Category Archives: IT Infrastructure

Top 10 BYOD Security Best Practices

Top 10 BYOD Security Best Practices Implemented  by “World Class” CIOs

Top 10 BYOD Security Best PracticesTop 10 BYOD Security Best Practices have been implemented by almost all “World Class” CIOs and CTOs.  The importance of these is only magnified by the implementation of Blockchain and DLT applications.

The Best Practices are:

  1. Implement a formal written BYOD policy
  2. Set up a locking password on each device
  3. Implement a phone locater on all devices
  4. Protect the access point of your network
  5. Implement anti-virus – utilize VPNs
  6. Manage authorized applications.
  7. Utilized data encryption on e-mails and enterprise data
  8. Utilize the cloud as a back up source
  9. Be wary of applications like QR coder readers
  10. Monitor access and data usage by device and by user

Read  BYOD Security  Order BYOD Policy BYOD Policy Download Selected Pages

Top 10 Security Best Practices take effort to implement

Too many companies have found out the hard way that their most valuable assets are exposed and vulnerable to hacker attracts, theft and destruction. They now have learned a very expensive lesson, a company’s valuable information cannot be undone, and also often leads to significant damage to your company’s reputation.

See Also:

Please follow and like us
error

Employment Still Strong — But

Employment Still Strong — But it may be slowing

Employment Still Strong — But not as strong as earlier.  In the past month one state dropped out of full employment status – Ohio.  Full employment as defined by Janco Associates is 4.0% or less.

Employment Still Strong -- But

There are 35 full employment states in May 2019. That is one less with Ohio’s unemployment rate going to 4.1%

In addition to this, there still are only two states with high unemployment defines as 5.5% percent or higher.

States with high unemployment rates May 2019

As a not of caution, there are 3 states that are edging close to the high unemployment rates. Mississipi – 5.0%, New Mexico – 5.0%, and Arizona – 4.9%

Except for the Distrist of Columbia, none of these regions have high concentrations of IT employment.  As such they do not materially impact the IT job market.

Employment Still Strong — But some concerns

Hiring demand remains high for IT professionals with the United States.

Hiring Demand for IT Professionals

Based on data gathered by Janco Associates, hiring demand for IT Middle Management and IT Staff positions remain high. In addition demand for contractors an consultants is high as well.

Order Salary Survey Download Sample Provide Data

See Also:

 

Please follow and like us
error

Blockchain DLT career path

Blockchain DLT career path included as a job family

Blockchain DLT career path has been added to the IT Job Family Classification System.  Not only is it included as an individual job family, it is also linked to all of the other IT job families in that offering.  Having clearly defined job paths a the first step in long-term career planing.  That is true for the individual as well as the company employing them.

Blockchain DLT career path

Blockchain DLT career path is defined in the classification system. In addition point of entry and exit to the other functions within IT have bee identified

The ways to migrate to and from the Blockchain DLT job family have been identified and documented by Janco.  With this tool it is now easy to:

  • Define career development opportunities within a Blockchain DLT job family and movement into and out of the job family to the other job families.
  • Discuss career planning, clarify specific training needs, and consider course enrollment and career advancement
  • Track job applicants and analyze data for reporting
  • Set pay grades and get accurate salary requirements by understanding jobs and their requirements better
  • Evaluate jobs more consistently by comparing similar jobs in the same job family

Read on Order IT Job Family Classification System Download sample

See Also:

 

Please follow and like us
error

Cloud Security Vulnerabilities

Top 10 Cloud Security Vulnerabilities

Top 10 Cloud Security Vulnerabilities have been identified and ranks by level of importance and impact by a panel of 57  CIOs, CTOs, and CSOs.

Cloud Security Vulnerabilities

Top 10 Security Vulnerabilities have been identified by a 100 plus CIOs, CTOs, and CSOs from Fortune 500 companies

The top 10 are:

  1. Data breaches
  2. Weak Security
  3. Non-Secure Interfaces & API
  4. OS vulnerabilities
  5. Account hijacking
  6. Insider breach as System Administrator
  7. Parasitic code on server
  8. Data Destruction
  9. Denial of service (DoS).
  10. Ransomware

All of these are addressed in Janco’s How to Guide for Cloud Process and Outsourcing.

Order Cloud Outsourcing  Download Selected Pages

Top 10 best practices address Cloud Security Vulnerabilities

Top 10 best practices for cloud Security – The cloud is great technology that helps organizations to improved productivity, reduce costs, and simplify the user’s life. However it does raise significant security risks. Here are 10 best practices that if followed minimize those risks.

  1. Utilize a SDM (System Development Methodology) to design, test and implement changes in the both the source and object level code.
  2. Implement a disaster recovery and business continuity plan that includes a focus on security of the data and application assets that are cloud based.
  3. Implement metrics and cloud application monitoring which can help to detect potential security violations and breaches in the cloud based data and applications
  4. Utilize a secure access and change management system to manage revisions to the cloud application.
  5. Utilize a patch management approach to install revisions to the cloud data and application.
  6. Implement a log management system to have an accurate audit trail of what occurs on the cloud.
  7. Implement firm security policies via a formal security management system (see https://www.e-janco.com/Security.htm and https://www.e-janco.com/Cloud.htm).
  8. Review latest published cloud vulnerabilities and make appropriate changes to cloud applications and access rules
  9. Contract with independent 3rd parties to find security vulnerabilities in your cloud based applications
  10. At least annually, conduct a security compliance audit on the total cloud based application from development to user access.

See also:

Please follow and like us
error

Right time to hire IT Pros

Right time to hire IT Pros – Almost 100K new jobs to be created this year

Right time to hire IT Pros

Before the labor market gets tighter now is the right time to hire IT Pros

The right time to hire IT Pros is now before the labor maket gets tighter. In the first five (5) months of 2019, 34,600 new IT jobs were created.  Almost 70,000 more new  jobs will be added in the remaing months of this yera. This is the perfect time for development projects. Labor rates have never been lower.  From building —

  • Mobile Apps
  • Artificial Intelligent Bots – B2C – Improve Customer Experience
  • Artificial Intelligent Bots – B2B – Improve Human Resource Experience
  • Integrations, Customizations and more.

CEO and CIO say focus is on the customer experience – right time to hire IT Pros

Chief Experience Officer Job Description

CXO drives customer experience. Right staff is critical

A great customer experience is all about catering to the customers’ expectations. Customers can be consumers or staff. Customers want choices, and instant results. Customer experience or CX cloud applications provide customers with seamless, personalized and immediate experiences.  With recent trends showing that social media greatly influences customers into making decisions, CX cloud allows an enterprise to engage with customer at every level throughout their life-cycle.

This has created a demand for the CXO – Chief Experience Officer. The CXO needs to drive the hiring effort.

Order Chief Experience Officer Job Description

See also:

Please follow and like us
error

10 reasons why new hires fail

10 reasons why new hires fail

IT Hiring Kit

One of the best ways to avoid this problems for IT Prfessional new hires is to implement Janco’s IT Hiring Kit.  Rather they are an individual contributor

10 reasons why new hires fail have been identified in a recent study by Janco Associates, Inc. They are as follow:

  1. The Job descriptions used in the recruiting process are not accurate and/or are out of date
  2. The new hire is not a team player
  3. The skills and experiences presented by the new hire are inflated.
  4. The new hire causes friction with the organization
  5. The skill the the new hire has are not a fit to the enterprises requirements
  6. The new hire is not motivated to meet the needs of the organization.
  7. The new hire is looking towards expanding their own resume not to meet the requirement of the position.
  8. The new hire has to have things their own way and are not very adaptive.
  9. The new hire is careless and not very attentive
  10. The new hire is a prima donna

In the recruiting and hiring process, steps need to be taken  to see that none of the items above are part of the new hire’s characteristics

Solution to minimize hiring mistakes for 10 reasons why new hires fail

IT Pro’s Hiring Kit – Includes latest IT Salary Data, Interview and Hiring Guide, and 300 Job Descriptions – In today’s economy, nearly every organization faces pressure to have the right talent in place, run at peak efficiency and “do more with less”. With the economy improvement and lowest unemployment numbers in several years, HR departments are pressured to get qualified professionals on board now.

Read on IT Hiring Kit Order IT Hiring Kit

See also:

Please follow and like us
error

Backup Policy Updated

Backup Policy Updated

Backup Policy

Backup Policy includes everthing that is need to be in full compliance with all mandated security requirement.

Backup Policy Updated as well as the CIO IT Infrastructure Policy Bundle. The policy has just been updated to take into account everything from GDPR to cloud storage and security implications.

The Backup Policy addresses the issues that you struggle with including:

  • How safe are your information assets in transit and at reset?
  • What protections are in place to prevent hacker access?
  • Does your backup and retention process meet all of your compliance requirements?
  • Who can gain access to your data?
  • What KPI metrics do you have in place?
  • Will the use of the data ensure successful recovery?

Managing backup and recovery in today’s environment is a multi-dimensional challenge with both near and long term business requirements. Recent technological developments in disk backup have had a positive impact on short term data retention requirements (see also BYOD policy). But these improvements do not replace the need to execute and deliver on a long term data retention strategy which includes:

  • Business and Regulatory Requirements Demand a Long-term Plan
  • Manage and Contain Your Total Cost of Ownership (TCO)
  • Encrypt Your Data for Secure Long-term Retention
  • Weigh the Environmental Impacts and Minimize Power and Cooling Costs
  • Simplify Management of the Entire Solution

Best of Breed solution

A “Best of Breed” backup policy and strategy considers how to:

  • Back up critical application data – across mixed operating systems and storage configurations
  • Restore desktops and mobile users quickly
  • Restore systems to dissimilar hardware or virtual systems
  • Back up data and system information to off site locations, so that you can quickly recover your business even from a total loss of your facility
  • Leverage new cloud based backup offerings to properly secure, back up,and archive critical data.

Order Backup Policy Backup Policy Download Selected Pages

See also:

Please follow and like us
error

Top 10 Interview Questions

Top 10 Interview Questions

Top 10 Interview QuestionsTop 10 Interview Questions – As recruting for strong IT professionals, what are the questions that need to be asked.  In Janco’s Interview and Hiring Guide there a many tips and best practices that should be followed.  Incuded are a number of top 10 lists of things to do.  The Top 10 Interview Questions are:

  1. What is your greatest strength?
  2. What is your greatest weakness?
  3. How do you handle stress and pressure?
  4. Describe a difficult work situation / project and how you overcame it.
  5. How do you evaluate success?
  6. Why are you leaving or have left your job?
  7. Why do you want this job?
  8. Why should we hire you?
  9. What are your goals for the future?
  10. What makes you the best fit for our organization?

Other Interviewing tools

Each of these questions opens up the interview process and provides the interviewer an insight in to the candidate they are intervewing.

ncluded in the Guide are specific questions to ask in several areas including:

  • Prior employment
  • Position the candidate is interviewing for
  • Education and training
  • If this is a remote worker
  • Decision-making and creativity
  • Management and leadership
  • Non-work activities and interests
  • Questions that should be avoided

To make the recruiting and interviewing process meet the criteria set by world-class organizations, included are:

  • Questions the interviewer should be prepared to answer
  • Screening resumes best practices
  • Phone screening best practices
  • Interview top 10 best practices
  • Hiring best practices

Also included are electronic forms for:

  • Interview Questionnaire
  • Background Check Authorization

Read on Order Interview Hiring Guide Download Interview Guide Selected Pages

Read Also

Please follow and like us
error

Chief Experience Officer (CXO) Job Description

Chief Experience Officer (CXO) Job Description

CXO - Chief Experience Officer Job Description

The CX is one of the hottest jobs on the market

Chief Experience Officer (CXO) Job Description.  The Chief Experience Officer (CXO) drives the enterprise’s growth in the user experience arena.  They oversee operations in all user experience sectors like marketing, image setting, mobile applications, social media, related technologies, and virtual goods, as well as web-based management and marketing.

The CXO is not only a user experience expert but also a seasoned marketing, brand, and product manager. As the role is transformational, the CXOs is responsible for the adoption of consistent user interfaces across the entire business. As with most senior executive titles, the responsibilities are set by the organization’s board of directors or other authority, depending on the organization’s legal structure.

Order Chief Experience Officer Job Description

C-Level Job Description Bundle

Order

The C-Level job description bundle contains the top eight (8) IT job descriptions. Each is between 5 to 8 pages long and is at the level of detail that KPI performance metrics can be defined and related directly to both employment contracts and compensation/bonus levels.

  • Chief Information Officer(CIO)
  • Chief Information Officer (CIO) – Small Enterprise
  • Chief Experience Officer (CXO)
  • Chief Security Officer (CSO)
  • Chief Compliance Officer (CCO)
  • Chief Mobility Officer
  • Chief Technology Officer (CTO)
  • Chief Digital Officer (CDO)

See also:

Please follow and like us
error

IT Job Market 2019

IT Job Market 2019

IT Job Market 2019 –  in the first 4 months of the year the number of new IT jobs created exceeds 40K.  That rate of growth is at a level that is beyond the number of individuals graduating from universities and trade schools.

IT Job Marker 2019

IT Job Marker 2019 – April shows that 95,500 IT jobs heav been added in past 12 months. That is inspite of the loss of 29,600 job in Telecommunications

IT job market 2019 growth is at a pace that will be beyond anything that we have witnesses since the late 1960s.

A steady progression in the number of new IT job created has been consistent for the last two years.  We do not see that changing for any time soon.

The areas where there has been the greatest inscrease in demand has been for those applictions that depend on remote users.  For example, iOS and Andraoid applications which access big data are where there is a grea shortage of skilled IT Professionals.  Add to that, the implications of cryptocurrency applications including blockchain and distributed ledger technology and you will find the disciplines that are the focus of new job creation.

In the course of analyzing data for our Mid Year IT Salary Survey, we found some interesting data on the Data Scientist position.  First the individual who fill that role are on either coast . Few , if any, Data Scientist roles are in makets other than the technology centers.  However, the median salaries for those postions is quite high.

IT Job Market 2019

Data Scientist median salary is around $210K. However the highest medias are San Francisco Bay area and Boston. Both of which is where there significant new product development.

Order Data Scientist Job Description

See Also

Please follow and like us
error