Information Technology News Feed

Security, Disaster Planning, ITSM, Metrics, and Salary Survey

The Information Technology News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • Information Technology News

  • 76% of companies did not know they were hacked

    Information Technology News Protal

    76% of companies did not know they were hacked

    Secrity Manual Template3 out of 4 companies hacked did not know for over seven months that they were hacked.  The average time between an attacker breaching a network and its owner noticing the intrusion is 205 days.  There little doubt that criminals and pranksters are thriving by attacking computers and networks that companies are struggling to cope, and that businesses offering answers are thriving.

    Janco's Security Manual Template is a step in the right direction to get control of this problem.

    Read on Order Security Manual Template Download sample 

    - 76% of companies did not know they were hacked


    Top ten security weakness

    Security Manual Template Best Practices

    Managing Security BreachesThe top 10 drivers of security shortcomings include:

    1. Insufficient funding for security
    2. Lack of commitment by senior executive management
    3. Lack of leadership in the security arena by the CIO
    4. Belief that the organization will not be targeted
    5. Lack of internal resources who are "security" experts
    6. Lack of an effective IT security strategy
    7. Lack of an action plan on how to implement a solution before an event
    8. Infrastructure for IT that does not easily lend itself to security implementation including complex and disjointed applications and data
    9. No central focus with the enterprise that focuses on security
    10. Lack of a good termination policy for employees and contractors

    Read on Order Security Manual Template Download sample

    - Top ten security weakness


    Top 10 Causes of Security Shortfalls

    Security Manual Template Defines Best Practices

    one out of ten CIOs and CFOs feel they do not have an adequate security strategy in place and are reactive when an incident does occur. The top 10 reasons for security shortfalls are:

    1. Insufficient funding for security
    2. Lack of commitment by senior executive management
    3. Lack of leadership in the security arena by the CIO
    4. Belief that the organization will not be targeted
    5. Lack of internal resources who are "security" experts
    6. Lack of an effective IT security strategy
    7. Lack of an action plan on how to implement a solution before an event
    8. Infrastructure for IT that does not easily lend itself to security implementation including complex and disjointed applications and data
    9. No central focus with the enterprise that focuses on security
    10. Lack of a good termination policy for employees and contractors

    Janco reviewed of over 200 incidents found the frequency of these types of breach losses:

    Types of Losses Due to Security Shotfalls

    Read On... Order Security Manual Template Download Sample

    - Top 10 Causes of Security Shortfalls


    Not a good idea to depend on Tech Giants Products

    Tech Giants cannot be depended on rather IT Infrastructure Policies and Procedures are the solution

    Companies need to depend on thier own infrastructureTech Giants will create new products that are linked to thier infratructure and if they do not create enough value, they will just abandon them.  For example, Google is killing off Inbox, its experimental email app that's lived alongside Gmail for the past four years. The service is set to shut down for good this coming March.

    When Inbox was announced in October of 2014, Google described it as something that was years in the making and a completely different type of inbox, designed to focus on what really matters.They also said it was designed for the problems we're going to see in the next 10 years. The company is sending the app away to its increasingly crowded virtual graveyard.

    Companies and individuals need to depend on thier own infrastructure.

    Read On Infrastructure Policies

    - Not a good idea to depend on Tech Giants Products


    2020 Edition IT Job Descriptions

    310 IT Job Descriptions - Available for download 

    2020 Edition IT Job DescriptionsJanco has just release it 2020 Edition of it IT Job Descritions.  The firm continues to update its inventory of job descriptions considering new techologies, compliance requirements, career planing, setting pay grades and accomplishing this in was that mets the needs of todays high-tech environment.

    In the latest edition Janco has:

    • Validated that all the jobs descriptions that are gender neutral
    • Updated all of the Job description to meet all mandated US, EU, and International requirements - this includes considerations for BREXIT
    • Added eight (8) new job descriptions ; Chief Experience Officer, Manager Blockchain Architecture. Project Manager Blockchain, Blockchain Analyst, Manager DevOps, DevOps Application Designer, DevOps Quality Control Specialist, DevOps Software Engineer, and DevOps Version Control Specialist.

    Read On Order IT Job Descriptions Sample Job Description

    - 2020 Edition IT Job Descriptions