IT Management Knowledge Base

CIO and IT Management Planning Tools

It is essential to have a proper backup strategy in place in case something goes wrong. Below are articles and links to tools that can help you in the Disaster Recovery and Business Continuity Planning and execution process. This knowledge base has been developed by Janco Associate, Inc.

  • News Feed

  • Top 15 In-Demand IT Technical Skils

    Management of IT functions driven by CIOs and enterprises' startegic direction

    Data Management, Data Manipulation and AI Technical Skills are in high demand

    Janco has identified fifteen (15) skills that are the highest in demand. They are all related to data management, manipulation, presentation, and artificial intelligence (AI). The median compensation for these individuals is just under $140K. Plus many of these positions are in the Web3 arena.

    In Demand IT Technical Skills

    Read On Manager Artificial Intelligence Order Manager AI Job Description

    - Top 15 In-Demand IT Technical Skils

    Top 10 Resume Mistakes

    10 Things To Avoid In Your Resume

    1. Job DescriptionsResume that is too long
    2. Resume that does not represent you in the best first impression
    3. Resume that is not structured well
    4. Resume that contains spelling errors
    5. Resume that contains grammatical and tense errors
    6. Resume that does not agree with your "social profile"
    7. Resume that contains a photo
    8. Resume that is not 100% accurate
    9. Resume that is the same for each job and company
    10. Not following up

    Order IT Hiring Kit  Download IT Hiring Kit TOC

    - Top 10 Resume Mistakes

    Top 10 Mobile Security Best Practices

    Policies and procedures on how to deal with increasing mobility are the nemesis of CIOs around the world

    Top 10 Mobile Device Security Best practices

    1. With the move towards more mobile and office site computing users are challenged to keep their BYOD device safe and secure
    2. Purchase Android devices only from suppliers who release Android patches quickly.
    3. Implement the locking feature on all mobile devices
    4. Utilize applications on the device from the vendor (Apple or Google) application store
    5. When possible utilize two-factor authentication or bio metrics
    6. Use device encryption
    7. Connect to Wi-Fi via a Virtual Private Network (VPN)
    8. Utilize a Password management system
    9. Utilize anti-virus software
    10. Turn off un-used features like connections that are not used. If you don't use an application, uninstall it.

      Read On...Order WFH & Mobility Bundle  Download Table of Contents

    - Top 10 Mobile Security Best Practices

    Top 10 CIO Priorities

    Top CIO Management and Planning Priorities 

    The top 10 IT priorities for CIO and C-level executives :

    1. Security and Hacking
    2. Staffing
    3. Identity Protection
    4. Access Management
    5. Mobile Computing
    6. Work From Home
    7. Budget Management
    8. Compliance
    9. Skills for New Technologies
    10. Data Privacy - With the rise of WFH, GDPR and CCPA data privacy is a top ten priority

    Top 10 CIO Priorities

    Download TOC IT Management Tool Kit

      Order IT Management Tool Kit


    - Top 10 CIO Priorities

    How to stay secure when you are traveling

    Protect your data from lost and theft - Best Practices for International Travel

    Security when you are on the roadMan-in-the-middle attacks easy to pull off. At public Wi-Fi locations, the airwaves are open and any attacker with a simple antenna can mount an attack.

    To improve overall online security:

    1. Browse secured sites only.
    2. Use a VPN. This will protect traffic where it is most vulnerable, the last mile between a user and a server.
    3. Know what your vulnerabilities are and use tools needed to combat them.
    4. Keep your devices up-to-date with latest software.
    5. Be cautious about opening or replying to emails from unknown senders.

    Order Travel and Off-Site Meeting Policy  Download Selected Pages

    - How to stay secure when you are traveling

    Work From Home alters home requirements

    WFH & Telecommuting environment

    WFH environmentRemote work is reshaping the office products industry. Statista says sales of home office furnishings have increased dramatically since the pandemic began, with office chair sales up more than 75%. A recent survey by the National Association of Home Builders found that 63% of buyers include a home office in their list of requirements. USA Today reported that sellers of backyard sheds saw up to a 400% increase in inquiries last summer, as outbuildings became attractive workspaces.

    Order WFH & Telecommuting Policy  Download Selected Pages



    - Work From Home alters home requirements

    CIOs role expands as hackers steal more data

    CIOs role expands as hackers steal more data

    CIO Security role expandsAfter several high-profile hacks last few months, CIOs in all industries still find themselves learning about the hackers aggressively hunting customer's personally identifiable information (PII) data, financial records and medical histories.

    Order CIO Job Description

    In the Healthcare and Insurance industry alone over 100 million health records were illegally accessed last year. As a result, the National Association of Insurance Commissioners Cybersecurity Task Force has proposed a new Insurance Data Security Model Law.

    Because insurance is a data-driven industry, regulators must understand what data is being collected and for what purpose the NAIC said. Today, regulators and companies have a need for data beyond what has been traditionally collected. But what regulators need is greater insight, not just more data.

    All information is valuable. Hackers want whatever data they can monetize. CIO already know that breaches can happen to anybody. There is no such thing as 100% security, no matter the education or tech you throw at it. It is just a question of how we handle it, when it happens.

    Currently, anti-malware and encryption stand as two big ways CIOs protect information. Nonetheless, protecting data going forward may be directly tied to CIOs ability to adapt to the changing roles of the position.

    The role of CIO is very business driven now. There are so many avenues for hackers to come in that you can’t just focus on tech. CIOs need to understand the entire business and be able to talk to the CEO and the board as well.

    IT Job Family Classification System

    IT Job Family Classification

    Career path definition and compensation planning made easy

    Read On

    - CIOs role expands as hackers steal more data

    Project Manager - 6 steps to promotion

    Project Managers are challenged to deliver results on time and with budget

    Project Manager - 6 step to promotion in a fast paced environment.

    1. Make better and faster decisions
    2. Optimize the skills and opinions of all team members
    3. Minimize wasted time, energy, and resources
    4. Reduced wheel-spinning, ambiguity, and departmental politics
    5. Focus on critical results and outcomes
    6. Eliminated silos and focus on collective results

    Project Manager challenges

    Read On Project Manager Order Project Manager Job Description 

    Sample Job Description

    - Project Manager - 6 steps to promotion

    Mobile device security at risk due to CIO decisions

    WFH - Mobile Device a Security Risk

    WFH and mobile device policy address security riskCOVID-19 forced most companies to empty office buildings and move everything (and everyone) to WFH, remote locations and the cloud in 2020. Security shortcuts were taken because of the abrupt change to work from home and typically the transitions took place in a few days.

    Also there were increased problems with IoT - especially as IoT devices in home environments accessed global systems via VPNs.  This was the primary cause of spreading malware through the enterprise' information pipeline. A recent Verizon mobile security report reported, almost 50% of the users interviewed admitted that their company had knowingly cut corners on mobile device security.

    Order WFH & Telecommuting Policy  Download Selected Pages

    - Mobile device security at risk due to CIO decisions

    How to verify a candidates information

    IT Hiring Kit - Best PracticesIT Job Market is Recovering - Best Practices

    The IT job market is recovering form the shut downs.  Recruiting now is a priority for most CIOs. At the same time, candidates often say yes when they are offered a position even if they are not planning on taking the job. It is up to the company and its recruiters to create a situation that will assure that when they provide an offer it is accepted and the candidate actually starts.

    Ways to verify a candidates Information

    Here are the top 10 things that recruiters need to do

    1. Make the right first impression
    2. Have complete and accurate job description
    3. Have the candidate review the job description before the interview
    4. Communicate to the candidate what the interview will entail
    5. Be prompt
    6. Allow no interruptions
    7. Prepare for the interview
    8. Have materials to be provided to the candidate available
    9. Be enthusiastic make the job be the next best thing to sliced bread
    10. Provide a set of next steps at the end of the interview

    Order Interview Hiring Guide  Download Interview Guide Selected Pages

    - How to verify a candidates information