Author Archives: Victor Janulaitis

About Victor Janulaitis

M. Victor Janulaitis is the founder and CEO of Janco Associates. His focus and that of the firm is the management and support of IT professionals improving infrastructure. His expertise is in organizational infrastructure, security, cost control, disaster recovery business continuity; information privacy; and staff development. Mr. Janulaitis has been an expert witness in several employment and termination lawsuits. He is considered an expert on discrimination, job content, compensation, and employee performance.

Information Security Jobs Hot

Information Security Jobs Hot – Salaries start in the mid $70K range

Information Security Jobs with salaries ranging from $75k thru $210K. With the help of serveral client organization, Janco has designed a Information Security Job Family with pay ranges.  The data contains the entry level salaries, median and highest salaries for individuals in those positions.  The chart below depicts that information.

Information Security Jobs Hot

Information Security jobs are among some of the hardest to fill. As a result the salaries for this positions almost all within the low six figure range.

No longer are organizations are looking for just the CSO (Chief Security Officer), rather they are looking to fill out the infrastructure to support the CSO.

IT Job Family Classification

Both in an individual’s personal career planning and an enterprise’s staffing, promotion and compensation it is important to have benchmarks on the levels that individuals are at. To that end, one of the best objective ways to meet this goal is to have formal job descriptions and clear paths for promotion and compensation.

Order IT Job Family Classification Download Selected Pages

Job Description Bundles

Janco has developed job description bundles to aid in the recruting process.

For those clients who do not want to acquire the entire HandiGuide there is an option to select subsets of our complete offering. These subsets are focused around particular areas of interest and provide you a way to get the benefits of Janco’s expertise in a limited and lower cost manner. All of the bundles have been updated in the last few months. They include:

 

Please follow and like us
error

Depending on Goggle Risky

Depending on Goggle Risky

Depending on Goggle Risky

Independence is  a core requirement for IT Governance and Infrastructure definition.

Depending on Goggle Risky – Depending on Internet, hardware, and software companies is a mistake. Enterprises  are impacted as they drop product support, are purchased by other companies, and/or have security breaches and system failures of their own.

For example, Google – Customer who installed Haiku ceiling fans, which were supported  with the Nest thermostat device via the “Works with Nest” program were left out in the cold. This was driven by Google’s decision to end the program and go with the “Google Net”.  They said this was to focus on supporting its own hardware business.  As a result, there was a loss of support for any device on that program. Not a good omen for people who installed them in their homes.

Another similar situation occurred for Comcast email users. Users who had comcast.net email accounts were not made aware of the limitation of services that Comcast’s spam protection process effected. What happens is as an email is sent to a comcast user email account, if the email has multiple recipients, the email is placed on hold (based on the comcast user’s usage). The user is NOT notified that the email was held and not delivered. It is up to the sender to contact the user and re-send it with the email going to a single recipient.

The less that you depend on Internet companies for proprietary offerings, the more you can be assured that you can continue to operate when they change their corporate strategy.

How long will it be before a company like Goggle decides to charge for their free email services. Wait a minute they already do that with their offering G Suite.

Order IT Governance Infrastructure Strategy Download Selected Pages

Read on:

 

Please follow and like us
error

Top 10 Wanted Benefits for IT Pros

Top 10 Wanted Benefits for IT Pros – High Demand for IT Pro moves many companies to improve prized benefits for IT Staff

Top 10 Wanted Benefits for IT ProsJanco surveyed 275 organizations Janco to identify the top 10 prized benefits for IT Pros.

  1. Benefit coverage for domestic partners.
  2. Paid maternity leave.
  3. Partial payment of school load held by employees.
  4. Tuition reimbursement to recognized universities.
  5. Tuition reimbursement for programs that lead to technical IT certifications.
  6. Formal company training programs
  7. Employee wellness programs
  8. 401K with company providing matching contributions.
  9. Telecommuting
  10. Flexible hours

In another recent survey, the top 100 best places for IP pros to work did include many of these benefits.  Many have done so in order to recruit and retain high performing IT Professionals.

The trend is for more benefits to be provided.  Some companies even go to the extent of having game rooms, free lunch programs, catered meals, sporting event special seating, and free drinks like soda, coffee and tea.

Read on IT Hiring Kit Order IT Hiring Kit

See Also

Please follow and like us
error

DevOps Job Descriptions

DevOps Job Descriptions Released

DevOps Job Descriptions were just released as a bundle. Both HR and IT have a critical role in addressing the expectations that the Executive Management has in the movement towards DevOps applications.

DevOps Job Descriptions

DevOps is a process which allows for the constant and evolving development of applications with new features and functionality added over time. This is without the traditional legacy SDM process of traditonal IT development and implementation.

The jobs descripions that are included in the bundle are:

  • Chief Digital Officer – CDO
  • Chief Experience Officer – CXO
  • Digital Brand Manager
  • Manager DevOps
  • DevOps Application Designer
  • DevOps Quality Control Specialist
  • DevOps Software Engineer
  • DevOps Version Control Specialist

There are more positions that will be added to this bundle as we continue to evaluate the roles that must be played in: planning, coding, building, testing, releasing, deploying, operating, and monitoring process of DevOps.

Read On   Order

DevOps Job Descriptions add to IT Job Family Classfication

In the bundle contains the full IT job family classification for all of these positions.  They have been added to the DevOps, Blockchain, and DLT job family.

DevOps Job FamilyRead On  Order IT Job Family Classification Download Selected Pages

See also:

Please follow and like us
error

Top 10 IT Staffing Issues

Top 10 IT Staffing Issues for CIOs and HR Pros identified

Top 10 IT Staffing Issues that CIOs and IT Pros face when looking at the increased demand for staff.

Top 10 IT staffing issues

Survey conducted by Janco Associates, Inc. identified the the staffing issues that CIOs and HR managers have. CIOs and HR professionals in those organizations were asked to list and rank their top 5 IT staffing issues. 129 companies participated in the survey and included both large and mid-sized companies with CIO that had at least 150 professionals under their direct control.

The results of the survey were:

  • Hiring new technical skills – 97 organizations
  • Retaining existing staff – 86 organizations
  • Improving existing staff skills – 74 organizations
  • Improving employee morale – 67 organizations
  • Providing competitive compensation – 48 organizations
  • Utilizing social networking in recruiting – 45 organizations
  • Maintaining productivity and service levels – 44 organizations
  • Providing competitive benefits – 41 organizations
  • Managing organization culture – 31 organizations
  • Providing viable career path – 28 organizations

See also:

Please follow and like us
error

NETFLIX Breach

NETFLIX Breach – user account ID changed

Security Manual TemplateNETFLIX Breach on the user-id has occurred twice in one week, I have had an account with Netflix for several years. On Friday when I tried to log in to my account I could not.  I got a message that my account e-mail address had be CHANGED. Since that is the only way that I can access my account, I had no user ID to get in. I had to call and wait to be connected to an account rep. Once there, I asked how that could happen, and the answer I got was that someone had BREACHED my account and re-assigned my user-id (which was my account ID) with theirs.

Linked with that information was my credit card payment information. After the recent Citicorp breach, there is no assurance that my credit card information was not breached. The solution the account rep gave was to CANCEL my account. Which I did and created a new account with a DIFFERENT email address. I also added my mobile number for account verification.

That worked for a day and on Saturday evening someone else logged in to my NEW account, turned on the service for their account and changed the user-id again. The only thing that I got were two emails from Netflix. One saying that someone accessed my account and the second that told me my user id had been changed.

Nexflix breach

Poor design for changing the user ID. They only ask for a password NO 2nd level verification with the mobile phone number

When I talked to the agent at Netflix on the SECOND breach there was no sense of urgency.  I have my credit card associated with the account and now have a concern that the credit card information has been hacked.

NETFLIX Breach – Do they even care that they have a security issue?

In both cases with both email addresses, they were uniquie and the passwords were over 8 characters in length. In addition, they had one upper case letter, two numbers, and a special character.  Somehow they were able to get into the account, and change key information.  They also have the capability to change the seconday security mobile phone number.

The fact that the only concern they had was to get my account back on-line so I would pay is troubling. Netflix did not address the issue of managing the changing of my user-id. Nor did they address the core issue of how the account got breached and then not providing me with a soulution.  For example a solution could be, having a DOUBLE verification before they change key security and personal information or making it so the userid could not be changed. Either solution would work.

I forecast the Netflix will be the next major corporation that will have the public embarasement of a major security breach.

Read on Order Security Manual Template

See also;

 

 

 

 

Please follow and like us
error

IT Job Market Explodes

IT Job Market Explodes – Now over 3.6 Million Job in the United States

IT Job Market Explodes – IT Job Market had grown by 34% since 2010.  This year Janco forecast that the number of new IT jobs will expand by approximately 100K.

IT Job Market Explodes

As of July 2019, 56,800 new IT jobs were created YTD. The forecast for the reaming 5 months of the year is that on average 8,400 jobs will be added each month resulting in 42K new IT jobs

CIOs and CTOs continue to be optimistic and do not see the hiring trend slowing.  The only downside to this is the contraction in the number of telecommunication jobs. In the past ten (10) years the number of Tel-comm jobs has shrunk by 20% from 890K to 712K.

Historic Number of Jobs in the IT job marketTele-comm jobs are being eliminated as organizations automate the function and fewer individuals are need to accomplish the same tasks.  This is the same type of job elimination that occured in that industry when it automated switchboard operaters to electronic swithes.

IT Job Market Explodes – As economy improves IT jobs lead the way in job creation.

Demand for IT Professionals is now focused at the interface between the end user of the data and the data stored on the cloud or in secured legacy systems.  Blockchain, cyber-currency, security, and compliance skills are the one highest in demand.

Janco has updated its IT Governance book to reflect the impact of this.

Read On Order IT Governance Infrastructure Strategy Download Selected Pages

Read also

Please follow and like us
error

10 Easy Steps to Stop Robocalls

10 Easy Steps to Stop Robocalls – or at least reduce the number

10 Easy Steps to Stop Robocalls

10 Easy Steps to Stop Robocalls -The policy that will improve the security of mobile devices and stop robocalls

10 Easy Steps to Stop Robocalls that every cell phone and text messaging user can follow to kill the call and stop calls and text messages from coming in the future.

  1. Put a do not disturb after normal work hours except for people already in your contact list
  2. Do not answer calls from blocked or unknown numbers.
  3. Do not answer calls identified as spam by your carrier
  4. Don’t answer calls from numbers you don’t recognize.
  5. For Text spams, forward them to 7726 (spells SPAM) and your carrier will be made aware of them and stop them
  6. If someone calls you and claims to be with XYZ company, hang up and call the company yourself. Use the company’s website to find an official number.
  7. If you answer a call an no one is on the line immediately hang up
  8. If you do answer a call and hear a recording such as “Hello, can you hear me?” just hang up.
  9. The same goes for a call where you’re asked to press a number before being connected to a representative.
  10. Do not engage as soon as you answer the call – i.e. Goggle’s Call Screening feature is cool but still identified you number a real person

In addition you shoul check with your carrier to see the services they provide – all of them soon will provice FREE services to support FCC requirements

See also:

Please follow and like us
error

Comcast.net

Comcast.net Killing email Account

I recently discovered that Comcast.net email account are not getting all of the mail that is sent to them.

concast.netIn January of this year comcast.net has started to meter and REJECT emails to people who have a comcast.net email address.  Bud has a comcast.net email account and he Is not getting all of his emails.

Comcast says:

RL000002 :: Mail to Comcast is queued and I see RL000002 in my email logs. What does this mean?

Comcast has instituted rate limiting on all inbound email traffic. This step was taken to protect our customers and our email system from unwanted spam and malicious attacks. Any systems affected by this rate limit will receive a 4xx message (temp-fail) during the SMTP transaction. This message is designed to instruct the sending server to try again at a later time to deliver its email.

Our rate limiting policy is based on sender reputation and volume metrics, provided by Cloudmark, regardless of the number of domains from that server.

New IP addresses that are expected to send significant amounts of email to Comcast subscribers should start by sending low volumes of mail, increasing as time goes on. As your IP sends more email, its limit will increase daily.

If the rate-limit is impacting your ability to deliver email, shortening your server’s delivery retry interval should resolve the issue.

Translated the  reason why this is happening is one of the following

  1. He is on a distribution list (multiple recipients)
  2. There are more than 3 or 4 links to a web site in the email
  3. He has exceeded the number of emails he is allowed to receive based on the number of emails he got last month.

If you have any people in your address book that has a comcast.net email account the same is occurring to them as well.

The one suggestion that I have is that you tell them this is occurring.  All of the vendors want to charge for the services provided.  If you do not pay for your email account is some way you are at risk of losing connectivity.

Find a provider that gives you the email account for “life” and meets your security and privacy standards to protect t your own information.

Please follow and like us
error

Taxable fringe benefits

Taxable fringe benefits

Taxable Fringe Benefits

Fringe Benefits need be included in the calculation of total compensation

Taxable fringe benefits are benefits an employer provides to any employee, partner, or independent contractor. A recipient of any taxable fringe benefits, must include the benefit’s fair market value in their annual taxable income calculation. Taxable fringe benefits are subjected to all federal income taxes, as well as FICA and FUTA.

Employees who currently use their own car for business-related driving must take care not to exceed the IRS stated mileage rate as any payments for the excess amount would be considered taxable income.

The following are examples as taxable fringe benefits:

  • Any reimbursement for any employee job-related moves of fewer than 50 miles
  • Clothing that is suitable for street wear that has been given to employees
  • Educational assistance payments that do not relate to the employee’s job or exceed the allowable IRS threshold
  • Cash awards and non-cash awards are taxable unless given to charity
  • Expense reimbursements lacking an adequate accounting is taxable

Order Salary Survey Download Sample

See Also:

Please follow and like us
error