10 Point Checklist DR Power Requirements

10 Point Checklist DR Power Requirements

10 point checklist DR power requirements in Janco’s Disaster Recovery Business Continuity template.  The checklist addresses the issues associated with power after an event disrupts availability. It is:

  1. Electricity, water, broken wires do not mix.  Before anything else, validate that the power source and power distribution systems are dry and functional before power is turned on.10 Point Checklist DR Power Requirements
  2. Understand the minimum power requirements to be operational.   Have a clear understanding of a facility’s critical loads.
  3. Have an adequate fuel supply to operate backup power sources. Make smart fuel and technology choices, considering things such as if natural gas pipeline service were to be disrupted in your community. Make sure that you have sufficient fuel storage capacity on-site for an extended outage.
  4. Set reasonable response times for standby generator.  Frequent outages of a few seconds, a few minutes, or more, can have significant cost implications for businesses. While some other generators take up to two minutes to engage, diesel-powered generators are uniquely able to provide full load power within 10 seconds of a grid outage.
  5. Maintain your equipment and test it operations. Standby generators should be exercised periodically to ensure they will operate as designed in the event of an outage.
  6. Understand your environment and geography.  Even the best generators won’t work underwater when subjected to extreme flooding.  Check unit location for protection from flooding and ensure you use the proper gauge extension cord.
  7. Set up generators in an “open environment”. Use generators or other gasoline or charcoal-burning devices such as heaters in an open area or outside near an open window. Carbon monoxide fumes can build up and poison people.
  8. Quarterly review your load.  Know when there are any new demands or critical circuits to protect.  If you’ve added new computers or other power-hungry devices, consider updating switchgear.
  9. Meet all mandated compliance requirements. Make sure you have the proper permits and records on operations.
  10. Optionally contract for a rental power source.  Consider a rental generator power for use in the event of an extended outage.
Order Disaster Plan TemplateOrder Disaster Plan TemplateDisaster Plan Sample

Digital Brand Manager – Technology skills required for many mainstream roles

Digital Brand Manager hot new job

Digital Brand Manager commands a $130K to $140K starting salary

The Digital Brand Manager is responsible for the total digital image that a brand and/or enterprise presents to the outside world. They develop, implement and managing branding and marketing campaigns that promote a company and its products and/or services. He or she plays a major role in enhancing brand awareness within the digital and social networking space as well as driving website traffic and acquiring leads/customers.

As such is responsible for digital consumer experiences across the entire enterprise and its operations. The Digital Brand Manager helps a company drive growth in its brands and product lines by converting traditional physical brand management process to social media ones, and over-sees the rapidly changing digital sectors like mobile applications, social media and Internet based marketing. The Digital Band Manager is responsible for executing and evolving the enterprise’s Social Media Strategy based on performance & emerging company/consumer needs. This includes but is not limited to: channel roles, content strategy, and Social Persona Development.

Janco has created a full job description that is over 1,700 words and 6 plus pages.

The Digital Brand Manager also identifies and evaluates new digital technologies and uses Web analytics tools to measure site traffic to better optimize marketing campaigns, email marketing, social media and display and search advertising.

Order digital brand manager job description

 

 

Android beats Apple in application development war

Android beats Apple in application development war

Android beats Apple in application development war — Android is increasing its lead for developers, eroding the long-standing maxim of creating apps for “iPhone first.”

Career Planning Template
Career Planning

The Developer Economics: State of the Developer Nation Q3 2016 reports Android now has a whopping 79 percent “mindshare” among mobile developers, the highest for any platform the company has measured since it began its quarterly surveys back in 2010. The record comes as the mindshare for iOS has consistently tracked at 51 percent to 55 percent since 2013 (although that figure rises to 61 percent for professional developers).

Download Selected Pages

More important, perhaps, almost half (47 percent) of professional developers now consider Android their primary platform, up seven points in just six months. Apple, meanwhile, is going in the opposite direction. The number of mobile developers who consider iOS their primary platform dropped eight points, from 39 percent to 31 percent.

Both in an individual’s personal career planning and an enterprise’s staffing, promotion and compensation it is important to have benchmarks on the levels that individuals are at. To that end, one of the best objective ways to meet this goal is to have formal job descriptions and clear paths for promotion and compensation.

Top 10 Wearable Issues

Top 10 Wearable Issues

Top 10 Wearable Issues – Over 33% of all organizations surveyed by Janco have revealed they have more than 5,000 connected devices. Add to that, Cisco predicts there will be more than 600 million wearable devices in use by 2020.

These facts present a set of challenges for CIOs and IT enterprises of all sizes.

  1. Easy physical access to Data
  2. Records management, retention, and destruction
  3. Business continuity is significantly more complex
  4. Photos, Videos and Audio can be captured without anyone knowing it
  5. Instant access to outside Wi-Fi and cellular systems facilitates rapid dissemination
  6. Insecure wireless connectivity
  7. Lack of encryption
  8. Lack of formal policies with limited regulation or compliance –
  9. Software and Firmware version control
  10. Current MDM Policies Don’t Cover Wearables

Read On…

Top 10 Wearable Issues Download Selected Pages

IT Hiring Rebounds in June, but Overall Growth Remains Slow

IT Hiring Rebounds in June, but Overall Growth Remains Slow

IT hiring rebounds in June, reversing a steep drop in May (much of which was attributed to Verizon strike by 40,000 workers – 17,000 telecommunication) but signaling continued softness in the technology job market as firms cope with uncertainty from the upcoming U.S. presidential election and the United Kingdom’s decision to leave the European Union.

IT hiring rebounds
IT hiring rebounds

U.S. employers added 34,200 information technology jobs in June, following a loss of 19,400 positions in May, according to an analysis of Bureau of Labor Statistics data by consulting firm Janco Associates Inc. The June figure is up significantly from the same month a year ago, when 6,800 jobs were added.

About 46,500 IT jobs have been created year-to-date, down from 69,400 at this time last year. Growth in IT jobs hit a five-year low in April, CIO Journal reported.

Janco projects a net decrease in the size of the IT job market this year. The firm estimates 76,500 jobs will be added at year’s end, compared to 112,500 in 2015.

“At the beginning of the year people were much more optimistic,” said M. Victor Janulaitis, Janco’s CEO. Last month’s uncertainty surrounding the upcoming U.S. presidential candidates and questions over the implications of a Brexit scenario prompted many firms to become more cautious across the board. ” Everyone’s saying we’re really slowing down this summer.”

That means companies may not fill IT roles left open by retiring baby boomers and may cut back on contractors and consultants. Unessential technology upgrades without a clear return-on-investment may be tabled for the time being.

The forecast is not without bright spots. Companies have been hiring application developers and designers, Mr. Janulaitis said, although most have been internal. And a survey from Janco this month found that average compensation for all IT professionals has increased to $82,775 in 2016 from $ 82,246 a year ago.

IT Median Salaries
IT Median Salaries

Janco’s employment findings are based on an analysis of a basket of IT-related jobs data drawn from the Labor Department’s Bureau of Labor Statistics.

The broader economy also rebounded in June, adding a seasonally adjusted 287,000 jobs. That followed a dismal gain of 11,000 jobs in May.

Order Salary SurveyDownload Selected PagesDownload Selected Pages

Foreign Assignments

Foreign Assignments Considerations

Foreign Assignments – Taking an overseas assignment can be a great career boost. There are some major issues that you need to consider.

Taxes

Many career opportunities can be unlocked when you accept a foreign assignment. Here is a list of things that you need to consider

The US is the only country in the world that taxes their citizens on their WORLDWIDE income. So even though you may earn every penny in other country on your local contract, the US wants to tax you for it. Fortunately there is a “foreign earned income tax” exclusion that you can apply for that will prevent the US from taxing you for the first $80,000 but above that value you will be taxed by both countries.

Download Selected PagesKeep a US address – find someone in your family who you can have all of your mail forwarded to and whose address you can use on your US tax forms.

Foreign Banking

The US requires that if you have a foreign bank account every year you must file a form with the Treasury Department to list all the foreign bank account numbers you own. Foreign branches of banks do not talk to their branches in the US. For all intents and purposes, they are totally different banks. You can wire money back and forth between your accounts (with associated fees), however it is easier to live with the separate accounts.

Moving

Have your movers come and estimate the volume of your household goods and then you get a feel for how much will fit in a new “smaller” place.

If you plan on coming back to the US, might leave any valuable goods (antiques, paintings, etc) with your family. Boats have been known to sink; containers have fallen off ships in bad weather, and while these items are insured, they could be lost forever.

Leave most of your electronics in the US. Your TV, stereo, microwave, washer/dryer, blender, even alarm clock, hair dryers, and telephones will not work on the power in many foreign countries.  The one exception is a DVD player – note your US DVDs will not work on an foreign DVD player as your DVDs are coded for the US.

Your goods will take 6-8 weeks to come from the US by boat – so be sure to negotiate into your contract that they put you into temporary housing or a hotel until your goods arrive and provide you with a car. I

Car and Driving

It is not cost effective to ship a car. Sell your car and buy a new one in your new country.

The US does not use the “international road signs” so you can find these on the Internet and study them before you arrive. Try to get your hands on an foreign countries’ driving manual before you arrive as the rules of the road are different in almost every country.

Bureaucracy

Getting a work permit, temporary resident’s visa, your driver’s license, and local ID in foreign country is a paperwork frenzy. Get as many of your personal documents together and organized up front (birth certificate, passport, immunizations, etc).

Networking

When you arrive in the foreign country typically you know virtually nobody. It is critical that you find a group of people soon after arriving. Type “Americans (country name)” into Goggle and find some local groups. These groups help you to meet other Americans who are in my exact same situation and who have already crossed the hurdles that you are just going over. These clubs often have “Newcomer” events that will welcome you to the area or subgroups (e.g. American Rotary, Mothers of Young Children, Retirees, Working Women’s Group, etc) that will help you almost immediately find other Americans in similar situations to yours.

Paperwork

Have a power of attorney and a will before you leave the US. Have an the attorney look into what could be done to make these documents legally recognizable in the foreign country.

Renting your Home in the US

You should find a fantastic property management company that does background checks (criminal) and credit checks on potential renters. Also, get the highest end rental insurance and fire insurance you can buy with replacement cost adjusted for inflation.

For a more complete presentation of these considerations go to http://goo.gl/8L4ICw.

10 best practices electronic meetings

10 best practices electronic meetings

10 best practices electronic meetings
Travel Off-Site Meeting Policy

10 best practices electronic meetings have been identified by Janco Associates, Inc.  They are:

  1. Have an agenda that is available to all attendees before the meeting
  2. Have a process to validate that the devices in use by users will work with the electronic meeting application
  3. Test the meeting technology with all attendees well in advance of the meeting
  4. Have a specific start time
  5. Be aware of time zones that meeting attendees will be in
  6. Have a dress code including background for meeting attendees to follow
  7. Send electronic invitation which require a confirmation and put the meeting in the electronic calendars of all attendees
  8. Have a common secure location where share documents are available to all attendees
  9. Record the meeting and comments for others to review if they are not able to attend
  10. After the meeting send a summary of the meeting including next steps, tasks assigned, and when the next follow-up meeting will take place.

Order PolicyDownload Selected Pages

CIOs investment in Infrastructure is on the rise

CIOs investment in Infrastructure is on the rise

CIOs investment in infrastructure is going up despite ongoing economic uncertainties.  They are investing in IT to improve operations, reduce costs, and enable strategies. IT budgets, hiring, and salaries are increasing slightly (see https://www.e-janco.com/Salary.htm) and CIOs are cautiously optimistic that this trend will continue into next year.

CIOs five (5) concerns are:

  1. Alignment of IT with the Business
  2. Security and Privacy
  3. Business Agility and Flexibility
  4. Business Productivity
  5. IT Time-to-Market / Speed of Delivery

CIOs five (5) largest IT investments are:

  • Big Data and Business Intelligence
  • Data Center Infrastructure
  • Enterprise Resource Planning
  • Application Software Development
  • Cloud Computing

CIO IT Infrastructure Policy Bundle (more info…) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable

  • Backup and Backup Retention Policy (more info…)
  • Blog and Personal Web Site Policy (more info…) Includes electronic Blog Compliance Agreement Form
  • BYOD Policy Template (more info…) Includes electronic BYOD Access and Use Agreement Form
  • Google Glass Policy Template (more info…) Includes electronic Google Glass Access and Use Agreement Form
  • Incident Communication Plan Policy (more info…) Updated to include social networks as a communication path
  • Internet, e-Mail, Social Networking, Mobile Device, Electronic Communications, and Record Retention Policy (more info…) Includes 5 electronic forms to aid in the quick deployment of this policy
  • Mobile Device Access and Use Policy (more info…)
  • Patch Management Policy (more info…)
  • Outsourcing and Cloud Based File Sharing Policy (more info…)
  • Physical and Virtual Security Policy (more info…)
  • Record Management, Retention, and Destruction Policy (more info…)
  • Sensitive Information Policy (more info…) HIPAA Compliant and includes electronic Sensitive Information Policy Compliance Agreement Form
  • Service Level Agreement (SLA) Policy Template with Metrics (more info…)
  • Social Networking Policy (more info…) Includes electronic form
  • Telecommuting Policy (more info…) Includes 3 electronic forms to help to effectively manage work at home staff
  • Text Messaging Sensitive and Confidential Information (more Info…)
  • Travel and Off-Site Meeting Policy (more info…)
  • IT Infrastructure Electronic Forms (more info…)

IT Infrastructure PoliciesDownload Selected Pages

SEnuke definition of poor service management

SEnuke definition of poor service management

SEnuke an adventure into poor service management.  We have  just spent a week of our lives working to get SEnuke – an SEO google search tool to work and have been frustrated beyond belief.

They came out with a new version that looked like the best thing since sliced bread.  Here are the problems that we encountered.

  1. Day 1 when when they launched the site was “down” in that you could not download the program.  The page said try back in 30 minutes.  It took a full day to get the download to work.
  2. When it installed, it did not uninstall the older version but left traces of it on so that “mysteriously” over the next week at times the older version executed confusing the heck out of me.
  3. The marketing material said that Captcha was included – however the SEnuke Captcha did not work for the better part of a week so that I had to purchase a service for that.
  4. When tried  purchasing Captcha, all of the listed companies did not work.  Links were to sites that were disable or not there.  In addition each of the sites had their own userids and passwords.  By the time that I was done shopping I have over 7 sets of them.
  5. The application was to create links and URLs.  It did not do that.  The help, which was via a blog forum, after two days told me I had to get the update.
  6. I got the update.  However, it could not be installed because it was classified as an UNSAFE publisher.  The certificate they had from GODADDY.com had been REVOKED.
  7. When I posted on the SEnuke forum the response I got was that I had to put an exclusion in my Norton.   I had already done that and even turned off Norton, but it still did not install.
  8. I posted that we would PAY for support to get it to work.  No response from them.

Considering they want close to $150 a month for their product it is not worth it.  Finally after almost a week of effort I cancelled the service and created this review of the product.

10 Steps to Implement Cloud SaaS

10 Steps to Implement Cloud SaaS

10 Steps to Implements Cloud SaaS
10 Steps to Implements Cloud SaaS

10 steps to implement cloud SaaS – As more CIO and other C-Level executives look have Software as a Service (SaaS) for interaction with their users, customers, suppliers, and markets there are some best practices that they should follow.

  1. Cloud How To Guide

    Evaluate the current capabilities of their IT infrastructure and application portfolio. Included in that an assessment of the competition and the state of opposing competitive solutions.

  2. Develop a roadmap with priorities for SaaS/cloud deployment. Establish who the drivers and owners of the SaaS process are.
  3. Establish clear governance that considers key stakeholders for cloud deployments. Include budgetary responsibility as well as for achieving stated goals.
  4. Develop metrics for performance and for measuring success in meeting cost and other deployment goals. Include a process for dissemination of the results in a timely manner
  5. Adopt vendor management practices to monitor SLA performance and define responsibilities.
  6. Provide active project management to keep implementation on time and on budget. Steering committees and SDM (System Development Methodology) need to be included in the mix.
  7. Plan for ongoing support, acquiring or training resources for the necessary skills, and address skills gaps. Budgets and associates service levels need to be defined before the SaaS development begins.
  8. Regularly evaluate performance and goals/metrics to ensure they are being met. Utilize every form of communication possible so the enterprise as a whole knows what the state of the SaaS activity is.
  9. Audit compliance with security and other standards and practices and privacy policies. Build compliance into the SaaS process.
  10. Ask suppliers to provide specific data and experience with cloud-to-cloud integration and performance.
Order Cloud Outsourcing Template  Download Selected Pages

10 Security Assessment Questions

10 Security Assessment Questions

Security Assessment and Compliance Management
Security Assessment and Compliance Management

Security Assessment Questions

  1. To stop a breach tomorrow, what does the enterprise need to differently today?
  2. Does the enterprise know if the company has been breached? How does it know?
  3. What assets are being protecting, what are they being protected from (i.e., theft, destruction, compromise), and who are they being protected them from (i.e. cybercriminals or insiders)?
  4. What risks does the enterprise face if it is breached (i.e., financial loss, reputation, regulatory fines, loss of competitive advantage)?
  5. Does the enterprise’s IT security implementation match the enterprise’s business-centric security policies?
  6. Are formal written policies, technical controls or both in place? Are they being followed?
  7. What is the enterprise’s security strategy for IoT?
  8. What is the enterprise’s security strategy for BYOD and “anywhere, anytime, any device” mobility?
  9. Does the enterprise have an incident response plan in place?
  10. What is the enterprise’s remediation process? Can the enterprise recover lost data and prevent a similar attack from happening again?

Security Compliance – Comprehensive, Detailed and Customizable for Your Business

The Security Compliance Policy and Audit Program bundle provides all the essential sections of a complete security manual and walks you through the creation of each step. Detailed language addressing more than a dozen security topics is included in 220 plus page Microsoft Word document, which you can modify as much or as little as you need to fit your business requirements. The template includes sections on critical topics like:

  • Risk analysis – Threat and Vulnerability Assessment via Electronic Forms
  • Staff member roles
  • Physical security
  • Electronic Communication (email / SmartPhones)
  • Blogs and Personal Web Sites
  • Facility design, construction and operations
  • Media and documentation
  • Data and software security
  • Network security
  • Internet and IT contingency planning
  • Insurance
  • Outsourced services
  • Waiver procedures
  • Incident reporting procedures
  • Access control guidelines
  • PCI DSS Audit Program as a separate document

Order Download Selected Pages

Technology Application Trends

Technology Application Trends

Technology Application Trends – 2010 – 2015 was the true start of the digital technology revolution that fundamentally altered the way we live, work, and relate to one another. In its scale, scope, and complexity, this transformation was unlike anything we have experienced before.

Everything was affected – politics, media, social interactions, commerce and technology itself.

Often described as the 4th Industrial Revolution, this period of digitalization continues to intensify characterized by a fusion of technologies which are blurring the lines between the physical and digital spheres for the 21st Century Enterprise. The 4th Industrial Revolution is causing widespread disruption in almost every industry across the globe, with enormous change in the skill sets required to master this new landscape. We have tailored this year’s program to explore the exponential speed of current breakthroughs (which has no historical precedent), with the breadth and depth of these changes unleashing entire new systems of production, management, governance, and Information Technology.

As digital business now moves into the next phase, autonomous and algorithmic investments will be required to improve operational efficiencies, drive down costs to run IT, and deliver the self-funded returns necessary for additional innovation and business value creation.

We do not yet know precisely how the 4th Industrial Revolution will unfold, but one thing is clear: our response to it must be comprehensive and integrated, involving all global IT ecosystem stakeholders at the intersection of the public and private sectors, and within academia and civil society.

2016 Internet and IT Position Description HandiGuide Released

IT Job Descriptions

There are now 273 IT Job Descriptions available that that have been updated to meet the latest compliance and new technology requirements. The HandiGuide can be acquired in MS WORD and / or PDF format.  In addition we provide the option to get updates and free custom job descriptions.

The job descriptions that we have added are:

Disaster Recovery Business Continuity with Security

Disaster Recovery Business Continuity with Security

Every company, regardless of size, needs a concise approach  disaster recovery business continuity with security in case of an emergency.

Order DRP BCP Security Download Selected Pages

Disaster Recovery Business Continuity with Security
Disaster Recovery Business Continuity with Security

Data is the lifeblood of every company, and often, it is a competitive advantage and the only thing that differentiates one enterprise from another. Who has the most loyal customers, the best service, and the most innovative strategies all boils down to information residing on the enterprise’s Information Technology and application systems. For this reason disaster recovery and business continuity are a definite need.  In addition, there are  security requirements that need to be met.  With mandated requirements like Sarbanes-Oxley, HIPAA, PCI-DSS, and ITIL, executive management is depending on you to have the right security policies and procedures in place.

Disaster Recovery Business Continuity with Security

Google has addressed this and describes it in a video that is has placed on youtube.

10 step security implementation process :

  • Make security an executive directive
  • Implement clear security guidelines
  • Provide specifics for security compliance
  • Enforce that everyone follows the rules
  • Provide formal training program
  • Communicate Security
  • Monitor security compliance
  • Establish security compliance metrics
  • Provide security compliance feedback
  • Audit security with a third party 

World Class Organizations mobility a standard feature in IT applications

World Class Organizations mobility a standard feature in IT applications

World Class Organizations mobility –  CIOs are incorporating mobility into their IT applications and business operational solutions. All of the recent major advances in technology have moved mobility into the mainstream.  In addition, they are building on the average user’s mobile-device comfort level that exists due to smartphones.

The primary driver for this mobile-ready technology is simple: world class application solutions more easily meet evolving industry needs, and are accessible to broad range of top managers in a manner that matches the work styles – and even the personal lives – of the internal and external users who depend on them.

BYOD - mobility policy
BYOD – mobility policy

Business professionals typically carry one or more devices with them at all times. Over 85% of IT functions have moved out of the denial stage regarding the “bring-your-own-device” (BYOD) movement and are successfully managing the operational complexity created by employee-owned, multi-platform mobile devices connected to their networks.

In a recent Janco Associates survey of c-level executives – including CEOs, CFOs, and CIOs:

  1. 36% of respondents said that they currently access their organization’s core operational and financial data, via smartphone or mobile device.
  2. Only 23% of the c-level executives interviewed describe themselves as technology “early adopters” or “techno-centric.”

C-level executives and top managers are no longer tied to their desks, and while they are on the move, the information that they need moves with them. In previous generations of technology “mobility” and “productivity” were at cross-purposes, the latest generation of IT applications and business operational solutions has paired the two successfully, providing increased access to information that improves efficiency. In sum, c-level executives and top managers no longer have to be techno-centric in order to leverage world class IT applications and business operational across the enterprise.

In the case of mobile IT applications and business operational functionality, CIOs need to understand the business processes, and relate with other c-level executives and top manages, and understanding how mobile access of information changes the way the enterprise operates.

For instance, a mobile IT applications and business operational solution, allows managers to approve workflows on the go – something that would otherwise have to wait until the manager is back in the office.

In the world of mobile business management, production and operations managers have instant access to information about potential problems, and these managers can even authorize changes to expedite specific work orders or deliveries. Since this data is linked to the enterprise’s other applications, the cost ramifications of real-time changes will become immediately apparent to business and finance leadership as well.

Bring Your Own Device Policy updated to to meet Disaster Recovery, Business Continuity and Corporate Intellectual Property Requirements

Download Selected Pages

Top 10 Best Practices Ransomware

Top 10 Best Practices Ransomware

Best Practices Ransomware

Best Practices Ransomware – Ransomware is a class of malware that holds a computer or data “hostage” until the user pays a particular amount or abides by specific instructions. The ransomware restricts access to the data and the system. Some cases of ransomware also repeatedly show messages that tell users they must pay the “ransom” or perform a particular action. There are some ransomware variants that encrypt files found on the system’s hard drive. Users must pay the ransom in order to decrypt the data that was altered by the ransomware.

Cybercriminals behind this threat made use of online payment methods as a way for users to pay the ransom.

  1. Have remote backups of your data that is not “mapped” to your computers and network.
  2. Show hidden file extensions. One way that Cryptolocker frequently arrives is in a file that is named with the extension “.PDF.EXE”, counting on Window’s default behavior of hiding known file-extensions. In order to mitigate this re-enable the ability to see the full file-extension, it can be easier to spot suspicious files.
  3. Have your email server filter out all files that are executables. If there is a need to exchange executable files within your environment and are denying emails with “.EXE” files, you can do so with ZIP files (password-protected) or via cloud services.
  4. Disable files running from AppData/LocalAppData folders. One of the way that ransomware works is to place an executable within those Wndows folders and then launch the programs. By disabling those files you eliminate a major weakness in your operating environment.
  5. Disable Remote Desktop Protocol (RDP) which allows others to access your desktop remotely. If you do not require the use of RDP, you can disable RDP to protect your environment.
  6. Keep your software current by applying patches and updates in a timely manner. Malware authors frequently rely on people running outdated software with known vulnerabilities, which they can exploit to silently get onto your system. It can significantly decrease the potential for ransomware-pain if you make a practice of updating your software often.
  7. Utilize a security suite that has large user base and is updated frequently.
  8. If you run WiFi in your environment, ,make sure that all of the routers in the network are secure, utilize strong passwords and change their passwords at least quarterly. If you do have a ransomware attack turn your WiFi off immediately.
  9. Provide in-depth training to all users who have access to your environment on what they can and cannot do such as accept files that are suspicious or from unknown users.
  10. Stay current with all breaches and ransomware attacks that are reported and adjust your operating environment to address exposures that others have faced.

Security Manual Template and Compliance Tools

Order Security Manual Download Selected Pages