IT Hiring Kit Update has just been released. It contains the lastest IT Salary Survey, the 2019 version of the Interview and Hiring Guide, and job descriptions. The kit comes in 4 editions – Standard, Silver, Gold and Platinum. Each of the job descriptions is between 2 to 8 pages in length.
The recent update includes a number of best practice definitions to facilitate recruiting. The best practices provide a proven methodology for how the recruitng process can be streamlined to maximize the productivity of the recruiting staff and increase the likelihood that only fully qualified candidates are screened , interviewed, and recruited.
IT Hiring Kit Update components all have been updated with the last few weeks. As the IT Job Market continues to tighten now is the time to get this must have kit.
The kit comes with 30 days of free update service. In addition, update subscription service can be purchased along with the core offering. The options are for one or two years of service.
The CTO of a Fortune 10 organization based out of New Year who has reviewed the latest version of the kit said that he was “… going to make the IT Hiring Kit a standard for all of the recruiting managers and CIO in the divisions of his company.” That is high praise indeed.
With the added components all available in eReader format, this kit is portable and mobile to address the everchanging technology environment. For example all of the job descriptions can be viewed on tablets and smartphones. With that option the need for paper copies is minimized.
Compliance Management is one of the top concerns of CIOs and other C-Level exeutives.
Compliance Management Kit was just released. All of the components of the kit were just updated to meet privacy and security madatesdue to GDPR for the EU and CaCPA for the state of California.
The kit comes in 3 versions: Silver, Gold, and Platinum. Each can be acquired with either 1 year or 2 years of update service. Janco feels mandates will continue to be added due to this high volume of cyber-attacks and privacy issues that are of concern to individuals and corporations.
First, he Silver version of the kit comes with the Compliance Management White Paper, a self-scoring Security Audit, a PCI Audit Program, and 31 key Job Descriptions including Chief Security Officer (CSO). Second, the Gold version of the kit come with all of that plus two full policies. The policies are the Record Classification and Management Policy and a Privacy Compliance Policy with a detail implementation work plan. The detail wok plan can be utilized right out of the box to ensure that privacy and security are implemented fully within the enterprise. And third, the Platinum version of the kit comes with everything in the first two, plus Janco’s Security Manual Template.
How to Guide for Cloud Processing and Outsourcing 2019 Version Released
How to Guide for Cloud Processing and Outsourcing 2019 Version Released with new fearures. It now is available in ePub format. The version is provided with the basic product.
As interest in cloud computing continues to gain momentum,there is increasing confusion about what cloud computing represents. Without a common, defined vocabulary and a standardized frame of reference, organizations cannot have a cogent discussion about cloud computing. The practical guide for cloud computing outsourcing addresses this challenge by providing a context for productive discussion and a structure for planning, both short and long term, for a successful implementation.
In a recent study, Janco identified the 5 major reasons why CIOs, and enterprises in general, are moving towards Cloud and Outsourcing as processing solutions.
CIO Infrastructure Policy Bundle Update 2019-02 now available
CIO IT Infrastructure Policy Bundle contains 20 full polices that are easily modified to meet an enterprise’s unique operation environment.
CIO Infrastructure Policy Bundle has just been updated. It inclues both the updated Record Classification, Management, Retention and Disposition Policy and the BYOD Access and Use Policy. This is all part of the annual review process which Janco is going through for its entire product like of CIO and IT Management tools to validate they meet all of the compliance, security and privacy mandates.
The policies are all part of the overall IT Governance Model. That model addresses the issues associated with the overall processes associated the design, developement, implementation , and ongoing operation of technology in the ever changing Internet based operational enviroment.
Currently, data classification is an area that CIOs need to address in light of GDPR and CaCPA.
Each of the polices in the CIO IT Infrastructure Policy Bundle can be acquired separately. See Policy offerings.
Blog and Personal Website Policy (revised 01/2019)
BYOD Access and Use Policy (revised 03/2019)
Mobile Device Access and Use Policy (revised 01/2019)
Physical and Virtual Server Security (revised 01/2019)
Record Classification, Management, Retention, and Disposition Policy (revised 03/2019)
Sensitive Information Policy (revised 1/2019)
Travel, Laptop, PDA and Off-Site Meeting Policy (revised 01/2019)
Updated in 2018 – Scheduled to be updated within the next three (3) months:
Backup and Backup Retention Policy
Google Glass Policy
Incident Communication Policy
Internet, Email, Social Networking, Mobile Device, and Electronic Communication Policy
Outsourcing and Cloud-Based File Sharing Policy
Patch Management Version Control
Privacy Compliance Policy
Service Level Agreement Policy including sample metrics
Social Networking Policy
Technology Acquisition Policy
Text Messaging Sensitive and Confidential Information
Record Classification, Management, Retention, and Destruction Policy Updated
Record Classification was just added to the Data Management Policy. The purpose of the addition was to reduce the sensitive data footprint to meet the most recent rigorous compliance standards,
Record Classification, Management, Retention, and Disposition Policy can be acquired separately or with the CIO IT Infrastructure Policy Bundle.
Most other data classification tools don’t go the extra mile. Their technology only looks for specific terms in your documents; it doesn’t provide the intelligence you need to secure the personal information of your customers or employees. Janco’s Record Classification, Management. Retention and Disposition Poicy provides visibility into where sensitive files are, what content is inside, who can access the files and who actually uses them.
Included with the policy is a crisp definition of data classification.
The foundation of any good record management program is developing a consistent records classification system across the organization.
While there are many record classification systems, one recommended best practice is a three-tier classification based on business function, record class, and record type.
The first step toward developing a records classification system is taking an inventory or a comprehensive and accurate listing of locations and contents of all records within the organization.
The second step is grouping the records in the inventory according to business functions, record class, and record type:
Common business functions include operations, finance, legal, marketing, human resources, and others.
The top-level business functions are broken down into record classes. For instance, two record classes of record-function accounting are accounts payable and accounts receivable.
Record types are a further subdivision of record classes. For instance, the accounts payable record class can be further broken down into accounts payable aging reports, accounts payable distribution reports, cash disbursement reports, and other categories.
2019 Version of the HandiGuide contains 300 2 to 8 page job descriptions. They every position for CIO to Blockchain programmer and System Administrators
IT Job Descriptions HandiGuide was just updated to reflect latest compliance requirements. The HandiGuide was completed in 2019. It is over 800 pages; which includes sample organization charts, a job progression matrix, and 300 individual descriptions. The book addresses all mandated requirements, including the ADA, and is in an easy to use format.
Also included with the HandiGuide are tools to help you expand, evaluate and define your enterprise’s Human Resource requirements. Those tools include:
Job Evaluation Questionnaire
Position Description Questionnaire
Job Progression Matrix (Job Family Classifications)
Sexual Harassment and other key employment issues
Best Practices for resume screening
Best Practices for phone screening
Employee Termination Checklist (Electronic Form)
This offering is fully vetted by the IT Productivitive Center, the Society for Human Resources Management, and the 3 major accounting firms (in the U.S and the EU).
The eReader version of the job descriptions can be loaded directly on an enterprises “Intranet”, searched and printed directly via tablets and SmartPhones.
Disaster Recovery Business Continuity Template – 2019 Version Released
Disaster Recovery Business Continuity has just been updated and the 2019 Version has just been released. The changes to this version are:
Updated all included job descriptions
Updated all included forms
Disaster Recovery electronic forms
Safety Program electronic forms
Added co-location checklist
Audit Program Updated
2019 Version now available for immediate download
Changed core document to exclude job descriptions and forms which are delivered in their own directories
Business and IT Impact Questionnaire is delivered in its own and comes as a MS WORD, pdf, and eBook electronic format
3 included job descriptions are delivered in their own directory
The chapters of the template are:
Business Impact Analysis
Disaster Recover Organization
Disaster Recovery Organizational Procedures
Appendix – Full of tools and checklists
Also included as separate MS Word and/or eBook electronic files in thier own directories:
Job Descriptions – Disaster Recovery Manager, Manager Disaster Recovery and Business Continuity
Disaster Recovery electronic forms – Business Continuity Site Evaluation Checklist, Business Continuity LAN Node Inventory, Business Continuity Location Contact Numbers, Business Continuity Off-Site Inventory, Business Continuity Personnel Location, Business Continuity Plan Distribution, Business Continuity Remote Location Contact Information, Business Continuity Server Registration, Business Continuity Team Call List, and Business Continuity Vendor List
Safety Program electronic forms – Area Safety Inspection, Employee Job Hazard Analysis, First Report of Injury, Inspection Checklist – Alternative Locations, Inspection Checklist – Computer Server Data Center, Inspection Checklist – Office Locations, New Employee Safety Checklist,Safety Program Contact List, and Training Record
Business Imact Analysis Questionnaire – PDF and MS WORD Formats
Business Impact Analysis electronic form – Application and File Server Inventory
eBook versions – Disaster Recovery Business Continuity Template and the DPR Audit Program
DRP BCP Audit Update Released with updates that have been implemented to see that the latest mandated requirements of ISO, the U.S., and the EU are complied with.
This Disaster Recovery / Business Continuity Audit program identifies control objectives that are meet by the audit program. There are approximately 50 specific items that the audit covers in the 17 page audit program. Included are references to specific tools that will assist you in addressing any defects or shortcoming the audit uncovers.
The Audit program covers the following control objectives:
Ensure that adequate and effective contingency plans have been established to support the prompt recovery of crucial enterprise functions.
Ensure that all mandated disaster recovery, business continuity, and security requirements have adequate compliance policies.
Ensure the survival of the business and to minimize the implications of a major enterprise and/or I T failure.
Ensure that all the potential risks to the enterprise are identified and assessed.
Ensure the optimum contingency arrangements are selected and cost effectively provided.
Ensure that an authorized and documented disaster recovery / business continuity plan is created, maintained up-to-date, and securely stored.
Ensure that the recovery plan is periodically tested.
Ensure that all internal and external parties are fully aware of their responsibilities and commitments.
Ensure that appropriate liaison is maintained with external parties (i.e. insurers, emergency services, suppliers, etc. ).
Ensure that both the damaged and recovery sites are secure and that systems are securely operated.
Ensure that systems and procedures are adequately and accurately documented.
Ensure that public and media relations would be effectively addressed.
The audit programs is available as a standalone item. In addition it is included with several of Janco’s offerings. They are:
IT Service Management Tool Now used by over 120 organizations
IT Service Management Tool (ITSM) and Service-Oriented Architecture (SOA) have gained great acceptance as the change management discipline has grown over the last several years.
In a survey of over 200 organization, Janco found that 71% of all organizations use the KPI Metric of User Review as a key metric.
Over 71% of organizations that have implement KPI metrics use favorable review by users as the key metric
The percentage of participants using a structured approach to manage change has grown from 55% to 75%. The reasons ITSM, SOA, and change management have become so important to organizations in recent years are:
More and frequent changes – Change is occurring at an incredible pace in organizations today. The sheer quantity of changes is increasing, and changes are happening more frequently and faster than ever before. With such large amounts of change happening, organizations need a better and more structured way to manage the individuals in the organization impacted by all of these changes.
Dynamics of the business environment – With the rapid change in the economic climate, CIOs and their IT organizations are now required to do more with less. Change management and change control is one-step that insures that changes are implemented correctly.
Value system of empowerment – Over the last few years, value systems have shifted in many organizations. Old values of control and predictability have been replaced by new values to push decision-making, authority and responsibility down into the organization. While this shift has delivered many benefits, it has also made top-down changes more difficult and increased the resistance they face. Organizations with empowered work forces need to manage the human side of change more effectively than they did in the very hierarchical structure of the past.
Competitive advantage – Many sources of competitive advantage have eroded as information moves more quickly and across the globe in seconds. In upcoming years, speed and agility will be a central differentiation in the market place. In addition, organizations that do not use change management cannot build their internal competency too quickly and effectively implement change. Strong change management competencies within an organization are a key source of competitive advantage in coming years.