Latest news of interest from the CIO's primary news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

News of interest from CIO's primary news feed - The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • IT Standard News Feed

  • Millennials are taking over the IT Pro job market

    As economy continues to expand tenure of CIOs is impacted and median age of IT professionals goes down

    Based on BLS data, Gen Y and X (Millenials) make up over 47% of the total labor force, Gen Xers are 37%, and Babyboomers have shrunk to only 16% of the total labor force.

    Age Distibution IT Job Market

    Order Salary Survey Download Sample Provide Data


    - Millennials are taking over the IT Pro job market

    Security Manual Designed to Manage Risk

    Security Manual Makes Risk and Compliance Management Easy

    Risk Management made easyAs the threat landscape continues to evolve, organizations must abandon traditional defensive postures for proactive strategies designed to mitigate risks and help them quickly recover.

    The Security Manual documents Janco's research and perspectives from industry leaders on recent threat trends, risk mitigation strategies, and lessons learned from those in the security trenches.

    The IT Security Manual Template provides CIOs, CSOs, and IT Managers all of the essential materials with real live use-able text for a complete security manual. Detailed language addressing more than a dozen security topics.

    Read on Order Security Manual Template Download sample


    - Security Manual Designed to Manage Risk

    VPNs are exposed to security breaches

    NordVPN and TorGuard VPN both were hit with major security breaches - Five actions that CIOs and CTOs can take. . .

    VPNs cna be breachedThe opening for the hackers occurred because their servers did not contain user activity logs.

    The hacker stole a Transport Layer Security key, which temporarily opened the door for a 'man in the middle' attack. The hackers may have also gained root access to the server, enabling them to potentially view and modify VPN traffic.
    At NordVPN the hacks were unnoticed for at least a year.  This raised security doubts about the affected VPN services.  The hack prevented internet service providers from collecting details on your website lookups. The attacker gained access to the server by exploiting an insecure remote management system left by the data center provider while we were unaware that such a system existed.
    How do you defend against system attacks and security breaches?  Janco Associates has defined a set of steps that enterprises of all sizes can follow to help to achieve a safe and secure computing environment. The steps that CIOs and CSOs should follow are:

    1. Access the network and computing environment 
    2. Conduct in-depth system and network security
    3. Establish network access rules that allow on valid access
    4. Mechanize and retain detail logs 
    5. Assume someone is attacking you now

    Read on…

    Order Security Manual Template Download sample

    - VPNs are exposed to security breaches

    How to keep safe on the Internet while being productive

    Keeping data safe and secureSecurity Tools to keep you safe

    Security and compliance are key to maintaining control of sensitive and confidential information. Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

    Read on Order Security Manual Template Download sample

    - How to keep safe on the Internet while being productive

    No recession signs for US IT jobs


    With the US trade war with China and slowing growth, particularly in manufacturing, some economists believe the US is heading towards recession as 2020 approaches. According to the National Association for Business Economics, there's a 60 percent chance the country's decade run of expansion will see a downturn at the end of next year.

    But the IT industry seems unabated by such forecasts. According to research and data collected by Janco Associates, 102,400 IT jobs will be added in 2019, as CIOs and CEOs budget for increased headcounts and approve the use of outside contractors and consultants for 2020.

    At the same time, there is an ample supply of skilled and qualified professionals to fill those roles - while more active recruiting in the sector seeing a compression of pay grades for some key positions.

    No recession for IT

    Order Salary Survey Download Sample

    - No recession signs for US IT jobs

    DevOps Job Description Bundle

    DevOps Job Description Bundle

    DevOps is an area that is of the greatest concern to C-Level management. There is a push by everyone to move into the next generation of processing and operational possibilities.

    DevOps Overview

    New roles are being created as we speak. Janco, with the assistance of HR and IT professionals along with operational managers has created a set of job descriptions to assist in the development of existing staff and recruiting of individuals who are actual Blockchain and DLT practitioners.


    Included with this bundle is the complete IT Job Family Classification with suggested job progressions.

    Read On Order Job Family Classification Download Selected Pages

    - DevOps Job Description Bundle

    DevOps Job Description

    DevOps Job Descriptions now available

    DevOps Job DescriptionThe DevOps job description was created by Janco's executive consultants. The DevOps Software Engineer job description is several pages in length and addresses all of the issues that DevOps professionals need to address.

    The DevOps Software Engineer is responsible for the analysis of business, engineering and scientific problems and is charged with the documentation and development of well-defined methods, procedures, and programs in the delivery of practical systems solutions.

    The DevOps Software Engineer is challenged with assisting in programming, troubleshooting, and management of problems affecting IT software, as well as developing these areas for future expansion and sustaining the highest system reliability and performance possible.

    Order DevOps Job Descriptions

    - DevOps Job Description

    Will Bitcoin or Facebook'entry imact national currencies

    Bitcoin and electronic currency  development have a number of unique challenges

    Electronic Currency ChallengesThe promise of a cheap, anonymous, distributed, fiat cryptocurrency that is detached from any country’s sovereignty is a pipe dream. It will never happen as the impact bitcoin has been minimal since itfirst hit the market in 2009. People will play with it, some businesses will accept it, fortunes will be made and lost, but it isn’t a threat to any nation’s fiat currency on that level.

    Blockchain Developer Read On Order Blockchain Developer Job Description

    - Will Bitcoin or Facebook'entry imact national currencies