their cable, broadband and wireless service providers.

The new site replaces an old one that was plagued with antiquated design that made filing a complaint difficult.

Posted in Infrastructure | Tagged , , , , | Leave a comment

10 best practices for Disaster Recovery and Business Continuity

10 best practices for Disaster Recovery and Business Continuity

Most CIOs and management executives all say they have disaster recovery and business continuity under control — Do they really?

Best Practices – Top 10 – Janco has found that successful organization typically follow or have implemented these 10 best practices

  1. Have management communicated that disaster recovery not as a tactical IT project but as a strategic IT asset.
  2. Create a disaster recovery and business continuity process that is integrated into the organization
  3. Allocate costs associated with the disaster recovery business continuity plan as part of the base overhead so that costs are distributed across the entire organization
  4. Treat disaster recovery and business continuity as “mission critical” for cost and staff allocations
  5. Establish metrics for the process and timing of recovery events
  6. Test the plans at least once every six months or whenever there is major enhancement to the enterprise’s computing or operational infrastructure
  7. Monitor how other enterprises and your competitors are faring after and event occurs
  8. Quarterly review you media communication protocol for who says what when to whom when an event occurs
  9. Pool your assets and personnel to provide resilience capabilities for interconnected systems or collaborative technologies such as payments or check processing.
  10. Test the back-ups (at least quarterly) so that what is taken is what is needed for recovery and that it meets your recovery performance metrics
Disaster Recovery Security Cloud DRP Security Incident Communication Policy
 Order Disaster Plan TemplateDisaster Plan Sample

It goes without saying that every company, regardless of size, needs a concise business continuity plan in case of an emergency. If you don’t have a disaster recovery plan or haven’t updated yours recently, now is the time to take this critical step to protect your business.

Plan Do Act

Posted in Disaster Recovery, Infrastructure | Tagged , , , , | Leave a comment

Job Market – DC leads the country with the 7.3% unemployment rate

Job Market – DC leads the country with the highest unemployment rate

19 states have unemployment rates of 6.0% or greater in December

Even with the slight improvement in the job market 19 states continue to have high unemployment. California still is at 7% and DC tops the list with a whopping 7.3% rate.  When you add in the participation rate in both of these job markets the true unemployment rate is closer to 10%.

States with High Unemployment – 19 States have 6.0% or greater unemployed

High unemployment states

Add on to this the increase in the labor force due to the recent actions on illegal immigration and the job market picture is not as rosy as depicted by the overall national unemployment rate.

Labor Force Participation

In December of 2014 the work force participation percentage of all employees (male and female) fell to 62.7% as more individuals left the job market. This more than offset the gain in the number of new jobs created.

Work Force Participation

Unemployment Data

During the recession of 2009 – 2013 unemployment in the IT Industry had not been as high as the rest of the United States. Older workers had a higher unemployment rate than your ones. In addition, female high tech employees have not as well as their male counterparts. This is especially true for workers over the age of 55. The unemployment rate for women over the age of 55 for computer and math workers in 2010 was 9.4% versus 8.0% for men.

Unemployment Trend

Posted in Career, Job Descriptions | Tagged , , , | Leave a comment

IT Salaries Rise

IT Salaries Rise

In 2015 IT Salaries will increase across the board for IT Pros.  In preliminary results of Janco Associates 2015 IT Salary survey they have found that all levels of IT Professionals and in all sizes if IT organizations salaries are going up.  The big winners are the executive levels of IT in mid-sized organizations.

Historic versus current salaries IT Professionals

IT Salaries are on rising

IT compensation for all IT Professionals has increased by 2.85% in the last 12 months. Between January 2014 and January 2015 the total mean compensation for all IT Professionals has increased from $79,674 to $81,948. This puts overall compensation back at the levels they were at in January 2008 and 2007.  In mid-sized enterprises, the mean total compensation for all positions has increased by 4.11% from $76,198 to $79,333.

Much of the rise is due to the fact that the number of IT Pros that are required is up. In 2014 the IT job market grew by 112,800 versus 74,900 and 62,500 in 2013 and 2012 respectively according to the Bureau of Labor Statistics (BLS).

IT Job Market Growth

The 2015 Salary Survey will be released by the end of January.

Salary Survey Job Descriptions IT Job Families IT Hiring Kit Interview Guide

Order Salary Survey  Provide Salary Data  Free Salary Survey

 

Posted in Career | Tagged , , , , | Leave a comment

Security is a pipe-dream

Security is a pipe-dream,  few enterprises are fully protected from events that have occurred in the past several months.

Not many CIOs and CSOs feel they have 100% of their security risks covered. In a recent survey that was published in NetworkWorld:

  • 55% said that was the case
  • 40% said they hope the had all of their security bases covered
  • 6% said that they did

With only 6% saying they had all of their bases covered there is lot of room for security hackers and data breachers to attack the systems in place.

Now that we know that a security breach may occur, how sure are these same CIOs and CSOs that they will be able to react in time. The first step is detection that a hack or breach has occurred. In another survey by Janco Associates we found that in midsized and large enterprises:

  • 35% had a detection solution in place and they automatically quarantined the server(s)
  • 43% had a detection solution in place but had to “manually” quarantine the server(s)
  • 23% had to “manually” put the server(s) offline when they found out they had a problem

When you put these two sets of data together, you conclude that less than 2% of enterprises are protected adequately enough to prevent a major security hack or breach occurring.

Disaster Recovery / Business Continuity &
Security Template Bundle

ISO 27000, Sarbanes-Oxley, and HIPAA Compliant
PCI-DSS Compliant

Order DRP BCP SecuritySample DRP Security Manual

Experts Agree You Should Update Your Plan Annually

Security is a critical concern during the recovery process

It goes without saying that every company, regardless of size, needs a concise business continuity plan in case of an emergency. If you don’t have a disaster recovery plan or haven’t updated yours recently, now is the time to take this critical step to protect your business.

Posted in Disaster Recovery, Infrastructure, Security & Compliance | Tagged , , , , , , , | Leave a comment

Top 6 cyber attack threats

Top 6 cyber attack  threats

The top 6 threats that CSOs need to address as attackers conspire to take down applications and steal data. These treats focus on data center infrastructure. (See also How to Manage Cyber Attacks)  Storing the most valuable and most visible assets in your organization –  web, DNS, database, and email servers – data centers have become the number one target of cyber criminals, hacktivists and state-sponsored attackers. The threats are:

  1. DDoS Attacks
  2. Web Application Attacks
  3. DNS Infrastructure
  4. SSL-Induced Security Blind Spots
  5. Brute Force
  6. Weak Authentication

CIOs and CSOs start the management process before the cyber attack occurs

Cyber attackCyber-attacks are now an everyday event and it is only a matter of time before your company faces one if it has not already. Cyber criminals are ubiquitous and attacks will continue despite our resolute attempts to stop them – even organizations with the best defenses in place are not immune. CIOs and CSOs need to accept these risks as fact and be prepared to respond quickly and effectively.
Managing cyber breaches starts before the breach occurs

Order Security TemplateTable of Contents

Posted in Infrastructure, Security & Compliance | Tagged , , , , , | Leave a comment

Mobile Devices are how many start and end the day

Mobile Devices are in many bedrooms

How did you start your day today? How did you end your day yesterday? For many, starting or ending our day involves connecting in some way with a mobile application. In 2014, the number of Internet users worldwide has reached nearly 30 billion. While the majority of these users connect via fixed-line to a PC, the growth of mobile- and cloud-based solutions has skyrocketed. Industry experts estimate that mobile-only users (no laptop, no desktop) will hit 1 billion next year.

  • Mobility Policy Bundle (more info…) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
    • BYOD Policy Template (more info…) Includes electronic BYOD Access and Use Agreement Form
    • Mobile Device Access and Use Policy (more info…)
    • Record Management, Retention, and Destruction Policy (more info…)
    • Social Networking Policy (more info…) Includes electronic form
    • Telecommuting Policy (more info…) Includes 3 electronic forms to help to effectively manage work at home staff
    • Travel and Off-Site Meeting Policy (more info…)
Order

Posted in Infrastructure, Policies & Procedures | Tagged , , , | Leave a comment

Best Articles of 2014 – CIO Challenges addressed

Top 10 Best Articles of 2014

Best Articles of 2014 – Janco in a review of the best articles and top 10 lists of this year, Janco highlights the role of the CIO and the challenges that the CIO faces.  Include in this years winners are:

Best articles of 2014

  1. A CIO’s guide to IT portfolio management
  2. Top 10 Manager Best Practices
  3. Top 10 Challenges faced by IT Project Managers
  4. Ten Best Practices to Hire and Retain World Class Creative IT Professionals
  5. Top 10 CIO Staffing Issues
  6. What does it take to become a CIO or CTO of a Fortune 100 company?
  7. ID Badges Challenge for CIOs
  8. Mobile Application Must Haves for the CIO
  9. Top 10 Interview Best Practices
  10. Internet of Things (IoT) Challenges
Posted in Career, Infrastructure, Job Descriptions, Policies & Procedures, Security & Compliance | Tagged , , , , , , | Leave a comment
%d bloggers like this: