Latest news of interest from the CIO's primary news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

News of interest from CIO's primary news feed - The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • IT Standard News Feed

  • Security Manual Designed to Manage Risk

    Security Manual Makes Risk and Compliance Management Easy

    Risk Management made easyAs the threat landscape continues to evolve, organizations must abandon traditional defensive postures for proactive strategies designed to mitigate risks and help them quickly recover.

    The Security Manual documents Janco's research and perspectives from industry leaders on recent threat trends, risk mitigation strategies, and lessons learned from those in the security trenches.

    Read on...

    Order Security Policies and ProceduresDownload TOC security policies

    - Security Manual Designed to Manage Risk


    Universities Work Together On Payment System

    Universities Work Together On Payment System - Shades of Internet Development 

    Universities Work Together On Payment System just like they did when the Internet was developed by them in the late 1960's with ARPAnet.

    Several universities, including MIT and Stanford, are working together to develop a digital currency network that solves blockchain's scalability and performance problems before public confidence in the technology erodes.

    Funded by a Swiss-based non-profit organization, the cryptocurrency application, called Unit-e, and its blockchain-based payment system is expected to launch in the second half of this year; if successful, it would surpass even mainstream financial networks like Visa's VisaNet in transactional capability.

    Security Manual TemplateOrder Security ManualDownload Selected Security Manual  Pages

    - Universities Work Together On Payment System


    2019 Version of 300 IT Job Descriptions Released

    Internet and Information Technology Positions Description HandiGuide with 300 Full Job Descriptions Released

    The Internet and IT Position Descriptions HandiGuide was just updated and is over 800 pages.  The Internet and IT Position Descriptions HandiGuide is a complete HR Toolkit.  It includes sample organization charts, a job progression matrix, and 300 Internet and IT job descriptions.

    The 2019 version of this tool is availabe for immediate purchase and download.  It is delivered electronically. This along with the 2019 IT Salary Survey are key elements of the IT Hiring Kit.

    IT Hiring KitOrder IT Hiring Kit

    IT Job DescriptionIT Salary SurveyInterview & Hiring Guide

    - 2019 Version of 300 IT Job Descriptions Released


    CIOs will be critical to the new enterprise model

    Chief Information Officer - An Ever Expanding Set of Responsibilities

    CIO Job DescriptionCIOs are waging a three-front battle: addressing aging systems and long-standing data issues; driving a business strategy that harnesses the value of a wide range of new, powerful technologies; and maximizing the value and security of today’s environment. In 2019, more CEOs will demand that one executive - the CIO - will lead and orchestrate this vital effort; CIOs will spend the time to build their leadership teams, empowering trusted operators to handle much of the day-today.

    In 2019 leading CIOs will build a technology infrastructure that translates tech-led innovation into customer value.

    - CIOs will be critical to the new enterprise model


    Employees are an orgaizations last layer of security

    Fortifing your organization’s last layer of security – your employees

    Security Management Tool KitPeople impact security outcomes, much more often than any technology, policy or process. Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. When it comes to combating these growing risks, most organizations continue to place more trust in technology-based solutions than on training their employees to be more aware of the threat landscape and able to recognize the red flags in cyber breach attempts.

    To fortify your organization's last layer of security - your employees - get the Security Manual Template to implement complete solutions.

    Order Security Policies and ProceduresDownload TOC security policies

     

    - Employees are an orgaizations last layer of security


    Obamacre website hacked - 75,000 users exposed

    Hearlthcare.gov site hacked - Cybersecurity at risk

    Obomacare websit hackedThe system used by healthcare insurance agents and brokers  to enroll users into Obamacare plans through the official HealthCare.gov portal was just hacked. 75,000 accounts were breached.

    The Federally Facilitated Exchanges (FFE) at Healthcare.gov is managed by the Centers for Medicare & Medicaid Services (CMS) was just hacked.

    The CMS said that it detected "anomalous system activity" in the FFE on October 13, 2018 and they started an immediate investigation.

    Security Manual TemplateOrder Security Manual

    - Obamacre website hacked - 75,000 users exposed


    Blockchain Developers in Demand

    Hot New Job Titles

    ERP and Blockchain jobs are in great demand. Individuals can look forward to salaries continuing to increase. The median salary for a Blockchain Developer is $127K with experienced individuals commanding upwards of $172K when they move to new organizations.

    Blockchain Developers in Demand

    IT Salary SurveyOrder Salary SurveyDownload summary salary survey

    - Blockchain Developers in Demand


    Tech Companies to Fight California Privacy Act

    The Security Manual includes a new section identifying mandates required by the 2018 California Consumer Privacy Act for consumer rights and business responsibilities

    CCPA ComplianceThe California Consumer Privacy Act (CCPA) came into being, in part, to keep it off the ballot. There were petitions to get a privacy act like GDPR onto the November ballot, but instead, lawmakers rushed through legislation in what has to be record time and the governor signed it into law. Tech companies are complaining that they didn't have enough input into the legislation. Fair point. In many ways, making the changes needed to meet the requirements could be costly.

    Read on Compliance Management Tools...

    - Tech Companies to Fight California Privacy Act