Protect Your Identity on the Internet and at Home

The number of people who disregard warnings and spill the beans about themselves on social media and other places are looking to have their identities stolen. One lady recently discovered that her image was being used by a scammer to get money from victims who thought they were communicating with her. While this didn’t affect her personally it allowed a crime to be committed against several people because of her.

Most people won’t use a pseudonym when writing and publishing their stuff on-line, as they want their followers to find them. While that stands there are ways of protecting yourself and other by using old images, instead of up-to-date photos, posting a false birth-date, and giving little personal information.

Everything you post on-line will be available through the Search Engines. That means extreme caution needs to be taken. While the Internet is only one such source of you identity you must be aware of others.

Garbage cans and recycling bins are places where scammers can also get your identity if you are not cautious. Don’t discard bills and letters, and so on, with your personal details displayed on them without shredding them. Envelopes can also contain these things.

When using a bank make sure there is no one standing close enough behind you to copy down details, such as pin numbers, addresses, age, and so forth. Some cab drivers in Australia have sold credit card numbers to mates overseas who have then bought products on them. Most shops now don’t refund in cash but put the money back on the card.

The institutions are trying to protect customers from fraud but they can’t cover everything. The bottom line is that it is your identity and you are the one responsible for it.

Merit Killing in AJK Pakistan

The infamous Public Service Commission rebuked like Machiavelli’s Prince and has issued a clarification on the alleged list-altering of successful candidates on their official website. As John Keats said,” A thing of beauty is joy forever,” which satirically becomes,” A thing of injustice is a pain forever.”

AJK PSC changed the Combined Merit List after ten hours without any explanation or prior notification to the affected candidates. How can someone be so irresponsible, someone specially, a Government institution?
This hypocritical Department claims supremacy of the merit, but it violates merit itself by selecting candidates on written result basis. What was the need of interview? How can you do this at government level? Merit is a far cry in Pakistan, I assume.

What is the truth? Let’s find out

Why the list was changed after ten hours on 9th February, 2017.Why the explanation from AJK PSC is published after 5 crucial days? Were they sleeping? Don’t they know how to run a public office? Don’t they know their responsibilities? This is something really fishy and suspicious. The delay in explanation and no recommendation on this depict a lot of negligence on the part of AJK PSC.

What happened to the original first list? Is it not favoritism and nepotism? Is it not the blood bath of Merit and Justice? How can someone be that irresponsible?

There have been 18 lists of successful candidates by the same Public Service Commission, why this one creates such big drama. As Lady Macbeth would say,” Out Damn Spot, Out!” The Psc shouts the same mysterious mantra of, “Out Merit, The damn merit out!”

I’d suggest the following to rebuild trust and promote justice in the State.

The affected candidates must be called in to show their side of the drama.
There must be video camera installed and recording in all AJK PSC interviews as it is a must in CSS and other public service commission. This can eradicate favoritism.
The struck out candidates should be re-entered in the list and there must be a public apology on the behalf of corrupt authority.
The President and Prime Minister of AJK should take keen interest in rooting out injustice and nepotism.
The passing formula of Css and other public commissions should be adopted. A candidate has to clear all nine papers separately. If he is fail in English essay, he will be considered fail. Not whatAJK PSC commission did, passed the candidate by adding Marking English Grammar. This is ridiculous and shameful passing policy.

The deserving candidates demand for justice and ask for eligible people to be selected instead of fake merit holders, who promote corruption, favoritism, nepotism and immorality in AJK and Pakistan.

The Next Cyber Victim Could Be You

The news about Equifax’s data breach, and the long line of data thefts in the years before, was very much on everyone’s mind. Knowing my focus on cybersecurity investments, someone asked me: Why does it keep happening?

I’ll focus on one out-of-the-way industry – overseas shipping – for an explanation.

A “Fingers Crossed” Cybersecurity Plan

According to the BBC, a private security firm named CyberKeel launched three years ago with the idea of bringing a higher level of awareness about viruses and data theft. The answer from big shipping companies, according to CyberKeel’s senior partner, was: Don’t waste your time. We’re pretty safe. There’s no need.

That’s typical. Hack attacks are like recessions – they’re not real until one happens to you.

It turns out one shipper had a virus in its computer system that added a hacker’s bank account number each time the shipping company’s suppliers requested electronic payment.

The hack extracted several million dollars, according to CyberKeel, before the shipper realized why its suppliers weren’t getting paid.

The final straw was the NotPetya ransomware attack this summer. The giant Danish shipping firm Maersk recently said the hack forced it to halt operations at 76 of its ocean terminals around the world, causing $300 million worth of disruptions to its business.

Maersk’s CEO told the Financial Times that the attack was so damaging “we ended up having to use WhatsApp on our private phones [to communicate]. It was, frankly, quite a shocking experience.”

The point is, huge cyberhacks keep happening when computer security isn’t a top priority for a company.

It’s also a key reason why cybersecurity stocks will continue to be huge winners for years to come.

The big challenge – even now – is getting companies to take the threat seriously.

If we own a physical business, a home or a car, security is always a priority, right? We make sure we have strong locks on the doors.

It doesn’t prevent a break-in, of course. But a good lock, fortified doors and unbreakable windows sure make the thieves’ job a lot harder.

We pull on the door handle a couple times just to make sure the deadbolt is set. We tell our employees and children to make sure to lock the doors when they leave.

Why It’s “Game On” for Cybersecurity Stocks

Yet – just taking the shipping industry as one example – most companies do no such thing. Ocean shipping today is highly dependent on onboard computers and automation. That’s why vessels that once needed crews of dozens in decades past can now be operated with as few as 13 people.

And yet, when a British consulting firm surveyed 2,500 merchant seamen about at-sea cybersecurity, they found:

Forty percent of ships’ officers said they had sailed on a vessel infected with a computer virus or malware.
Eighty-seven percent of ships’ crews had no cybersecurity training.
It takes an average of 146 days to detect a shipboard data breach.
Seventy percent of shipboard data breaches go undetected.

Surveys like the one above demonstrate why cybersecurity stocks will continue to ride the wave of spending in this sector, as business after business, and industry after industry, wakes up to the threat.