Microsoft, Windows, and Internet News - XML News Feed

Microsoft, Windows, and Internet News - XML News Feed - The Internet and Mobility News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

Omni Commerce new e-commerce paradigm

A management site for IT

Omni CommerceEnterprises are now moving towards the new e-commerce paradigm

SmartPhones and tablets are changing the way the way people and business browse the Internet, shop, provide service and communicate with suppliers, customers and associates.

CIOs need to have the right foundation. Leadership begins with having a strategy in place that works and then having the right people in place to create and implement the,.

Order Omni Commerce Planning Toolkit

Download Selected Pages Omni Commerce Strategy

- Omni Commerce new e-commerce paradigm

OSHA mandates for Pandemic

Pandemic Best Practices for IT Infrastructure meet OSHA mandates

Pandemic Infrastructure Bundle - OSHA MandateThe Pandemic Planning Checklist meets OSHA's pandemic mandates. OSHA has released Guidance on Preparing Workplaces for COVID-19, which provides specific action steps employers should take to address the global pandemic. With the virus spreading and disrupting operations throughout the United States, organizations must promptly assess their employeesÂ’ exposure risks, adapt their business operations to incorporate social distancing practices, and take steps to protect at-risk employees with appropriate personal protective equipment (PPE).

The Pandemic Infrstructcure Bundle explaisn best practices for developing and implementing effective business continuity and pandemic response plans, identifying and providing appropriate PPE to prevent the spread of COVID-19.

Order Pandemic Bundle  Download Selected TOCs and Sample Pages

- OSHA mandates for Pandemic

Video Conferencing US Govermement Mandates - FEDRAMP

FedRAMP Program Management Office (PMO) mission is to promote the adoption of secure cloud services across the Federal Agencies

IT Infrastrutrue Policies - FEDRAMP compliantIn doing business with the US Federal goverment suppliers of cloud based servvice need to comply with FEDRAMP. The FedRAMP Program Management Office (PMO) mission is to promote the adoption of secure cloud services across the Federal Government by providing a standardized approach to security and risk assessment.

In support of this the  US National Security Agency (NSA) published a questions to ask before using one of today's popular video conferencing, text chatting, and collaboration tools.  The 8 point list includes:

  1. Does the service implement end-to-end (E2E) encryption?
  2. Does the E2E encryption use strong, well-known, testable encryption standards?
  3. Is multi-factor authentication (MFA) available?
  4. Can users see and control who connects to collaboration sessions?
  5. Does the tool's vendor share data with third parties or affiliates?
  6. Do users have the ability to securely delete data from the service and its repositories as needed (both on client and server side)?
  7. Is the tool's source code public (e.g. open source)?
  8. Is the service FedRAMP approved for official US government use?

Order IT Infrastructure Policies Download Selected Pages

- Video Conferencing US Govermement Mandates - FEDRAMP

Unseasoned remote workers put companies at risk

IT Mobility Policy Bundle can help  companies stay safe as more employees work from home

Remote Workers PoliciesAllowing remote employees to connect to and access critical infrastructure without having proper authorization, authentication and accountability in place significantly increases the risk of cybercriminals misusing that access. The current cybersecurity skills shortage coupled with small cybersecurity budgets and the security challenges brought forward by remote employees can spell disaster for SMBs.

It is one thing to say that workers will work remotely and access sensitive and confidential information via the internet.  It is quite another to be able to assure executive management that critically sensitive information is protected and compliance mandates are met.

Read On Order Mobility Policy Bundle Download Sample

- Unseasoned remote workers put companies at risk

Open Wi-Fi networks are a security risk

security risksSecurity Policy and Procedure Manual
Compliance Management Made Easy
ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Open wireless networks are a serious risk to users. Attackers can be sitting on the same networks use various techniques and hacker tools to sniff web traffic and hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.

Read on Order Security Manual Template Download sample

- Open Wi-Fi networks are a security risk

Security Management Team Job Descriptions

Information Security Management Team Job Descriptions

#computersecurityWho are the players and what roles do they exert?  We have reviewed management structure of over 100 world class security management teams and have identified the key players in those organization. Follow #computersecurity

Job descriptions included in the Security Management Team bundle are:

  • Chief Compliance Officer (CCO);
  • Chief Digital Officer;
  • Chief Mobility Officer;
  • Chief Security Officer (CSO);
  • Data Protection Officer (DPO);
  • Data Security Administrator;
  • Database Administrator;
  • Director e-Commerce;
  • Identity Management Protection Analyst
  • Information Security Analyst
  • Manager Data Security;
  • Manager Facilities and Equipment;
  • Manager Network & Computing
  • Manager Network Services
  • Manager Security and Workstations
  • Manager Training and Documentation
  • Manager Voice and Data Communication
  • Manager Wireless Systems
  • Network Security Analyst
  • System Administrator - Linux
  • System Administrator - Unix
  • System Administrator - Windows
  • VP Strategy and Architecture
  • Wi-Fi Administrator

Order Security Management Team Job Descriptions


- Security Management Team Job Descriptions

Chief Digital OfficerJob Description Released

Chief Digital Officer Now in over 50% of all enterprises

The most mature and most data-fluent organizations are now using data to determine new business opportunities and new products to develop as well as how to be more efficient, more productive and more competitive. CDO's purpose is to break down barriers that remain between IT, the data function and the business units.

Number of Chief Data Officers


Read On Order Chief Data Officer Job Description

- Chief Digital OfficerJob Description Released

Security breaches are a CEO concern

Security BreachSecurity breaches are a CEO concern

Breaches have moved from the CIO or CISO to the CEO. All C-Level executives, Boards of Directors and other external bodies are now asking some pointed questions: What plans are in place to protect against an advanced attack or a data breach? What strategies are implemented for dealing with an incident if it does penetrate the security infrastructure?

CEOs and Boards have raised the discussion to calculating risk and building effective solutions to prepare for what many see as inevitable. The traditional perimeter-based protection strategies are no longer enough.

Read on Order Security Manual Template Download sample

- Security breaches are a CEO concern

Cost of Cloud Outage

Cost of Cloud Outage

Cost of Cloud OutageCost of outage is very expensive.  If a business has 50,000 customers and just 10% reach out to complain, that's 5,000 complaints to address. That is a significant loss time and energy that could have been spent acquiring new customers and growing the business.

Those unhappy customers are also likely to share their less-than-positive experiences with friends and family, in person or through social media, and might move on to do business with competitors.

Experts estimate that the cost of losing critical applications is more than $5,000 per minute. Nearly 20% of the surveyed companies indicated losses of between $50,000 to over $5,000,000 after losing critical applications and/or data.

- Cost of Cloud Outage

Beyond salary as a reward

IT pay increases may not be enough to motivate IT Pros

Beyond salary as a rewardMany CIO continue to use pay increaseas their primary reward for op IT Professionals. Unfortunately when times are tough and raises can't be given then there is no reward given at all. Not all employees work solely for the pay, but it is certainly a big part of it. If CIOs fail to recognize and reward the good work of employees they run the risk of them leaving the company or worse yet reducing their productivity and possibly undermining the the overall IT function. CIOs and HR staffs need to

  • Understand individyals cultural differences in accepting rewards and recognitions
  • Understand the cognitive differences of IT Pros and in differences in needs such as security vs. merit
  • Identify alternative types of rewards and recognitions beyond money
  • Understand what works and what doesn't

Order IT Job Description HandiGuide 

Sample Description 

Download TOC

- Beyond salary as a reward