M. Victor Janulaitis is the founder and CEO of Janco Associates. His focus and that of the firm is the management and support of IT professionals improving infrastructure. His expertise is in organizational infrastructure, security, cost control, disaster recovery business continuity; information privacy; and staff development.
Mr. Janulaitis has been an expert witness in several employment and termination lawsuits. He is considered an expert on discrimination, job content, compensation, and employee performance.
Compliance Kit – head start on meeting all mandated requirements. Everything from an Industry-standard White Paper to a detail audit program.
HIPAA changes proposed for 2019 are getting closer. The Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has favored issuing HIPAA guidelines to clear up misunderstandings with HIPAA compliance requirements, but we are now at a point when changes to HIPAA Rules are about to be made.
OCR asked 54 different questions in its RFI. Some of the main aspects being considered are in relation to:
Patients’ right to access and obtain copies of their protected health information and the timeframe for responding to those requests (Currently 30 days)
Removing the requirement to obtain written confirmation of receipt of an organization’s notice of privacy practices
Promotion of parent and caregiver roles in care
Easing of restrictions on disclosures of PHI without authorization
Possible exceptions to the minimum necessary standard for disclosures of PHI
Changes to HITECH Act requirements for the accounting of disclosures of PHI for treatment, payment and healthcare operations
Encouragement of information sharing for treatment and care coordination
Changing the Privacy Rule to make sharing PHI with other providers mandatory rather than permissible.
Expansion of healthcare clearinghouses’ access to PHI
Addressing the opioid crisis and serious mental illness
All if these are addressed in Janco’s Compliance Management toolkit.
Top 10 Security Best Practices take effort to implement
Too many companies have found out the hard way that their most valuable assets are exposed and vulnerable to hacker attracts, theft and destruction. They now have learned a very expensive lesson, a company’s valuable information cannot be undone, and also often leads to significant damage to your company’s reputation.
Blockchain DLT career path included as a job family
Blockchain DLT career path has been added to the IT Job Family Classification System. Not only is it included as an individual job family, it is also linked to all of the other IT job families in that offering. Having clearly defined job paths a the first step in long-term career planing. That is true for the individual as well as the company employing them.
Blockchain DLT career path is defined in the classification system. In addition point of entry and exit to the other functions within IT have bee identified
The ways to migrate to and from the Blockchain DLT job family have been identified and documented by Janco. With this tool it is now easy to:
Define career development opportunities within a Blockchain DLT job family and movement into and out of the job family to the other job families.
Discuss career planning, clarify specific training needs, and consider course enrollment and career advancement
Track job applicants and analyze data for reporting
Set pay grades and get accurate salary requirements by understanding jobs and their requirements better
Evaluate jobs more consistently by comparing similar jobs in the same job family
Top 10 best practices address Cloud Security Vulnerabilities
Top 10 best practices for cloud Security – The cloud is great technology that helps organizations to improved productivity, reduce costs, and simplify the user’s life. However it does raise significant security risks. Here are 10 best practices that if followed minimize those risks.
Utilize a SDM (System Development Methodology) to design, test and implement changes in the both the source and object level code.
Implement a disaster recovery and business continuity plan that includes a focus on security of the data and application assets that are cloud based.
Implement metrics and cloud application monitoring which can help to detect potential security violations and breaches in the cloud based data and applications
Utilize a secure access and change management system to manage revisions to the cloud application.
Utilize a patch management approach to install revisions to the cloud data and application.
Implement a log management system to have an accurate audit trail of what occurs on the cloud.
Right time to hire IT Pros – Almost 100K new jobs to be created this year
Before the labor market gets tighter now is the right time to hire IT Pros
The right time to hire IT Pros is now before the labor maket gets tighter. In the first five (5) months of 2019, 34,600 new IT jobs were created. Almost 70,000 more new jobs will be added in the remaing months of this yera. This is the perfect time for development projects. Labor rates have never been lower. From building —
Artificial Intelligent Bots – B2B – Improve Human Resource Experience
Integrations, Customizations and more.
CEO and CIO say focus is on the customer experience – right time to hire IT Pros
CXO drives customer experience. Right staff is critical
A great customer experience is all about catering to the customers’ expectations. Customers can be consumers or staff. Customers want choices, and instant results. Customer experience or CX cloud applications provide customers with seamless, personalized and immediate experiences. With recent trends showing that social media greatly influences customers into making decisions, CX cloud allows an enterprise to engage with customer at every level throughout their life-cycle.
This has created a demand for the CXO – Chief Experience Officer. The CXO needs to drive the hiring effort.
Updated IT job descriptions are important for an entire range of reason. The foremost is that updated IT job descriptions clearly define what roles and responsibilities the individual filling that role has. In addition it clearly defines metrics for the position which can be translated into Key Performance Indicators – KPI.
Promotions depend on Updated IT Job descriptions
Janco updated the IT Job Descriptions continually. At least once every 12 months each job description is reviewed, edited, and updated to meet the latest requirements for the position.
The labor market for qualified professionals is tight. With that as an factor in staffing, promotions become more important. It is easier to higher an entry level individual than first tier performer for the two levels up. With that in mind, position descriptions should include career path and promotion opportunities.
Training and education are ways in which CIOs and IT Managers can improve the quality of their staffs. Janco has created a number of tools which are being used today by over 300 of the Fortune 500 organizations.
The main offering Janco has is its full IT Job Descriptions. It comes as individual MS Word files, epub book, or the complete HandiGuide
IT Job Descriptions HandiGuide includes sample organization charts, a job progression matrix, and 300 Internet and IT job descriptions. The book addresses all mandated requirements, including the ADA, and is in an easy to use format. This can be purchased as a complete set or bundles of job descriptions
Cyber Threats are on the rise – cyber crime is here to stay
Cyber Threats are on the rise and cyber crime is here to stay
Cyber threats are on the rise, in 2017 there was over $600 billion globally of costs associated with cyber crime. Other key facts:
The forecast for 2019 is that $11.5B billion in damage costs due to ransomware
94% of all data breaches begin with a click on a link in an email
In 2017 consumers lost over $20 Billion due to cyber crime
In 2015 businesses lost over $20 billion due to email accounts being compromised
In 2016 over 20 billion people had records stolen or compromised
Things that consumers and business should do are:
Implement device monitoring and protection
Conduct frequent Dark web scans to identify breaches
Utilize VPNs and avoid public free Wi-Fi connections
Implement a secure password safe process
Harden devices to protect against cyber security
Implement bio metric and dual factor authentication
Scan connected IoT devices
Monitor credit reporting systems
Implement secure backups with a long retention cycle.
Security Manual Template – Cyber Threats are on the rise
Many organizations fail to realize the benefits of security information management due to the often exhaustive financial and human resource costs of implementing and maintaining the software. However, Janco’s’ Security Manual Template – the industry standard – provides the infrastructure tools to manage security, make smarter security decisions and respond faster to security incidents and compliance requests within days of implementation.
One of the best ways to avoid this problems for IT Prfessional new hires is to implement Janco’s IT Hiring Kit. Rather they are an individual contributor
10 reasons why new hires fail have been identified in a recent study by Janco Associates, Inc. They are as follow:
The Job descriptions used in the recruiting process are not accurate and/or are out of date
The new hire is not a team player
The skills and experiences presented by the new hire are inflated.
The new hire causes friction with the organization
The skill the the new hire has are not a fit to the enterprises requirements
The new hire is not motivated to meet the needs of the organization.
The new hire is looking towards expanding their own resume not to meet the requirement of the position.
The new hire has to have things their own way and are not very adaptive.
The new hire is careless and not very attentive
The new hire is a prima donna
In the recruiting and hiring process, steps need to be taken to see that none of the items above are part of the new hire’s characteristics
Solution to minimize hiring mistakes for 10 reasons why new hires fail
IT Pro’s Hiring Kit – Includes latest IT Salary Data, Interview and Hiring Guide, and 300 Job Descriptions – In today’s economy, nearly every organization faces pressure to have the right talent in place, run at peak efficiency and “do more with less”. With the economy improvement and lowest unemployment numbers in several years, HR departments are pressured to get qualified professionals on board now.
Backup Policy includes everthing that is need to be in full compliance with all mandated security requirement.
Backup Policy Updated as well as the CIO IT Infrastructure Policy Bundle. The policy has just been updated to take into account everything from GDPR to cloud storage and security implications.
The Backup Policy addresses the issues that you struggle with including:
How safe are your information assets in transit and at reset?
What protections are in place to prevent hacker access?
Does your backup and retention process meet all of your compliance requirements?
Who can gain access to your data?
What KPI metrics do you have in place?
Will the use of the data ensure successful recovery?
Managing backup and recovery in today’s environment is a multi-dimensional challenge with both near and long term business requirements. Recent technological developments in disk backup have had a positive impact on short term data retention requirements (see also BYOD policy). But these improvements do not replace the need to execute and deliver on a long term data retention strategy which includes:
Business and Regulatory Requirements Demand a Long-term Plan
Manage and Contain Your Total Cost of Ownership (TCO)
Encrypt Your Data for Secure Long-term Retention
Weigh the Environmental Impacts and Minimize Power and Cooling Costs
Simplify Management of the Entire Solution
Best of Breed solution
A “Best of Breed” backup policy and strategy considers how to:
Back up critical application data – across mixed operating systems and storage configurations
Restore desktops and mobile users quickly
Restore systems to dissimilar hardware or virtual systems
Back up data and system information to off site locations, so that you can quickly recover your business even from a total loss of your facility
Leverage new cloud based backup offerings to properly secure, back up,and archive critical data.