Information Technology News Feed

Security, Disaster Planning, ITSM, Metrics, and Salary Survey

The Information Technology News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • Information Technology News

  • 2024 Edition of Outsourcing and Cloud-Based File Sharing Policy Released

    Information Technology News Protal

    Includes seven full job descriptions and four electronic forms

    Policy - Outsouring & Cloud-Based File SharingOutsourcing and Cloud-Based File Sharing do not remove the enterprise’s requirement to manage the process or the data.  Even a comprehensive outsourcing and cloud-based file-sharing arrangement requires Service Level Agreement (SLA) monitoring and redefinition, as well as strategic management and other retained functions. The policy address these issues as well as proving a basse to prevent costly cyber attacks.

    Cyber attacks rose by over 30% in 2023.  Global Threat report by Crowdstrike reported the types of attacks were

    • Cloud-conscious attacks up by 110%
    • Cloud environment inclusions up by 75%
    • Number of victims named on eCrime leak /sites 76% on year-to-year analysis
    • The number of attacks that had ransomware focus  up by 84%

    They also reported that the problem was not malware rather there was an increase in the number of attackers.  Some were state-sponsored and others originated in countries that were not averse to providing cover for the attackers as 61% of attackers targeted the US and 11% targeted Europe.

    Countries that were sources of those attacks were Russia, China, North Korea, Syria, Iran, Pakistan, Georgia, Columbia, and Turkey.

    Order Outsourcing and Cloud Policy  Download Selected Pages

     

    - 2024 Edition of Outsourcing and Cloud-Based File Sharing Policy Released


    Not a good idea to depend on Tech Giants Products

    Tech Giants cannot be depended on rather IT Infrastructure Policies and Procedures are the solution

    Companies need to depend on thier own infrastructureTech Giants will create new products that are linked to thier infratructure and if they do not create enough value, they will just abandon them.  For example, Google is killing off Inbox, its experimental email app that's lived alongside Gmail for the past four years. The service is set to shut down for good this coming March.

    When Inbox was announced in October of 2014, Google described it as something that was years in the making and a completely different type of inbox, designed to focus on what really matters.They also said it was designed for the problems we're going to see in the next 10 years. The company is sending the app away to its increasingly crowded virtual graveyard.

    Companies and individuals need to depend on thier own infrastructure.

    Read On Infrastructure Policies

    - Not a good idea to depend on Tech Giants Products


    AI Impacts Disaster Recovery / Business Continuity - Security

    Experts Agree AI Impacts DRP/BCP and Security Plans

    AI and DRP/BCP - SecurityAI now had been added to the processes driving comprehensive disaster recovery planning and security protection.  AI is now being used in the implementation of comprehensive storage and data protection. Protecting vital business data is a necessity. This is where investment with AI in disaster recovery is critical and where different on-premises and off-premises solutions can be applied.

    Too many companies have found out the hard way that their most valuable assets are exposed and vulnerable to hacker attracts, theft and destruction when they have to activate the DRP/BCP. This is where AI can be utilized to minimized that risk.

    Read on DRP BCP Security Order DRP BCP Security Bundle 

    - AI Impacts Disaster Recovery / Business Continuity - Security


    MSIX Cyber Attacks on Windows PC

    More companies have faced ransomware attacks as cyberattacks are on the rise

    A new cyberattack campaign has been found to be using MSIX -- a Windows application packaging format -- to infect Windows PCs and evade detection by dropping a stealthy malware loader into its victim's PC.  Users are directed to download malicious MSIX packages through compromised websites, search engine optimization (SEO) techniques, or malvertising. The masquerading themes include installers for Chrome, Brave, Edge, Grammarly, and WebEx.

    Salaries for IT security specialist are increasing up

    Median salaries for IT security pros now at $118,718 and rising.

    Salaries for IT Security Professionals

    Read on Order Security Manual Template 

    - MSIX Cyber Attacks on Windows PC


    Cryptocurrency - cybercurrency makes cybercrime easier

    IT focus on the digital market place and cryptocurrency

    Manager Blockchain DLT Architecture Job DescriptionSecurity threats have been added to with the move towards cryptocurrency (cybercurrency).  Cryptocurrrency makes monetizing cybercrime for cybercriminals. Attsacks are becoming more sophisticated and expensive.  The bottom line impact can be material as a single breach can impact all of a firms operations.

    Manager Blockchain - DLT Architecture Available for Immediate Download

    The Blockchain and distributed ledger technology processing and database systems are the heart of the enterprise's systems. It is extremely important to the enterprise that these systems offer the highest reliability and performance possible. The Manager Blockchain Architecture is challenged to oversee the Blockchain processing activities and ensure that the systems are reliable and performing at peak efficiency.

    The Manager Blockchain Architecture is responsible for the management of the Blockchain architecture and Distributed Ledger Technology Processing activities directed towards the development and deployment of those applications. That includes cyber-currency management, maintenance of information systems, enterprise operations, and process of architectural models, with primary emphasis on optimizing and integrating the flow of information and physical products throughout the enterprise as well as with external subcontractors, suppliers, and customers.

    Read On  Order Manager Blockchain Architecture Job Description

    - Cryptocurrency - cybercurrency makes cybercrime easier