Technology Management Meeting Place        News HTML

Salary Survey 2010

Subscribe

IT Job DescriptionsDisaster PlanSecurity Policy TemplateSarbanes Oxley Complaince

The Technology Management Meeting Place has the right Technology and Management Tools.

Business News

Internet News

HR Management Tools

Operations Management Tools

Additional Job Description References

 

 

Site Map

08:42:56 MST -0700


Security risks faced by most organizations

Security ManualSecurity study by Ponemon  finds:

  • Employee-related incidents of fraud are occuring weekly in many organizations.
  • Two Thirds say the risk of insider fraud is very high or high within their organizations.
  • CEO's and other C-level executives may be ignoring security threats
  • Most insider fraud incidents go unpunished, leaving organizations vulnerable to
    future such incidents.
  • The greatest threats to security from insider fraud are mobile devices, outsourced relationships (including cloud providers) and applications.
  • Most do not believe their organization has the appropriate technologies to prevent or quickly detect insider fraud, including employees’ misuse of IT resources.
Order Security ManualSample DRP
  1. Top 10 Predictions for Disaster Recovery and Business Continuity 10 Disaster Recovery – Business Continuity Predictions for 2013 Disaster Recovery vs Business Resilience  – There will be a move from an academic discussion to practical...
  2. Released CIO IT Infrastructure Policy and Procedure Bundle Update CIO IT Infrastructure Policy and Procedure Bundle Janco has announced an update to the “CIO IT Infrastructure Policy and Procedure Bundle” report to their offering....
  3. Email Spam Reporting Policy E-mail Spam Reporting Policy Note: Of course legitimate, individually-sent employment, business and personal inquiries are not considered spam.  Below is a sample of a letter...
  4. Released BYOD Policy Template – Bring-Your-Own-Device BYOD Policy Template Janco has announced an update to  the “BYOD Policy Template – Bring-Your-Own-Device”. BYOD Policy Template Includes an electronic form for employee agreement...
  5. Life cycle for business continuity and security breaches are the same When a security breach or business interruption occur, the life cycle from the start to the end are the same.  First and foremost you must...
- more information
09:13:21 MST -0700
Clear Policies Support CIOs Goals

Security ManualWritten policies represent the only way for CIOs and the executive management team to clearly communicate the way it would like employees to conduct the business of the organization. Without well-managed policies, companies are left to ad-hoc decisions made unilaterally. Research shows that well-run companies suffering the least loss of sensitive data and IT downtime have strong policy management programs. However, most organizations do not have a policy management solution which provides end users with easy access to policies.

IT Infrastructure PoliciesInfrastructure Policy Sample
  1. Top 10 Predictions for Disaster Recovery and Business Continuity  10 Disaster Recovery - Business Continuity Predictions for 2013 Disaster Recovery vs Business Resilience  - There will be a move from an academic discussion to practical...
  2. Released CIO IT Infrastructure Policy and Procedure Bundle Update  CIO IT Infrastructure Policy and Procedure Bundle Janco has announced an update to the "CIO IT Infrastructure Policy and Procedure Bundle" report to their offering....
  3. Email Spam Reporting Policy  E-mail Spam Reporting Policy Note: Of course legitimate, individually-sent employment, business and personal inquiries are not considered spam.  Below is a sample of a letter...
  4. Released BYOD Policy Template - - Bring-Your-Own-Device  BYOD Policy Template Janco has announced an update to  the "BYOD Policy Template - - Bring-Your-Own-Device". BYOD Policy Template Includes an electronic form for employee agreement...
  5. Life cycle for business continuity and security breaches are the same  When a security breach or business interruption occur, the life cycle from the start to the end are the same.  First and foremost you must...
- more information
10:09:03 MST -0700
Aftermath of blizzard of 2013

The "Blizzard of 2013" -- the 100 year storm blanketed the east coast with over 3 feet inches of snow on top of hurricane Sandy. Many potential IT disasters from this blizzard were saved by the fact that it happened over the weekend.

Order DRP BCPSample DRP BCP

CIOs then had to be concerned about the potential damage from extended power outages, roof collapses from the weight of the snow, and water and other related potential damages from the aftermath of the event.  Adding to that the damage from Sandy still had not been completely repaired.

Many CIO  had a well executable I/S disaster recovery plan in place but did they activate it on time?

  • Was all of the financial data is intact?
  • Did the relocating to an alternate site go well?
  • Could operations begin on Monday morning as expected?


- more information
14:15:46 MST -0700
Security and Ethics collide

Security ManualAccording to a new report by Symantec, half of the employees who left or lost their jobs in the last 12 months kept confidential corporate data, and about 40 percent plan to use it in their new jobs.

They found that companies often do not take steps to address data leakage. Only 47 percent of respondents said their organizations take action when employees leave with sensitive information in violation of company policy. In addition, 68 percent said their organization does not take steps to ensure employees do not use confidential competitive information from third parties. Employees on the other hand say:

  • 62%  they consider it acceptable to transfer work documents to personal computers, tablets, smartphones or online file-sharing applications, with the majority never deleting the data they've moved because they see no harm in keeping it.
  • 44% believe a software developer who develops source code for a company has some ownership of his or her work and inventions.
  • 56% do not believe it is a crime to use a competitor's intellectual property, and
  • 42% do not think it is wrong to reuse the source code in projects for other companies without permission
Order Security ManualSample DRP
- more information
18:23:51 MST -0700
Version 7.4 of the Disaster Recovery Plan Released

Janco has just released version 7.4 of it Disaster Recovery Business Continuity Template.  Updates to the template have been:

 Order Disaster Plan TemplateDisaster Plan Sample

Version 7.4

  • Updated Recovery Site Strategy for Cloud
  • Updated CSS Style Sheet for black and white printing

Version 7.3

  • Updated to include Version 1.3 of the Disaster Recovery Business Continuity Audit Program

Version 7.2

    • Updated responsibilities for team members
    • Added Safety Program references in the core template
    • Added Electronic Safety Program Forms
      • Area Safety Inspection
      • Employee Job Hazard Analysis
      • First Report of Injury
      • Inspection Checklist – Alternative Locations
      • Inspection Checklist – Office Locations
      • New Employee Safety Checklist
      • Safety Program Contact List
      • Training Record

Version 7.1

  • Updated graphics
  • Updated Business Analysis Impact Section

Version 7.0

  • Updated for compliance with ISO 22301
  • Added Electronic Forms for Disaster Recovery and Business Continuity Plan Management
    • Plan Distribution Control Log
    • Remote Location Contact Information
    • Team Call List
    • Vendor Contact List
    • Off-Site Inventory
    • LAN Hardware / Software Inventory
    • Personnel Locations
- more information

Terms and Conditions | Privacy Policy
Copyright 1999 - Copyright - Janco Associates, Inc. - ALL RIGHTS RESERVED