Information Technology News Feed

Security, Disaster Planning, ITSM, Metrics, and Salary Survey

The Information Technology News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • Information Technology News

  • Janco quoted in "The Register"

    Information Technology News Protal

    IT hiring stalls as AI hype, layoffs, tariffs, and economic uncertainty collide 

    AI, layoffs, tariffs, and economic uncertainty collide to stall hiring of IT Pros. The hint of optimism found in February's tech jobs numbers has been dashed. According to multiple analyses of the latest data out from the US Bureau of Labor Statistics for March.

    February's stats from Janco Associates and CompTIA's reports may have sent mixed messages, but March is looking clearer, which isn't to say encouraging. And this is all before the ongoing fallout from President Trump's staggering global tariff war.

    IT Job Market Shrinks

    According to Janco's latest report, terminations have outpaced hiring for IT professionals in each of the past three quarters. At the same time, IT unemployment in the US peaked at 5.7 percent in January and remains elevated at 5.0 percent in March, higher than the national average of 4.1 percent, though that's more about people leaving the industry than landing new jobs.

    Read on IT Hiring Kit  Order IT Hiring Kit

    - Janco quoted in "The Register"


    2025 Edition IT Job Descriptions

    331 IT Job Descriptions - Available for download
    focus on AI and LLM 

    2025 Edition IT Job DescriptionsJanco has just release it 2025 Edition of it IT Job Descriptions.  The firm continues to update its inventory of job descriptions considering new techologies, compliance requirements, career planing, setting pay grades and accomplishing this in was that mets the needs of todays high-tech environment.

    The 331 positions include all of the functions within the IT group. The Job Descriptions have been updated to be compliant with PCI-DSS, GDPR, Sarbanes-Oxley, HIPAA, CobiT, and the ITIL standards. The job descriptions are all structured to focus on "Best Practices" as defined by the IT Productivity Center to meet the requirements of World Class Enterprises. They are ready to use and easily modified to meet your enterprise's unique requirements.

    Read On Order IT Job Descriptions Sample Job Description

    - 2025 Edition IT Job Descriptions


    IT Governance Infrastructure Defined

    IT Governance InfrastructureIT Governance checklist and employee termination electronic forms

    Information Technology is undergoing a rapid evolution as the importance of social media and the digital resources are changing the ways that enterprises operate, employees and enterprise associates interact on a day-to-day basis, and customers and suppliers access enterprise assets remotely.

    The WFH options available for service centers and help desk support are driving change and IT infrastructure needs to adapt.

    The CIO Infrastructure Management Tool Kit versions each contain some of essential tools that your enterprise needs as it creates budgets and sets priorities. The bundles include the IT Infrastructure, Strategy and Charter Template, Janco's latest IT salary data, the Business Impact and Application Questionnaire, Service Level Policy Template with sample metrics, Functional Specification Template, and the Practical Guide for IT Outsourcing.

    Order IT Infrastructure Policies  Download Selected Pages

    - IT Governance Infrastructure Defined


    Top 10 Causes of Security Shortfalls

    Security Manual Template Defines Best Practices

    one out of ten CIOs and CFOs feel they do not have an adequate security strategy in place and are reactive when an incident does occur. The top 10 reasons for security shortfalls are:

    1. Insufficient funding for security
    2. Lack of commitment by senior executive management
    3. Lack of leadership in the security arena by the CIO
    4. Belief that the organization will not be targeted
    5. Lack of internal resources who are "security" experts
    6. Lack of an effective IT security strategy
    7. Lack of an action plan on how to implement a solution before an event
    8. Infrastructure for IT that does not easily lend itself to security implementation including complex and disjointed applications and data
    9. No central focus with the enterprise that focuses on security
    10. Lack of a good termination policy for employees and contractors

    Janco reviewed of over 200 incidents found the frequency of these types of breach losses:

    Types of Losses Due to Security Shotfalls

    Order Security Security Audit Program Download Selected Pages

    - Top 10 Causes of Security Shortfalls


    49 million customers face Dell data Breach

    Security Policies and Procedures - First Step in Data Breach Protection

    Data breaches will happen. Security and data breach protection are  a never-ending process and that no CIO or CSO can claim that their data is completely secure.

    The sheer number of data breaches reported this year alone has led to security experts dubbing this year as the "Year of the Hack. " What's an organization to do when the major technology companies are admitting they have been breached? With sophisticated malware, advanced attacks and sneaky insiders, security seems like an unattainable goal. Security is everyone's responsibility, from the board of directors, c-level executives such as the CEO, CIO, CFO, down to the front-line employees who actually work daily with sensitive information.

    Dell Breach

    The stolen data consists of about 7 million individual/personal purchase data, with 11 line items of consumer segment company data.

    The impacted database contained entries from enterprise clients, partners, educational, institutions, and other entries. A hacker has posted the data is up for sale to a single buyer for an undisclosed amount.

    There were implications in the post that the data might also consist of some sensitive information. "I don't have email/phone for this 49 million but I do have email & phone number of some several thousand other customers. All recent", the hacker posted.

    Order Security Manual Template Download Sample

    - 49 million customers face Dell data Breach