IT job market poor as growth continues to trend down. This year, only a little more than one half (53% – 66,600 jobs) of that number of new IT jobs were created. Telecommunication job growth continues to be slow and still has not recovered from the Verizon strike earlier in the year. Where the Verizon strike was about limiting shipping jobs overseas it did not cover companies that continue to outsource telecommunication jobs.
Year to date there are 47,400 fewer new jobs in 2016 than in 2015. The forecast for all of 2016 is only 75,600 new jobs will be created for the year versus 129,400 in 2014 and 112,500 in 2015.
That is not a good sign for IT Pros who are looking to advance and for overall compensation for IT professionals.
IT Median Salaries 2015 vs. 2016
In the process of capturing the data for Janco’s 2017 IT salary survey to be released in January, the trend for IT salaries remaining flat seems to be continuing.
You can get a free copy of the full survey if you provide 10 valid data points and use a corporate e-mail address. Free e-mail accounts like gmail or yahoo do not qualify as we have no way to verify the accuracy of the data provided.
New York Security Compliance – The State of New York announced a series of new rules strengthening cybersecurity requirements for financial firms. This is the latest in a series of announcement aimed at protecting clients, consumers and financial entities from the “ever-growing threat of cyber-attacks.
The Governor of New York said, “New York, the financial capital of the world, is leading the nation in taking decisive action to protect consumers and our financial system from … state-sponsored organizations, global terrorist networks, and other criminal enterprises.” Even if your firm isn’t directly subject to these new regulations, it’s safe to assume that this approach will be rapidly adopted by similar regulatory bodies domestically and around the world.
The current draft calls for the “encryption of all nonpublic information held or transmitted”, but because they tie it tightly to access control, acceptable usage policy, and data retention. Simple encryption won’t be enough to comply with the New York mandates.
To comply with New York Security Compliance mandates CFOs, CIOs, and CSOs, and firms should:
Implement more dynamic ways to protect data. Enterprises will need to deploy more dynamic forms of data protection that extend beyond their current systems. When the requirement for encryption and data-loss protection spans not just records and managed systems, but anywhere data can travel, traditional means of encryption and monitoring are scale able. Organizations will need to enforce granular limitations on access privileges, implement new audit systems to document data governance, and be able to remotely apply data disposition and destruction rules.
Tie access control and privilege management to identity. In a complex technology ecosystem, it’s no longer feasible to define access and privilege at the system, device, or perimeter. Identity is the one attribute that crosses on-premises, cloud, and un-managed services, and provides a consistent way to set, audit, and control access to confidential information. Ultimately, encryption, access controls, and data-in-use protections must persist independent of the kinds of data protected, where it’s stored, or how it’s shared.
Prioritize solutions to balance simplicity and security. Too often, risk and security teams have simply added new solutions to their portfolio in response to regulations and enforcement. Unfortunately, this has often created a complex, hard-to-navigate forest of tools, hurdles, and collaboration dead-ends for employees. The downside of that is it creates incentives for otherwise well-intentioned people to avoid following policy, increasing the risk of a material breach.
Make audit a primary concern. In the past, the requirement for an audit trail on data access was seen as an add-on. In the worst case, it was an afterthought, something built last as a reaction to risk and compliance needs. But, by thinking differently about this rich trove of data, you can improve your visibility into data use and your ability to identify dangerous behavior in advance. In many cases, you will be able to proactively stop data loss before it happens. With a strategy that protects data directly, by deploying identity-driven access controls and dynamic permissions, you can use the data from each user interaction to build a better picture of where data is traveling, and to whom.
Take a more dynamic approach to data protection. Adhere to mandates and be ready to tell any auditor about your enterprises ability to protect the confidentiality, integrity, and availability of your enterprise’s information.
10 Security Assessment Questions 10 Security Assessment Questions Security Assessment Questions To stop a breach tomorrow, what does the enterprise need to differently today? Does the enterprise know if...
Wearable Device Security Concerns Wearable Device Security Concerns Wearable Device Security – Over 300,000,000 wearable devices are going to be deployed in the next several years Wearable Device Security –...
ISO 31000 Compliance – Risk Management ISO 31000 Compliance – Risk Management Cloud processing and outsourcing add external risks to a business’ operation. The International Standards Organization (ISO) has implemented a...
10 step security implementation 10 step security implementation 10 step security implementation process: Make security an executive directive – The driver for security needs to be at the CEO and...
10 point checklist DR power requirements in Janco’s Disaster Recovery Business Continuity template. The checklist addresses the issues associated with power after an event disrupts availability. It is:
Electricity, water, broken wires do not mix. Before anything else, validate that the power source and power distribution systems are dry and functional before power is turned on.
Understand the minimum power requirements to be operational. Have a clear understanding of a facility’s critical loads.
Have an adequate fuel supply to operate backup power sources. Make smart fuel and technology choices, considering things such as if natural gas pipeline service were to be disrupted in your community. Make sure that you have sufficient fuel storage capacity on-site for an extended outage.
Set reasonable response times for standby generator. Frequent outages of a few seconds, a few minutes, or more, can have significant cost implications for businesses. While some other generators take up to two minutes to engage, diesel-powered generators are uniquely able to provide full load power within 10 seconds of a grid outage.
Maintain your equipment and test it operations. Standby generators should be exercised periodically to ensure they will operate as designed in the event of an outage.
Understand your environment and geography. Even the best generators won’t work underwater when subjected to extreme flooding. Check unit location for protection from flooding and ensure you use the proper gauge extension cord.
Set up generators in an “open environment”. Use generators or other gasoline or charcoal-burning devices such as heaters in an open area or outside near an open window. Carbon monoxide fumes can build up and poison people.
Quarterly review your load. Know when there are any new demands or critical circuits to protect. If you’ve added new computers or other power-hungry devices, consider updating switchgear.
Meet all mandated compliance requirements. Make sure you have the proper permits and records on operations.
Optionally contract for a rental power source. Consider a rental generator power for use in the event of an extended outage.
10 Disaster Recovery Lessons Learned 10 lessons learned in Sandy’s aftermath on disaster recovery and business continuity The impacts of Hurricane Sandy have crystallized many executives’ minds on the importance...
10 point checklist for disaster recovery 10 point checklist for disaster recovery HR, Legal and Media Communications Disaster Recovery 10 Point Checklist A list of 10 questions to rank how comprehensive...
Meeting ISO 27031 Requirements Meeting ISO 27031 Requirements ISO 27031 The ISO Standard defines the Information and Communication Technology (ITC) Requirements for Business Continuity (IRBC) program that supports the...
Digital Brand Manager commands a $130K to $140K starting salary
The Digital Brand Manager is responsible for the total digital image that a brand and/or enterprise presents to the outside world. They develop, implement and managing branding and marketing campaigns that promote a company and its products and/or services. He or she plays a major role in enhancing brand awareness within the digital and social networking space as well as driving website traffic and acquiring leads/customers.
As such is responsible for digital consumer experiences across the entire enterprise and its operations. The Digital Brand Manager helps a company drive growth in its brands and product lines by converting traditional physical brand management process to social media ones, and over-sees the rapidly changing digital sectors like mobile applications, social media and Internet based marketing. The Digital Band Manager is responsible for executing and evolving the enterprise’s Social Media Strategy based on performance & emerging company/consumer needs. This includes but is not limited to: channel roles, content strategy, and Social Persona Development.
Janco has created a full job description that is over 1,700 words and 6 plus pages.
The Digital Brand Manager also identifies and evaluates new digital technologies and uses Web analytics tools to measure site traffic to better optimize marketing campaigns, email marketing, social media and display and search advertising.
Android beats Apple in application development war
Android beats Apple in application development war — Android is increasing its lead for developers, eroding the long-standing maxim of creating apps for “iPhone first.”
The Developer Economics: State of the Developer Nation Q3 2016 reports Android now has a whopping 79 percent “mindshare” among mobile developers, the highest for any platform the company has measured since it began its quarterly surveys back in 2010. The record comes as the mindshare for iOS has consistently tracked at 51 percent to 55 percent since 2013 (although that figure rises to 61 percent for professional developers).
More important, perhaps, almost half (47 percent) of professional developers now consider Android their primary platform, up seven points in just six months. Apple, meanwhile, is going in the opposite direction. The number of mobile developers who consider iOS their primary platform dropped eight points, from 39 percent to 31 percent.
Both in an individual’s personal career planning and an enterprise’s staffing, promotion and compensation it is important to have benchmarks on the levels that individuals are at. To that end, one of the best objective ways to meet this goal is to have formal job descriptions and clear paths for promotion and compensation.
Client Server Application Framework Client Server Application Framework Client Server Application Framework article was written on the Upper Setting. It not only defined what the future of mobile and...
Mobilizing Smartphones is a Challenge Mobilizing Smartphones is a very difficult job according to CIOs Mobilizing applications for employees to use on their Smartphones sure sounds like a fun idea....
Job Market tightens Job Market tightens Job Market tightens – Even with the national unemployment data showing positive improvements, the job market is tightening. In a review of...
Top 10 Wearable Issues – Over 33% of all organizations surveyed by Janco have revealed they have more than 5,000 connected devices. Add to that, Cisco predicts there will be more than 600 million wearable devices in use by 2020.
These facts present a set of challenges for CIOs and IT enterprises of all sizes.
Easy physical access to Data
Records management, retention, and destruction
Business continuity is significantly more complex
Photos, Videos and Audio can be captured without anyone knowing it
Instant access to outside Wi-Fi and cellular systems facilitates rapid dissemination
Insecure wireless connectivity
Lack of encryption
Lack of formal policies with limited regulation or compliance –
Wearable Device Security Concerns Wearable Device Security Concerns Wearable Device Security – Over 300,000,000 wearable devices are going to be deployed in the next several years Wearable Device Security –...
IT Hiring Rebounds in June, but Overall Growth Remains Slow
IT hiring rebounds in June, reversing a steep drop in May (much of which was attributed to Verizon strike by 40,000 workers – 17,000 telecommunication) but signaling continued softness in the technology job market as firms cope with uncertainty from the upcoming U.S. presidential election and the United Kingdom’s decision to leave the European Union.
U.S. employers added 34,200 information technology jobs in June, following a loss of 19,400 positions in May, according to an analysis of Bureau of Labor Statistics data by consulting firm Janco Associates Inc. The June figure is up significantly from the same month a year ago, when 6,800 jobs were added.
About 46,500 IT jobs have been created year-to-date, down from 69,400 at this time last year. Growth in IT jobs hit a five-year low in April, CIO Journal reported.
Janco projects a net decrease in the size of the IT job market this year. The firm estimates 76,500 jobs will be added at year’s end, compared to 112,500 in 2015.
“At the beginning of the year people were much more optimistic,” said M. Victor Janulaitis, Janco’s CEO. Last month’s uncertainty surrounding the upcoming U.S. presidential candidates and questions over the implications of a Brexit scenario prompted many firms to become more cautious across the board. ” Everyone’s saying we’re really slowing down this summer.”
That means companies may not fill IT roles left open by retiring baby boomers and may cut back on contractors and consultants. Unessential technology upgrades without a clear return-on-investment may be tabled for the time being.
The forecast is not without bright spots. Companies have been hiring application developers and designers, Mr. Janulaitis said, although most have been internal. And a survey from Janco this month found that average compensation for all IT professionals has increased to $82,775 in 2016 from $ 82,246 a year ago.
Janco’s employment findings are based on an analysis of a basket of IT-related jobs data drawn from the Labor Department’sBureau of Labor Statistics.
The broader economy also rebounded in June, adding a seasonally adjusted 287,000 jobs. That followed a dismal gain of 11,000 jobs in May.
Foreign Assignments – Taking an overseas assignment can be a great career boost. There are some major issues that you need to consider.
The US is the only country in the world that taxes their citizens on their WORLDWIDE income. So even though you may earn every penny in other country on your local contract, the US wants to tax you for it. Fortunately there is a “foreign earned income tax” exclusion that you can apply for that will prevent the US from taxing you for the first $80,000 but above that value you will be taxed by both countries.
Keep a US address – find someone in your family who you can have all of your mail forwarded to and whose address you can use on your US tax forms.
The US requires that if you have a foreign bank account every year you must file a form with the Treasury Department to list all the foreign bank account numbers you own. Foreign branches of banks do not talk to their branches in the US. For all intents and purposes, they are totally different banks. You can wire money back and forth between your accounts (with associated fees), however it is easier to live with the separate accounts.
Have your movers come and estimate the volume of your household goods and then you get a feel for how much will fit in a new “smaller” place.
If you plan on coming back to the US, might leave any valuable goods (antiques, paintings, etc) with your family. Boats have been known to sink; containers have fallen off ships in bad weather, and while these items are insured, they could be lost forever.
Leave most of your electronics in the US. Your TV, stereo, microwave, washer/dryer, blender, even alarm clock, hair dryers, and telephones will not work on the power in many foreign countries. The one exception is a DVD player – note your US DVDs will not work on an foreign DVD player as your DVDs are coded for the US.
Your goods will take 6-8 weeks to come from the US by boat – so be sure to negotiate into your contract that they put you into temporary housing or a hotel until your goods arrive and provide you with a car. I
Car and Driving
It is not cost effective to ship a car. Sell your car and buy a new one in your new country.
The US does not use the “international road signs” so you can find these on the Internet and study them before you arrive. Try to get your hands on an foreign countries’ driving manual before you arrive as the rules of the road are different in almost every country.
Getting a work permit, temporary resident’s visa, your driver’s license, and local ID in foreign country is a paperwork frenzy. Get as many of your personal documents together and organized up front (birth certificate, passport, immunizations, etc).
When you arrive in the foreign country typically you know virtually nobody. It is critical that you find a group of people soon after arriving. Type “Americans (country name)” into Goggle and find some local groups. These groups help you to meet other Americans who are in my exact same situation and who have already crossed the hurdles that you are just going over. These clubs often have “Newcomer” events that will welcome you to the area or subgroups (e.g. American Rotary, Mothers of Young Children, Retirees, Working Women’s Group, etc) that will help you almost immediately find other Americans in similar situations to yours.
Have a power of attorney and a will before you leave the US. Have an the attorney look into what could be done to make these documents legally recognizable in the foreign country.
Renting your Home in the US
You should find a fantastic property management company that does background checks (criminal) and credit checks on potential renters. Also, get the highest end rental insurance and fire insurance you can buy with replacement cost adjusted for inflation.
For a more complete presentation of these considerations go to http://goo.gl/8L4ICw.
Unemployment Levels over 6% in 12 states Unemployment Levels over 6% in 12 states State Unemployment Levels Unemployment Levels by State — The National unemployment data provides a measure of the health...
CIOs investment in infrastructure is going up despite ongoing economic uncertainties. They are investing in IT to improve operations, reduce costs, and enable strategies. IT budgets, hiring, and salaries are increasing slightly (see https://www.e-janco.com/Salary.htm) and CIOs are cautiously optimistic that this trend will continue into next year.
CIOs five (5) concerns are:
Alignment of IT with the Business
Security and Privacy
Business Agility and Flexibility
IT Time-to-Market / Speed of Delivery
CIOs five (5) largest IT investments are:
Big Data and Business Intelligence
Data Center Infrastructure
Enterprise Resource Planning
Application Software Development
CIO IT Infrastructure Policy Bundle (more info…)All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
SEnuke an adventure into poor service management. We have just spent a week of our lives working to get SEnuke – an SEO google search tool to work and have been frustrated beyond belief.
They came out with a new version that looked like the best thing since sliced bread. Here are the problems that we encountered.
Day 1 when when they launched the site was “down” in that you could not download the program. The page said try back in 30 minutes. It took a full day to get the download to work.
When it installed, it did not uninstall the older version but left traces of it on so that “mysteriously” over the next week at times the older version executed confusing the heck out of me.
The marketing material said that Captcha was included – however the SEnuke Captcha did not work for the better part of a week so that I had to purchase a service for that.
When tried purchasing Captcha, all of the listed companies did not work. Links were to sites that were disable or not there. In addition each of the sites had their own userids and passwords. By the time that I was done shopping I have over 7 sets of them.
The application was to create links and URLs. It did not do that. The help, which was via a blog forum, after two days told me I had to get the update.
I got the update. However, it could not be installed because it was classified as an UNSAFE publisher. The certificate they had from GODADDY.com had been REVOKED.
When I posted on the SEnuke forum the response I got was that I had to put an exclusion in my Norton. I had already done that and even turned off Norton, but it still did not install.
I posted that we would PAY for support to get it to work. No response from them.
Considering they want close to $150 a month for their product it is not worth it. Finally after almost a week of effort I cancelled the service and created this review of the product.
10 steps to implement cloud SaaS – As more CIO and other C-Level executives look have Software as a Service (SaaS) for interaction with their users, customers, suppliers, and markets there are some best practices that they should follow.
Evaluate the current capabilities of their IT infrastructure and application portfolio. Included in that an assessment of the competition and the state of opposing competitive solutions.
Develop a roadmap with priorities for SaaS/cloud deployment. Establish who the drivers and owners of the SaaS process are.
Establish clear governance that considers key stakeholders for cloud deployments. Include budgetary responsibility as well as for achieving stated goals.
Develop metrics for performance and for measuring success in meeting cost and other deployment goals. Include a process for dissemination of the results in a timely manner
Adopt vendor management practices to monitor SLA performance and define responsibilities.
Provide active project management to keep implementation on time and on budget. Steering committees and SDM (System Development Methodology) need to be included in the mix.
Plan for ongoing support, acquiring or training resources for the necessary skills, and address skills gaps. Budgets and associates service levels need to be defined before the SaaS development begins.
Regularly evaluate performance and goals/metrics to ensure they are being met. Utilize every form of communication possible so the enterprise as a whole knows what the state of the SaaS activity is.
Audit compliance with security and other standards and practices and privacy policies. Build compliance into the SaaS process.
Ask suppliers to provide specific data and experience with cloud-to-cloud integration and performance.
To stop a breach tomorrow, what does the enterprise need to differently today?
Does the enterprise know if the company has been breached? How does it know?
What assets are being protecting, what are they being protected from (i.e., theft, destruction, compromise), and who are they being protected them from (i.e. cybercriminals or insiders)?
What risks does the enterprise face if it is breached (i.e., financial loss, reputation, regulatory fines, loss of competitive advantage)?
Does the enterprise’s IT security implementation match the enterprise’s business-centric security policies?
Are formal written policies, technical controls or both in place? Are they being followed?
What is the enterprise’s security strategy for IoT?
What is the enterprise’s security strategy for BYOD and “anywhere, anytime, any device” mobility?
Does the enterprise have an incident response plan in place?
What is the enterprise’s remediation process? Can the enterprise recover lost data and prevent a similar attack from happening again?
Security Compliance – Comprehensive, Detailed and Customizable for Your Business
The Security Compliance Policy and Audit Program bundle provides all the essential sections of a complete security manual and walks you through the creation of each step. Detailed language addressing more than a dozen security topics is included in 220 plus page Microsoft Word document, which you can modify as much or as little as you need to fit your business requirements. The template includes sections on critical topics like:
Risk analysis – Threat and Vulnerability Assessment via Electronic Forms
Technology Application Trends – 2010 – 2015 was the true start of the digital technology revolution that fundamentally altered the way we live, work, and relate to one another. In its scale, scope, and complexity, this transformation was unlike anything we have experienced before.
Everything was affected – politics, media, social interactions, commerce and technology itself.
Often described as the 4th Industrial Revolution, this period of digitalization continues to intensify characterized by a fusion of technologies which are blurring the lines between the physical and digital spheres for the 21st Century Enterprise. The 4th Industrial Revolution is causing widespread disruption in almost every industry across the globe, with enormous change in the skill sets required to master this new landscape. We have tailored this year’s program to explore the exponential speed of current breakthroughs (which has no historical precedent), with the breadth and depth of these changes unleashing entire new systems of production, management, governance, and Information Technology.
As digital business now moves into the next phase, autonomous and algorithmic investments will be required to improve operational efficiencies, drive down costs to run IT, and deliver the self-funded returns necessary for additional innovation and business value creation.
We do not yet know precisely how the 4th Industrial Revolution will unfold, but one thing is clear: our response to it must be comprehensive and integrated, involving all global IT ecosystem stakeholders at the intersection of the public and private sectors, and within academia and civil society.
2016 Internet and IT Position Description HandiGuide Released
There are now 273 IT Job Descriptions available that that have been updated to meet the latest compliance and new technology requirements. The HandiGuide can be acquired in MS WORD and / or PDF format. In addition we provide the option to get updates and free custom job descriptions.
Cloud Technology Impacts Outsourcing Cloud Technology Impacts Outsourcing What makes cloud computing different from this “ordinary” system of computing is that the cloud functions as a collective computer that...
Data is the lifeblood of every company, and often, it is a competitive advantage and the only thing that differentiates one enterprise from another. Who has the most loyal customers, the best service, and the most innovative strategies all boils down to information residing on the enterprise’s Information Technology and application systems. For this reason disaster recovery and business continuity are a definite need. In addition, there are security requirements that need to be met. With mandated requirements like Sarbanes-Oxley, HIPAA, PCI-DSS, and ITIL, executive management is depending on you to have the right security policies and procedures in place.
Disaster Recovery Business Continuity with Security
Google has addressed this and describes it in a video that is has placed on youtube.