Latest news of interest from the CIO's primary news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

News of interest from CIO's primary news feed - The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • IT Standard News Feed

  • On screen notification to be controlled

    Focus Assist to control windows device notifications

    Mobile NotificationsMicrosoft is about to release Focus Assist.  With its release, a user can set times when you don't want notifications to bother them, such as during key work hours or when you plug in a second display for a presentation or when you're playing a game. With Focus Assist the user can establish periods, Windows will not send notifications.

    Microsoft's research found that people spend an average of 23 minutes per day regrouping and getting back on task after being distracted by a notification. A total waste of time.

    Order Mobile Device Access Use PolicyDownload Selected Pages

    - On screen notification to be controlled

    How to keep safe on the Internet while being productive

    Keeping data safe and secureSecurity Tools to keep you safe

    Security and compliance are key to maintaining control of sensitive and confidential information. Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

    Read on SecurityOrder Security ManualDownload Selected Security Manual  Pages

    - How to keep safe on the Internet while being productive

    GDPR - six rules of the road for GDPR

    Security Manual now includes a GDPR Compliance Checklist to accelerate compliance with the new EU requirements

    Six rules that you should follow to be GDPR compliantGDPR data protection

    1. Consent to use information must be clearly explained and there must be a positive opt-in.
    2. At the time of data collection, a privacy notice should be presented.
    3. Collected personal information must be relevant and limited to what is necessary.
    4. Do not keep personal information any longer than necessary.
    5. Have a data protection policy and data breach response plan in place that meets the requirements of the GDPR.
    6. Seek expert advice or legal counsel as needed.

    Read on SecurityOrder Security Manual

    - GDPR - six rules of the road for GDPR

    Wearable Device champion named a C-Level executive

     Wearable Device champion named a C-Level executive

    Wearable DeviceTechnology is now playing a critical role in individuals who are promoted into C-Level positions.

    Press releases now include technology roles in capability of executives as they are promoted.  A case in point is Brooks Tingle who was just named as the CEO of John Hancock Insurance.  In his previous role he was the Senior VP of Marketing and Strategy for the insurance company where he championed wearable devices.

    Order Wearable device WYOD policy


    Download Selected Wearable device WYOD policy Pages

    - Wearable Device champion named a C-Level executive

    Median pay for IT Pros $90,116

    2018 Salary Survey put median IT Professionals compensation at $90,116

    Janco 2018 IT Salary Survey shows compensation for IT executives have fared better in large companies than mid-sized companies.  The greatest increases have been at the middle manager levels in mid-sized companies with an increase of 4.45% - most of which can be attributed to performance bonuses and the hiring of significantly more qualified individuals earlier.

    Median IT Pay now over $90K

    Order Salary SurveyDownload Sample salary survey


    - Median pay for IT Pros $90,116

    Security, BIA, Vulnerability recent articles

    Security Manual Template includes BIA and Threat Vunlerability Assessment Tools

    Cyberattack ArticlesHere are some recent articles on security and cyberattacks:

    1. Security cyber war recent articles Cyber war  continues Cyber war and security recent postings: CIOs worry more about cyber threats with mobile computing  Cyber threats are now a much greater...
    2. ISO 31000 Compliance – Risk Management ISO 31000 Compliance – Risk Management Cloud processing and outsourcing add external risks to a business’ operation. The International Standards Organization (ISO) has implemented a...
    3. Risk Assessment Methodology Risk Assessment Methodology Risk Assessment Methodology extracted from Janco’s Security Manual Template — Risk management is a process to identify, assess, manage and control potential events...
    4. Inexpensive drones will be a new security risk Inexpensive drones are here now Drones are now available that cost less than $1,000 and can be used by almost everyone.  These devices raise security...
    5. Top 6 cyber attack threats Top 6 cyber attack  threats The top 6 threats that CSOs need to address as attackers conspire to take down applications and steal data. These...
    - Security, BIA, Vulnerability recent articles

    Minimize cyberattack risks and exposures

    Security Policies - Procedures - Audit Tools

    Minimize cyberattack risks and exposuresMinimize cyberattack risks and exposures - Cyberattacks from malware and ransomware are a fact of life for IT professionals. Having a general understanding about how to handle attacks isn’t enough; you need to know the specifics of how, why, and when these attacks occur so you can deploy the best defense at each stage.

    Janco's Security Manual Template is a comprehensive solution to protection from cyberattacks and security management of all your digital resources.  The template address issues like

    • Meeting compliance requirements of US federal and state mandates, EU security requirements, and ISO standardization
    • Defending users at each step of the malware life cycle
    • Identify and protect your enterprise from the full range of cyberattacks
    • What to do to minimize the damage if an attack is successful
    - Minimize cyberattack risks and exposures

    Solution to help protect sensitive and private content

    Sensitive Information Policy defined by 40 world-class enterprises

    Sensitive Information PolicySecuring customer's personally identifiable information (PII) and sensitive personal information (SPI) is a priority for every organization. To ensure the security of customer information, too many businesses rely on lengthy manual processes or third-party resources that are only loosely integrated.

    To protect sensitive information, many states are now required to implement security programs that include capabilities for incident monitoring and alerting, trend reporting, logging, security information management (SIM), and other prudent security controls and practices.

    Order Sensitive Information PolicyDownload Selected Pages
    - Solution to help protect sensitive and private content