Microsoft, Windows, and Internet News - XML News Feed

Microsoft, Windows, and Internet News - XML News Feed - The Internet and Mobility News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:


Chief Data Officer career path defined

A management site for IT

Chief Data Officer more than a data expert, but also a seasoned enterprise manager

 The role is transformational, the CDO is responsible for the adoption of data technologies across the entire business. As with most senior executive titles, the responsibilities are set by the organization's board of directors or other authority, depending on the organization's legal structure. The CDO is responsible for user data experiences across the entire enterprise and its operations.

Chief Data Officer demand

Read on... Order Chief Data Officer Job Description

- Chief Data Officer career path defined


Security Management Team Job Descriptions

Information Security Management Team Job Descriptions

#computersecurityWho are the players and what roles do they exert?  We have reviewed management structure of over 100 world class security management teams and have identified the key players in those organization. Follow #computersecurity

Job descriptions included in the Security Management Team bundle are:

  • Chief Compliance Officer (CCO);
  • Chief Digital Officer;
  • Chief Mobility Officer;
  • Chief Security Officer (CSO);
  • Data Protection Officer (DPO);
  • Data Security Administrator;
  • Database Administrator;
  • Director e-Commerce;
  • Identity Management Protection Analyst
  • Information Security Analyst
  • Manager Data Security;
  • Manager Facilities and Equipment;
  • Manager Network & Computing
  • Manager Network Services
  • Manager Security and Workstations
  • Manager Training and Documentation
  • Manager Voice and Data Communication
  • Manager Wireless Systems
  • Network Security Analyst
  • System Administrator - Linux
  • System Administrator - Unix
  • System Administrator - Windows
  • VP Strategy and Architecture
  • Wi-Fi Administrator

Order Security Management Team Job Descriptions

 

- Security Management Team Job Descriptions


Security breaches are a CEO concern

Security BreachSecurity breaches are a CEO concern

Breaches have moved from the CIO or CISO to the CEO. All C-Level executives, Boards of Directors and other external bodies are now asking some pointed questions: What plans are in place to protect against an advanced attack or a data breach? What strategies are implemented for dealing with an incident if it does penetrate the security infrastructure?

CEOs and Boards have raised the discussion to calculating risk and building effective solutions to prepare for what many see as inevitable. The traditional perimeter-based protection strategies are no longer enough.

Read on Order Security Manual Template Download sample

- Security breaches are a CEO concern


IT Governance and service desk effectiveness

IT GovernanceThe right tool - IT Infrastructure Architecture for CIOs who want to create a world class IT function

The business operations environment has changed and IT Governance model needs to adapt to the remote work force.

An effective, efficient service desk is a critical component of any successful organization. By choosing a flexible, integrated solution that delivers secure, comprehensive incident management and request fulfillment, you can improve user productivity and satisfaction while reducing costs, ensuring compliance with SLAs, maximizing value and positioning IT as a strategic business partner within the larger organization.

Read On  Order IT Governance Infrastructure Strategy

- IT Governance and service desk effectiveness


WFH & Telecommuting environment prefered by many

WFH PolicyWFH & Telecommuting employees do not want to go back to the office

A survey of 3,500 US workers who have worked from home (WGH) found that 68% would choose remote working over working from an office.  This is a common refrain by white-collar workers who have enjoyed the freedom and flexibility of WFH during the pandemic.

Many employees are hesitant to return to the office. 61% of those surveyed said they would be willing to take a pay cut in exchange for being able to WFH permanently. Some even suggested they'd sacrifice up to 50% of their current wage to do so.

Order WFH & Telecommuting Policy  Download Selected Pages

- WFH & Telecommuting environment prefered by many


Employment picture continues to improve

State Unemployment continues to improve

The National unemployment data provides a measure of the health of the over-all labor market.   A more granular metric is one that considers local condition - i.e. state and local unemployment.  

High unemployment states - June 2021

Full Employment States - June 2021

- Employment picture continues to improve


CIO and CSO Post Pandemic Security Concerns

CIO and CSO Security Concerns With Increase with WFH and in the number of Cyberattacks

The top security management issues and metrics that we have found which address the security concern are:

  • The dollar amount and percentage of the operational budget allocated to incident detection. Fully 30% of all organization do not have any budget at all allocated to this.
  • Quality and availability of cyber-intelligence to use to monitor intrusions and minimize the number of false positives. We have found that on average organizations spend over $1,000,000 per year addressing false positives.
  • Work From Home security risks and exposure of sensitive data with proper control and monitoring
  • Availability and quality of a dedicated response team that can immediately address the incident and take remedial steps to stopping the further damage.
  • Availability and quality of additional staffing resources, both internal and external, to be able to "surge" to an incident as it is occurring. All of the budget in the world will not help if the CIO or CSO cannot get the right resources are not identified before the event occurs.
  • Ability to have visibility to incidents as they are occurring. The worst case scenario is one in which an incident occurs and is not discovered for some time magnifying the extent of the damage.
  • Lack of ability and resources to segregate suspicious traffic from normal activity. When this happens a company only know that an incident has occurred after it is made public by someone other than the IT or security team.

CIO and CSO Security Post Pandemic Security Issues

Read on Order Security Manual Template

- CIO and CSO Post Pandemic Security Concerns


Data Security - Top 10 Best Practices

Security Best Practices

Security Best PracticesThere are best practices that CIOs need to implement in order to protect a businesses' data:

  1. Understand who is accessing data via frequent auditing and real-time monitoring of data access
  2. Keep current records on data access permissions
  3. Classify data by sensitivity 
  4. Minimize and remove global access rights
  5. Identify data owners and users 
  6. Include data access reviews when individuals are transferred, promoted, or terminated 
  7. Align groups to data ownership and management
  8. Audit permissions and group changes 
  9. Lock down, delete or archive stale, unused data 
  10. Clean up security groupings

Order Security Manual Template Download sample

- Data Security - Top 10 Best Practices


Social Neworking Policy is missing in many companies

Electronic forms make implementing a Social Networking Policy easier

In Januay 2018 Facebook had over 2.2 billion active users, 90% of which are outside of the United States.  The scope of the user base with the large numbers outside of the US create significant exposure to enterprises and companies of all sizes and types.

A social netwoking policy along with rules for how employees an associates of firms interact with the Internet is now a core requirement.

There are several such templates for a Social Networking Policies.  One of the best, as reported by the American Productivity Society is the one published by Janco Associates.

Read on...

Order social networking Policy  Download Selected Pages 

- Social Neworking Policy is missing in many companies


Omni Commerce new e-commerce paradigm

Omni CommerceEnterprises are now moving towards the new e-commerce paradigm

SmartPhones and tablets are changing the way the way people and business browse the Internet, shop, provide service and communicate with suppliers, customers and associates.

CIOs need to have the right foundation. Leadership begins with having a strategy in place that works and then having the right people in place to create and implement the,.

Order Omni Commerce Planning Toolkit

Download Selected Pages Omni Commerce Strategy

- Omni Commerce new e-commerce paradigm