Technology Management Meeting Place        News HTML

Salary Survey 2010

Subscribe

IT Job DescriptionsDisaster PlanSecurity Policy TemplateSarbanes Oxley Complaince

The Technology Management Meeting Place has the right Technology and Management Tools.

Business News

Internet News

HR Management Tools

Operations Management Tools

Additional Job Description References

 

 

Site Map

12:19:42 EDT -0400


Many data breaches take over 1 year to fix after the first intrusion

Security Audit Program

ISO 28000, 27001, & ISO 27002 / HIPAA / SOX PCI-DSS Compliant

Severs and coprorate data are breached on a daily basis.  While this is happening most companies are  unaware that their propritary information is being stolen. Janco has found that over 90% of cybercrime victims find out about the compromise only after a 3rd party notifies them.  Then after a cybercriminal gains access to an enterprise's network it takes an average 416 days to detect the intrusion.

OrderTable of Contents

- more information
11:52:58 EDT -0400
Policies are critical for mobile computing

Telecommuting, BYOD, and other mobile technologies have revolutionized the way millions of people do their jobs. Employees now have the flexibility to work anytime from anywhere. For enterprises, the increase in employee productivity does often translate into faster response time, more revenue and higher margins.

Mobility Policy Bundle (more info...) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable

  • BYOD Policy Template (more info...) Includes electronic BYOD Access and Use Agreement Form
  • Mobile Device Access and Use Policy (more info...)
  • Record Management, Retention, and Destruction Policy (more info...)
  • Social Networking Policy (more info...) Includes electronic form
  • Telecommuting Policy (more info...) Includes 3 electronic forms to help to effectively manage work at home staff
  • Travel and Off-Site Meeting Policy (more info...)
Order
- more information
15:49:18 EDT -0400
Top 10 CIO Staff Issues

The top 10 concerns of CIOs in staffing are:

  1. Retaining existing staff
  2. Improving employee morale
  3. Adding new technical skills to staff
  4. Providing competitive compensation
  5. Maintaining and improving existing productivity and service levels
  6. Providing competitive benefits
  7. Reducing employee burn-out
  8. Managing organization culture
  9. Providing viable career path
  10. Utilizing social networking in the recruiting process
Order CIO Job Description
- more information
14:13:43 EDT -0400
Top 5 Firewall Management Best Practices

Top 5 best practices to address some of the most common firewall challenges that lead to misconfigurations or other problems that cause firewalls to fail in their crucial missions.

  • Keep the enterprise security policy manager or compliance manager in the loop on firewall changes.
  • Clean up unused rules.
  • Eliminate conflicting rules.
  • Follow a consistent workflow for requesting and implementing firewall changes.
  • Get application developers or the dev ops team on the same page with the firewall administrator.

Order Security ManualTable of Contents

- more information
11:45:54 EDT -0400
2014 Mid-Year IT Salary Survey Now Available

T Salaries up less than 1%

IT Pros see little improvement in pay according to Janco's Mid-Year 2014 IT Salary Survey

IT Job DescriptionsThe Mid-Year 2014 Salary Survey, just released by Janco Associates and eJobDescription.com, is not good news for IT Professionals.  The survey shows that hiring and salaries has not significantly improved for IT professionals in most North American metropolitan areas.

Order Salary Survey    Free Salary Survey
- more information

Terms and Conditions | Privacy Policy
Copyright 1999 - Copyright - Janco Associates, Inc. - ALL RIGHTS RESERVED