Top 10 IT Staffing Issues for CIOs and HR Pros identified
Top 10 IT Staffing Issues that CIOs and IT Pros face when looking at the increased demand for staff.
Survey conducted by Janco Associates, Inc. identified the the staffing issues that CIOs and HR managers have. CIOs and HR professionals in those organizations were asked to list and rank their top 5 IT staffing issues. 129 companies participated in the survey and included both large and mid-sized companies with CIO that had at least 150 professionals under their direct control.
NETFLIX Breach on the user-id has occurred twice in one week, I have had an account with Netflix for several years. On Friday when I tried to log in to my account I could not. I got a message that my account e-mail address had be CHANGED. Since that is the only way that I can access my account, I had no user ID to get in. I had to call and wait to be connected to an account rep. Once there, I asked how that could happen, and the answer I got was that someone had BREACHED my account and re-assigned my user-id (which was my account ID) with theirs.
Linked with that information was my credit card payment information. After the recent Citicorp breach, there is no assurance that my credit card information was not breached. The solution the account rep gave was to CANCEL my account. Which I did and created a new account with a DIFFERENT email address. I also added my mobile number for account verification.
That worked for a day and on Saturday evening someone else logged in to my NEW account, turned on the service for their account and changed the user-id again. The only thing that I got were two emails from Netflix. One saying that someone accessed my account and the second that told me my user id had been changed.
Poor design for changing the user ID. They only ask for a password NO 2nd level verification with the mobile phone number
When I talked to the agent at Netflix on the SECOND breach there was no sense of urgency. I have my credit card associated with the account and now have a concern that the credit card information has been hacked.
NETFLIX Breach – Do they even care that they have a security issue?
In both cases with both email addresses, they were uniquie and the passwords were over 8 characters in length. In addition, they had one upper case letter, two numbers, and a special character. Somehow they were able to get into the account, and change key information. They also have the capability to change the seconday security mobile phone number.
The fact that the only concern they had was to get my account back on-line so I would pay is troubling. Netflix did not address the issue of managing the changing of my user-id. Nor did they address the core issue of how the account got breached and then not providing me with a soulution. For example a solution could be, having a DOUBLE verification before they change key security and personal information or making it so the userid could not be changed. Either solution would work.
I forecast the Netflix will be the next major corporation that will have the public embarasement of a major security breach.
IT Job Market Explodes – Now over 3.6 Million Job in the United States
IT Job Market Explodes – IT Job Market had grown by 34% since 2010. This year Janco forecast that the number of new IT jobs will expand by approximately 100K.
As of July 2019, 56,800 new IT jobs were created YTD. The forecast for the reaming 5 months of the year is that on average 8,400 jobs will be added each month resulting in 42K new IT jobs
CIOs and CTOs continue to be optimistic and do not see the hiring trend slowing. The only downside to this is the contraction in the number of telecommunication jobs. In the past ten (10) years the number of Tel-comm jobs has shrunk by 20% from 890K to 712K.
Tele-comm jobs are being eliminated as organizations automate the function and fewer individuals are need to accomplish the same tasks. This is the same type of job elimination that occured in that industry when it automated switchboard operaters to electronic swithes.
IT Job Market Explodes – As economy improves IT jobs lead the way in job creation.
Demand for IT Professionals is now focused at the interface between the end user of the data and the data stored on the cloud or in secured legacy systems. Blockchain, cyber-currency, security, and compliance skills are the one highest in demand.
I recently discovered that Comcast.net email account are not getting all of the mail that is sent to them.
In January of this year comcast.net has started to meter and REJECT emails to people who have a comcast.net email address. Bud has a comcast.net email account and he Is not getting all of his emails.
RL000002 :: Mail to Comcast is queued and I see RL000002 in my email logs. What does this mean?
Comcast has instituted rate limiting on all inbound email traffic. This step was taken to protect our customers and our email system from unwanted spam and malicious attacks. Any systems affected by this rate limit will receive a 4xx message (temp-fail) during the SMTP transaction. This message is designed to instruct the sending server to try again at a later time to deliver its email.
Our rate limiting policy is based on sender reputation and volume metrics, provided by Cloudmark, regardless of the number of domains from that server.
New IP addresses that are expected to send significant amounts of email to Comcast subscribers should start by sending low volumes of mail, increasing as time goes on. As your IP sends more email, its limit will increase daily.
If the rate-limit is impacting your ability to deliver email, shortening your server’s delivery retry interval should resolve the issue.
Translated the reason why this is happening is one of the following
He is on a distribution list (multiple recipients)
There are more than 3 or 4 links to a web site in the email
He has exceeded the number of emails he is allowed to receive based on the number of emails he got last month.
If you have any people in your address book that has a comcast.net email account the same is occurring to them as well.
The one suggestion that I have is that you tell them this is occurring. All of the vendors want to charge for the services provided. If you do not pay for your email account is some way you are at risk of losing connectivity.
Find a provider that gives you the email account for “life” and meets your security and privacy standards to protect t your own information.
Fringe Benefits need be included in the calculation of total compensation
Taxable fringe benefits are benefits an employer provides to any employee, partner, or independent contractor. A recipient of any taxable fringe benefits, must include the benefit’s fair market value in their annual taxable income calculation. Taxable fringe benefits are subjected to all federal income taxes, as well as FICA and FUTA.
Employees who currently use their own car for business-related driving must take care not to exceed the IRS stated mileage rate as any payments for the excess amount would be considered taxable income.
The following are examples as taxable fringe benefits:
Any reimbursement for any employee job-related moves of fewer than 50 miles
Clothing that is suitable for street wear that has been given to employees
Educational assistance payments that do not relate to the employee’s job or exceed the allowable IRS threshold
Cash awards and non-cash awards are taxable unless given to charity
Expense reimbursements lacking an adequate accounting is taxable
Compliance Kit – head start on meeting all mandated requirements. Everything from an Industry-standard White Paper to a detail audit program.
HIPAA changes proposed for 2019 are getting closer. The Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has favored issuing HIPAA guidelines to clear up misunderstandings with HIPAA compliance requirements, but we are now at a point when changes to HIPAA Rules are about to be made.
OCR asked 54 different questions in its RFI. Some of the main aspects being considered are in relation to:
Patients’ right to access and obtain copies of their protected health information and the timeframe for responding to those requests (Currently 30 days)
Removing the requirement to obtain written confirmation of receipt of an organization’s notice of privacy practices
Promotion of parent and caregiver roles in care
Easing of restrictions on disclosures of PHI without authorization
Possible exceptions to the minimum necessary standard for disclosures of PHI
Changes to HITECH Act requirements for the accounting of disclosures of PHI for treatment, payment and healthcare operations
Encouragement of information sharing for treatment and care coordination
Changing the Privacy Rule to make sharing PHI with other providers mandatory rather than permissible.
Expansion of healthcare clearinghouses’ access to PHI
Addressing the opioid crisis and serious mental illness
All if these are addressed in Janco’s Compliance Management toolkit.
Top 10 Security Best Practices take effort to implement
Too many companies have found out the hard way that their most valuable assets are exposed and vulnerable to hacker attracts, theft and destruction. They now have learned a very expensive lesson, a company’s valuable information cannot be undone, and also often leads to significant damage to your company’s reputation.
Blockchain DLT career path included as a job family
Blockchain DLT career path has been added to the IT Job Family Classification System. Not only is it included as an individual job family, it is also linked to all of the other IT job families in that offering. Having clearly defined job paths a the first step in long-term career planing. That is true for the individual as well as the company employing them.
Blockchain DLT career path is defined in the classification system. In addition point of entry and exit to the other functions within IT have bee identified
The ways to migrate to and from the Blockchain DLT job family have been identified and documented by Janco. With this tool it is now easy to:
Define career development opportunities within a Blockchain DLT job family and movement into and out of the job family to the other job families.
Discuss career planning, clarify specific training needs, and consider course enrollment and career advancement
Track job applicants and analyze data for reporting
Set pay grades and get accurate salary requirements by understanding jobs and their requirements better
Evaluate jobs more consistently by comparing similar jobs in the same job family