Category Archives: Security

Chief Experience Officer (CXO) Job Description

Chief Experience Officer (CXO) Job Description

CXO - Chief Experience Officer Job Description

The CX is one of the hottest jobs on the market

Chief Experience Officer (CXO) Job Description.  The Chief Experience Officer (CXO) drives the enterprise’s growth in the user experience arena.  They oversee operations in all user experience sectors like marketing, image setting, mobile applications, social media, related technologies, and virtual goods, as well as web-based management and marketing.

The CXO is not only a user experience expert but also a seasoned marketing, brand, and product manager. As the role is transformational, the CXOs is responsible for the adoption of consistent user interfaces across the entire business. As with most senior executive titles, the responsibilities are set by the organization’s board of directors or other authority, depending on the organization’s legal structure.

Order Chief Experience Officer Job Description

C-Level Job Description Bundle

Order

The C-Level job description bundle contains the top eight (8) IT job descriptions. Each is between 5 to 8 pages long and is at the level of detail that KPI performance metrics can be defined and related directly to both employment contracts and compensation/bonus levels.

  • Chief Information Officer(CIO)
  • Chief Information Officer (CIO) – Small Enterprise
  • Chief Experience Officer (CXO)
  • Chief Security Officer (CSO)
  • Chief Compliance Officer (CCO)
  • Chief Mobility Officer
  • Chief Technology Officer (CTO)
  • Chief Digital Officer (CDO)

See also:

Please follow and like us
error

Expired Password

Expired Password Rules

Expired Password

Expiring passwords is no longer considered a best practice by many security experts

Expired Password – the process of expiring Passwords is an obsolete practice that is not worth the effort. Microsoft agrees with that.  In a company post they said, periodic password expiration is an ancient and obsolete mitigation of very low value, and Microsoft does not believe it’s worthwhile for a baseline to enforce any specific value.

As a result, Microsoft has dropped as a best practice that passwords should be frequently changed. In its Windows security configuration baseline model.  That model is collection of recommended group policies and their settings, accompanied by reports, scripts and analyzers. Earlies models had advised enterprises and other organizations to mandate a password change every 60 days.

Password Policies

Policies to automatically expire passwords – and other group policies that set security standards – are often misguided.  According to security expers. the small set of ancient password policies enforceable through Windows’ security templates is not and cannot be a complete security strategy for user credential management.

Better practices are multi-factor authentication – also known as two-factor authentication – and banning weak, vulnerable, easily-guessed or frequently revealed passwords.

Security Policies

Solutiion implemeting the Security Policies and Procedures. Janco’s Security Manual Template both the Business & IT Impact Questionnaire and the Threat & Vulnerability Assessment Tool (both were redesigned to address Sarbanes Oxley and CobiT compliance). In addition, the Security Manual Template PREMIUM Edition  contains 16 detail job descriptions that apply specifically to security and Sarbanes Oxley, ISO 27000 (ISO27001 and ISO27002),CobiT, PCI-DSS, and HIPAA. Data Protection is a priority.

Order Security Manual Template Download Sample

Read Also

Please follow and like us
error

PCMatic Support Poor at Best

PCMatic Support Poor at Best – email only

PCMatic Support Poor at Best, when you have an issue they have no user forum, no real knowledge base to query, no on-line chat, nor a tech support phone number.

We tried the Pro version of PCMatic and found it an interesting solution to the protection arena.

When we had a problem with another program and added to the white list. That did not make any difference.  That we found strange.  Let me explain.

PCMatic Support

PCMatic Support should implement polices on Patch Management, version control, and service desk support.

We could install the other program (DriverSupport.com) and add it to the white list. All went well until a reboot was required. PCMatic just REMOVED the whitelisted program. We sent 3 help requests that respond with ROBOTIC canned answers that do not answer the question of how to get around the issue.

There is NO link to a follow-up area, there is NO phone number listed of who I can talk to, and there is NO user forum where I can ask if another user has solved the problem. The only solution that I have is to request a refund.

This is the WORST customer service we have seen yet in the virus protection arena. PcMactic prides itself as being all U.S. made and suppported. They might as well be in India, at least there someone will talk to you.

AVOID THIS PRODUCT IT IS NOT WORTH THE TIME TO MAKE IT WORK. They should spend more on technical support and less on TV ads

See Also:

Please follow and like us
error

Top 10 Reputation Management Rules

Top 10 Reputation Management Rules

Top 10 Security Management rules

Top 10 Security Management rules are defined in Janco’s Security Manual Template.

Top 10 Reputation Management Rules are defined in detail in Janco’s Security Manual Template.

Without constant vigilance, your company is vulnerable to attack. The first step to take is to assess your current security stance, then make a plan to increase security with proper best practices and technologies.

Top ten commandments of security management for CSOs, CIOs, and IT Managers

  1. Limit access to information to those who need to have it. People can’t misuse information that they don’t have.
  2. Conduct frequent and deep security audits. Identify who has access to what – and how their actions could weaken the protection of valuable data/information.
  3. Set limits to information access. Do not exclude all information from access – data exclusion locks down access. Limits set authorizations so specific people can do specific things under specific circumstances.
  4. Limit administrative rights to as few individuals as possible. Very few individuals need them to do their jobs.
  5. Ignore organizational hierarchy when setting access capabilities. Access and authorization should be based upon responsibilities, not position.
  6. Make Security Invisible. Minimize extra commands, screens, pop-ups for employees; if an action is allowed, just let it happen.
  7. Analyze Security End back doors. Compliance logs reveal threat patterns, and show how security steps are hurting productivity.
  8. Monitor information access and updates. User-initiated application information updates can invite vulnerabilities.
  9. Educate everyone on security policies and procedures. The more that people know about the rules the better
  10. Make security best practices the watch word for everyone. IT and the general workforce must address the constantly changing nature of security breaches.

Security Manual Template

Security Policies and Procedures Manual for the Internet and Information Technology is over over 230 pages in length. All versions of the Security Manual template include both the Business & IT Impact Questionnaire and the Threat & Vulnerability Assessment Tool (both were redesigned to address GDPR, CaCPA, ISO, Sarbanes Oxley and CobiT compliance).

Security Manual TemplateOrder Security ManualDownload Selected Security Manual Pages

See Also:

Please follow and like us
error

GDPR Compliance

GDPR Compliance is at risk with 3rd Party providers

GDPR Compliance

GDPR Compliance Management is more complex with the increased use of 3rd Party providers

Security and GDPR Compliance risks from third parties are on the rise. A security compliance study found that 56 percent of companies admitted to a security incident caused by a third party.

With GDPR now in place, security of third-party vendors and consultants is more important than ever. Their security failure will impact your company and could result in a breach of your data.

So how do you approach third-party security in a GDPR world? The first step is to know who your vendors are and other outsiders with access to your network. These tiers are based on the level and volume of data they have access to, determining which are the most critical. Companies need to know who has any access to their data and get an accurate understanding of exactly what information they can access, why, and how often. With this information in hand, you can then develop an accurate response plan.

GDPR compliance plans should also take into consideration all of your third-party vendors. Thus, when establishing a dedicated Data Privacy Officer (DPO), that person will help the company meet GDPR requirements and should keep tabs on third-party practices and data systems as they affect your business. Lunetta added:

To support the DPO with additional expertise on making decisions such as, “We need X solution to address Y compliance/security requirement,” it’s imperative for IT security teams to conduct regular self-assessments for uncovering gaps and determining options for remediating them.

GDPR Tips

Some tips for ensuring that your third parties are staying in GDPR compliance:

  • Address cybersecurity governance because while it’s one thing to invest in security solutions that help address personal data protection, it’s another to use them in a manner that is also GDPR-compliant.
  • Access Policy Governance – Having robust access controls isn’t good enough to comply with GDPR. Instead, you also need a set of policies that can be defined, implemented and enforced around how your enterprise controls access to personal data.
  • Pay attention to privileged.  Users, such as systems administrators, can circumvent standard controls inside of an application or a database. Identify those users, establish governance controls, and implement enforcement mechanisms through technology solutions such as network access control.

See also:

Please follow and like us
error

Compliance Mandates

Compliance Mandates – Companies Impacted

Compliance Mandates come from multiple sources.  How companies are impacted by them varies by size of company and the markets they serve.

Compliance Mandates impact every company that does business on the Internet. Few companies are impacted by all of the mandates. In the U.S. the most impactful is the CaCPA inacted by Califorinia and the GDPR from the EU

The EU has implemented a single privacy and compliance mandate.  In the U.S. that is not the case as of yet.  The U.S. Congress has talked about it but, as of yet, there is no consensus on what that legislation will look like.  Until that occurs the various states, and California in particular, will set the rules.

The standards for user privacy and control drove the released of an update to its Security Manual Template which identifies mandated user rights and enterprise responsibilities related to privacy protection. Janco reviewed in detail the California Consumer Privacy Act of 2018 (CaCPA) and generated a detail list of user rights and business responsibilities that are mandated.  The CaCPA requirements are very complex and significant resources will have to be allocated for organizations to comply with these new mandates.  These mandates will impact all organizations that have an Internet presence in the U.S. and California in particular.  The compliance deadline is January 1, 2020.

Compliance Management is an issue that every organization needs to address.

Compliance Management KitOrder Compliance management KitDownload Selected Pages

See also

Please follow and like us
error

Compliance Management

Compliance Management Kit Released

Compliance Management

Compliance Management is one of the top concerns of CIOs and other C-Level exeutives.

Compliance Management Kit was just released.  All of the components of the kit were just updated to meet privacy and security madatesdue to GDPR for the EU and CaCPA for the state of California.

The kit comes in 3 versions: Silver, Gold, and Platinum.  Each can be acquired with either 1 year or 2 years of update service.  Janco feels mandates will continue to be added due to this high volume of cyber-attacks and privacy issues that are of concern to individuals and corporations.

First, he Silver version of the kit comes with the Compliance Management White Paper, a self-scoring Security Audit, a PCI Audit Program, and 31 key Job Descriptions including Chief Security Officer (CSO). Second, the Gold version of the kit come with all of that plus two full policies. The policies are the Record Classification and Management Policy and a Privacy Compliance Policy with a detail implementation work plan. The detail wok plan can be utilized right out of the box to ensure that privacy and security are implemented fully within the enterprise.   And third, the Platinum version of the kit comes with everything in the first two, plus Janco’s Security Manual Template.

To learn more about the kit go to https://www.e-janco.com/Compliance.htm.

Order Compliance management KitDownload Selected Pages

Other related posts on this blog:

Please follow and like us
error

Record Classification

Record Classification, Management, Retention, and Destruction Policy Updated

Record Classification was just added to the Data Management Policy.  The purpose of the addition was to reduce the sensitive data footprint to meet the most recent rigorous compliance standards,

Record Classification and Management

Record Classification, Management, Retention, and Disposition Policy can be acquired separately or with the CIO IT Infrastructure Policy Bundle.

Most other data classification tools don’t go the extra mile. Their technology only looks for specific terms in your documents; it doesn’t provide the intelligence you need to secure the personal information of your customers or employees. Janco’s Record Classification, Management. Retention and Disposition Poicy provides visibility into where sensitive files are, what content is inside, who can access the files and who actually uses them.

Included with the policy is a crisp definition of data classification.

The foundation of any good record management program is developing a consistent records classification system across the organization.

While there are many record classification systems, one recommended best practice is a three-tier classification based on business function, record class, and record type.

The first step toward developing  a records classification system is taking an inventory or a comprehensive and accurate listing of locations and contents of all records within the organization.

The second step is grouping the records in the inventory according to business functions, record class, and record type:

  • Common business functions include operations, finance, legal, marketing, human resources, and others.
  • The top-level business functions are broken down into record classes. For instance, two record classes of record-function accounting are accounts payable and accounts receivable.
  • Record types are a further subdivision of record classes. For instance, the accounts payable record class can be further broken down into accounts payable aging reports, accounts payable distribution reports, cash disbursement reports, and other categories.

Read on Record Classification, Management, Retention, and Disposition Policy

Order Record Management PolicyDownload Selected Pages Record Management policy

Other Posting of a similar nature

Please follow and like us
error

IoT Challenges

Internet of Things – IoT Challenges

IoT Challenges

IoT Challenges are varied and unique to the capture of real-time data

IoT Challenges – IoT  is more than internet enabled sensors and analytics. It is a way to get real-time information. There is a very good chance that the IoT device can be remotely controlled, monitored, updated and maintained using remote management tools, sensors and predictive analytics that continually collect device data that can identify problems before they happen.

Granted most of these devices are not critical in life or death situations. However, there can be property loss when a device fails, does not have the current BIOS or software, or is used in an inappropriate manner. In addition the implications on data storage in order to meet the mandated records management requirements have not been understood to their fullest.

Add that to the fact that typically IoT data is proprietary and enterprise confidential, security is a major concern.

Managements concerns are

  • Security Threats – 38%
  • Data Privacy – 28%
  • Access Management – 9%
  • External Attacks – 9%
  • Meeting Compliance Requirements – 7%
  • BYOD and user devices – 6%
  • 3rd Party Data Requests – 2%
  • Other concerns – 3%

Order Manager IoT Job Description

See also:

Please follow and like us
error

What is HIPAA

What is HIPAA and how can an enerprise comply with the mandated requirements

What is HIPAA Privacy Rule – provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important purposes.

There also is a HIPAA Security Rule – It specifies a series of administrative, physical, and technical safeguards for covered entities to use to assure the confidentiality, integrity, and availability of electronic protected health information. This places unique challenges to the Business Continuity and Disaster Recovery Planning processes.

What is HIPAA

What is HIPAA and how does it impact overall Compliance Management?

Federal and state government regulations (see state compliance requirements) can be a big problem for today’s organizations. There are more than 100 such regulations in the U.S. alone, and that number continues to grow. These are in addition to industry-specific mandates. They are all designed to safeguard the confidentiality, integrity, and availability of electronic data from information security breaches. So, what are the consequences if your organization fails to comply? Heavy fines and legal action. In short, it’s serious.

Read On HIPAA Compliance

Order DRP BCP SecurityDownload Table of Contents Security and DRP templates

 

Please follow and like us
error