IT Management Knowledge Base

CIO and IT Management Planning Tools

It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.

  • News Feed

  • Project Manager - 6 steps to promotion

    Management of IT functions driven by CIOs and enterprises' startegic direction

    Project Managers are challenged to deliver results on time and with budget

    Project Manager - 6 step to promotion in a fast paced environment.

    1. Make better and faster decisions
    2. Optimize the skills and opinions of all team members
    3. Minimize wasted time, energy, and resources
    4. Reduced wheel-spinning, ambiguity, and departmental politics
    5. Focus on critical results and outcomes
    6. Eliminated silos and focus on collective results

    Project Manager challenges

    Read on Proj Mgr  Order Proj Mgr Job Description  Sample Job Description


    Internet and Information Technology Job Description s - 2024 Edition Released

    IT Job Descriptions the complete CIO HR resource

    IT Job DescriptionsIT Job Descriptions updated to reflect latest compliance requirements. The Internet and IT Position Descriptions HandiGuide was completed in 2024 and is over 900 plus pages; which includes sample organization charts, a job progression matrix, and 326 Internet and IT job descriptions.

    The book addresses all mandated requirements, including the ADA, and is in an easy to use format. If you have ordered this in the past look at the version history to see the changes we have made and consider ordering the update service.

    Read on  Order IT Job Descriptions  


    First Things an IT Pro must in first weeks in a new company

    Job description provdies roadmap for success

    Job Description defines road to successIn today's interconnected and competitive world, understanding the dynamics of organizational politics goes beyond formal authority and technical expertise. It involves leveraging relationships, understanding power structures, and strategically aligning interests to drive outcomes and influence decisions. Learn practical techniques to use power, influence, and politics to engage stakeholders effectively and key factors to effectively manage politics.

    Culture is key in organizations. In order to succeed, an IT Pro need to master organizational politics, understand who needs to be influenced, and developing alliances to help in navigating a complex work and technical environments.  This will be critical in and achieving success in the new organization.

    Order IT Job Description HandiGuide   Download TOC

     


    WFH and Mobility Infrstructure Video Released

    WFH and Mobility Infrstructure Policies 2024 Edition Released

    See Video  

    WFH & Mobility Policy Bundle to Administer Telecommuters - The increasing use and dependency on IT is drastically changing the way companies improve employee productivity and keep in closer contact with its customers. Today most businesses provide laptops to employees. The challenge comes with Smart Phones and tablets while bringing additional benefits. Employees who are accustomed to using these tools in their personal life are requesting (or demanding) to use the same tools at the workplace.

    Order WFH & Mobility Bundle  Download Table of Contents

     


    Mobile device security at risk due to CIO decisions

    WFH - Mobile Device a Security Risk

    WFH and mobile device policy address security riskThe pandemic forced most companies to empty office buildings and move everything (and everyone) to WFH, remote locations and the cloud. Security shortcuts were taken because of the abrupt change to work from home and typically the transitions took place in a few days.

    Also there were increased problems with IoT - especially as IoT devices in home environments accessed global systems via VPNs.  This was the primary cause of spreading malware through the enterprise' information pipeline. A recent Verizon mobile security report reported, almost 50% of the users interviewed admitted that their company had knowingly cut corners on mobile device security.

    Order WFH & Telecommuting Policy  Download Selected Pages


    AI is moving into the mainstream

    UPS implements AI for delivery protection

    UPS has implemented maching learning and AI to generate a delivery risk assessment based on two years of USP delivery data, historic loss patterns and address characteristics. It provides that data to retailers (including Amazon) to help determine the best delivery options.

    AI and Machine Learning Budget on the rise

    The next move will be to add current data into the model and suggest to customers alternative delivery locations such as making it a "pick-up" from a secure location like a UPS store front.

    Read On  Order IT Governance Strategy


    Key Performance Indicators, Productivity, and Metrics

    Key Performance Indicators, Productivity, and Metrics - KPI Metrics Quality Cost Control Products are all delivered electronically

    KPI MetricsMetrics are the key to productivity improvements. When the correct factors are measured - behavior is modified and encouraged resulting in improved productivity and operating performance. When the wrong things are measured there can, and offend are unintended negative consequences. Productivity can degraded as the wrong behaviors are encouraged. For this reason, it is critical for KPI to be driven by operational and strategic objectives.

    Included in the KPI Metrics HandiGuide are proven KPI metrics which dozens of "World Class" enterprises have found create environments that are driven to succeed.

    Our clients have found, many applications and application monitoring tools now depend on on-line desktop monitors with automated interaction with the system administrators to provide real time data analysis. In some cases these desktop KPI and metrics tools even operate on devices as small as a Smartphone.

    Read On KPI Metrics  Download Selected KPI Metrics


    Work From Home alters home requirements

    Remote Work - WFH & Telecommuting environment

    WFH environmentRemote work is reshaping the office products industry. Statista says sales of home office furnishings have increased dramatically since the pandemic began, with office chair sales up more than 75%. A recent survey by the National Association of Home Builders found that 63% of buyers include a home office in their list of requirements. USA Today reported that sellers of backyard sheds saw up to a 400% increase in inquiries last summer, as outbuildings became attractive workspaces.

    Order WFH & Telecommuting Policy  Download TOC

     

     


    How to stay secure when you are traveling

    Protect your data from lost and theft - Best Practices for International Travel

    Security when you are on the roadMan-in-the-middle attacks easy to pull off. At public Wi-Fi locations, the airwaves are open and any attacker with a simple antenna can mount an attack.

    To improve overall online security:

    1. Browse secured sites only.
    2. Use a VPN. This will protect traffic where it is most vulnerable, the last mile between a user and a server.
    3. Know what your vulnerabilities are and use tools needed to combat them.
    4. Keep your devices up-to-date with latest software.
    5. Be cautious about opening or replying to emails from unknown senders.

    Order Travel and Off-Site Meeting Policy  Download Selected Pages


    Top 10 Mobile Security Best Practices

    Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs around the world

    Top 10 Mobile Device Security Best practices

    1. With the move towards more mobile and office site computing users are challenged to keep their BYOD device safe and secure
    2. Purchase Android devices only from suppliers who release Android patches quickly.
    3. Implement the locking feature on all mobile devices
    4. Utilize applications on the device from the vendor (Apple or Google) application store
    5. When possible utilize two-factor authentication or bio metrics
    6. Use device encryption
    7. Connect to Wi-Fi via a Virtual Private Network (VPN)
    8. Utilize a Password management system
    9. Utilize anti-virus software
    10. Turn off un-used features like connections that are not used. If you don't use an application, uninstall it.

      Read On... Order WFH & Mobility Bundle Download Selected Pages