Microsoft, Windows, and Internet News - XML News Feed
Microsoft, Windows, and Internet News - XML News Feed - The Internet and Mobility News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.
If you wish to subscribe to this news feed the options that you have are:
Safety Liability for WFH employees
A management site for IT
Safety Program defined for WFH
Janco's Safety Program HandiGuide delivers a comprehensive solution for safety compliance, combining its knowledge of the broad spectrum of risks, mandated compliance requirements and the drive to continuously improvement the safety culture across the entire workplace.
Read On Download Selected Pages- Safety Liability for WFH employees
ISO 28000 Supply Chain Security
ISO 28000:2007 is necessary for support of an organization implementing and managing a Supply Chain Security Management System (SCSMS)
With companies that have a high reliance on just-in-time delivery, aging infrastructure and increased natural and human-made threats. As a result Supply Chain Security has become a very important item for them, especially when viewed in relation with Business Continuity Management, Risk Management and Security Management.
Order Supply Chain Audit Program Download sample- ISO 28000 Supply Chain Security
IRS Gearing up to Audit and Monitor 1099s and W9 for Independent Contractors
Independent Contractors in the crosshairs of the IRS
The IRS soon will add 85,000 agents. They will be looking for work. One of areas of that work will be in identifying unreported income of independent contractors. In discussions with several internal IRS managers, we verified they are investigating how to identify and address IT Pros who were WFH employees that switched to an independent contractor status. The crust of the initial audit attractivities would be driven by matching W2s, W9s, and 1099s of that universe.
Independent contractors do not receive W-2s from clients or companies they work for independently because they are not considered employees. Instead, an independent contractor receives 1099 (MISC most commonly) for every job over $600 that they complete during the tax year. The IRS considers any 1099 payment as taxable income, individuals are required to report 1099 payment on your tax return, meaning they need to report 1099 payments even if they do not receive a 1099 from a company. The government requires that organizations send their independent contractor's 1099-MISC forms by January 31st, indicating the income paid to each contractor over the prior year.
IT Pros Historical Job Market Size
The key difference between W9 and 1099 is that the W9 is a form filed by independent contractors who provide services to companies, upon the request from the respective company. The 1099 is a form used to provide information to the Internal Revenue Service (IRS) regarding specific types of income from non-employment related sources.
The W9 is an IRS form that is maintained by the individual who files the information return for verification purposes. W9 also serves as an important identification of the Social Security Number (TIN Taxpayer Identification Number) of the taxpayer. Companies who obtain services from third parties must request the W9 from a U.S. citizen or a foreign national. The information in this form becomes useful when the company is reporting to the Internal Revenue Service to indicate the amount of funds paid to independent contractors.
The 1099 is a form used to provide information to the (IRS) regarding specific types of income from non-employment related sources. In general, 4 copies of 1099 are made: for the payer (company), payee (independent contractor), IRS and the State Tax Department. IRS also specifies regulations regarding filing tax return based on the number of 1099 forms. If the number of forms is less than 250, paper copies must be filed. When the number of forms exceeds 250, they must be filed electronically with the IRS.
The first companies that will be impacted by this new attention will be large employers. Once the full complement of 85,000 new IRS agents are on board, they will move to have all 1099s filed electronically. The scope of activities will be significantly increased.IRS Gearing up to Audit and Monitor 1099s and W9 for Independent Contractors
Chief Data Officer career path defined
Chief Data Officer more than a data expert, but also a seasoned enterprise manager
The role is transformational, the CDO is responsible for the adoption of data technologies across the entire business. As with most senior executive titles, the responsibilities are set by the organization's board of directors or other authority, depending on the organization's legal structure. The CDO is responsible for user data experiences across the entire enterprise and its operations.
Read on... Order Chief Data Officer Job Description- Chief Data Officer career path defined
Security Management Team Job Descriptions
Information Security Management Team Job Descriptions
Who are the players and what roles do they exert? We have reviewed management structure of over 100 world class security management teams and have identified the key players in those organization. Follow #computersecurity
Job descriptions included in the Security Management Team bundle are:
- Chief Compliance Officer (CCO);
- Chief Digital Officer;
- Chief Mobility Officer;
- Chief Security Officer (CSO);
- Data Protection Officer (DPO);
- Data Security Administrator;
- Database Administrator;
- Director e-Commerce;
- Identity Management Protection Analyst
- Information Security Analyst
- Manager Data Security;
- Manager Facilities and Equipment;
- Manager Network & Computing
- Manager Network Services
- Manager Security and Workstations
- Manager Training and Documentation
- Manager Voice and Data Communication
- Manager Wireless Systems
- Network Security Analyst
- System Administrator - Linux
- System Administrator - Unix
- System Administrator - Windows
- VP Strategy and Architecture
- Wi-Fi Administrator
Order Security Management Team Job Descriptions
- Security Management Team Job Descriptions
Security breaches are a CEO concern
Security breaches are a CEO concern
Breaches have moved from the CIO or CISO to the CEO. All C-Level executives, Boards of Directors and other external bodies are now asking some pointed questions: What plans are in place to protect against an advanced attack or a data breach? What strategies are implemented for dealing with an incident if it does penetrate the security infrastructure?
CEOs and Boards have raised the discussion to calculating risk and building effective solutions to prepare for what many see as inevitable. The traditional perimeter-based protection strategies are no longer enough.
Read on Order Security Manual Template Download sample- Security breaches are a CEO concern
IT Governance and service desk effectiveness
The right tool - IT Infrastructure Architecture for CIOs who want to create a world class IT function
The business operations environment has changed and IT Governance model needs to adapt to the remote work force.
An effective, efficient service desk is a critical component of any successful organization. By choosing a flexible, integrated solution that delivers secure, comprehensive incident management and request fulfillment, you can improve user productivity and satisfaction while reducing costs, ensuring compliance with SLAs, maximizing value and positioning IT as a strategic business partner within the larger organization.
Read On Order IT Governance Infrastructure Strategy- IT Governance and service desk effectiveness
WFH & Telecommuting environment prefered by many
WFH & Telecommuting employees do not want to go back to the office
A survey of 3,500 US workers who have worked from home (WGH) found that 68% would choose remote working over working from an office. This is a common refrain by white-collar workers who have enjoyed the freedom and flexibility of WFH during the pandemic.
Many employees are hesitant to return to the office. 61% of those surveyed said they would be willing to take a pay cut in exchange for being able to WFH permanently. Some even suggested they'd sacrifice up to 50% of their current wage to do so.
Order WFH & Telecommuting Policy Download Selected Pages- WFH & Telecommuting environment prefered by many
Employment picture continues to improve
State Unemployment continues to improve
The National unemployment data provides a measure of the health of the over-all labor market. A more granular metric is one that considers local condition - i.e. state and local unemployment.
Employment picture continues to improve
CIO and CSO Post Pandemic Security Concerns
CIO and CSO Security Concerns With Increase with WFH and in the number of Cyberattacks
The top security management issues and metrics that we have found which address the security concern are:
- The dollar amount and percentage of the operational budget allocated to incident detection. Fully 30% of all organization do not have any budget at all allocated to this.
- Quality and availability of cyber-intelligence to use to monitor intrusions and minimize the number of false positives. We have found that on average organizations spend over $1,000,000 per year addressing false positives.
- Work From Home security risks and exposure of sensitive data with proper control and monitoring
- Availability and quality of a dedicated response team that can immediately address the incident and take remedial steps to stopping the further damage.
- Availability and quality of additional staffing resources, both internal and external, to be able to "surge" to an incident as it is occurring. All of the budget in the world will not help if the CIO or CSO cannot get the right resources are not identified before the event occurs.
- Ability to have visibility to incidents as they are occurring. The worst case scenario is one in which an incident occurs and is not discovered for some time magnifying the extent of the damage.
- Lack of ability and resources to segregate suspicious traffic from normal activity. When this happens a company only know that an incident has occurred after it is made public by someone other than the IT or security team.
Read on Order Security Manual Template- CIO and CSO Post Pandemic Security Concerns