Latest news of interest from the CIO's primary news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

News of interest from CIO's primary news feed - The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

  • IT Standard News Feed

  • C-Level jobs on the rise in IT

    Tools that the CIO, CSO, CTO, and CFO can use for Infrastructure, Disaster Recovery, Security, Job Descriptions, ITSM, Salary, Change Control, and Help Desk.

    Median Salary over $209K for C-level Jobs

    A preliminary classification of potential reporting relationships between the c-level job title and the CIO is taken from the IT Job Classification which is published as a separate document.

    c-level IT jobs salary

    As technology takes a leading role in many enterprises there are now twelve c-level titles that are appearing within many World-Class IT functions. Compensation for those positions exceeds $150K. The most frequently seen position titles are:

    • Chief Information Officer (CIO)
    • Chief Information Officer - Small Enterprise or SBU (CIO)
    • Chief Artificial Intelligence (CAIO)
    • Chief Compliance Officer (CCO)
    • Chief Data Officer (CDaO)
    • Chief Digital Officer (CDO)
    • Chief Experience Officer (CXO)
    • Chief Information Security Officer (CISO)
    • Chief Mobility Officer (CMO)
    • Chief Product Officer (CPO)
    • Chief Security Officer (CSO)
    • Chief Technology Officer (CTO)

    Read On Order C-Level Job Descriptions


    AI and ML Job Descriptions

    High demand for IT Pros with AI and ML skills

    Many companies have Artificial Intelligence (AI) and Machine Learning (ML) as a priority.  A limiting factor is finding individuals with the skills and experience to meet those goals.  Universities, over time, have provided graduates that meet the needs of businesses to meet their technological needs resources currently are not geared toward providing their graduates with the tools they need to be viable candidates for these positions.

    Salaries for AI ML Pros

    Read On   Order


    IT Governance, ITSM, and Service Level Agreement Tools

    ITSM, SLA, and IT Governance tools released

    ITSM SOA SLAJanco has just released two offering that address the impact of the new remote workforce operating environment.

    The IT Service Management Policy Template MS Word document that contains policies, standards,  procedures and metrics that comply with the ITIL Standard. Chapters of the template include:

        • Service Requests Policy
        • Service Request Standard
        • Help Desk Policy
        • Help Desk StandardsITIL Service Management
        • Help Desk Procedures
        • Help Desk Service Level Agreement
        • Change Control Standard
        • Change Control Quality Assurance Standard
        • Change Control Management Workbook
        • Documentation Standard
        • Application Version Control Standard
        • Version Control Standard
        • Internet Policy
        • e-mail Policy
        • Electronic Communication Policy
        • Blog & Personal Web Site Policy
        • Travel and Off-Site Meeting
        • Sensitive Information Policy
        • Work From Home and Telecommuting Policy

    Order ITSM Template  Download ITSM TOC

    IT GovernanceThe IT Governance Infrastructure HandiGuide addresses the new business operation IT risks and ensures that the activities associated with information and technology are aligned with the overall business strategy.

    It includes full job descriptions for Chief Technology Officer (CTO); Chief Information Officer (CIO); Chief Compliance Officer (CCO); Chief Experience Officer (CXO); Chief Security Officer (CSO); Chief Data Officer; Chief Digital Officer; Chief Mobility Officer (CMO); and Digital Brand Manager .

    Order Governance Strategy  Download TOC 


    Security Management Best Practices

    Top 10 Security Management Best PracticesSecurity Manual

    1. Centralize Malware Management
    2. Establish Boundary Control
    3. Centralize Provisioning and Authorization Management
    4. Implement Acceptable Use Policy
    5. Build Security into Applications Starting in the Design Phase
    6. Understand and implement all compliance and audit requirements
    7. Implement Monitoring and reporting processes
    8. Manage security deployment and infrastructure processes
    9. Implement network and host defenses
    10. Constantly validate network and system resource integrity

    Order Security Manual Template Download Sample


    Hiring IT Pros With Certificaction is Expensive

    Certifications and Salaries

    Salaries for IT ProsHiring the Right Staff - Key Challenge - While hiring the right people may appear more obvious in small, entrepreneurial companies, it is also true in larger companies. The right people might have the foresight to help an enterprise change and keep up with their industry. With the right people, you can move ahead and you will have a team that supports your success.

    With new hires it is often difficult to validate the experience and competency of candidates being interviewed.  If a candidate has formal certification, that often makes the process easier.

    Several common certifications and benchmarks for starting salaries are listed.

    • Certified Information Systems Security Professional (CISSP) - $100K to $135K
    • Professional Scrum Master (PSM) – $95K to $125K
    • Amazon Web Services (AWS) certifications - $95K to $125K
    • Certified Agile Leadership (CAL) – $90K to $120K
    • Microsoft Azure certifications - $80K to $120K
    • Certified Information Systems Auditor (CISA) - $85K to $115K
    • Cisco certifications - $85K to $100K
    • CompTIA A+ - $65K to $90K

    Read on Salary Survey  Order Salary Survey  Download Summary


    Ransomware Attacks Continue to Affect More Websites

    Ransomware Protection is Key Element of IT Governance Infrastructure Strategy

    Ransomware attacks are impacting more companies than ever.  Last year over two thirds (67%) of all companies world wide suffered attacks.  In 76% of those attacks, there was some data encryption that had to be addressed.  The average ransom paid was $1.82 million USD.

    Even if the ransom is paid, there is not guarantee the data was recovered. If is was recovered, there have been cases where the data was resold by the cyber criminals.

    There is a five step process that CIOs and IT managers should follow.

    1. Assess risks - have a clear understanding of what they are defending against
    2. Implement monitoring tools - take preventive measures and implement recovery paths
    3. Implement essential security technologies - do not over complicate solutions
    4. Create a Business Continuity Plan which covers recovery from a Ransomware attack
    5. Train everyone on the security team - include all organization levels

    Read On  Order IT Governance Strategy 

     


    IT Service Management (ITSM) Service Oriented Architecture (SOA)

    ITSM - SOA - Change Control - Help Desk - Service Requests Blog - Personal Web Site - Sensitive Information

    ITSM - SOA - Service DeskWhen a system defect or workplace disruption hits, you need to act fast to ensure the enterprise can continue to function, your employees and associates are informed and productivity is maintained . And where better to designate the first responder than your service - help desk with a focus on IT Service Management (ITSM).

    KPI metrics have taken off as measurement of the quality of IT's service has become a priority. Currently 67% of all organization have implemented the KPI approach. In a survey of 205 organizations that have these metrics in place we found that user perception is the top metric that most are focused on.

    The IT Service Management Policy Template MS Word document that contains policies, standards,  procedures and metrics that comply with the ITIL Standard. Chapters of the template include:  

    • Service Requests Policy
    • Service Request Standard
    • Help Desk Policy
    • Help Desk StandardsITIL Service Management
    • Help Desk Procedures
    • Help Desk Service Level Agreement
    • Change Control Standard
    • Change Control Quality Assurance Standard
    • Change Control Management Workbook
    • Documentation Standard
    • Application Version Control Standard
    • Version Control Standard
    • Internet Policy
    • e-mail Policy
    • Electronic Communication Policy
    • Blog & Personal Web Site Policy
    • Patch Management and Version Control Policy
    • Travel and Off-Site Meeting
    • Sensitive Information Policy
    • Work From Home and Telecommuting Policy

    Order ITSM Template  Download ITSM TOC


    EvilProxy - phishing as a service attacks

    EvilProxy addressed in Security Manual Template - 2023 Edition

    Security Audit ProgramEvilProxy functions as a reverse proxy, where the service is positioned between the user and the real login page, relaying requests and responses back and forth between them. From the victim’s perspective, it’s like they’re interacting with the real website, but the attacker gets to see everything that gets transmitted between the two parties, including the login credentials and MFA codes. EvilProxy claims to be able to bypass MFA on Apple, Gmail, Facebook, Microsoft, Twitter, GitHub, GoDaddy, and other popular websites.

    Out of hundreds of accounts that were accessed by attackers, 39% were C-level executives, 17% were chief financial officers, and 9% were presidents and CEOs. When it came to lower-level management and personnel, the attackers focused on users with access to financial assets or sensitive information.

    Read on Order Security Manual Template Download sample