Telecommuting Top 10 Reasons Why

Telecommuting Top 10 Reasons Why

Telecommuting Top 10 Reasons Why include the following:

  1. Flexible Work Hours – If employees telecommute then their schedules become more flexible.
  2. Reduce costs – telecommuters can save money on transportation costs such as gas, parking, public transportation, work clothes, and dry cleaning bills. Employers can save money by reducing overhead and retaining employees.
  3. Ease the strain on employees -telecommuters have greater flexibility to plan non-work-related activities around their business schedule instead of searching for the time in the early morning, late evening, or during lunch.
  4. More Productive – telecommuters will save the time they now take to commute to their place of employment.
  5. Minimize Non-Work Distractions – At times employees in an office setting can be distracted from their work by untimely interruptions from peers, impromptu meetings, or pulled away onto other projects. Telecommuters may find themselves more productive.
  6. Better Morale – Working from home usually means telecommuter have more time with their family.
  7. Green Solution  – Working from home part or full-time reduces the auto emissions and decreases gas consumption.
  8. Stay Healthy – Working from home decreases the stress caused by inflexible hours, commuting time and costs, continual rushing to unmet family needs, sitting idle during a commute and provides time to exercise or pursue endeavors of particular interest to you.
  9. Potential Tax Deductions – Income deductions are available for home-based work-related expenses such as fax, scanner, phone, computer and office supplies.
  10. Reduce the Need for Outsourcing – Working from home helps keep jobs domestic and reduces need or desire for business and industry to contract with other countries for work that can be done at sites other than the main office.
Order Telecommuting PolicyDownload Selected Pages

Top 10 Smartphone Features to be added

Top 10 Smartphone Features to be added

Top 10 Smartphone features to be added in the next new devices.

  1. New designs: Samsung looking at a folding smartphone, Apple face lift to phone hardware and core application
  2. Faster processors: Qualcomm has announced the Snapdragon 835, which could be installed in some premium Android smartphones from top mobile companies. Some may opt for Mediatek’s Helio X30, which has 10 CPU cores
  3. Virtual reality: It’ll be possible to plug handsets into Google’s DayDream View VR headset to watch movies, play games, or roam VR worlds.
  4. Improved LTE: LTE speeds will get a serious boost with new modem technologies. Smartphones like the Galaxy S7 and Apple’s iPhone 7 can download data over LTE networks at a maximum speed of 600Mbps (bits per second), and upload data at 150Mbps.
  5. USB port upgrade: USB-C will replace the aging micro-USB 2.0 ports in Android handsets. USB-C is extremely versatile — beyond charging, it can be used to connect mobile devices to high-definition monitors, headphones, flash drives, and external storage devices.
  6. More Wireless Audio (Bluetooth): This means the extra headache of buying and recharging wireless headsets, but getting rid of the headphone jack could result in thinner and lighter handsets with better battery life.
  7. Quicker charging: Smartphones will charge much faster with USB-C cables, which can carry more power to a battery.
  8. Smarter phones: Augmented reality smartphones can recognize objects, map out rooms, and present relevant information about objects in sight on a handset’s screen. Smartphones can already recognize images and speech recognition via online services, but deep-learning enhancements could bring those capabilities offline.
  9. Faster Bluetooth: Bluetooth 5 wireless upgrade which will have two times the speed and four times the range of its predecessor
  10. More Removable Storage – Currently, internal storage tops out at 256GB and SD storage at 512GB, but SanDisk this year showed a prototype 1TB SD card.

IT Infrastructure Policies and Procedures

One of the best ways to communicate and understand a company and its operating culture is through its policies. Designing and writing policy and communicating it effectively is an essential skill for professionals to have. By having policy carefully developed and communicated, employees will clearly know what the organization expects from them, the degree of control and independence they will have, and what the benefits and consequences are in regard to adhering to policy.

IT Infrastructure PoliciesDownload Selected Pages

10 step security

10 step security for third party access to enterprise systems

10 Setps for security in cloud Security plan10 step security for 3rd party access to enterprise systems are a must with the increased use of internet processing and use by day to day business operations.

Security and compliance are key to maintaining control of sensitive and confidential information. All of the product offerings of Janco are geared towards proving tools to help C-Level executives and top IT professionals maintain the privacy of its users and enterprise data.

Order Security ManualDownload Selected Pages

  1. Create an asset inventory and tracking to reduce the risk of network-connected assets being out of compliance with policy.
  2. Understand the cloud-based environment where all users are considered remote, and apply controls similar to how they have historically provided access to third parties.
  3. Make changes in how the organization manages and controls these various user-types by incorporating concepts such as zero-trust, network abstraction, extended identity validation and full-session recording to effectively reduce the overall risk and isolate any potential impact caused by third parties or remote user actions.
  4. Define a plan which meets the requirements for external contractors, employees, and B2B entities.
  5. Coordinate third party access plan in conjunction with their business units and develop a solid communications plan.
  6. Create rules for access using the appropriate level of controls commensurate with their given risk profiles, to include: isolation/segmentation, encryption, and federation integrations.
  7. Establish access points and rules for data availability to third parties
  8. Invest in ways to authenticate third-party users beyond simple username and password.
  9. Define metrics which address compliance variances and risks, and build an end-to-end security and risk view for the entire enterprise.
  10. Create a reporting system which track access, access violations, downloads and total usage. This should be real-time and have assigned individuals monitor and report and deviations.

Order Cloud Outsourcing TemplateDownload Selected Pages

World Class Organizations mobility a standard feature in IT applications

World Class Organizations mobility a standard feature in IT applications

World Class Organizations mobility –  CIOs are incorporating mobility into their IT applications and business operational solutions. All of the recent major advances in technology have moved mobility into the mainstream.  In addition, they are building on the average user’s mobile-device comfort level that exists due to smartphones.

The primary driver for this mobile-ready technology is simple: world class application solutions more easily meet evolving industry needs, and are accessible to broad range of top managers in a manner that matches the work styles – and even the personal lives – of the internal and external users who depend on them.

BYOD - mobility policy
BYOD – mobility policy

Business professionals typically carry one or more devices with them at all times. Over 85% of IT functions have moved out of the denial stage regarding the “bring-your-own-device” (BYOD) movement and are successfully managing the operational complexity created by employee-owned, multi-platform mobile devices connected to their networks.

In a recent Janco Associates survey of c-level executives – including CEOs, CFOs, and CIOs:

  1. 36% of respondents said that they currently access their organization’s core operational and financial data, via smartphone or mobile device.
  2. Only 23% of the c-level executives interviewed describe themselves as technology “early adopters” or “techno-centric.”

C-level executives and top managers are no longer tied to their desks, and while they are on the move, the information that they need moves with them. In previous generations of technology “mobility” and “productivity” were at cross-purposes, the latest generation of IT applications and business operational solutions has paired the two successfully, providing increased access to information that improves efficiency. In sum, c-level executives and top managers no longer have to be techno-centric in order to leverage world class IT applications and business operational across the enterprise.

In the case of mobile IT applications and business operational functionality, CIOs need to understand the business processes, and relate with other c-level executives and top manages, and understanding how mobile access of information changes the way the enterprise operates.

For instance, a mobile IT applications and business operational solution, allows managers to approve workflows on the go – something that would otherwise have to wait until the manager is back in the office.

In the world of mobile business management, production and operations managers have instant access to information about potential problems, and these managers can even authorize changes to expedite specific work orders or deliveries. Since this data is linked to the enterprise’s other applications, the cost ramifications of real-time changes will become immediately apparent to business and finance leadership as well.

Bring Your Own Device Policy updated to to meet Disaster Recovery, Business Continuity and Corporate Intellectual Property Requirements

Download Selected Pages

Mobile applications more secure with new technology

Mobile applications more secure with new technology

Mobile Applications – (Upper Setting, Inc. — A new startup has come up with a great new tool that that lets developer quickly develop lightning fast secure real-time client/server applications with its SDK.

Application developers can create highly responsive apps proving users with the ability to receive real-time notification on their Androids, iOS and Windows Phones. The framework is geared to meet the needs of the automation industry as well as defense systems monitoring and control applications. With this solution, when critical events occur, users are able to immediately react and control right from their smart mobile devices.

Mobile Application SDK

The real beauty of this is that it a SDK that is well documented and easy to implement.  Gone are the days of the hammer and chisel.  This is a great productivity tool that every enterprise and IT organization needs to investigate.

There is a white paper that is available that describes this SDK –

Mobility Policy Bundle (more info…) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable

  • BYOD Policy Template (more info…) Includes electronic BYOD Access and Use Agreement Form
  • Mobile Device Access and Use Policy (more info…)
  • Record Management, Retention, and Destruction Policy (more info…)
  • Social Networking Policy (more info…) Includes electronic form
  • Telecommuting Policy (more info…) Includes 3 electronic forms to help to effectively manage work at home staff
  • Travel and Off-Site Meeting Policy (more info…)


Top 10 CIO Concerns

Top 10 CIO Concerns

Top 10 CIO Concerns – With the changing economy and improved outlook for IT spending, Janco has identified the top  10 CIO concerns.

Order CIO Job Description

The top 10 concerns are:

  1. Security – as more instances of cyber-attacks are identified CIOs are well aware that their jobs are at risk if this occurs under their watch,.
  2. Cloud Computing – This is the new hidden IT that is driving many new applications and is not under the complete control of the CIO and IT organization.
  3. Infrastructure – No longer are those interacting with the data and systems in a single location utilizing standard hardware and software. Records management, retention and destruction as well as version control are just a few of the areas that CIOs need to manage and control.
  4. Consolidation – Islands of data and computing continue to exist as new technologies are implemented. Redundancy leads to disparate information and needs to be resolved.
  5. Big Data – As data is consolidated it needs to be analyzed more quickly so that decision making within the enterprise is improved.
  6. Automation – Traditional functions are now being eliminated and automation needs to take placed which will meet the strategic objectives of the enterprise.
  7. Mobile Computing – BYOD and mobile applications are where users are looking for support in order to improve their bottom line results.
  8. Staff Retention – During the past few years that has not been an issue but now with an improved IT job market staff will leave.
  9. Social Networks – This is the wave of the future and needs to be managed more effectively.
  10. Succession Planning – Not only for the CIO role but for all of the other key roles within the IT functions. Job family definition is now a priority.

Malware – mobile devices are reasonably safe from them

Malware mobile devices are reasonably safe from them

Malware mobile devices are reasonably safe from those attacks based on a number of reviews of malware attacks.  Typically new malware attacks are only in play for a week and after that fewer than 2% go on for more than 30 days.

Malware mobile devices
That is not to say that malware will continue to be a non-issue.  With the new move to mobile devices we expect this profile to change and malware as well as other attacks to become more common, extensive and pervasive.
CIOs and CSOs will need to watch this closely.  This is especially with the new changes that Google is putting in place for it ranking systems and adding focus on mobile sites that are responsive.

Mobile device FCC regulations for 2015 help the mobile user

Mobile Device FCC regulations for 2015 help the user

Mobile Device Access and Use Policy

Mobile device policy including the latest tables and smartphones and FTC guidelines

Order Mobile Device Access Use PolicySample Mobile Device Policy

1. Carriers can’t throttle ‘unlimited” data plans

The FTC made it clear this week in a statement that it will now consider throttling of “unlimited” plans a clear-cut case of false advertising. Both throttled plans and unlimited plans will still be legal. But they can no longer be the same plans.

2. Carriers can’t sell you slow data connectivity as ‘broadband’

The Federal Communications Commission on Thursday unceremoniously redefined what “broadband” means. The previous definition of “broadband” was a meager 4Mbps for downloads and 1Mbps for uploads. That standard was set four years ago.

The new minimums are 25Mbps for downloads and upload speeds of at least of 3Mbps.

As with cases that involve throttling of “unlimited” plans, this is a marketing matter. Providers can sell connectivity at any speed they want, but they can’t advertise it as “broadband” unless it meets the new criteria.

The fact even that 25Mbps is legally considered “broadband” hints at the pathetically low standards that data providers are held to in the U.S. Still, it’s a lot better than nothing.

3. Hotels can’t block your personal Wi-Fi hotspots

Long story short: Some hotels and other businesses, and most famously Marriott hotels, wanted to force hotel guests to pay up for a separate Wi-Fi connection for every device used in the hotel.

FCC Commissioner Jessica Rosenworcel and FCC Chairman Tom Wheeler both said in no uncertain terms that such blocking should not be allowed. Further, Rosenworcel said that even more unlicensed spectrum should be opened up for personal use.

4. You don’t have to die needlessly because emergency personnel can’t locate you indoors.

When you’re in a crisis situation — one that involves, say, a medical emergency or criminal activity — a 911 call enables first responders to use your smartphone’s GPS to find out where you are with some degree of accuracy — as long as you’re outside. They do this through your carrier, and it’s information that carriers are required to provide.

This week, the FCC approved new rules that require carriers to, within two years, start using technology that’s able to provide the location of a 911 caller within 50 meters in at least 40% of cases.

5. You don’t have to tolerate slow airplane Wi-Fi anymore.

Gogo, which provides Wi-Fi service on airplanes, recently got approval from the FCC for a new service called 2Ku to be installed on 1,000 aircraft. The new service is satellite-based and several times faster than most airplane Wi-Fi systems — up to 70Mbps.

6. The entertainment industry can’t use emergency alerts in movie promotions

The FCC recently fined Viacom and ESPN $1.4 million for using official emergency alert tones in a promotion for a movie called Olympus Has Fallen. The warning sound was part of the movie, but people who heard it might have thought there was a real emergency.

In levying the fine, the FCC made it clear that, well, you just can’t do that.

7. It now is easier to file a complaint

The FCC this month launched a new website where consumers can complain about their cable, broadband and wireless service providers.

The new site replaces an old one that was plagued with antiquated design that made filing a complaint difficult.

Mobile Devices are how many start and end the day

Mobile Devices are in many bedrooms

How did you start your day today? How did you end your day yesterday? For many, starting or ending our day involves connecting in some way with a mobile application. In 2014, the number of Internet users worldwide has reached nearly 30 billion. While the majority of these users connect via fixed-line to a PC, the growth of mobile- and cloud-based solutions has skyrocketed. Industry experts estimate that mobile-only users (no laptop, no desktop) will hit 1 billion next year.

  • Mobility Policy Bundle (more info…) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
    • BYOD Policy Template (more info…) Includes electronic BYOD Access and Use Agreement Form
    • Mobile Device Access and Use Policy (more info…)
    • Record Management, Retention, and Destruction Policy (more info…)
    • Social Networking Policy (more info…) Includes electronic form
    • Telecommuting Policy (more info…) Includes 3 electronic forms to help to effectively manage work at home staff
    • Travel and Off-Site Meeting Policy (more info…)

Top 10 backup mistakes made by IT groups

Top 10 backup mistakes made by IT groups

The top 10 backup mistakes made by CIOs and IT groups have been identified by several groups.  This is the list as verified by Janco Associate, Inc. ( Janco has found that only when a backup is needed and then found that it is lacking or missing do many CIOs, IT Managers, and users appreciate the complexity  of the issue.

Top 10 Backup MistakesSample Policy

  1. Backing up only desktops and ignoring laptops, tablets, smartphone and other mobile devices
  2. Thinking that all that matters are mainframe or data center data bases
  3. Not understanding the differences in various deduplication solutions
  4. Not understanding what impact the backup processes have on users
  5. Not having a good grasp of the security implications due to disparate backup files
  6. Focusing only on what is needed today and ignoring future ramifications
  7. Not having a robust deployment solution defined
  8. Understanding the total cost of ownership for a solution or lack of a complete backup and security solution
  9. Ignoring BYOD implications and complications
  10. Not understanding he implications of the backup solution for disaster recovery and business continuity


10 Best Practices for Sensitive Data Text Messaging

Text Messaging Top 10 Best Practices

Text Messaging Best PracticesText Messaging 10 Best Practices – As more data is moved from one mobile device user to another more sensitive and confidential information is exposed to the potential of data leakage.  Janco Associates has found that the 10 best practices below help to minimize risk and meet mandated compliance requirements.

  • Use encryption – The text message must be communicated from the sending device, through the mobile provider or a software application to the recipient’s device in an encrypted manner.
  • Keep your encryption key private – The encrypted text message should not be decrypted and stored on the cellular or network provider’s systems in ways that can be accessed by unauthorized personnel.
  • End-to-end encryption should be followed – Both the sender(s) and the receiver(s) must fulfil the encryption requirements for the message in transit and at rest.
  • Monitor and report violations – Report all unencrypted text messages that are received or sent out that contain any sensitive and confidential information immediately to the Chief Security Officer (CSO) or CIO.
  • Clean up devices on retirement – Devices used to text sensitive and confidential information should be sanitized upon retirement of the device. They should be securely wiped when they are returned or an employee is terminated or quits.
  • Passwords are a must – The mobile device and/or secure texting application must be password protected; this feature must never be disabled and is subject to audit or spot check at any time.
  • Automatic lock down should be implemented – The mobile device must be configured to lock automatically after a period of inactivity (not to exceed 5 minutes).
  • Minimize information sent – All text messages containing sensitive and confidential information should be limited to the minimum information necessary for the permitted purpose. Multiple identifying factors (e.g., full name, date of birth, medical record number, social security number or condition specific information) should not be used.
  • Spell things out – Do not use shorthand or abbreviations.
  • Check your work – Review texts prior to sending to ensure accuracy. Beware of auto-correct functions.

10 Steps to Prevent Being Scammed by Social Media

10 steps to Preventing Social Media Scam

Social Media ScamWith more companies moving to marketing via social media there now is a greater possibility that social media scam will impact and compromise your company.  Here are 10 steps that Janco Associates has found that can minimize that risk.

  1. Implement a social networking policy for all individuals and devices that can impact the company’s infrastructure
  2. Social engineering awareness training must be done constantly, not the typical annual training program.
  3. If it sounds like it is too good to be true the odds are it is a scam
  4. Look to the outside to be aware of scams that others are facing
  5. Question suspicious behavior and communications.
  6. Report suspicious behavior and communications to the IT and HR management instead of shared on social networks.
  7. Work devices should not be used for personal activities.
  8. Access to various types of data should be protected with separate and strong passwords.
  9. The network should be segmented to guard against scammers infiltrating a network segment simply because an employee with access to another segment was compromised.
  10. Learn from past mistakes of others. Reverse engineer this same scenario in your own company to see if the scam could happen in your organization.
Order PolicySample policy

60% of all organizations have BYOD policy in place

BYOD Policy – 60% of all organizations have a BYOD policy in place

BYOD PolicyMost organizations are already making the move to BYOD. According to a survey of IT professionals, more than 60 percent of organizations have a BYOD policy in place. Others, however, are still in the phase of implementing their policies.

Bring Your Own Device Sample

For those organizations – and even for those that have embarked whole-heatedly on BYOD – questions remain regarding which mobility management approach they should take: one that addresses device management, one that addresses application management, or one that encompasses both.

IT professionals expect three benefits from a BYOD management solution:

  • Enhanced productivity
  • Increased flexibility
  • Improved compliance

Mobile computing goes into the air

Mobile Device Access and Use Policy

Order Mobile Device Access Use PolicySample Outsourcing Policy

As applications go mobile security becomes more of an issue

Every organization needs to identify and develop mobile security policies to be deployed which will provide adequate protection.

%d bloggers like this: