H-1B Makes up for poor educational system

H-1B Makes up for poor educational system

H-1B Makes up for poor educational system< according to industry leaders.

Disaster Recovery Business Continuity with Security

Disaster Recovery Business Continuity with Security

Every company, regardless of size, needs a concise approach  disaster recovery business continuity with security in case of an emergency.

Order DRP BCP Security Download Selected Pages

Disaster Recovery Business Continuity with Security
Disaster Recovery Business Continuity with Security

Data is the lifeblood of every company, and often, it is a competitive advantage and the only thing that differentiates one enterprise from another. Who has the most loyal customers, the best service, and the most innovative strategies all boils down to information residing on the enterprise’s Information Technology and application systems. For this reason disaster recovery and business continuity are a definite need.  In addition, there are  security requirements that need to be met.  With mandated requirements like Sarbanes-Oxley, HIPAA, PCI-DSS, and ITIL, executive management is depending on you to have the right security policies and procedures in place.

Disaster Recovery Business Continuity with Security

Google has addressed this and describes it in a video that is has placed on youtube.

10 step security implementation process :

  • Make security an executive directive
  • Implement clear security guidelines
  • Provide specifics for security compliance
  • Enforce that everyone follows the rules
  • Provide formal training program
  • Communicate Security
  • Monitor security compliance
  • Establish security compliance metrics
  • Provide security compliance feedback
  • Audit security with a third party 

Disaster Recovery Backup Solution

Disaster Recovery Backup

Disaster Recovery Backup and Backup Retention Policy Template

CIOs and IT Managers need to consider mandated compliance requirements

Disaster Recovery Backup Solution – Just added Best Practices for Backup, Cloud Backup and Mobile Device Backup. IT organizations of all sizes contend with a growing data footprint with more data to manage, protect, and preserve for longer periods of time. Online primary storage, has focus a on fast low latency, reliable access to data while near-line secondary storage has a focus on low cost and high capacity.

Disaster Recovery BackupQuestion that need to be answered are:

  • Is our data safe in transit and at rest?
  • What prevents hackers from gaining access to our data?
  • Is our data properly handled, stored, and deleted?
  • Who can access our data?
  • What are the benchmark measurements?
  • Is our data backup strategy compliant?
  • Will our recovery be successful?

 

 

Privacy is a thing of the past

Privacy is a thing of the past

When we look at the world as it is today, it is easy to see that privacy is no longer a reality no matter where you are in the world

Order Sensitive Information PolicySensitive Information policy

BYOD guidelines are just being defined, but one warning must rise above the din: never, ever, try to gain unauthorized access to an employee’s pri…

Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists BYOD

URL: https://www.e-janco.com/Press/2013/20130510-BYOD-Policy.html

Compliance Mandates – Security Manual Template Version 8.0 Released

Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists Compliance

URL: https://www.e-janco.com/Newsletters/2010/Compliance_Newsletter_100726.htm

Companies should also weigh the vulnerabilities associated with various cloud computing service and deployment models

Articles Archives Register CIO Roundtable Company Who we are Customers Downloads Advertizing Rate Sheet TestimonialsPrivacy Payment Options Terms and Conditions Return Policy Site Map Blog Top 10 Lists Cloud

URL: https://www.e-janco.com/CloudSecurity.htm

Disaster Recovery Plan – 10 Tips

Disaster Recovery Plan Template

Disaster recovery plan template is an easy way to protect your company’s assets.

 Order Disaster Plan TemplateDisaster Recovery Planning Template

Disaster Recovery

Baseline for best practices defined in Janco’s Disaster Recovery Business Continuity Template

As requirements for avoiding downtime become increasingly stringent, administrators need tools and platforms that can help them plan, design, and implement disaster recovery strategies that can meet those needs.

  • Analyze single points of failure
  • Keep Updated notification trees
  • Be aware of current events
  • Plan for worst-case scenarios
  • Clearly document recovery processes
  • Centralize information – Have a printed copy available
  • Create test plans and scripts
  • Retest regularly
  • Perform comprehensive recovery and business continuity test
  • Define metrics and create score cards

Disaster Recovery vs Business Continuity and Backup

Disaster Recovery vs Business Continuity and Backup

Disaster Recovery is different that Business Continuity.  Here is a great video that explains the difference.

Disaster Recovery
 Order Disaster Plan TemplateDisaster Plan Sample

Order Disaster Plan TemplateDisaster Plan Sample

Mobile computing goes into the air

Mobile Device Access and Use Policy

Order Mobile Device Access Use PolicySample Outsourcing Policy

As applications go mobile security becomes more of an issue

Every organization needs to identify and develop mobile security policies to be deployed which will provide adequate protection.

Omni commerce – Consumer Products Video

Omni commerce consumer implementation video

Omni Commerce

 Order Omni Commerce Planning Toolkit
Disaster Plan Sample

Business Continuity Plans Are Demand Now

Business Continuity Plans Are Needed Now

All Business Continuity Disaster Recovery Planning efforts need to encompass several factors. How employees will communicate, where they will go and how they will keep doing their jobs. The details can vary greatly, depending on the size and scope of a company and the way it does business. For some businesses, issues such as supply chain logistics are most crucial and are the focus on the plan. For others, information technology may play a more pivotal role, and the planning process may have more of a focus on systems recovery.

 Order Business Continuity TemplateDisaster Plan Sample

Planning is the quintessential complex, unfamiliar task. Serious events happen so rarely that recovery operations are the opposite of routine. What’s more, the myriad interconnected data, application and other resources that must be recovered after such an event make recovery an exceptionally difficult and error-prone effort. Even if you have never built a plan before, you can achieve great results. Just follow the DR Template that Janco has created and you will have a functioning plan before you know it.

 Order Disaster Plan TemplateDisaster Plan Sample

Business continuity is vital to business success, and in today’s interconnected world, virtually every aspect of a company’s operation is vulnerable to disruption. Some risks could take your business offline for days, but in a competitive environment, even minutes of downtime could prove fatal. So, how do you determine the resiliency and recovery requirements of your business? How do you identify and integrate critical business and IT priorities into a robust continuity and resiliency program?

Inexpensive drones will be a new security risk

Inexpensive drones are here now

Security ManualDrones are now available that cost less than $1,000 and can be used by almost everyone.  These devices raise security issues from who uses them, how they are applied and how to protect sensitive locations from unwanted intrusions.

Order Security ManualTable of Contents

Baby Boomers face age discrimination in a tight job market

Baby boomers face age discrimination

Baby boomers who have been out of work for more than a year are finding it hard to get jobs that use their experience and skills. Unfortunately many employers are screening out boomers.

PBS has been doing a series on this subject. If you are over 55 and unable to find comparable full-time job, no one will admit or talk about age discrimination. There is an increasing amount of overlooked talent in the boomer generation.

IT Job Descriptions
Salary Data

IT Job DescriptionsIT Hiring KitIT Salary Survey
Download Salary Survey

Is It Time To Appoint a Chief Mobility Officer

Is the time right to create a Chief Mobility Officer (CMoO) position

Mobility PoliciesThe time has arrived to legitimize and define the role of the chief mobility officer(CMoO), contends Enterprise CIO Forum community manager John Dodge. To support that position Janco Associates has created a job description for the position.

A Chief Mobility Officer is needed to direct the development and revisions to policies and procedures for the general operation of the mobility initiatives and its related activities.  Some of the responsibilities of this role include:

  • Gaining visibility into the compliance of remote devices
  • Managing network security and sensitive information
  • Defining  OS platforms and devices to support
  • Setting mobile policies20
  • Managing BYOD
  • Resolving help desk incidents and problems
  • Ensuring compliance and producing audit trails
  • Supporting connectivity and Wi-Fi access
  • Installing and updating software
  • Approving applications available via the firm’s application store
  • Enforcing mobile policies
  • Managing device security

Read on about the Chief Mobility Officer job description…

OrderChief Mobility Officer Job Description

New Privacy Legislation Proposed in US House

Security ManualNew Privacy Legislation – Application Privacy, Protection and Security (APPS) Act 2013

Proposed privacy legislation bill would require application developers to explicitly gain consent before obtaining data from consumers, and compel them to securely maintain that data in accordance with mandatory privacy policies.

Rep. Hank Johnson brought the bipartisan Application Privacy, Protection and Security (APPS) Act 2013 to the floor of the U.S. House of Representatives on Thursday in a bid to bolster confidence in the desktop and mobile apps market, which has been at the center of a number of privacy storms in the not-so-distant past.

The bill, if passed, would require that app developers display privacy policies and require consent from users before the applications is even used. In some cases, apps already require this — many in-built Apple iPhone and iPad apps display a terms of service message and require users to sign off on it before they continue.

Such policies would also have to explain whether their data could or will be shared with third parties, such as advertising networks. And, if a user stops using an app, they can compel the app developer to delete any data held on them. The U.S. Federal Trade Commission would enforce these privacy rules, the bill states.

What does it cost for each Gig of lost data

Cloud DRP SecurityCloud solutions can minimize lost data

When data is stored on physical media and it is corrupted recovery often cannot occur.  Cloud solution provide real time back of all data which can be tested easily.

Cyber war breaks out – slows Internet

Cyber war pushes need for more security

Security ManualThe recent cyber war between Spamhaus and Cyberbunker with commercial Denial of Service Attack (DDoS) pushed the Internet to the brink of failure impacting more than the two companies.

This cyber war shows how easy it can be for any organization to originate an attack, to be attacked, and how difficult it is to defend against an attack.

Order Security ManualTable of Contents

The first step that CIOs need to take is to implement clear Security policies and procedures as defined both by ISO compliance standards and Janco Security Manual Template.

Add to this the recent attacks on the US infrastructure  by the Chinese military, the issues faced by corporations that depend on the Internet are great.