CIO Role – 3 Ways CIOs Can Win People Over

CIO Role – 3 Ways CIOs Can Win People Over

CIO Role – CIOs who are committed to advancing their roles—and having a broader impact on the business—need to develop their skills surrounding the company’s number-one asset: people. Being perceived as a pure technologist, whether deserved or not, is hardly a path to advancement.

IT Job DescriptionsCIO Role – CTO Responsibilities

Chief Information Officer – Chief Technology Officer

Order CIO Job Description

There are several ways CIOs can position themselves to enhance their interaction with their fellow C-Level executives:

  1. Participate in meetings outside of IT. One CIO, frustrated that her colleagues perceived the IT function as brimming with no-sayers, requested that members of her team be invited to meetings outside of IT, so as to supply their own viewpoint. As IT folks joined technology and sales teams on an ongoing basis, they not only expanded their own scope but also broadened the others’ understanding of what IT actually does. In doing so, they helped groomed themselves for other positions. In one case, a IT executive lost one of her top performers to the sales team—and even prodded the person to take the job by promising to keep a IT position open, just in case.
  2. Figure out how to create value for other functional areas. At some companies, others perceive IT as a function whose members are only interested in tracking project status—whether that is useful or not. Rather than emailing technology-packed reports to colleagues, try playing the internal marketer and ask other functional leaders what kind of report would be most helpful to them. Engaging in a face-to-face dialogue will help restore the human element to your working relationship.
  3. Help demystify IT. Having joined a company as a CIO, one executive kept hearing the same refrain: “I don’t really know what IT does.” Those who did suggest they understood the role of IT typically ventured a textbook definition that was more suited to data processing of the late 1980s. To reduce the mystery that surrounded his role, the CIO sent out a company-wide e-mail inviting all employees to join him for a brown-bag lunch on the first Thursday of every month. After six months, he regularly drew a large crowd. He used the meetings to speak candidly about the factors that impact the bottom line, and to find ways he could help support his colleagues. The dialogue not only lifted his function’s profile—other C-Suite executives soon started following his lead.
Posted in Career, Job Descriptions | Tagged , , , | Leave a comment

Privacy is a thing of the past

Privacy is a thing of the past

When we look at the world as it is today, it is easy to see that privacy is no longer a reality no matter where you are in the world

Order Sensitive Information PolicySensitive Information policy

BYOD guidelines are just being defined, but one warning must rise above the din: never, ever, try to gain unauthorized access to an employee’s pri…

Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists BYOD

URL: http://www.e-janco.com/Press/2013/20130510-BYOD-Policy.html

Compliance Mandates – Security Manual Template Version 8.0 Released

Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists Compliance

URL: http://www.e-janco.com/Newsletters/2010/Compliance_Newsletter_100726.htm

Companies should also weigh the vulnerabilities associated with various cloud computing service and deployment models

Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists Cloud

URL: http://www.e-janco.com/CloudSecurity.htm

Posted in Infrastructure, Security & Compliance | Tagged , , | Leave a comment

10 steps Disaster Plan Testing

10 step Disaster Plan Testing

10 step Disaster Plan Testing

10 step Disaster Plan Testing – Almost every organization has a disaster recovery and business continuity plan on the shelf.  The question that every CIO needs to have answered is will the plan work?

To that end we have defined and documented a testing process that will ensure that a DR/BC plan will work when it is needed after a disaster or business interruption occurs.

The 10 steps are:

  1. Identify people who will participate in the test
  2. Identify the enterprise operations that will be teste
  3. Train people before the test
  4. Establish test objectives
  5. Select test type
    1. A walkthrough
    2. A desktop
    3. A timed desktop
    4. Live or real time
  6. Document the test plan
  7. Manage pretest administration
  8. Conduct the test
  9. Do a post-test review of successes and failure – implement changes the test
  10. Schedule the next test

Each of these steps is discussed in detail in the Disaster Recovery Business Continuity Template.

 Order Disaster Plan TemplateDisaster Plan Sample

Disaster Recovery Business Continuity Plan Template

The Disaster Recovery Business Continuity template has been purchase by over 2,500 enterprise world wide in both the public and private sectors. To see the distribution of our customer base click here.

Disaster Recovery Security Cloud DRP Security Incident Communication Policy Security Audit Program
 Order Disaster Plan TemplateDisaster Plan SampleDR BC History
Posted in Disaster Recovery | Tagged , , , , | Leave a comment

Recruiting IT Pros Harder Now

Recruiting IT Pros Harder Now

Recruiting T Pros now is much more difficult.  Given that the good news is that unemployment rate dipped to 5.5% – the bad news is that CIO are now having a harder time finding experienced IT Pros.  In industries ranging from retail to health care to business services, CIOs would be well-advised to look back at how they recruited and retained workers in 2005, when the unemployment rate landed at 5.1%.

Suggestions for keeping a mindset of abundance in an era of scarcity:

  • Focus advertising dollars for targeting job-hunters. CIS need to advertise on the Internet, not only on job boards and social media but also using banner ads, which appear when someone is searching for an IT position.
  • Communicate you are a quality employer. Make the impression that you are a quality firm both in your office to your web presence. You want to work for a place that’s successful and physical and virtual presence are important.
  • Offer benefits that matter most to employees. Health insurance is a big deal to people, it hurts the bottom line in the short term. However IT Pros are more likely to come -and stay – if he or she doesn’t have to switch insurance plans every six months.

IT Hiring Kit – The must have tool kit for organizations and mangers who are looking to build a quality IT function. For more information go to http://www.e-janco.com/ITHirePack.htm.

IT Hiring IT Job Descriptions IT Salary SurveyIT Salary SurveyJob Descriptions
Order IT Hiring Kit
Posted in Career, Infrastructure, Job Descriptions | Tagged , , , | Leave a comment

Top 10 Network Security Management Best Practices

Top 10 Network Security Management Best Practices

Security Management Best Practices

Security management best practices – The top 10 network  Security management best practices if not followed expose a company’s assets and reputation to unnecessary risk.

10 Security Management Best Practices

This top 10 list is one that has been proven in practice.  NO organization that follows all of them has ever been attacked with their know that an attack is in progress and can react to it before it becomes a major media event.

  1. Centralize Malware Management
  2. Establish Boundary Control
  3. Centralize Provisioning and Authorization Management
  4. Implement Acceptable Use Policy
  5. Build Security into Applications Starting in the Design Phase
  6. Understand and Implement all Compliance and Audit Requirements
  7. Implement Monitoring and Reporting Processes
  8. Manage security deployment and Infrastructure Processes
  9. Implement Network and Host Defenses
  10. Constantly Validate Network and System Resource Integrity

To read more about this Janco’s security management page.  In addition, the Security Manual Template that is offered by Janco provides a foundation to implement these best practices.

Order Security ManualSample DRP

Posted in Infrastructure, Policies & Procedures, Security & Compliance | Tagged , , , , , | Leave a comment

Top 10 Effective Feedback Best Practices

Top 10 Effective Feedback Best Practices

Effective Feedback Best Practices are based on the employer communicating with the staff member, the staff member listening, agreeing with the feedback, and (with luck) changing or improving performance and behavior.

The key to effective feedback is that it is given regularly and in an informal way so that the employee feels that the conversations are open and that you as a manager are concerned about them as individuals.

Feedback will be will work when:

  1. Feedback is given
  2. Well timed
  3. Given with respect for the employee’s opinion and judgement
  4. Clear and is accurate
  5. Given to an employee who is committed to their job and understands what is expected of them
  6. Given and when improvement is shown that fact is communicated
  7. Given with consideration for the employee’s best interests
  8. Communicated in a positive manner
  9. Provided with a proposed method of solving an issue
  10. Given and the employee takes responsibility for implementing a solution

IT Job Family Classification System HandiGuide – This HandiGuide provides a step by step methodology and architecture to define job families and and align them with pay grades.

The core of Janco’s IT Job Family Classification System are four (4) IT specifiic career families, broad meaningful grouping of jobs commonly clustered within a career emphasis.

To develop a functional set of classifications, the IT job family classification system provides the tools to identify the content of the task performed within a job which is the key criteria in determining the family into which a job falls. This process is how jobs are marketed in the recruiting process and conforms to how individuals and enterprises define overall career paths.

Included in the HandiGuide is a template that has been proven to work in over 100 organizations world wide. A core IT Job Family Classification is included along with operational tools to layer the levels within each of the defined job families.

 

Posted in Career, Job Descriptions | Tagged , , , , | Leave a comment

10 Interview Questions that the interviewee should ask

10 Interview Questions That Should be Asked by the Interviewee

In preparing for an interview there are 10 interviewee questions that should be asked either directly or indirectly.  They will provide a good benchmark for the environment of the job that the candidate in interviewing for.

They are:

  1. How will this position change after I’ve been here a while?
  2. If this is not a new position where has the prior person gone? Did they get promoted or leave? How stable is the group that I am being hired for?
  3. How will you use my skills if the activity I am being hired for is stalled or something unexpected arises?
  4. What is the career path for this position? — Jobs with more responsibility? Management positions? Positions that require specific technical expertise?
  5. What is the project/product road map for the next one to three years?
  6. What kind of training and support for ongoing education does the organization offer?
  7. Is there an open door policy to communicate with upper management levels within he organization? Does the company offer mentorships with senior leaders?
  8. How will my role contribute to the overall mission of the company?
  9. What outcomes will you use to measure those contributions? What metrics will be in place to measure personal and team performance
  10. Will I have opportunities to work directly with the line organization outside of my group?
  • Information Technology Salary Survey – Janco collects IT salary and benefit data on a continual basis and publishes that data twice a year.  Once in January and a second time in June.
Order Salary SurveyFree Salary Survey

IT Job Descriptions

Posted in Career, Job Descriptions | Tagged , , | Leave a comment

Top 10 Best Practices to meet IT governance and compliance requirements

Top 10 Best Practices to meet IT governance and compliance requirements

Top 10 best practices to meet governance and compliance requirements are a baseline tat “World Class” CIOs and enterprises all follow.

  1. Understand all existing and proposed regulation and compliance requirement.  This includes industry, state, local, federal and international regulations and mandates
  2. Have clear definition of duties (job descriptions) that meet all infrastructure, security and compliance requirements. These should be well documented and distributed throughout the enterprise.
  3. Continually assess the internal controls of IT that are in place. This requires interaction with both internal and external auditors.
  4. Establish a baseline of IT internal controls – include a definition of baseline policies and procedures that need to be in place in IT function.  Infrastructure policies and procedures must be constantly reviewed and updated.
  5.  Audit compliance to baseline of IT internal controls and governance requirements. All levels of management need to be involved.
  6.  Track access to all “protected” and confidential data. This has to be real time and responsive as the exposure the enterprise faces continues to increase over time.
  7.  Preserve audit data in secure long term storage.  After the fact reviews can not take place unless this occurs.
  8.  Establish and enforce separation of duties and management accountability are key.
  9.  Implement metrics that support the alignment of IT with enterprise requirements. To measure is to modify behavior.  The right metrics need to be in place.
  10.  Implement a function which focuses on implications of new technology on infrastructure and governance of IT.

One of the best ways to communicate and understand a company and its operating culture is through its policies. Designing and writing policy and communicating it effectively is an essential skill for professionals to have. By having policy carefully developed and communicated, employees will clearly know what the organization expects from them, the degree of control and independence they will have, and what the benefits and consequences are in regard to adhering to policy.

  • CIO IT Infrastructure Policy Bundle (more info…) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
    • Backup and Backup Retention Policy (more info…)
    • Blog and Personal Web Site Policy (more info…) Includes electronic Blog Compliance Agreement Form
    • BYOD Policy Template (more info…) Includes electronic BYOD Access and Use Agreement Form
    • Google Glass Policy Template (more info…) Includes electronic Google Glass Access and Use Agreement Form
    • Incident Communication Plan Policy (more info…) Updated to include social networks as a communication path
    • Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy (more info…) Includes 5 electronic forms to aid in the quick deployment of this policy
    • Mobile Device Access and Use Policy (more info…)
    • Patch Management Policy (more info…)
    • Outsourcing and Cloud Based File Sharing Policy (more info…)
    • Physical and Virtual Security Policy (more info…)
    • Record Management, Retention, and Destruction Policy (more info…)
    • Sensitive Information Policy (more info…) HIPAA Compliant and includes electronic Sensitive Information Policy Compliance Agreement Form
    • Service Level Agreement (SLA) Policy Template with Metrics (more info…)
    • Social Networking Policy (more info…) Includes electronic form
    • Telecommuting Policy (more info…) Includes 3 electronic forms to help to effectively manage work at home staff
    • Text Messaging Sensitive and Confidential Information (more Info…)
    • Travel and Off-Site Meeting Policy (more info…)
    • IT Infrastructure Electronic Forms (more info…)

IT Infrastructure PoliciesInfrastructure Policy Sample

Posted in Disaster Recovery, Infrastructure, Policies & Procedures, Security & Compliance | Tagged , , , , , , | Leave a comment

35 high risk IT projects identified by GAO

35 high risk IT projects identified by GAO

35 high risk IT projects have been identified by the GAO in a recent audit of federal IT projects.  They fall in the following six areas which cover the breath of the entire federal government:

  • Government infrastructure Improvement projects
  • Transforming DOD Program Management
  • Ensuring Public Safety and Security
  • Managing Federal Contracting More Effectively
  • Assessing the Efficiency and Effectiveness of Tax Law Administration
  • Modernizing and Safeguarding Insurance and Benefit Programs

The 35 high risk IT projects are:

  • Strengthening the Foundation for Efficiency and Effectiveness
  • Limiting the Federal Government’s Fiscal Exposure by Better Managing Climate Change Risks
  • Management of Federal Oil and Gas Resources
  • Modernizing the U.S. Financial Regulatory System and the Federal Role in Housing Finance
  • Restructuring the U.S. Postal Service to Achieve Sustainable Financial Viability
  • Funding the Nation’s Surface Transportation System
    Strategic Human Capital Management
  • Managing Federal Real Property
  • Improving the Management of IT Acquisitions and Operations (new)
  • DOD Approach to Business Transformation
  • DOD Business Systems Modernization
  • DOD Support Infrastructure Management
  • DOD Financial Management
  • DOD Supply Chain Management
  • DOD Weapon Systems Acquisition
  • Mitigating Gaps in Weather Satellite Data
  • Strengthening Department of Homeland Security Management Functions
  • Establishing Effective Mechanisms for Sharing and Managing Terrorism-Related Information to Protect the Homeland
  • Ensuring the Security of Federal Information Systems and
  • Cyber Critical Infrastructure and Protecting the Privacy of Personally Identifiable Information
  • Ensuring the Effective Protection of Technologies Critical to U.S. National Security Interests
  • Improving Federal Oversight of Food Safety
  • Protecting Public Health through Enhanced Oversight of Medical Products
  • Transforming EPA’s Processes for Assessing and Controlling Toxic Chemicals
  • DOD Contract Management
  • DOE’s Contract Management for the National Nuclear
  • Security Administration and Office of Environmental Management
  • NASA Acquisition Management
  • Enforcement of Tax Laws
  • Managing Risks and Improving VA Health Care (new)
  • Improving and Modernizing Federal Disability Programs
  • Pension Benefit Guaranty Corporation Insurance Programs
  • Medicare Program
  • Medicaid Program

CIO IT Infrastructure Policy Bundle (more info…) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable

  • Backup and Backup Retention Policy (more info…)
  • Blog and Personal Web Site Policy (more info…) Includes electronic Blog Compliance Agreement Form
  • BYOD Policy Template (more info…) Includes electronic BYOD Access and Use Agreement Form
  • Google Glass Policy Template (more info…) Includes electronic Google Glass Access and Use Agreement Form
  • Incident Communication Plan Policy (more info…) Updated to include social networks as a communication path
  • Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy (more info…) Includes 5 electronic forms to aid in the quick deployment of this policy
  • Mobile Device Access and Use Policy (more info…)
  • Patch Management Policy (more info…)
  • Outsourcing and Cloud Based File Sharing Policy (more info…)
  • Physical and Virtual Security Policy (more info…)
  • Record Management, Retention, and Destruction Policy (more info…)
  • Sensitive Information Policy (more info…) HIPAA Compliant and includes electronic Sensitive Information Policy Compliance Agreement Form
  • Service Level Agreement (SLA) Policy Template with Metrics (more info…)
  • Social Networking Policy (more info…) Includes electronic form
  • Telecommuting Policy (more info…) Includes 3 electronic forms to help to effectively manage work at home staff
  • Text Messaging Sensitive and Confidential Information (more Info…)
  • Travel and Off-Site Meeting Policy (more info…)
  • IT Infrastructure Electronic Forms (more info…)

IT Infrastructure PoliciesInfrastructure Policy Sample

Posted in Infrastructure, Policies & Procedures | Tagged , , , , , | Leave a comment

IT job description bundles available in MS WORD format

IT job descriptions bundles are available in MS WORD format

IT job descriptions bundles have just been updated to meet the latest compliance and security requirements

IT Job DescriptionsIT job descriptions bundles have just been updated.  The bundles are:

  • C-Level IT Job Description Bundle \
    • Chief Information Officer(CIO), Chief Information Officer (CIO) – Small Enterprise, Chief Security Officer (CSO), Chief Compliance Officer (CCO), Chief Mobility Officer (CMO), Chief Technology Officer (CTO), and Chief Digital Officer (CDO)
  • Compliance Management Job Description Bundle
    • Chief Compliance Officer (CCO), Director Electronic Commerce, e-Commerce Specialist, Internet-Intranet Administrator, Manager BYOD Support, Manager Internet – Intranet Activities, Manager Internet Systems, Manager Point of Sale, Manager Record Administration, Manager Transaction Processing, Manager Video and Website Content, Manager Web Content, Manager Wireless Systems, BYOD support anaylst, On-Line Transaction Processing Analyst, PCI-DSS Administrator, PCI-DSS Coordinator, POS Coordinator, POS Hardware Coordinator, POS Senior Coordinator, Record Management Coordinator, System Administrators – UNIX – Windows Linix, Web Analyst, Web Site Designer, Webmaster, and Wireless Coordinator.
  • eCommerce, Wireless, and Internet Job Description Bundle
    • Director Electronic Commerce, e-Commerce Specialist, Internet-Intranet Administrator, Manager Internet – Intranet Activities, Manager Internet Systems, Manager Point of Sale, Manager Record Administration, Manager Transaction Processing, Manager Video and Website Content, Manager Web Content, Manager Wireless Systems, On-Line Transaction Processing Analyst, PCI-DSS Administrator, PCI-DSS Coordinator, POS Coordinator, POS Hardware Coordinator, POS Senior Coordinator, Record Management Coordinator, System Administrator – Linux, System Administrator – UNIX , System Administrator – Windows, Web Analyst, Web Site Designer, Webmaster, and Wireless Coordinator.
  • Enterprise Architecture and IT Executives Job Description Bundle
    • Vice President Strategy and Architecture, Chief Information Officer- CIO, Chief Information Officer – Small Enterprise – CIO, Chief Compliance Officer – CCO, Chief Mobility Officer(CMO), Chief Security Officer – CSO, Chief Technology Officer – CTO, Manager Change Control, Manager Competitive Intelligence, Manager Database, Manager Enterprise Architecture, Manager Sarbanes-Oxley Compliance, Manager Video and Website Content, Project Manager Enterprise Architecture, Capacity Planning Supervisor, Change Control Supervisor, Database Administrator, Enterprise Architect, PCI-DSS Coordinator, and Cloud Computing Architect
  • Enterprise Resource Planning (ERP) Job Description Bundle
    • Project Manager, Enterprise Resource Planning (ERP); Enterprise Resource Planning (ERP) – Architect; Enterprise Resource Planning (ERP) – Business Analyst; Enterprise Resource Planning (ERP) – Data Architect; Enterprise Resource Planning (ERP) – Decision Support Analyst; Enterprise Resource Planning (ERP) – Developer; Enterprise Resource Planning (ERP) – Functional Lead; Enterprise Resource Planning (ERP) – Infrastructure Administrator; Enterprise Resource Planning (ERP) – Master Data Analyst; Enterprise Resource Planning (ERP) – Process Owner; Enterprise Resource Planning (ERP) – Security Administrator; Enterprise Resource Planning (ERP) – Security Analyst; Enterprise Resource Planning (ERP) – Subject Matter Expert; Enterprise Resource Planning (ERP) – Team Lead; Enterprise Resource Planning (ERP) – Technical Lead; and Enterprise Resource Planning (ERP) – Trainer
  • Disaster Recovery and Business Continuity Job Description Bundle
    • Chief Information Officer; Chief Security Officer; Chief Compliance Officer; Chief Mobility Officer; VP Strategy and Architecture; Director Disaster Recovery and Business Continuity; Director e-Commerce; Director Media Communications; Manager Disaster Recovery; Manager Disaster Recovery and Business Continuity; Disaster Recovery Coordinator; Disaster Recovery – Special Projects Supervisor; Manager Database; Capacity Planning Supervisor; Manager Media Library Support; Manager Record Administration; Manager Site Management; and Pandemic Coordinator
  • IT Service Management – SOA Job Description Bundle
    • Director Sarbanes-Oxley Compliance; Manager Change Control; Manager Customer Service Center<; Manager Help Desk Support; Manager Metrics; Manager Quality Control; Manager Service Level Reporting; Manager User Support; Capacity Planning Supervisor; Change Control Analyst; Change Control Supervisor; Help Desk Analyst; Key Performance Indicatior Analyst; Metrics Measurement Analys; and Quality Measurement Analyst
  • Metrics, Service Level Agreement & Outsourcing Job Description Bundle
    • VP Administration; VP Strategy and Architecture; Director IT Management and Control; Manager Contracts and Pricing;Manager Controller; Manager Metrics; Manager Outsourcing; Manager Service Level Reporting; Manager Vendor Management; Key Performance Indicator Analyst; Metrics Measurement Analyst; Quality Measurement Analyst; System Administrator Linux; System Administrator Unix; and System Administrator Windows
  • Security Management Job Description Bundle
    • Chief Compliance Officer (CCO); Chief Security Officer (CSO); VP Strategy and Architecture; Director e-Commerce; Database Administrator; Data Security Administrator; Manager Data Security; Manager Facilities and Equipment; Manager Network and Computing Services; Manager Network Services; Manager Training and Documentation; Manager Voice and Data Communication; Manager Wireless Systems; Network Security Analyst; System Administrator – Linux; System Administrator – Unix; and System Administrator – Windows
  • Salary Survey Job Description Bundle
    • Executive – VP – Chief Information Officer (CIO), Chief Security Officer (CSO), VP – Administration, VP – Consulting Services, VP – Information Services, VP – Technical Services, Director – IT Planning, Director – Production/Data Center, and Director – Systems & Programming.
    • Middle Management: Manager Computer Operations, Manager Customer Service, Manager Data Communications, Manager Data Warehouse, Manager Database, Manager Internet Systems, Manager Network Services, Manager Office Automation Applications, Manager Operating Systems Production, Manager Production Services, Manager Production Support, Manager Quality Control, Manager Security and Workstations, Manager Systems and Programming, Manager Technical Services, Manager Training and Documentation, Manager Voice and Data Communications, Manager Voice/Wireless Communication, Project Manager Applications, Project Manager Distributed Systems, Project Manager Network Technical Services, Project Manager Systems, Capacity Planning Supervisor, Change Control Supervisor, Computer Operations Shift Manager Computer Operations Shift Supervisor, Hardware Installation Supervisor, Microcomputer Support Supervisor, Network Services Supervisor, Production Control Specialist, Production Services Supervisor, and Webmaster.
    • Staff: Change Control Analyst, Computer Operator, Data Center Facility, Administrator, Data Entry Clerk, Data Entry Supervisor, Data Security Administrator, Data Base Specialist, Disaster Recovery Coordinator, e-Commerce Specialist, Forms and Graphics Designer, Hardware Installation Coordinator, Internet Developer, IT Planning Analyst, LAN Application Support Analyst, Librarian, Network Control Analyst, Network Services Administrator, Network Specialist Senior, Network Technician, Object Programmer, Operations Analyst, Personal Computer Specialist, Production Control Analyst, Programmer/Analyst, Software Engineer, Systems Analyst, Systems Programmer, System Support Specialist, Technical Services Specialist, Technical Specialist, Voice/Wireless Communications Coordinator, and Web Analyst

For more information go to http://www.e-janco.com/jobdescriptions.html

Posted in Career, Disaster Recovery, Infrastructure, Job Descriptions, Policies & Procedures, Security & Compliance | Tagged , | Leave a comment

Top 10 Reasons Cloud Fails

Top 10 reasons Cloud fails

Applications are moving to the cloud and CIOs are striving to make the cloud they use as private and secure as possible.

Outsourcing Template
The top 10 reasons cloud fails are:

  1. Changing infrastructure but not changing the operational processes
  2. Ignoring what others are doing
  3. Real benefits are not understood
  4. Alignment of IT and business in the private cloud not done
  5. The wrong staff resources assigned to the design, implementation and operation of the cloud
  6. Benefits are not measured
  7. Charging is not done fairly for services rendered
  8. Benefits are not communicated
  9. The application is not really a cloud based solution – just a conversion of an existing mainframe solution
  10. Organization is not geared to support cloud applications and cloud users
Order Cloud Outsourcing Template    Sample Cloud Outsourcing Contract

Posted in Infrastructure | Tagged , , | Leave a comment

Best Practices – 5 keys on how to harness employee creativity

Best Practices – CIOs need to harness employees’ creativity. Here are five ways they can do that

Best practices to harness creativity include these 5 key elements.

  1. Listen to opinions that are not positive to the proposed solution – CIOs tout the value of employee engagement, but you can’t have one without the other. You have to let people be more open in the workplace.If CIOs do not let dissenting opinions be expressed then team members become less engaged.
  1. Utilize non-traditional solutions – CIOs are good at putting people in positions, and expecting them to do the same thing year after year, and then thinking they’re just going to get better and better at it. But it doesn’t work that way, creative juices dry up. They need to have novelty. They need to do something different.
  1. Make the work environment a fun place to be – Adding an element of fun to the workday can help employees release tension and get reinvigorated.
  1. Stress mastery vs. performance – If a company is all about performance metrics, then employees will focus on achieving those metrics via the same old routines. Employees who are encouraged to become masters of their domain are much more open to new and creative ways of doing things.
  1. Build bonds between people – People who work together day after day want to feel something more than just the work. Personal relationships are the best form of team building

Human Resources

  • CIO HR and Staffing Management Kit – Save over $3,000 with this kit that contains
    • Internet and IT Job Descriptions
    • All of the Job Descriptions as individual MS Word files
    • IT Job Classification HandiGuide
    • Interview and Hiring Guide
    • Latest IT Salary Survey
  • IT Job Family Classification HandiGuide – An architecture to define job families and and align them with pay grades

Posted in Career, Infrastructure, Job Descriptions | Tagged , , , | Leave a comment

Mobile device FCC regulations for 2015 help the mobile user

Mobile Device FCC regulations for 2015 help the user

Mobile Device Access and Use Policy

Mobile device policy including the latest tables and smartphones and FTC guidelines

Order Mobile Device Access Use PolicySample Mobile Device Policy

1. Carriers can’t throttle ‘unlimited” data plans

The FTC made it clear this week in a statement that it will now consider throttling of “unlimited” plans a clear-cut case of false advertising. Both throttled plans and unlimited plans will still be legal. But they can no longer be the same plans.

2. Carriers can’t sell you slow data connectivity as ‘broadband’

The Federal Communications Commission on Thursday unceremoniously redefined what “broadband” means. The previous definition of “broadband” was a meager 4Mbps for downloads and 1Mbps for uploads. That standard was set four years ago.

The new minimums are 25Mbps for downloads and upload speeds of at least of 3Mbps.

As with cases that involve throttling of “unlimited” plans, this is a marketing matter. Providers can sell connectivity at any speed they want, but they can’t advertise it as “broadband” unless it meets the new criteria.

The fact even that 25Mbps is legally considered “broadband” hints at the pathetically low standards that data providers are held to in the U.S. Still, it’s a lot better than nothing.

3. Hotels can’t block your personal Wi-Fi hotspots

Long story short: Some hotels and other businesses, and most famously Marriott hotels, wanted to force hotel guests to pay up for a separate Wi-Fi connection for every device used in the hotel.

FCC Commissioner Jessica Rosenworcel and FCC Chairman Tom Wheeler both said in no uncertain terms that such blocking should not be allowed. Further, Rosenworcel said that even more unlicensed spectrum should be opened up for personal use.

4. You don’t have to die needlessly because emergency personnel can’t locate you indoors.

When you’re in a crisis situation — one that involves, say, a medical emergency or criminal activity — a 911 call enables first responders to use your smartphone’s GPS to find out where you are with some degree of accuracy — as long as you’re outside. They do this through your carrier, and it’s information that carriers are required to provide.

This week, the FCC approved new rules that require carriers to, within two years, start using technology that’s able to provide the location of a 911 caller within 50 meters in at least 40% of cases.

5. You don’t have to tolerate slow airplane Wi-Fi anymore.

Gogo, which provides Wi-Fi service on airplanes, recently got approval from the FCC for a new service called 2Ku to be installed on 1,000 aircraft. The new service is satellite-based and several times faster than most airplane Wi-Fi systems — up to 70Mbps.

6. The entertainment industry can’t use emergency alerts in movie promotions

The FCC recently fined Viacom and ESPN $1.4 million for using official emergency alert tones in a promotion for a movie called Olympus Has Fallen. The warning sound was part of the movie, but people who heard it might have thought there was a real emergency.

In levying the fine, the FCC made it clear that, well, you just can’t do that.

7. It now is easier to file a complaint

The FCC this month launched a new website where consumers can complain about their cable, broadband and wireless service providers.

The new site replaces an old one that was plagued with antiquated design that made filing a complaint difficult.

Posted in Infrastructure | Tagged , , , , | Leave a comment

10 best practices for Disaster Recovery and Business Continuity

10 best practices for Disaster Recovery and Business Continuity

Most CIOs and management executives all say they have disaster recovery and business continuity under control — Do they really?

Best Practices – Top 10 – Janco has found that successful organization typically follow or have implemented these 10 best practices

  1. Have management communicated that disaster recovery not as a tactical IT project but as a strategic IT asset.
  2. Create a disaster recovery and business continuity process that is integrated into the organization
  3. Allocate costs associated with the disaster recovery business continuity plan as part of the base overhead so that costs are distributed across the entire organization
  4. Treat disaster recovery and business continuity as “mission critical” for cost and staff allocations
  5. Establish metrics for the process and timing of recovery events
  6. Test the plans at least once every six months or whenever there is major enhancement to the enterprise’s computing or operational infrastructure
  7. Monitor how other enterprises and your competitors are faring after and event occurs
  8. Quarterly review you media communication protocol for who says what when to whom when an event occurs
  9. Pool your assets and personnel to provide resilience capabilities for interconnected systems or collaborative technologies such as payments or check processing.
  10. Test the back-ups (at least quarterly) so that what is taken is what is needed for recovery and that it meets your recovery performance metrics
Disaster Recovery Security Cloud DRP Security Incident Communication Policy
 Order Disaster Plan TemplateDisaster Plan Sample

It goes without saying that every company, regardless of size, needs a concise business continuity plan in case of an emergency. If you don’t have a disaster recovery plan or haven’t updated yours recently, now is the time to take this critical step to protect your business.

Plan Do Act

Posted in Disaster Recovery, Infrastructure | Tagged , , , , | Leave a comment

Job Market – DC leads the country with the 7.3% unemployment rate

Job Market – DC leads the country with the highest unemployment rate

19 states have unemployment rates of 6.0% or greater in December

Even with the slight improvement in the job market 19 states continue to have high unemployment. California still is at 7% and DC tops the list with a whopping 7.3% rate.  When you add in the participation rate in both of these job markets the true unemployment rate is closer to 10%.

States with High Unemployment – 19 States have 6.0% or greater unemployed

High unemployment states

Add on to this the increase in the labor force due to the recent actions on illegal immigration and the job market picture is not as rosy as depicted by the overall national unemployment rate.

Labor Force Participation

In December of 2014 the work force participation percentage of all employees (male and female) fell to 62.7% as more individuals left the job market. This more than offset the gain in the number of new jobs created.

Work Force Participation

Unemployment Data

During the recession of 2009 – 2013 unemployment in the IT Industry had not been as high as the rest of the United States. Older workers had a higher unemployment rate than your ones. In addition, female high tech employees have not as well as their male counterparts. This is especially true for workers over the age of 55. The unemployment rate for women over the age of 55 for computer and math workers in 2010 was 9.4% versus 8.0% for men.

Unemployment Trend

Posted in Career, Job Descriptions | Tagged , , , | Leave a comment
%d bloggers like this: