Archive for the ‘IT Productivity News’ Category

World Class CIOs are focusing on wearable device Security

Wearable Device Security — Janco Associates has determined that most mobile devices have some major vulnerabilities. They include: Insufficient User Authentication/Authorization Data Encryption Missing Insecure Interfaces Software/Firmware Updates Not Secure Privacy Controls are missing The purpose of the Wearable Device Policy Template is to define standards, procedures, and restrictions for end users who have specific and authorized business requirements to use the devices connected via a wireless or unmanaged network outside of ENTERPRISE’s direct control

Follow this link:
World Class CIOs are focusing on wearable device Security

BYOD management key concern of many C-Level executives

BYOD management key concern of many C-Level executives Three concerns for management of BYOD are: Take control of BYOD costs by automatically tracking and billing work-related spend on employee-owned devices on almost any network Enable employees to be more productive by eliminating time-consuming manual processes Reduce the effort and cost of monitoring, processing and reporting BYOD expenses BYOD Policy Template meets all mandated compliance requirements Janco, in concert with a number of world class enterprises had created a BYOD Policy Template that addresses these issues and provides solutions for the following questions: What are the legal implication of BYOD – What is the impact of the Stored Communication Act – Record Retention and Destruction? What happens to the data and audit trail on a BYOD when an employee leaves the company

The rest is here:
BYOD management key concern of many C-Level executives

16 States have 6% unemployment rates

In the month of April ther are 16 states with an unemployment rate of over 6%.  In addition there are 11 states where the unemployment rate has risen in the last 3 months. The states with the greatest increase in unemployment are West Virgina (from 6.1% to 7.0%) and Alaska (from 6.3% to 6,7%.      

Link:
16 States have 6% unemployment rates

Will the information agecontinue to disrupt old ways

The information age is upon us and will continue to disrupt old ways of doing things and replace them with new digitally driven processes.

More here:
Will the information agecontinue to disrupt old ways

Over 42 million security incidents occured in 2014 – Even the White House was hacked

2014 had 42.8 million reported security incidents.

Go here to see the original:
Over 42 million security incidents occured in 2014 – Even the White House was hacked

Information risk management defined

Information risk management defined The components of this IT Management suite are all ready to use as soon as you download them.  There is both a individual license for each item and an enterprise license which allows you to to place the product on your enterprise’s INTRANET (not INTERNET) and they can be shared by groups/ divisions/data centers within a single Country / DUNS number. Information risk management involves eight steps: Identify all the assets that contain or transmit the information you are trying to protect

The rest is here:
Information risk management defined

BYOD is a challenge for government CIOs

BYOD is a challenge for government CIOs     The recent incident with the past Secretary of State highlights the fact that during the past few years, many government agencies have been challenged with balancing the hype surrounding bring-your-own-device (BYOD) programs with legitimate opportunities to use BYOD to empower employees and enhance productivity. While the excitement around BYOD grew and then receded across the broader market, government decision-makers have always viewed it with greater caution — with far fewer prioritizing BYOD among their technology initiatives.

See the original post:
BYOD is a challenge for government CIOs

Cloud Computig shifts computing model for many corporatrions

Cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is not whether the cloud is part of their infrastructure plans, but which applications and workloads to move to the cloud and when. But even as the benefits of cloud and hosted models have become apparent, concerns persist about security, and an assumption lingers that the cloud is inherently less secure than an enterprise data center environment

Originally posted here:
Cloud Computig shifts computing model for many corporatrions

Caught in the Middle of Amazon's Spat With Hachette

What the sticking point is between Hachette and Amazon isn't clear, and neither party is talking

Visit link:
Caught in the Middle of Amazon's Spat With Hachette

Facebook's New Menu Service Gets It Halfway to GrubHub

The new feature improves menu upload to restaurant pages

Read the original here:
Facebook's New Menu Service Gets It Halfway to GrubHub