now browsing by tag
#onlinedating | Politics have become a deal-breaker in many relationships | #bumble | #tinder | #pof | romancescams | #scams
<p>The fallout from COVID-19 confronts graduating college seniors with a stark economic reality which, sadly, no amount of inspirational commencement speeches can undo. Across-the-board hiring freezes are common, and many summer internships, which serve the critical role of integrating young professionals into the workplace, are postponed or cancelled. Similar to the financial crash of 2008, students’ professional mettle will be tested.</p><p>Yet I am hopeful that the seeds of opportunity were planted years ago, and that we are seeing some green shoots. What specifically do I mean? In 2016, long before COVID-19 disrupted the economy, I founded the company <a href=”https://www.parkerdewey.com/” target=”_blank”>Parker Dewey</a>—named after Francis Parker and John Dewey, the “founding fathers” of experiential learning—to help fix the broken entry-level hiring system. The traditional ways to identify, assess, and hire college students and recent graduates for full-time roles is ineffective, resulting in approximately 45% of recent college graduates being <a href=”https://www.newyorkfed.org/research/college-labor-market/college-labor-market_underemployment_rates.html” target=”_blank”>under</a> or <a href=”https://www.newyorkfed.org/research/college-labor-market/college-labor-market_unemployment.html” target=”_blank”>unemployed</a>. Employers, who spend enormous time and effort hiring new college graduates, <a href=”https://www.bls.gov/news.release/nlsyth.t03.htm” target=”_blank”>see most leave before the one-year mark</a>. </p><p>Typically, it goes like this: a job opening is posted online, hundreds of people apply instantly, narrowing the applicant field becomes a near-impossible task, and an interviewer eventually glances at a resume before asking questions that won’t substitute for seeing a job candidate in action.</p>
<p>We designed Parker Dewey to fix that by connecting college students and recent graduates—we call them Career Launchers—with specific projects from some of the nation’s most sought-after employers, and those that may be “under the radar.” Since launching, we’ve partnered with firms ranging from start-ups to those in the Fortune 100, which use our proprietary platform to provide these “micro-internship” opportunities. These mutually beneficial experiences allow both the Career Launcher and the company to test-drive each other before a full-time role is offered or filled.</p><p>In addition, micro-internships allow college students to better hone and demonstrate those “core skills” most valued by employers such as communication, adaptability, problem solving, and grit. While these skills are a key component of a post-secondary curriculum, rarely do students (or employers) appreciate the crosswalks from classroom to career, especially in classes that don’t sound like a job title.</p>
<blockquote>Right now, 55% of college graduates leave a full-time roll before completing a full year.</blockquote>
<p>Micro-internships provide professional opportunities that many Career Launchers would lack in a world of typical internships alone, which require a 10- or 12-week commitment, cannot be completed remotely, and are often unpaid. Traditional summer internships are inaccessible to students who work while earning their degree, who need flexible scheduling, and even student-athletes who compete and train while their peers explore careers. As a direct result of the uncertainty brought on by COVID-19, more employers are recognizing the need for more flexible opportunities to attract, assess, and hire Career Launchers.</p><p>Some of the <a href=”https://www.parkerdewey.com/example-projects” target=”_blank”>typical projects available</a> on <a href=”https://app.parkerdewey.com/auth/talent/sign-up” target=”_blank”>Parker Dewey’s platform</a> include creating a social media editorial calendar, drafting a press release form, wireframing a fitness app, editing an independent film, and creating digital “vaults” for financial investors—plus many more.</p><p>Each project has a thorough description, start date, end date, estimated number of hours to completion, and the amount the Career Launcher will be paid. We are fully integrated with LinkedIn, so creating a professional profile on the Parker Dewey platform is easy, and we eliminate the problem of applicant deluge by matching individuals with companies when each side shows a mutual interest in each other.</p>
<p>Beyond providing all types of students with access to employment, micro-internships have been described as “job dating,” and while we didn’t model the platform on dating apps, I can definitely see the parallel. I think companies and potential employees should “date” each other before making the engagement-like commitment of an internship, or the marriage of a full-time role. Right now, 55% of college graduates leave a full-time roll before completing a full year.</p><p>When I was fresh out of undergrad as an accounting major, I was hired by a big accounting firm for what was supposed to be my dream job. But I knew after one week it wasn’t what I wanted. Without a platform to showcase my skills to companies in other industries, or explore other pathways, I was a fresh-water fish in the salty accounting seas. In this time of economic uncertainty, Parker Dewey connects Career Launchers with paying projects from top employers, while giving each side time to learn more about each other. That’s a win-win we could all use right now. <a href=”https://app.parkerdewey.com/auth/talent/sign-up” target=”_blank”>You can create your profile now</a> to get instant access to industry-leading micro-internships.</p>
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
View full post on National Cyber Security
#nationalcybersecuritymonth | Moody’s, Nasdaq and many others choosing Lithuania for cyber security GBS functions
The following article by Invest Lithuania’s Senior Investment Advisor Monika Vilkelytė first appeared in the Outsourcing&More magazine. You can find the original here.
Assigning cyber security operations to GBS centres is a smart move for international companies. But finding the right location for such a centre can be a serious headache. Suitable locations need to have both fast, secure IT infrastructure and a strong pool (and future pipeline) of IT talent. Affordable locations offering this combination are few and far between. That’s why Lithuania, which is ranked 4th globally in the Cyber Security Index, is proving so attractive to global company groups in terms of cyber security operations. The likes of Oracle, Nasdaq and Outokumpu already have cyber security teams in Lithuania, while Moody’s is on the way to building its cyber security capabilities in Vilnius. With a strong pipeline of talent and a clearly defined National Cyber Security Strategy, there’s plenty of room for future growth.
The ever-changing face of cyber security
The number of cyber attacks made against organizations around the world is increasing every year. Worse still, the complexity and severity of these attacks is also growing, as criminals search for ever-more sophisticated ways to break through a company’s cyber defences. With huge amounts of both company and customer data in their systems, and processes that are more deeply interconnected than ever, a major cyber attack could have catastrophic consequences.
GBS and cyber security – a smart combination
To face this ever-changing threat, companies need to be innovative and responsive, constantly updating their cyber defences to meet the latest dangers. And increasingly, global companies are using the GBS model as the most effective way to manage their Cyber Security operations. By centralizing their cyber security team in one location, it becomes easier to adopt new innovative solutions. These teams are also more effective at focusing the limited time and resources a company has on mission-critical cyber services.
Finding a home for your cyber security team
Finding the right model for managing cyber security (a GBS approach) is an important first step, but executing this model well is just as important. And one of the critical decisions a company has to make is where to locate the GBS centre that manages their cyber security.
Two features characterise the ideal location for a cyber security team. The location needs to have fast, well-developed and robust IT infrastructure. It also needs a wealth of IT talent from which to build a team of experts capable of responding to the latest threats.
Finding this combination is already a tall order, without even factoring in cost. This is not an area of operations where you want to cut corners, so low cost locations that don’t offer the quality needed are out of the question. On the other hand, building a team of high quality IT experts is prohibitively expensive in many cities and countries.
Lithuania offers quality infrastructure and talent
Lithuania offers the IT infrastructure and talent businesses need for cyber security, and at competitive costs compared to other EU locations.
Ranked 4th in the Global Cyber Security index, Lithuania’s IT infrastructure is well suited to cyber security operations. It is robust, with a strong focus at the executive level on cyber readiness and resilience. In 2017 Lithuania established a National Cyber Security Centre, and the following year a National Cyber Security Strategy was approved. This strategy covers not only the government, but also a wide range of non-governmental organizations, private sector players, and scientific and educational institutions. This means the whole ecosystem is building resilience, as shown by the introduction of advanced warning systems at critical infrastructure facilities last year.
In terms of talent, there are currently 38,000 IT professionals in Lithuania, with a further 10,600 students enrolled in IT studies. Funding for IT studies was recently doubled, ensuring further growth in the flow of IT talent. The government has also invested in an upskilling project focused on key areas including cyber security and AI, with the aim of adding new specialists to the market. Universities in Lithuania’s two largest cities, Vilnius and Kaunas, offer dedicated programmes for cyber security specialists, including MScs in Information and Information Technology Security, a BSc programme in Information Systems and Cyber Security and an MSc in Cybersecurity Management.
This means the level of quality, in terms of both talent and infrastructure, is comparable to other leading EU destinations. But, unlike those locations, Lithuania is a far more cost-competitive option.
Cost advantages to help you build the right team
Junior IT staff such as database administrators of Unix / Linux administrators can be hired to a around €2,000 per month, including taxes. The average salary for a senior QA specialist with 5 years’ experience is €2,700 tax inclusive, while a Senior cyber security specialist with 5 years experience earns €3,360. This means assembling a skilled cyber security team which includes highly experienced professionals is affordable and sustainable in Lithuania.
What’s more, Lithuania has the 3rd most affordable internet rates in Europe, and office rental costs are also highly competitive. As a result, overheads for GBS centres are also low in comparison with other EU locations.
Nasdaq, Moody’s, Oracle and more
These strong fundamentals have attracted some of the world’s largest companies to set up cyber security teams in Lithuania. Moody’s established a GBS centre in Vilnius in early 2019 which is planned to include an advanced cyber security unit. In fact, the availability of talent in this area was one of the major reasons Moody’s chose Lithuania, as Duncan Neilson, SVP HR Regional Lead EMEA explained when the centre was announced:“Given our goals of hiring diverse talent and further developing our automation and cyber security capabilities, choosing Lithuania as our newest EU location makes good business sense.”
Nasdaq also operates an IT centre in Vilnius. This centre has been developing constantly since its establishment in 2015 – it grew from 30 to 300 FTEs in 3 years – and includes a cyber security team. On a visit to Lithuania, Nasdaq’s CEO and president Adena Friedman noted the strength of the IT talent available. “This place has a great talent pool,” she commented. “At first we thought Lithuania was a centre of low cost, but today Vilnius is a centre of professionalism for us. This city is going to be an ever more important player for us.”
Overall, almost 10% of the GBS centres in Lithuania perform cyber security functions. This includes GBS centres of companies such as Danske Bank, DXC Technology, Outokumpu, Devbridge Group, TransUnion and many more. And the number is growing all the time.
Cyber security products developed in Lithuania
Lithuanian cyber security teams are adept at product development as well. Oracle runs an office of 50 specialists in Kaunas who develop a range of products, including web application firewalls, and advanced API, DDoS, and cloud-based malware protection. According to Leon Kuperman, Vice President of the company’s software development division Oracle Dyn, the Kaunas team will be further expanded: “We are planning significant growth in the region, so we may need to move to a bigger office.”
TransUnion has a special team of Lithuanian cyber security specialists who continuously monitor the online security of more than 1,200 company employees and the information systems of TransUnion’s corporate customers worldwide. “The platform monitoring teams who are working on cyber security are the only TransUnion UK teams that operate 24/7, ensuring the uninterrupted and stable operation of all systems,” says Jonas Lukošius, Manager of TransUnion’s Kaunas office.
There are a number of other cyber security development teams operating in the Kaunas-Vilnius hub. NRD Cyber Security focuses on offering protection for public service providers, law enforcement, critical infrastructure and more, while US-based Arxan offers guarding solutions injected directly into its clients’ binary code. “We currently have offices in the US, the UK, and Japan,” says Andrew Whaley, Arxan’s SVP Head of Engineering. “In the near future, Vilnius has the potential to become our largest software development office.” Then there is CUJO AI, a Lithuanian tech company that develops AI-based online security solutions.
More talent and expertise
This developed ecosystem, combined with the range of cyber security training opportunities offered by local universities, means there is plenty of know-how and experience on offer in Lithuania. Existing players are actively involved in training up new talent – Moody’s cooperates with ISM business school, Oracle offers its own multi-level training programme, and Danske Bank offers flexible arrangements to students so they can begin working while they complete their studies.
Therefore, as the sector matures, an even deeper pool of expertise in cyber security will be available to companies looking to establish GBS centres in Lithuania.
The original article can be found here.
View full post on National Cyber Security
#cyberfraud | #cybercriminals | Many ups and downs for Karnataka Police this year- The New Indian Express
Source: National Cyber Security – Produced By Gregory Evans Express News Service The year 2019 saw many ups and downs for the State Police. Early into the year the police faced severe embarrassment when one senior officer complained against another for illegally tapping his phone calls and soon the issue snowballed into a major political […] View full post on AmIHackerProof.com
Phishing is still a vector to attack presidential campaigns. Many 2020 candidate organizations still aren’t using best practice by implementing a proper DMARC policy.
It seems they’ve not learned from the hack on Hillary’s campaign. In 2016, John Podesta got tricked by a crude phish—and it easily could happen again.
Things are better now, but there’s still acres of room for improvement. In today’s SB Blogwatch, we dig their DNS records.
Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention: a decade in three minutes.
Can You Spell DMARC?
What’s the craic, Zack? Mister Whittaker reports—“Only a few 2020 US presidential candidates are using a basic email security feature”:
DMARC, an email security protocol that verifies the authenticity of a sender’s email and rejects spoofed emails … could prevent a similar attack that hobbled the Democrats during the 2016 election. … Only Elizabeth Warren … Joe Biden, Kamala Harris, Michael Bloomberg, Amy Klobuchar, Cory Booker, Tulsi Gabbard and Steve Bullock have … improved their email security.
The remaining candidates, including … Donald Trump, are not rejecting spoofed emails. … That, experts say, puts their campaigns at risk from foreign influence campaigns and cyberattacks.
In the run-up to the 2016 presidential election, Russian hackers sent an email to Hillary Clinton campaign manager John Podesta, posing as a Google security warning. [It] tricked Podesta into … allowing hackers to steal tens of thousands of private emails.
Or perhaps you prefer a different topical angle? G’day, David Braue—“You may be targeting Black Friday bargains, but cybercriminals are targeting you”:
Security firms are warning shoppers to be careful online as cybercriminals increase their activity in the runup to [the] retail season. … Shoppers need to be particularly wary of online scams and malware propagated through emails spoofing legitimate retailers.
Despite efforts by the Australian Signals Directorate to promote the use of next-generation DMARC email anti-fraud tools … research suggests that just 45 percent of Australia’s biggest online retailers have actually begun implementing DMARC – and just 10 percent have adopted the strictest level of security.
Returning to this hemisphere, Agari’s Armen Najarian claims, “2020 Presidential Candidates Remain Vulnerable”:
The kinds of email attacks that helped derail Hillary Clinton’s candidacy in 2016 are only getting more sophisticated. [But some] campaigns are not taking the threat as seriously as they should.
Meanwhile, we’re seeing new trends in how cybercriminals execute … advanced threats, which are liable to throw an entire candidacy off-course. After all, it only requires one campaign employee or volunteer to click on one link in a malicious email.
It’s likely only a matter of time before the unthinkable happens once again. … The Mueller Report … squarely pointed to spear phishing as the primary attack vector for Russian hackers seeking to gain access.
Unfortunately, candidates must not only be concerned about email directed to them and their campaign staff. … Imagine the damage that can be done by emails that appear to come from the legitimate domain of the candidate, but actually come from a malicious criminal who uses that domain to spread false information to potential … donors, voters, and the media.
This is entirely possible, and likely even probable, unless candidates take the steps they need to protect against it by implementing DMARC with a p=reject policy.
DMARC: HOWTO? Chad Calease obliges—“A Definitive Guide”:
This is the time of year we’re all too aware how much phishing really sucks. … While technology isn’t able to catch all of it 100% of the time, DMARC is one of these important layers of defense that helps to dramatically minimize the amount of phishing emails that get through to our inboxes.
DMARC stands for Domain-based Message Authentication, Reporting & Conformance. [It] is a set of 3 DNS records that work together to ensure email is sent only from authorized … mail servers, thereby helping block fraudulent messages.
DMARC sets a clear policy for what to do if a message hasn’t been sent from an authorized source. … DMARC helps prevent criminals from spoofing the “header from” or “reply-to” address: … First it checks that the DKIM … digital signature is a match. Then it checks the SPF record to ensure the message came from an authorized server. If both DKIM and SPF pass these checks, DMARC delivers the message.
But if one or more of these tests fails, DMARC behaves according to a policy we set:
‘none’ [which] doesn’t impose any actions …
‘quarantine’ [which] Flags messages … to be directed to the recipients’ spam or junk folders …
‘reject’ [which] outright refuses messages that fail … (this is the end goal of a good DMARC configuration).
OK, so why aren’t all the candidates on board? Here’s lostphilosopher:
I see this as a reflection of the candidates ability to find and listen to experts. I don’t expect a candidate to understand how to do tech “right” – I’m in the industry and still get half of it wrong! However, when you’re running a multi million dollar campaign you can afford to bring in experts to set this stuff up and audit your practices.
I assume these candidates are already doing this and that if they are still not following some basic best practices it’s because they are actively ignoring the experts. … That’s what worries me: If they can’t find or listen to these people now, what makes me think they’ll be able to in office?
And this Anonymous commentator agrees:
Think about this for a second! If the … candidates don’t care enough about their own email traffic, why would anyone vote for them to secure this nation? If your own private info is easily up for grabs, what do you honestly think national security would be like under any of them?
But gl4ss spots an oint in the flyment:
If you rely on DMARC … and just trust it blindly then you know what? You’re gonna get ****ed by someone on whthouse.org.co.uk.acva.com.
Sure the email is sent from that domain, but so what? The domain isn’t right.
It was ever thus. Ryan Dunbar—@ryandunbar2—looks back:
In 1980 we knew internet email was not secure.
2003 get email SPF
2007 get email DKIM
2012 get DMARC
2019 get ARC, BIMI
2025 get QUIC, yet email will still not be secure.
2050 get internet3
Why does it look like the ones running the internet don’t want a secure internet?
Meanwhile, El Duderino knows who to blame:
This is Al Gore’s fault because he invented the internet.
10 Years; 100 songs; 3 minutes
Previously in And Finally
You have been reading SB Blogwatch by Richi Jennings. Richi curates the best bloggy bits, finest forums, and weirdest websites… so you don’t have to. Hate mail may be directed to @RiCHi or firstname.lastname@example.org. Ask your doctor before reading. Your mileage may vary. E&OE.
Image source: Tia Dufour (public domain)
View full post on National Cyber Security
Photo by Arcoudis Chrisoula
The heaviest burden of poverty is usually borne by Roma children as the most fragile members of the community. Roma children living in extreme poverty are often caught in a cycle of transgenerational poverty.
According to a recent survey carried in eleven EU member states by the EU Fundamental Rights Agency (FRA)1 :
- more than 90 % of Roma children are at risk of poverty;
- 41 % of Roma children live in a household where at least one person in the household went to bed hungry at least once in a month;
- 80 % of the Roma families and their children live with an income below the respective national at risk-of-poverty threshold;
- 50% of Roma children face nutritional risk, have underlying malnutrition and exhibit stunting and inadequate child growth.
These figures, unacceptable as they are, do not relay the deep human cost of poverty, which restricts access to the most fundamental of needs. rights. Poverty is an urgent human rights concern. For those living in extreme poverty, many human rights are out of reach. It robs individuals of their dignity and increases vulnerability to hunger, malnutrition, physical and mental illnesses, human rights abuses and exclusion.
Racism, humiliation and exclusion are drivers of poverty, as well as consequences of it. Discrimination, whether based on gender, ethnicity, sexuality or other grounds can lead to exclusion and restricts pathways out of poverty. Poverty is more than just a human rights violation.
Roma children living in extreme poverty are often subjected to a life of family alienation, abuse, child labour, illiteracy, long term unemployment and homelessness. They often live in isolation and are invisible to state policies for poverty relief. Child poverty is a violation of human dignity!
The Council of Europe combats poverty in various ways. For example, the European Convention on Human Rights guarantees civil and political human rights, and it is complemented by the European Social Charter (ESC), adopted in 1961 and revised in 1996, which guarantees social and economic human rights. According to Article 30, “Everyone has the right to protection against poverty and social exclusion”.
Furthermore, the Directorate for European Cooperation and Strategy and Council of Europe Development Bank (CEB) fund initiatives to provide training for Roma to facilitate their access to labour markets. Access to decent work opportunities for all is the most effective way to increase participation, lift people out of poverty, reduce inequality and drive economic growth. The Council of Europe’s Roma and Traveller Team in co-operation with the Croatian Government Office for Human Rights and Rights of National Minorities have organsed an expert seminar on the transition of Roma young people from education to employment and working life.
1Roma survey – Data in focus, Poverty and employment: the situation of Roma in 11 EU Member States, EU Fundamental Rights Agency, 2014
The post #deepweb | <p> Extreme poverty afflicts many of the 10-12 million Roma in Europe <p> appeared first on National Cyber Security.
View full post on National Cyber Security
Companies are surrounded by cybersecurity threats, but many are not making it a priority to educate employees about them, a survey says.
Nearly half (46%) of entry-level employees don’t know whether their company has a cybersecurity policy, according to research firm Clutch.
The survey demonstrated a lack of awareness that can put companies at risk for IT security breaches. Nearly two-thirds of employees (63%) said they don’t know whether the quantity of IT security threats their companies face will increase or decrease over the next year. Additionally, among entry-level employees, 87% said they don’t know how the number of threats will shift in the next year.
The survey also found that employees are less likely to recognize IT services as the primary area of security vulnerability at their company. Instead, they cited theft of company property as the primary threat to company security, ahead of unauthorized information and email phishing scams.
The findings are a bit ironic, because “most cyberbreaches are caused by employees, inadvertently,” Robert Anderson, co-chair of the cybersecurity and data privacy group at Lindabury, McCormick, Estabrook & Cooper, P.C., told FierceCEO.
“There is a tendency for businesses to not put the emphasis on employees, but they are the greatest vulnerability,” Anderson said.
The post Many #employees know #little about #cybersecurity #threats appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
As with many tech sectors, cybersecurity has been facing an increasingly large worker shortage over the past decade. But unlike most other talent shortages, this one is set to have a material impact on consumer safety. That’s not just idle speculation, says Candace Worley, vice president and chief technical strategist…
View full post on National Cyber Security Ventures
After an onslaught of hacking, breaches and malware this year, and the resultant waves of publicity, National Cybersecurity Awareness Month should be a bit anticlimactic. But for some people, the message never gets old. One of the organizations most aware of cyberthreats and most active in countering them is CIS,…
The post During Cybersecurity Awareness Month, Experts Say Too Many Remain Unaware of Threats appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
What could a Point of Sale (POS) security breach cost your business? Factoring in the cost of an investigation, legal fees, potential fines and lawsuits, damage to a reputation, and a likely decrease in customer loyalty, your business could be
View full post on National Cyber Security Ventures
Many State Report Cards Leave Parents in the Dark About School Achievement – Inside School Research – Education Week
With jargon, “meaningless” tables and missing data, state report cards can be difficult for parents to use, a new report shows.
View full post on Education Week: Bullying
#pso #htcs #b4inc
View full post on Parent Security Online