CHARLETTE TERRONES

Charlette Terrones Blog

Action Guidelines(Ten codes of a capable person)

Ten Codes for a Capable person

1.A person who can make consistent effort

2.A person who can enjoy working

3.A person who can take quick decisions

4.A person who can work strategically

5.A person who faces his or her first job positively

6.A person who can add value to work

7.A person who quickly responds to clients

8.A person who understands his or her position

9.A person who can act differently than others

10.A person who has a philosophy for work

1.A person who can make consistent effort

We learn throughout our entire life. Thus, persistent effort is very important. No one should be satisfied with what one has. Our business environment is always changing, and if we cannot cope with such changes, we cannot become professionals.

2.A person who can enjoy working

It is important to always find delight in work. If we cannot find delight in work, no matter how difficult it is, then it is just a waste of time and there is nothing to be gained from it. A person who has many complaints will certainly not be able to do his or her job. Among successful people, there are not many who complain. This is because, when facing difficulty, a successful person thinks of a solution to the problem, instead of complaining about it.

3.A person who can take quick decisions

When people take a long time to take a decision, it means that they are at a loss. It often happens that people take wrong decisions in such cases. The appropriateness of a decision is not proportional to the time taken to make it. It is very important to take decisions immediately.

4.A person who can work strategically

It is very important to have strategy in any kind of work. If we do not have strategy, we will only do what we have to do in order to attain the goal. We should be aware of the most suitable way to work in the present conditions. A person with strategy is a person who can do an excellent job in a short time.

5.A person who faces his or her first job positively

Anyone can do work that they are experienced in. Doing work for the first time is a time when the real ability of a person is tested, and it is also the time when significant ability comes about. We cannot use inexperience as an excuse. A person who can face his or her first job positively is a person who can grow faster than anyone else.

6.A person who can add value to work

We cannot get compensation from work that has no added value. We must offer high added value to the client in order to be entitled to high compensation. The final evaluation from clients is the compensation that we can get. No matter how well we think we've done our job, if we do not get compensation from clients, it means that we could not meet their needs - and it is nothing more than self-satisfaction.

7.A person who quickly responds to clients

Clients ask questions because they need advice immediately. We must be able to answer clients' questions in a prompt and effective manner. In order to do so, it is important to be prepared well in advance.

8.A person who understands his or her position

Always give 120% at work as compared to the present. We cannot get anything from work done within the limits of our knowledge and ability. By objectively analyzing whether our present job will help improve our ability, we must devise ways to plan out work which will help to develop our ability.

9.A person who can act differently than others

We cannot do original work just by imitating somebody else's way of working. We should discover the originality in ourselves, and we must think with new ideas, rather than being stuck with stereotypical ideas, in order to develop a product or service. We must not be satisfied with the present situation and should repeat creative destruction.

10.A person who has a philosophy for work

Can we clearly define what we are working for and what motive we live with? People ultimately live either for themselves or for others. People who have belief and philosophy to live their lives for the sake of others (clients and society) can be called real professionals.

Comments

Eastern, Inova, and alternative insurance. A history of security and stability.

The concept of alternative insurance, commonly known as “captives,” has been around as long as insurance itself.1 The idea dates back to the 1600s when ship owners sat down at Lloyd’s Coffee House in London to discuss common sense solutions to protecting their vessels and cargo from financial loss. The rest is “Lloyd’s of London” history.

The modern day “captive” was born in 1958 by insurance innovator Fred Reiss, when he formed a “self-insurance” company to insulate his first client from the insecurities and instabilities of traditional insurance. As a wholly owned subsidiary located in Bermuda, this insurance company was literally a “captive” of the parent.

In recent decades, captives’ inherent security and stability have garnered widespread global acceptance and popularity. More than 90% of Fortune 500 companies have one or more captives. The ever-evolving sophistication of captives makes them attractive solutions for organizations of all types and sizes in search of an alternative to traditional insurance.

Eastern and Inova. True leadership in alternative insurance.

Inova's leadership in alternative insurance began in March 1998 when Cayman-based Eastern Re Ltd. became the first Segregated Portfolio Company (SPC) authorized by the Cayman Island Monetary Authority (CIMA). An SPC is a single legal entity comprised of individual “protected cells” that protect each insured organization’s assets and liabilities within a secure, stable environment.

Inova’s Eastern Re was the first SPC to be assigned a financial strength rating by A.M. Best Company. On August 13, 2014, A.M. Best Company reaffirmed Eastern Re’s A (Excellent) financial strength rating.

Inova's strength is reinforced by Eastern’s solid partnerships with globally respected industry leaders, including Lloyd’s of London (insurer/reinsurer), Global Captive Management Ltd. (insurance manager), Ernst & Young LLP (actuary/auditor), and Deustche Bank (SPC investment manager).

As of December 31, 2014, Inova includes 20 active programs totaling in excess of $60M in direct written premium.

1 Shanique Hall, “Recent Developments in the Captive Insurance Industry,” Center for Insurance Policy Research (CIPR) Newsletter [January 2012], accessed February 7, 2014.

Comments

When we look around we are amazed at the speed with which the world is changing. Online fraud techniques such as Pharming and other cyber-crime attacks are at all time high. To overcome such challenges, we need to at least have some basic understanding of these terms. The intention of this informational document is to approach the problem with a solution.

What is Pharming

Pharming redirects Internet users from legitimate websites to malicious ones using a strategy called DNS Cache Poisoning – where corrupt data is inserted into the cache database of a DNS.

The attacker uses several ways to carry out pharming attacks, one of the most popular way is to modify the Host file. The Pharmer covertly hijacks your computer and takes you to a forged website. Your browser may display the legitimate URL, but you will not be on the legitimate server. This, in most cases, is a page that looks identical to that of your bank, financial institution or online shopping websites like, eBay, or Amazon. Here, the attacker seeks your confidential information like credit card numbers, account passwords, etc.

The Hosts fi­le allows storing IP & domain names to speed up sur­fing and avoid consulting a DNS server. So, every time a user enters the address into the browser, the PC accesses the Hosts fi­le fi­rst and, if it ­finds this domain name, it takes up the IP address of a website. Now if the Hosts file is modified, the user will be redirected to the wrong website, where the attacker will be waiting to steals the credentials.

To carry out a pharming attack, the attacker typically makes use of the following:


A Batch Script to write the malicious IP and domain names onto the Hosts ­files.

A Joiner to join the batch ­file onto another fi­le

A Code Obfuscator to help the executable escape detection from anti-virus software.




 

Phishing vs Pharming

You need to be clear about the difference between Pharming and Phishing. Phishing attacks start with the receipt of an e-mail asking you to visit a website where you may get compromised. Pharming attacks start at the DNS server level where you are redirected to a malicious website.

How to mitigate Pharming attack

Use an anti-virus program which protects you from unauthorized alterations of the Host file is one way. Also, you should regularly patch your operating system and the installed software.

More sophisticated pharming attacks target the DNS server which is usually handled by Internet Service Providers (ISPs). In such a scenario, a user has few options at hand to handle the risk and he can do little against it, except using trustworthy DNS servers.

 

Comments

No one is safe online. Everyone is vulnerable and it is your responsibility to establish precautionary measures to protect yourself against cyberattacks. Make yourself well informed and updated on different schemes which cybercriminals used to deceive online users.

The simple tips below should help ensure your security online without ruining the convenience online access offers:

1. Your passwords should be strong enough that it cannot be easily guessed by hackers. Do not use obvious passwords using your personal information or do not use the most common passwords that are ridiculously easy to guess. Moreover, make sure that you use different passwords for your online accounts because having similar passwords on all accounts makes it easier for hackers to steal your identity.

2. Updating your software is very important. There are many good reasons why you need to update your software, thus make sure to take time updating and installing new versions of it.

3. Phishers do have the capability to copy the exact interface of a certain website and lure you into one. They will do everything to obtain personal information from you using those fake sites. Closely examine the site you are accessing before logging in your account and before giving out any personal and financial information.

4. A recovery contact is very important at times where you can’t login to your account. Make sure to set an account recovery contact in case you can’t access your own account.

5. Take advantage of setting up a two-step authentication as it serves as an added security to your accounts and will prevent hackers from accessing your account easily.

Dangers and threats are lurking on the Internet and hackers are always on the hunt looking for someone to victimize. Make yourself invincible and hard to hack, follow the basic ways above and be updated on latest schemes cybercriminals used.

 

Comments

There were an estimated 3.6 million cases of fraud and two million computer misuse offences in a year, according to an official survey.

The Crime Survey for England and Wales included the offences for the first time in its annual report, which covered the year to September.

Separate figures recorded by police showed an 8% rise in offences overall.

The Office for National Statistics said crime recording improvements meant the police figures could not reveal trends.

'Crime has changed'

John Flatley, from the ONS, said: "In the past, burglary and theft of vehicles were the high-volume crimes driving trends but their numbers have fallen substantially since then.

"When the crime survey started [35 years ago], fraud was not considered a significant threat and the internet had yet to be invented.

"Today's figures demonstrate how crime has changed, with fraud now the most commonly experienced offence."

Sir Tom Winsor, the Chief Inspector of Constabulary for England and Wales, told the You and Yours programme on BBC Radio 4 that many frauds went undetected and a great deal never got reported to the police.

"The amount of fraud that is taking place now is probably in epidemic proportions," he added. "The police are having to work very, very hard to keep up with even the ones they know about.

"The capability at police forces is quite skeletal and that needs to change and change a great deal."

The National Police Chiefs' Council lead for crime and incident recording, Chief Constable Jeff Farrar, said forces were working with the Home Office, police and crime commissioners, and industry experts to develop new tactics to fight cybercrime.

"The ability to commit crime online demonstrates the need for policing to adapt and transform to tackle these cyber challenges," he said.

Cyber and fraud: What is being counted?

  • Bank and credit account fraud - meaning criminals accessing bank accounts, credit cards or fraudulently using plastic card details
  • "Advance fee fraud" - crimes where the victim has been tricked into handing over cash after a communication, such as a lottery scam
  • "Non-investment fraud" - criminals conning a victim into buying something, often online, perhaps through a bogus phone call or email.
  • Other frauds including investment or fake charity scams
  • There are two broad categories of "computer misuse" crimes:
  • Unauthorised access to personal information, including hacking
  • Computer virus, malware or other incidents such as "DDoS" attacks aimed at online services


     

 

 

Comments
More

Action Guidelines(Ten codes of a capable person)

Ten Codes for a Capable person

1.A person who can make consistent effort

2.A person who can enjoy working

3.A person who can take quick decisions

4.A person who can work strategically

5.A person who faces his or her first job positively

6.A person who can add value to work

7.A person who quickly responds to clients

8.A person who understands his or her position

9.A person who can act differently than others

10.A person who has a philosophy for work

1.A person who can make consistent effort

We learn throughout our entire life. Thus, persistent effort is very important. No one should be satisfied with what one has. Our business environment is always changing, and if we cannot cope with such changes, we cannot become professionals.

2.A person who can enjoy working

It is important to always find delight in work. If we cannot find delight in work, no matter how difficult it is, then it is just a waste of time and there is nothing to be gained from it. A person who has many complaints will certainly not be able to do his or her job. Among successful people, there are not many who complain. This is because, when facing difficulty, a successful person thinks of a solution to the problem, instead of complaining about it.

3.A person who can take quick decisions

When people take a long time to take a decision, it means that they are at a loss. It often happens that people take wrong decisions in such cases. The appropriateness of a decision is not proportional to the time taken to make it. It is very important to take decisions immediately.

4.A person who can work strategically

It is very important to have strategy in any kind of work. If we do not have strategy, we will only do what we have to do in order to attain the goal. We should be aware of the most suitable way to work in the present conditions. A person with strategy is a person who can do an excellent job in a short time.

5.A person who faces his or her first job positively

Anyone can do work that they are experienced in. Doing work for the first time is a time when the real ability of a person is tested, and it is also the time when significant ability comes about. We cannot use inexperience as an excuse. A person who can face his or her first job positively is a person who can grow faster than anyone else.

6.A person who can add value to work

We cannot get compensation from work that has no added value. We must offer high added value to the client in order to be entitled to high compensation. The final evaluation from clients is the compensation that we can get. No matter how well we think we've done our job, if we do not get compensation from clients, it means that we could not meet their needs - and it is nothing more than self-satisfaction.

7.A person who quickly responds to clients

Clients ask questions because they need advice immediately. We must be able to answer clients' questions in a prompt and effective manner. In order to do so, it is important to be prepared well in advance.

8.A person who understands his or her position

Always give 120% at work as compared to the present. We cannot get anything from work done within the limits of our knowledge and ability. By objectively analyzing whether our present job will help improve our ability, we must devise ways to plan out work which will help to develop our ability.

9.A person who can act differently than others

We cannot do original work just by imitating somebody else's way of working. We should discover the originality in ourselves, and we must think with new ideas, rather than being stuck with stereotypical ideas, in order to develop a product or service. We must not be satisfied with the present situation and should repeat creative destruction.

10.A person who has a philosophy for work

Can we clearly define what we are working for and what motive we live with? People ultimately live either for themselves or for others. People who have belief and philosophy to live their lives for the sake of others (clients and society) can be called real professionals.

Comments

Eastern, Inova, and alternative insurance. A history of security and stability.

The concept of alternative insurance, commonly known as “captives,” has been around as long as insurance itself.1 The idea dates back to the 1600s when ship owners sat down at Lloyd’s Coffee House in London to discuss common sense solutions to protecting their vessels and cargo from financial loss. The rest is “Lloyd’s of London” history.

The modern day “captive” was born in 1958 by insurance innovator Fred Reiss, when he formed a “self-insurance” company to insulate his first client from the insecurities and instabilities of traditional insurance. As a wholly owned subsidiary located in Bermuda, this insurance company was literally a “captive” of the parent.

In recent decades, captives’ inherent security and stability have garnered widespread global acceptance and popularity. More than 90% of Fortune 500 companies have one or more captives. The ever-evolving sophistication of captives makes them attractive solutions for organizations of all types and sizes in search of an alternative to traditional insurance.

Eastern and Inova. True leadership in alternative insurance.

Inova's leadership in alternative insurance began in March 1998 when Cayman-based Eastern Re Ltd. became the first Segregated Portfolio Company (SPC) authorized by the Cayman Island Monetary Authority (CIMA). An SPC is a single legal entity comprised of individual “protected cells” that protect each insured organization’s assets and liabilities within a secure, stable environment.

Inova’s Eastern Re was the first SPC to be assigned a financial strength rating by A.M. Best Company. On August 13, 2014, A.M. Best Company reaffirmed Eastern Re’s A (Excellent) financial strength rating.

Inova's strength is reinforced by Eastern’s solid partnerships with globally respected industry leaders, including Lloyd’s of London (insurer/reinsurer), Global Captive Management Ltd. (insurance manager), Ernst & Young LLP (actuary/auditor), and Deustche Bank (SPC investment manager).

As of December 31, 2014, Inova includes 20 active programs totaling in excess of $60M in direct written premium.

1 Shanique Hall, “Recent Developments in the Captive Insurance Industry,” Center for Insurance Policy Research (CIPR) Newsletter [January 2012], accessed February 7, 2014.

Comments

When we look around we are amazed at the speed with which the world is changing. Online fraud techniques such as Pharming and other cyber-crime attacks are at all time high. To overcome such challenges, we need to at least have some basic understanding of these terms. The intention of this informational document is to approach the problem with a solution.

What is Pharming

Pharming redirects Internet users from legitimate websites to malicious ones using a strategy called DNS Cache Poisoning – where corrupt data is inserted into the cache database of a DNS.

The attacker uses several ways to carry out pharming attacks, one of the most popular way is to modify the Host file. The Pharmer covertly hijacks your computer and takes you to a forged website. Your browser may display the legitimate URL, but you will not be on the legitimate server. This, in most cases, is a page that looks identical to that of your bank, financial institution or online shopping websites like, eBay, or Amazon. Here, the attacker seeks your confidential information like credit card numbers, account passwords, etc.

The Hosts fi­le allows storing IP & domain names to speed up sur­fing and avoid consulting a DNS server. So, every time a user enters the address into the browser, the PC accesses the Hosts fi­le fi­rst and, if it ­finds this domain name, it takes up the IP address of a website. Now if the Hosts file is modified, the user will be redirected to the wrong website, where the attacker will be waiting to steals the credentials.

To carry out a pharming attack, the attacker typically makes use of the following:


A Batch Script to write the malicious IP and domain names onto the Hosts ­files.

A Joiner to join the batch ­file onto another fi­le

A Code Obfuscator to help the executable escape detection from anti-virus software.




 

Phishing vs Pharming

You need to be clear about the difference between Pharming and Phishing. Phishing attacks start with the receipt of an e-mail asking you to visit a website where you may get compromised. Pharming attacks start at the DNS server level where you are redirected to a malicious website.

How to mitigate Pharming attack

Use an anti-virus program which protects you from unauthorized alterations of the Host file is one way. Also, you should regularly patch your operating system and the installed software.

More sophisticated pharming attacks target the DNS server which is usually handled by Internet Service Providers (ISPs). In such a scenario, a user has few options at hand to handle the risk and he can do little against it, except using trustworthy DNS servers.

 

Comments

No one is safe online. Everyone is vulnerable and it is your responsibility to establish precautionary measures to protect yourself against cyberattacks. Make yourself well informed and updated on different schemes which cybercriminals used to deceive online users.

The simple tips below should help ensure your security online without ruining the convenience online access offers:

1. Your passwords should be strong enough that it cannot be easily guessed by hackers. Do not use obvious passwords using your personal information or do not use the most common passwords that are ridiculously easy to guess. Moreover, make sure that you use different passwords for your online accounts because having similar passwords on all accounts makes it easier for hackers to steal your identity.

2. Updating your software is very important. There are many good reasons why you need to update your software, thus make sure to take time updating and installing new versions of it.

3. Phishers do have the capability to copy the exact interface of a certain website and lure you into one. They will do everything to obtain personal information from you using those fake sites. Closely examine the site you are accessing before logging in your account and before giving out any personal and financial information.

4. A recovery contact is very important at times where you can’t login to your account. Make sure to set an account recovery contact in case you can’t access your own account.

5. Take advantage of setting up a two-step authentication as it serves as an added security to your accounts and will prevent hackers from accessing your account easily.

Dangers and threats are lurking on the Internet and hackers are always on the hunt looking for someone to victimize. Make yourself invincible and hard to hack, follow the basic ways above and be updated on latest schemes cybercriminals used.

 

Comments

There were an estimated 3.6 million cases of fraud and two million computer misuse offences in a year, according to an official survey.

The Crime Survey for England and Wales included the offences for the first time in its annual report, which covered the year to September.

Separate figures recorded by police showed an 8% rise in offences overall.

The Office for National Statistics said crime recording improvements meant the police figures could not reveal trends.

'Crime has changed'

John Flatley, from the ONS, said: "In the past, burglary and theft of vehicles were the high-volume crimes driving trends but their numbers have fallen substantially since then.

"When the crime survey started [35 years ago], fraud was not considered a significant threat and the internet had yet to be invented.

"Today's figures demonstrate how crime has changed, with fraud now the most commonly experienced offence."

Sir Tom Winsor, the Chief Inspector of Constabulary for England and Wales, told the You and Yours programme on BBC Radio 4 that many frauds went undetected and a great deal never got reported to the police.

"The amount of fraud that is taking place now is probably in epidemic proportions," he added. "The police are having to work very, very hard to keep up with even the ones they know about.

"The capability at police forces is quite skeletal and that needs to change and change a great deal."

The National Police Chiefs' Council lead for crime and incident recording, Chief Constable Jeff Farrar, said forces were working with the Home Office, police and crime commissioners, and industry experts to develop new tactics to fight cybercrime.

"The ability to commit crime online demonstrates the need for policing to adapt and transform to tackle these cyber challenges," he said.

Cyber and fraud: What is being counted?

  • Bank and credit account fraud - meaning criminals accessing bank accounts, credit cards or fraudulently using plastic card details
  • "Advance fee fraud" - crimes where the victim has been tricked into handing over cash after a communication, such as a lottery scam
  • "Non-investment fraud" - criminals conning a victim into buying something, often online, perhaps through a bogus phone call or email.
  • Other frauds including investment or fake charity scams
  • There are two broad categories of "computer misuse" crimes:
  • Unauthorised access to personal information, including hacking
  • Computer virus, malware or other incidents such as "DDoS" attacks aimed at online services


     

 

 

Comments
More

Action Guidelines(Ten codes of a capable person)

Ten Codes for a Capable person

1.A person who can make consistent effort

2.A person who can enjoy working

3.A person who can take quick decisions

4.A person who can work strategically

5.A person who faces his or her first job positively

6.A person who can add value to work

7.A person who quickly responds to clients

8.A person who understands his or her position

9.A person who can act differently than others

10.A person who has a philosophy for work

1.A person who can make consistent effort

We learn throughout our entire life. Thus, persistent effort is very important. No one should be satisfied with what one has. Our business environment is always changing, and if we cannot cope with such changes, we cannot become professionals.

2.A person who can enjoy working

It is important to always find delight in work. If we cannot find delight in work, no matter how difficult it is, then it is just a waste of time and there is nothing to be gained from it. A person who has many complaints will certainly not be able to do his or her job. Among successful people, there are not many who complain. This is because, when facing difficulty, a successful person thinks of a solution to the problem, instead of complaining about it.

3.A person who can take quick decisions

When people take a long time to take a decision, it means that they are at a loss. It often happens that people take wrong decisions in such cases. The appropriateness of a decision is not proportional to the time taken to make it. It is very important to take decisions immediately.

4.A person who can work strategically

It is very important to have strategy in any kind of work. If we do not have strategy, we will only do what we have to do in order to attain the goal. We should be aware of the most suitable way to work in the present conditions. A person with strategy is a person who can do an excellent job in a short time.

5.A person who faces his or her first job positively

Anyone can do work that they are experienced in. Doing work for the first time is a time when the real ability of a person is tested, and it is also the time when significant ability comes about. We cannot use inexperience as an excuse. A person who can face his or her first job positively is a person who can grow faster than anyone else.

6.A person who can add value to work

We cannot get compensation from work that has no added value. We must offer high added value to the client in order to be entitled to high compensation. The final evaluation from clients is the compensation that we can get. No matter how well we think we've done our job, if we do not get compensation from clients, it means that we could not meet their needs - and it is nothing more than self-satisfaction.

7.A person who quickly responds to clients

Clients ask questions because they need advice immediately. We must be able to answer clients' questions in a prompt and effective manner. In order to do so, it is important to be prepared well in advance.

8.A person who understands his or her position

Always give 120% at work as compared to the present. We cannot get anything from work done within the limits of our knowledge and ability. By objectively analyzing whether our present job will help improve our ability, we must devise ways to plan out work which will help to develop our ability.

9.A person who can act differently than others

We cannot do original work just by imitating somebody else's way of working. We should discover the originality in ourselves, and we must think with new ideas, rather than being stuck with stereotypical ideas, in order to develop a product or service. We must not be satisfied with the present situation and should repeat creative destruction.

10.A person who has a philosophy for work

Can we clearly define what we are working for and what motive we live with? People ultimately live either for themselves or for others. People who have belief and philosophy to live their lives for the sake of others (clients and society) can be called real professionals.

Comments

Eastern, Inova, and alternative insurance. A history of security and stability.

The concept of alternative insurance, commonly known as “captives,” has been around as long as insurance itself.1 The idea dates back to the 1600s when ship owners sat down at Lloyd’s Coffee House in London to discuss common sense solutions to protecting their vessels and cargo from financial loss. The rest is “Lloyd’s of London” history.

The modern day “captive” was born in 1958 by insurance innovator Fred Reiss, when he formed a “self-insurance” company to insulate his first client from the insecurities and instabilities of traditional insurance. As a wholly owned subsidiary located in Bermuda, this insurance company was literally a “captive” of the parent.

In recent decades, captives’ inherent security and stability have garnered widespread global acceptance and popularity. More than 90% of Fortune 500 companies have one or more captives. The ever-evolving sophistication of captives makes them attractive solutions for organizations of all types and sizes in search of an alternative to traditional insurance.

Eastern and Inova. True leadership in alternative insurance.

Inova's leadership in alternative insurance began in March 1998 when Cayman-based Eastern Re Ltd. became the first Segregated Portfolio Company (SPC) authorized by the Cayman Island Monetary Authority (CIMA). An SPC is a single legal entity comprised of individual “protected cells” that protect each insured organization’s assets and liabilities within a secure, stable environment.

Inova’s Eastern Re was the first SPC to be assigned a financial strength rating by A.M. Best Company. On August 13, 2014, A.M. Best Company reaffirmed Eastern Re’s A (Excellent) financial strength rating.

Inova's strength is reinforced by Eastern’s solid partnerships with globally respected industry leaders, including Lloyd’s of London (insurer/reinsurer), Global Captive Management Ltd. (insurance manager), Ernst & Young LLP (actuary/auditor), and Deustche Bank (SPC investment manager).

As of December 31, 2014, Inova includes 20 active programs totaling in excess of $60M in direct written premium.

1 Shanique Hall, “Recent Developments in the Captive Insurance Industry,” Center for Insurance Policy Research (CIPR) Newsletter [January 2012], accessed February 7, 2014.

Comments

When we look around we are amazed at the speed with which the world is changing. Online fraud techniques such as Pharming and other cyber-crime attacks are at all time high. To overcome such challenges, we need to at least have some basic understanding of these terms. The intention of this informational document is to approach the problem with a solution.

What is Pharming

Pharming redirects Internet users from legitimate websites to malicious ones using a strategy called DNS Cache Poisoning – where corrupt data is inserted into the cache database of a DNS.

The attacker uses several ways to carry out pharming attacks, one of the most popular way is to modify the Host file. The Pharmer covertly hijacks your computer and takes you to a forged website. Your browser may display the legitimate URL, but you will not be on the legitimate server. This, in most cases, is a page that looks identical to that of your bank, financial institution or online shopping websites like, eBay, or Amazon. Here, the attacker seeks your confidential information like credit card numbers, account passwords, etc.

The Hosts fi­le allows storing IP & domain names to speed up sur­fing and avoid consulting a DNS server. So, every time a user enters the address into the browser, the PC accesses the Hosts fi­le fi­rst and, if it ­finds this domain name, it takes up the IP address of a website. Now if the Hosts file is modified, the user will be redirected to the wrong website, where the attacker will be waiting to steals the credentials.

To carry out a pharming attack, the attacker typically makes use of the following:


A Batch Script to write the malicious IP and domain names onto the Hosts ­files.

A Joiner to join the batch ­file onto another fi­le

A Code Obfuscator to help the executable escape detection from anti-virus software.




 

Phishing vs Pharming

You need to be clear about the difference between Pharming and Phishing. Phishing attacks start with the receipt of an e-mail asking you to visit a website where you may get compromised. Pharming attacks start at the DNS server level where you are redirected to a malicious website.

How to mitigate Pharming attack

Use an anti-virus program which protects you from unauthorized alterations of the Host file is one way. Also, you should regularly patch your operating system and the installed software.

More sophisticated pharming attacks target the DNS server which is usually handled by Internet Service Providers (ISPs). In such a scenario, a user has few options at hand to handle the risk and he can do little against it, except using trustworthy DNS servers.

 

Comments

No one is safe online. Everyone is vulnerable and it is your responsibility to establish precautionary measures to protect yourself against cyberattacks. Make yourself well informed and updated on different schemes which cybercriminals used to deceive online users.

The simple tips below should help ensure your security online without ruining the convenience online access offers:

1. Your passwords should be strong enough that it cannot be easily guessed by hackers. Do not use obvious passwords using your personal information or do not use the most common passwords that are ridiculously easy to guess. Moreover, make sure that you use different passwords for your online accounts because having similar passwords on all accounts makes it easier for hackers to steal your identity.

2. Updating your software is very important. There are many good reasons why you need to update your software, thus make sure to take time updating and installing new versions of it.

3. Phishers do have the capability to copy the exact interface of a certain website and lure you into one. They will do everything to obtain personal information from you using those fake sites. Closely examine the site you are accessing before logging in your account and before giving out any personal and financial information.

4. A recovery contact is very important at times where you can’t login to your account. Make sure to set an account recovery contact in case you can’t access your own account.

5. Take advantage of setting up a two-step authentication as it serves as an added security to your accounts and will prevent hackers from accessing your account easily.

Dangers and threats are lurking on the Internet and hackers are always on the hunt looking for someone to victimize. Make yourself invincible and hard to hack, follow the basic ways above and be updated on latest schemes cybercriminals used.

 

Comments

There were an estimated 3.6 million cases of fraud and two million computer misuse offences in a year, according to an official survey.

The Crime Survey for England and Wales included the offences for the first time in its annual report, which covered the year to September.

Separate figures recorded by police showed an 8% rise in offences overall.

The Office for National Statistics said crime recording improvements meant the police figures could not reveal trends.

'Crime has changed'

John Flatley, from the ONS, said: "In the past, burglary and theft of vehicles were the high-volume crimes driving trends but their numbers have fallen substantially since then.

"When the crime survey started [35 years ago], fraud was not considered a significant threat and the internet had yet to be invented.

"Today's figures demonstrate how crime has changed, with fraud now the most commonly experienced offence."

Sir Tom Winsor, the Chief Inspector of Constabulary for England and Wales, told the You and Yours programme on BBC Radio 4 that many frauds went undetected and a great deal never got reported to the police.

"The amount of fraud that is taking place now is probably in epidemic proportions," he added. "The police are having to work very, very hard to keep up with even the ones they know about.

"The capability at police forces is quite skeletal and that needs to change and change a great deal."

The National Police Chiefs' Council lead for crime and incident recording, Chief Constable Jeff Farrar, said forces were working with the Home Office, police and crime commissioners, and industry experts to develop new tactics to fight cybercrime.

"The ability to commit crime online demonstrates the need for policing to adapt and transform to tackle these cyber challenges," he said.

Cyber and fraud: What is being counted?

  • Bank and credit account fraud - meaning criminals accessing bank accounts, credit cards or fraudulently using plastic card details
  • "Advance fee fraud" - crimes where the victim has been tricked into handing over cash after a communication, such as a lottery scam
  • "Non-investment fraud" - criminals conning a victim into buying something, often online, perhaps through a bogus phone call or email.
  • Other frauds including investment or fake charity scams
  • There are two broad categories of "computer misuse" crimes:
  • Unauthorised access to personal information, including hacking
  • Computer virus, malware or other incidents such as "DDoS" attacks aimed at online services


     

 

 

Comments
More

Action Guidelines(Ten codes of a capable person)

Ten Codes for a Capable person

1.A person who can make consistent effort

2.A person who can enjoy working

3.A person who can take quick decisions

4.A person who can work strategically

5.A person who faces his or her first job positively

6.A person who can add value to work

7.A person who quickly responds to clients

8.A person who understands his or her position

9.A person who can act differently than others

10.A person who has a philosophy for work

1.A person who can make consistent effort

We learn throughout our entire life. Thus, persistent effort is very important. No one should be satisfied with what one has. Our business environment is always changing, and if we cannot cope with such changes, we cannot become professionals.

2.A person who can enjoy working

It is important to always find delight in work. If we cannot find delight in work, no matter how difficult it is, then it is just a waste of time and there is nothing to be gained from it. A person who has many complaints will certainly not be able to do his or her job. Among successful people, there are not many who complain. This is because, when facing difficulty, a successful person thinks of a solution to the problem, instead of complaining about it.

3.A person who can take quick decisions

When people take a long time to take a decision, it means that they are at a loss. It often happens that people take wrong decisions in such cases. The appropriateness of a decision is not proportional to the time taken to make it. It is very important to take decisions immediately.

4.A person who can work strategically

It is very important to have strategy in any kind of work. If we do not have strategy, we will only do what we have to do in order to attain the goal. We should be aware of the most suitable way to work in the present conditions. A person with strategy is a person who can do an excellent job in a short time.

5.A person who faces his or her first job positively

Anyone can do work that they are experienced in. Doing work for the first time is a time when the real ability of a person is tested, and it is also the time when significant ability comes about. We cannot use inexperience as an excuse. A person who can face his or her first job positively is a person who can grow faster than anyone else.

6.A person who can add value to work

We cannot get compensation from work that has no added value. We must offer high added value to the client in order to be entitled to high compensation. The final evaluation from clients is the compensation that we can get. No matter how well we think we've done our job, if we do not get compensation from clients, it means that we could not meet their needs - and it is nothing more than self-satisfaction.

7.A person who quickly responds to clients

Clients ask questions because they need advice immediately. We must be able to answer clients' questions in a prompt and effective manner. In order to do so, it is important to be prepared well in advance.

8.A person who understands his or her position

Always give 120% at work as compared to the present. We cannot get anything from work done within the limits of our knowledge and ability. By objectively analyzing whether our present job will help improve our ability, we must devise ways to plan out work which will help to develop our ability.

9.A person who can act differently than others

We cannot do original work just by imitating somebody else's way of working. We should discover the originality in ourselves, and we must think with new ideas, rather than being stuck with stereotypical ideas, in order to develop a product or service. We must not be satisfied with the present situation and should repeat creative destruction.

10.A person who has a philosophy for work

Can we clearly define what we are working for and what motive we live with? People ultimately live either for themselves or for others. People who have belief and philosophy to live their lives for the sake of others (clients and society) can be called real professionals.

Comments

Eastern, Inova, and alternative insurance. A history of security and stability.

The concept of alternative insurance, commonly known as “captives,” has been around as long as insurance itself.1 The idea dates back to the 1600s when ship owners sat down at Lloyd’s Coffee House in London to discuss common sense solutions to protecting their vessels and cargo from financial loss. The rest is “Lloyd’s of London” history.

The modern day “captive” was born in 1958 by insurance innovator Fred Reiss, when he formed a “self-insurance” company to insulate his first client from the insecurities and instabilities of traditional insurance. As a wholly owned subsidiary located in Bermuda, this insurance company was literally a “captive” of the parent.

In recent decades, captives’ inherent security and stability have garnered widespread global acceptance and popularity. More than 90% of Fortune 500 companies have one or more captives. The ever-evolving sophistication of captives makes them attractive solutions for organizations of all types and sizes in search of an alternative to traditional insurance.

Eastern and Inova. True leadership in alternative insurance.

Inova's leadership in alternative insurance began in March 1998 when Cayman-based Eastern Re Ltd. became the first Segregated Portfolio Company (SPC) authorized by the Cayman Island Monetary Authority (CIMA). An SPC is a single legal entity comprised of individual “protected cells” that protect each insured organization’s assets and liabilities within a secure, stable environment.

Inova’s Eastern Re was the first SPC to be assigned a financial strength rating by A.M. Best Company. On August 13, 2014, A.M. Best Company reaffirmed Eastern Re’s A (Excellent) financial strength rating.

Inova's strength is reinforced by Eastern’s solid partnerships with globally respected industry leaders, including Lloyd’s of London (insurer/reinsurer), Global Captive Management Ltd. (insurance manager), Ernst & Young LLP (actuary/auditor), and Deustche Bank (SPC investment manager).

As of December 31, 2014, Inova includes 20 active programs totaling in excess of $60M in direct written premium.

1 Shanique Hall, “Recent Developments in the Captive Insurance Industry,” Center for Insurance Policy Research (CIPR) Newsletter [January 2012], accessed February 7, 2014.

Comments

When we look around we are amazed at the speed with which the world is changing. Online fraud techniques such as Pharming and other cyber-crime attacks are at all time high. To overcome such challenges, we need to at least have some basic understanding of these terms. The intention of this informational document is to approach the problem with a solution.

What is Pharming

Pharming redirects Internet users from legitimate websites to malicious ones using a strategy called DNS Cache Poisoning – where corrupt data is inserted into the cache database of a DNS.

The attacker uses several ways to carry out pharming attacks, one of the most popular way is to modify the Host file. The Pharmer covertly hijacks your computer and takes you to a forged website. Your browser may display the legitimate URL, but you will not be on the legitimate server. This, in most cases, is a page that looks identical to that of your bank, financial institution or online shopping websites like, eBay, or Amazon. Here, the attacker seeks your confidential information like credit card numbers, account passwords, etc.

The Hosts fi­le allows storing IP & domain names to speed up sur­fing and avoid consulting a DNS server. So, every time a user enters the address into the browser, the PC accesses the Hosts fi­le fi­rst and, if it ­finds this domain name, it takes up the IP address of a website. Now if the Hosts file is modified, the user will be redirected to the wrong website, where the attacker will be waiting to steals the credentials.

To carry out a pharming attack, the attacker typically makes use of the following:


A Batch Script to write the malicious IP and domain names onto the Hosts ­files.

A Joiner to join the batch ­file onto another fi­le

A Code Obfuscator to help the executable escape detection from anti-virus software.




 

Phishing vs Pharming

You need to be clear about the difference between Pharming and Phishing. Phishing attacks start with the receipt of an e-mail asking you to visit a website where you may get compromised. Pharming attacks start at the DNS server level where you are redirected to a malicious website.

How to mitigate Pharming attack

Use an anti-virus program which protects you from unauthorized alterations of the Host file is one way. Also, you should regularly patch your operating system and the installed software.

More sophisticated pharming attacks target the DNS server which is usually handled by Internet Service Providers (ISPs). In such a scenario, a user has few options at hand to handle the risk and he can do little against it, except using trustworthy DNS servers.

 

Comments

No one is safe online. Everyone is vulnerable and it is your responsibility to establish precautionary measures to protect yourself against cyberattacks. Make yourself well informed and updated on different schemes which cybercriminals used to deceive online users.

The simple tips below should help ensure your security online without ruining the convenience online access offers:

1. Your passwords should be strong enough that it cannot be easily guessed by hackers. Do not use obvious passwords using your personal information or do not use the most common passwords that are ridiculously easy to guess. Moreover, make sure that you use different passwords for your online accounts because having similar passwords on all accounts makes it easier for hackers to steal your identity.

2. Updating your software is very important. There are many good reasons why you need to update your software, thus make sure to take time updating and installing new versions of it.

3. Phishers do have the capability to copy the exact interface of a certain website and lure you into one. They will do everything to obtain personal information from you using those fake sites. Closely examine the site you are accessing before logging in your account and before giving out any personal and financial information.

4. A recovery contact is very important at times where you can’t login to your account. Make sure to set an account recovery contact in case you can’t access your own account.

5. Take advantage of setting up a two-step authentication as it serves as an added security to your accounts and will prevent hackers from accessing your account easily.

Dangers and threats are lurking on the Internet and hackers are always on the hunt looking for someone to victimize. Make yourself invincible and hard to hack, follow the basic ways above and be updated on latest schemes cybercriminals used.

 

Comments

There were an estimated 3.6 million cases of fraud and two million computer misuse offences in a year, according to an official survey.

The Crime Survey for England and Wales included the offences for the first time in its annual report, which covered the year to September.

Separate figures recorded by police showed an 8% rise in offences overall.

The Office for National Statistics said crime recording improvements meant the police figures could not reveal trends.

'Crime has changed'

John Flatley, from the ONS, said: "In the past, burglary and theft of vehicles were the high-volume crimes driving trends but their numbers have fallen substantially since then.

"When the crime survey started [35 years ago], fraud was not considered a significant threat and the internet had yet to be invented.

"Today's figures demonstrate how crime has changed, with fraud now the most commonly experienced offence."

Sir Tom Winsor, the Chief Inspector of Constabulary for England and Wales, told the You and Yours programme on BBC Radio 4 that many frauds went undetected and a great deal never got reported to the police.

"The amount of fraud that is taking place now is probably in epidemic proportions," he added. "The police are having to work very, very hard to keep up with even the ones they know about.

"The capability at police forces is quite skeletal and that needs to change and change a great deal."

The National Police Chiefs' Council lead for crime and incident recording, Chief Constable Jeff Farrar, said forces were working with the Home Office, police and crime commissioners, and industry experts to develop new tactics to fight cybercrime.

"The ability to commit crime online demonstrates the need for policing to adapt and transform to tackle these cyber challenges," he said.

Cyber and fraud: What is being counted?

  • Bank and credit account fraud - meaning criminals accessing bank accounts, credit cards or fraudulently using plastic card details
  • "Advance fee fraud" - crimes where the victim has been tricked into handing over cash after a communication, such as a lottery scam
  • "Non-investment fraud" - criminals conning a victim into buying something, often online, perhaps through a bogus phone call or email.
  • Other frauds including investment or fake charity scams
  • There are two broad categories of "computer misuse" crimes:
  • Unauthorised access to personal information, including hacking
  • Computer virus, malware or other incidents such as "DDoS" attacks aimed at online services


     

 

 

Comments
More

Action Guidelines(Ten codes of a capable person)

Ten Codes for a Capable person

1.A person who can make consistent effort

2.A person who can enjoy working

3.A person who can take quick decisions

4.A person who can work strategically

5.A person who faces his or her first job positively

6.A person who can add value to work

7.A person who quickly responds to clients

8.A person who understands his or her position

9.A person who can act differently than others

10.A person who has a philosophy for work

1.A person who can make consistent effort

We learn throughout our entire life. Thus, persistent effort is very important. No one should be satisfied with what one has. Our business environment is always changing, and if we cannot cope with such changes, we cannot become professionals.

2.A person who can enjoy working

It is important to always find delight in work. If we cannot find delight in work, no matter how difficult it is, then it is just a waste of time and there is nothing to be gained from it. A person who has many complaints will certainly not be able to do his or her job. Among successful people, there are not many who complain. This is because, when facing difficulty, a successful person thinks of a solution to the problem, instead of complaining about it.

3.A person who can take quick decisions

When people take a long time to take a decision, it means that they are at a loss. It often happens that people take wrong decisions in such cases. The appropriateness of a decision is not proportional to the time taken to make it. It is very important to take decisions immediately.

4.A person who can work strategically

It is very important to have strategy in any kind of work. If we do not have strategy, we will only do what we have to do in order to attain the goal. We should be aware of the most suitable way to work in the present conditions. A person with strategy is a person who can do an excellent job in a short time.

5.A person who faces his or her first job positively

Anyone can do work that they are experienced in. Doing work for the first time is a time when the real ability of a person is tested, and it is also the time when significant ability comes about. We cannot use inexperience as an excuse. A person who can face his or her first job positively is a person who can grow faster than anyone else.

6.A person who can add value to work

We cannot get compensation from work that has no added value. We must offer high added value to the client in order to be entitled to high compensation. The final evaluation from clients is the compensation that we can get. No matter how well we think we've done our job, if we do not get compensation from clients, it means that we could not meet their needs - and it is nothing more than self-satisfaction.

7.A person who quickly responds to clients

Clients ask questions because they need advice immediately. We must be able to answer clients' questions in a prompt and effective manner. In order to do so, it is important to be prepared well in advance.

8.A person who understands his or her position

Always give 120% at work as compared to the present. We cannot get anything from work done within the limits of our knowledge and ability. By objectively analyzing whether our present job will help improve our ability, we must devise ways to plan out work which will help to develop our ability.

9.A person who can act differently than others

We cannot do original work just by imitating somebody else's way of working. We should discover the originality in ourselves, and we must think with new ideas, rather than being stuck with stereotypical ideas, in order to develop a product or service. We must not be satisfied with the present situation and should repeat creative destruction.

10.A person who has a philosophy for work

Can we clearly define what we are working for and what motive we live with? People ultimately live either for themselves or for others. People who have belief and philosophy to live their lives for the sake of others (clients and society) can be called real professionals.

Comments

Eastern, Inova, and alternative insurance. A history of security and stability.

The concept of alternative insurance, commonly known as “captives,” has been around as long as insurance itself.1 The idea dates back to the 1600s when ship owners sat down at Lloyd’s Coffee House in London to discuss common sense solutions to protecting their vessels and cargo from financial loss. The rest is “Lloyd’s of London” history.

The modern day “captive” was born in 1958 by insurance innovator Fred Reiss, when he formed a “self-insurance” company to insulate his first client from the insecurities and instabilities of traditional insurance. As a wholly owned subsidiary located in Bermuda, this insurance company was literally a “captive” of the parent.

In recent decades, captives’ inherent security and stability have garnered widespread global acceptance and popularity. More than 90% of Fortune 500 companies have one or more captives. The ever-evolving sophistication of captives makes them attractive solutions for organizations of all types and sizes in search of an alternative to traditional insurance.

Eastern and Inova. True leadership in alternative insurance.

Inova's leadership in alternative insurance began in March 1998 when Cayman-based Eastern Re Ltd. became the first Segregated Portfolio Company (SPC) authorized by the Cayman Island Monetary Authority (CIMA). An SPC is a single legal entity comprised of individual “protected cells” that protect each insured organization’s assets and liabilities within a secure, stable environment.

Inova’s Eastern Re was the first SPC to be assigned a financial strength rating by A.M. Best Company. On August 13, 2014, A.M. Best Company reaffirmed Eastern Re’s A (Excellent) financial strength rating.

Inova's strength is reinforced by Eastern’s solid partnerships with globally respected industry leaders, including Lloyd’s of London (insurer/reinsurer), Global Captive Management Ltd. (insurance manager), Ernst & Young LLP (actuary/auditor), and Deustche Bank (SPC investment manager).

As of December 31, 2014, Inova includes 20 active programs totaling in excess of $60M in direct written premium.

1 Shanique Hall, “Recent Developments in the Captive Insurance Industry,” Center for Insurance Policy Research (CIPR) Newsletter [January 2012], accessed February 7, 2014.

Comments

When we look around we are amazed at the speed with which the world is changing. Online fraud techniques such as Pharming and other cyber-crime attacks are at all time high. To overcome such challenges, we need to at least have some basic understanding of these terms. The intention of this informational document is to approach the problem with a solution.

What is Pharming

Pharming redirects Internet users from legitimate websites to malicious ones using a strategy called DNS Cache Poisoning – where corrupt data is inserted into the cache database of a DNS.

The attacker uses several ways to carry out pharming attacks, one of the most popular way is to modify the Host file. The Pharmer covertly hijacks your computer and takes you to a forged website. Your browser may display the legitimate URL, but you will not be on the legitimate server. This, in most cases, is a page that looks identical to that of your bank, financial institution or online shopping websites like, eBay, or Amazon. Here, the attacker seeks your confidential information like credit card numbers, account passwords, etc.

The Hosts fi­le allows storing IP & domain names to speed up sur­fing and avoid consulting a DNS server. So, every time a user enters the address into the browser, the PC accesses the Hosts fi­le fi­rst and, if it ­finds this domain name, it takes up the IP address of a website. Now if the Hosts file is modified, the user will be redirected to the wrong website, where the attacker will be waiting to steals the credentials.

To carry out a pharming attack, the attacker typically makes use of the following:


A Batch Script to write the malicious IP and domain names onto the Hosts ­files.

A Joiner to join the batch ­file onto another fi­le

A Code Obfuscator to help the executable escape detection from anti-virus software.




 

Phishing vs Pharming

You need to be clear about the difference between Pharming and Phishing. Phishing attacks start with the receipt of an e-mail asking you to visit a website where you may get compromised. Pharming attacks start at the DNS server level where you are redirected to a malicious website.

How to mitigate Pharming attack

Use an anti-virus program which protects you from unauthorized alterations of the Host file is one way. Also, you should regularly patch your operating system and the installed software.

More sophisticated pharming attacks target the DNS server which is usually handled by Internet Service Providers (ISPs). In such a scenario, a user has few options at hand to handle the risk and he can do little against it, except using trustworthy DNS servers.

 

Comments

No one is safe online. Everyone is vulnerable and it is your responsibility to establish precautionary measures to protect yourself against cyberattacks. Make yourself well informed and updated on different schemes which cybercriminals used to deceive online users.

The simple tips below should help ensure your security online without ruining the convenience online access offers:

1. Your passwords should be strong enough that it cannot be easily guessed by hackers. Do not use obvious passwords using your personal information or do not use the most common passwords that are ridiculously easy to guess. Moreover, make sure that you use different passwords for your online accounts because having similar passwords on all accounts makes it easier for hackers to steal your identity.

2. Updating your software is very important. There are many good reasons why you need to update your software, thus make sure to take time updating and installing new versions of it.

3. Phishers do have the capability to copy the exact interface of a certain website and lure you into one. They will do everything to obtain personal information from you using those fake sites. Closely examine the site you are accessing before logging in your account and before giving out any personal and financial information.

4. A recovery contact is very important at times where you can’t login to your account. Make sure to set an account recovery contact in case you can’t access your own account.

5. Take advantage of setting up a two-step authentication as it serves as an added security to your accounts and will prevent hackers from accessing your account easily.

Dangers and threats are lurking on the Internet and hackers are always on the hunt looking for someone to victimize. Make yourself invincible and hard to hack, follow the basic ways above and be updated on latest schemes cybercriminals used.

 

Comments

There were an estimated 3.6 million cases of fraud and two million computer misuse offences in a year, according to an official survey.

The Crime Survey for England and Wales included the offences for the first time in its annual report, which covered the year to September.

Separate figures recorded by police showed an 8% rise in offences overall.

The Office for National Statistics said crime recording improvements meant the police figures could not reveal trends.

'Crime has changed'

John Flatley, from the ONS, said: "In the past, burglary and theft of vehicles were the high-volume crimes driving trends but their numbers have fallen substantially since then.

"When the crime survey started [35 years ago], fraud was not considered a significant threat and the internet had yet to be invented.

"Today's figures demonstrate how crime has changed, with fraud now the most commonly experienced offence."

Sir Tom Winsor, the Chief Inspector of Constabulary for England and Wales, told the You and Yours programme on BBC Radio 4 that many frauds went undetected and a great deal never got reported to the police.

"The amount of fraud that is taking place now is probably in epidemic proportions," he added. "The police are having to work very, very hard to keep up with even the ones they know about.

"The capability at police forces is quite skeletal and that needs to change and change a great deal."

The National Police Chiefs' Council lead for crime and incident recording, Chief Constable Jeff Farrar, said forces were working with the Home Office, police and crime commissioners, and industry experts to develop new tactics to fight cybercrime.

"The ability to commit crime online demonstrates the need for policing to adapt and transform to tackle these cyber challenges," he said.

Cyber and fraud: What is being counted?

  • Bank and credit account fraud - meaning criminals accessing bank accounts, credit cards or fraudulently using plastic card details
  • "Advance fee fraud" - crimes where the victim has been tricked into handing over cash after a communication, such as a lottery scam
  • "Non-investment fraud" - criminals conning a victim into buying something, often online, perhaps through a bogus phone call or email.
  • Other frauds including investment or fake charity scams
  • There are two broad categories of "computer misuse" crimes:
  • Unauthorised access to personal information, including hacking
  • Computer virus, malware or other incidents such as "DDoS" attacks aimed at online services


     

 

 

Comments
More

Action Guidelines(Ten codes of a capable person)

Ten Codes for a Capable person

1.A person who can make consistent effort

2.A person who can enjoy working

3.A person who can take quick decisions

4.A person who can work strategically

5.A person who faces his or her first job positively

6.A person who can add value to work

7.A person who quickly responds to clients

8.A person who understands his or her position

9.A person who can act differently than others

10.A person who has a philosophy for work

1.A person who can make consistent effort

We learn throughout our entire life. Thus, persistent effort is very important. No one should be satisfied with what one has. Our business environment is always changing, and if we cannot cope with such changes, we cannot become professionals.

2.A person who can enjoy working

It is important to always find delight in work. If we cannot find delight in work, no matter how difficult it is, then it is just a waste of time and there is nothing to be gained from it. A person who has many complaints will certainly not be able to do his or her job. Among successful people, there are not many who complain. This is because, when facing difficulty, a successful person thinks of a solution to the problem, instead of complaining about it.

3.A person who can take quick decisions

When people take a long time to take a decision, it means that they are at a loss. It often happens that people take wrong decisions in such cases. The appropriateness of a decision is not proportional to the time taken to make it. It is very important to take decisions immediately.

4.A person who can work strategically

It is very important to have strategy in any kind of work. If we do not have strategy, we will only do what we have to do in order to attain the goal. We should be aware of the most suitable way to work in the present conditions. A person with strategy is a person who can do an excellent job in a short time.

5.A person who faces his or her first job positively

Anyone can do work that they are experienced in. Doing work for the first time is a time when the real ability of a person is tested, and it is also the time when significant ability comes about. We cannot use inexperience as an excuse. A person who can face his or her first job positively is a person who can grow faster than anyone else.

6.A person who can add value to work

We cannot get compensation from work that has no added value. We must offer high added value to the client in order to be entitled to high compensation. The final evaluation from clients is the compensation that we can get. No matter how well we think we've done our job, if we do not get compensation from clients, it means that we could not meet their needs - and it is nothing more than self-satisfaction.

7.A person who quickly responds to clients

Clients ask questions because they need advice immediately. We must be able to answer clients' questions in a prompt and effective manner. In order to do so, it is important to be prepared well in advance.

8.A person who understands his or her position

Always give 120% at work as compared to the present. We cannot get anything from work done within the limits of our knowledge and ability. By objectively analyzing whether our present job will help improve our ability, we must devise ways to plan out work which will help to develop our ability.

9.A person who can act differently than others

We cannot do original work just by imitating somebody else's way of working. We should discover the originality in ourselves, and we must think with new ideas, rather than being stuck with stereotypical ideas, in order to develop a product or service. We must not be satisfied with the present situation and should repeat creative destruction.

10.A person who has a philosophy for work

Can we clearly define what we are working for and what motive we live with? People ultimately live either for themselves or for others. People who have belief and philosophy to live their lives for the sake of others (clients and society) can be called real professionals.

Comments

Eastern, Inova, and alternative insurance. A history of security and stability.

The concept of alternative insurance, commonly known as “captives,” has been around as long as insurance itself.1 The idea dates back to the 1600s when ship owners sat down at Lloyd’s Coffee House in London to discuss common sense solutions to protecting their vessels and cargo from financial loss. The rest is “Lloyd’s of London” history.

The modern day “captive” was born in 1958 by insurance innovator Fred Reiss, when he formed a “self-insurance” company to insulate his first client from the insecurities and instabilities of traditional insurance. As a wholly owned subsidiary located in Bermuda, this insurance company was literally a “captive” of the parent.

In recent decades, captives’ inherent security and stability have garnered widespread global acceptance and popularity. More than 90% of Fortune 500 companies have one or more captives. The ever-evolving sophistication of captives makes them attractive solutions for organizations of all types and sizes in search of an alternative to traditional insurance.

Eastern and Inova. True leadership in alternative insurance.

Inova's leadership in alternative insurance began in March 1998 when Cayman-based Eastern Re Ltd. became the first Segregated Portfolio Company (SPC) authorized by the Cayman Island Monetary Authority (CIMA). An SPC is a single legal entity comprised of individual “protected cells” that protect each insured organization’s assets and liabilities within a secure, stable environment.

Inova’s Eastern Re was the first SPC to be assigned a financial strength rating by A.M. Best Company. On August 13, 2014, A.M. Best Company reaffirmed Eastern Re’s A (Excellent) financial strength rating.

Inova's strength is reinforced by Eastern’s solid partnerships with globally respected industry leaders, including Lloyd’s of London (insurer/reinsurer), Global Captive Management Ltd. (insurance manager), Ernst & Young LLP (actuary/auditor), and Deustche Bank (SPC investment manager).

As of December 31, 2014, Inova includes 20 active programs totaling in excess of $60M in direct written premium.

1 Shanique Hall, “Recent Developments in the Captive Insurance Industry,” Center for Insurance Policy Research (CIPR) Newsletter [January 2012], accessed February 7, 2014.

Comments

When we look around we are amazed at the speed with which the world is changing. Online fraud techniques such as Pharming and other cyber-crime attacks are at all time high. To overcome such challenges, we need to at least have some basic understanding of these terms. The intention of this informational document is to approach the problem with a solution.

What is Pharming

Pharming redirects Internet users from legitimate websites to malicious ones using a strategy called DNS Cache Poisoning – where corrupt data is inserted into the cache database of a DNS.

The attacker uses several ways to carry out pharming attacks, one of the most popular way is to modify the Host file. The Pharmer covertly hijacks your computer and takes you to a forged website. Your browser may display the legitimate URL, but you will not be on the legitimate server. This, in most cases, is a page that looks identical to that of your bank, financial institution or online shopping websites like, eBay, or Amazon. Here, the attacker seeks your confidential information like credit card numbers, account passwords, etc.

The Hosts fi­le allows storing IP & domain names to speed up sur­fing and avoid consulting a DNS server. So, every time a user enters the address into the browser, the PC accesses the Hosts fi­le fi­rst and, if it ­finds this domain name, it takes up the IP address of a website. Now if the Hosts file is modified, the user will be redirected to the wrong website, where the attacker will be waiting to steals the credentials.

To carry out a pharming attack, the attacker typically makes use of the following:


A Batch Script to write the malicious IP and domain names onto the Hosts ­files.

A Joiner to join the batch ­file onto another fi­le

A Code Obfuscator to help the executable escape detection from anti-virus software.




 

Phishing vs Pharming

You need to be clear about the difference between Pharming and Phishing. Phishing attacks start with the receipt of an e-mail asking you to visit a website where you may get compromised. Pharming attacks start at the DNS server level where you are redirected to a malicious website.

How to mitigate Pharming attack

Use an anti-virus program which protects you from unauthorized alterations of the Host file is one way. Also, you should regularly patch your operating system and the installed software.

More sophisticated pharming attacks target the DNS server which is usually handled by Internet Service Providers (ISPs). In such a scenario, a user has few options at hand to handle the risk and he can do little against it, except using trustworthy DNS servers.

 

Comments

No one is safe online. Everyone is vulnerable and it is your responsibility to establish precautionary measures to protect yourself against cyberattacks. Make yourself well informed and updated on different schemes which cybercriminals used to deceive online users.

The simple tips below should help ensure your security online without ruining the convenience online access offers:

1. Your passwords should be strong enough that it cannot be easily guessed by hackers. Do not use obvious passwords using your personal information or do not use the most common passwords that are ridiculously easy to guess. Moreover, make sure that you use different passwords for your online accounts because having similar passwords on all accounts makes it easier for hackers to steal your identity.

2. Updating your software is very important. There are many good reasons why you need to update your software, thus make sure to take time updating and installing new versions of it.

3. Phishers do have the capability to copy the exact interface of a certain website and lure you into one. They will do everything to obtain personal information from you using those fake sites. Closely examine the site you are accessing before logging in your account and before giving out any personal and financial information.

4. A recovery contact is very important at times where you can’t login to your account. Make sure to set an account recovery contact in case you can’t access your own account.

5. Take advantage of setting up a two-step authentication as it serves as an added security to your accounts and will prevent hackers from accessing your account easily.

Dangers and threats are lurking on the Internet and hackers are always on the hunt looking for someone to victimize. Make yourself invincible and hard to hack, follow the basic ways above and be updated on latest schemes cybercriminals used.

 

Comments

There were an estimated 3.6 million cases of fraud and two million computer misuse offences in a year, according to an official survey.

The Crime Survey for England and Wales included the offences for the first time in its annual report, which covered the year to September.

Separate figures recorded by police showed an 8% rise in offences overall.

The Office for National Statistics said crime recording improvements meant the police figures could not reveal trends.

'Crime has changed'

John Flatley, from the ONS, said: "In the past, burglary and theft of vehicles were the high-volume crimes driving trends but their numbers have fallen substantially since then.

"When the crime survey started [35 years ago], fraud was not considered a significant threat and the internet had yet to be invented.

"Today's figures demonstrate how crime has changed, with fraud now the most commonly experienced offence."

Sir Tom Winsor, the Chief Inspector of Constabulary for England and Wales, told the You and Yours programme on BBC Radio 4 that many frauds went undetected and a great deal never got reported to the police.

"The amount of fraud that is taking place now is probably in epidemic proportions," he added. "The police are having to work very, very hard to keep up with even the ones they know about.

"The capability at police forces is quite skeletal and that needs to change and change a great deal."

The National Police Chiefs' Council lead for crime and incident recording, Chief Constable Jeff Farrar, said forces were working with the Home Office, police and crime commissioners, and industry experts to develop new tactics to fight cybercrime.

"The ability to commit crime online demonstrates the need for policing to adapt and transform to tackle these cyber challenges," he said.

Cyber and fraud: What is being counted?

  • Bank and credit account fraud - meaning criminals accessing bank accounts, credit cards or fraudulently using plastic card details
  • "Advance fee fraud" - crimes where the victim has been tricked into handing over cash after a communication, such as a lottery scam
  • "Non-investment fraud" - criminals conning a victim into buying something, often online, perhaps through a bogus phone call or email.
  • Other frauds including investment or fake charity scams
  • There are two broad categories of "computer misuse" crimes:
  • Unauthorised access to personal information, including hacking
  • Computer virus, malware or other incidents such as "DDoS" attacks aimed at online services


     

 

 

Comments
More


You are visitor no.

Make your free website at Beep.com
 
The responsible person for the content of this web site is solely
the webmaster of this website, approachable via this form!