Welcome to SecureMe101

Internet Security is Serious Business. Get Knowledge

SecureMe101's Commitment

To Ensure Online User's Security through Education

SecureMe101's Philosophy

Ignroance is not an Excuse, Acquire Knowledge

Friday, 20 June 2014

12 Fast-Growing, High-Paying Jobs In 2014 (For Youths)



What are the hottest jobs of 2014?
As youths, without much of career guidance and all the advice that could have helped shape our decisions and actions to having a rewarding and competitive career that is in tune with the demands of the industry. I came across this piece, based on scientific data, which reveals some of the jobs/roles that are in tune with the dynamic and ever evolving industries.
CareerBuilder teamed up with Economic Modeling Specialists Intl. (EMSI) to identify the occupations that grew by at least 7% from 2010 to 2013, are projected to grow in 2014, and pay at least $22 per hour.

Wednesday, 18 June 2014

Securing Your Loose Ends (Smartphones and Tablets)




As the world becomes more interconnected, integrated and intelligent, mobile devices are playing an ever-increasing role in changing the way people live, work and communicate. But it is not just happening in personal life: Smartphones and tablets are also being rapidly adopted by enterprises as new work tools, joining existing laptops and desktops. The use of mobile devices for both personal and business has experienced an explosive growth in the past few years and will only accelerate in the near future.

As employees bring mobile devices into the workplace, many organizations are motivated to encourage their use for business purposes, because they tend to drive: Increased employee productivity, reduced IT cost, improved availability and performance, easy access to company resources amongst others. Likewise individuals make use of their smartphones in online shopping, payments, banking, business communication, mobile money and utility bills settlement.
However, there are myriad of risks associated with the use of smartphones and tablets for personal or business concerns. General risks and vulnerabilities include:

  • Loss and theft: Small size and high portability make loss and theft top security concerns when a mobile device is used in the workplace. According to a mobile threat study by Juniper Networks, 1 in 20 mobile devices was stolen or lost in 2010.2When devices are lost or stolen, all of the data stored on or accessible from the mobile device may be compromised if access to the device or the data is not effectively controlled.
  • Malware: Mobile device malware—viruses, worms, Trojans, spyware—has been on the rise over the past few years because most mobile platforms do not yet have native mechanisms to detect malware. Malware can cause a loss of personal or confidential data, additional service charges (for example, some malware can send premium Short Message Service (SMS) text messages or make phone calls in the background) and, even worse, make the device unusable.
  • Spam: With the growth of text messaging, spam—unsolicited communication sent to a mobile device from a known or unknown phone number—is also on the rise.
  • Phishing: “Phishing” is an email or an SMS text message (dubbed,“SMiShing”) sent to trick a user into accessing a fake website, sending a text message or making a phone call to reveal personal information (such as a online banking details in the Nigeria) or credentials that would allow the hacker access to financial or business accounts.
  • Bluetooth and Wi-Fi: Bluetooth and Wi-Fi effectively increase the connectivity of mobile devices within a certain range, but they can be easily exploited to infect a mobile device with malware or compromise transmitted data.

In view of these threats, the following are some foolproof strategies to adopt:

  • Identity and Access: Enforce strong passwords to access the device (alphanumeric = oluwaDamilolA1#), If virtual private network (VPN) access to corporate intranet is allowed, include capability to control what IP addresses can be accessed and when re-authentication is required for accessing critical resources
  • Data Protection: Encrypt business data stored on the device and during transmission, Include capability to wipe data locally and remotely, Set timeout to lock the device when it is not used, Periodically back up data on the device so data restore is possible after the lost device has been recovered, Include capability to locate or lockout the device remotely.
  • Application Security: Download business applications from controlled locations only, Run certified business applications only, Monitor installed applications and remove those identified to be untrustworthy or malicious.
  • Integrity Control: Run anti-malware software to detect malware on storage and in memory, Run a personal firewall to filter inbound and outbound traffic.



Contributions: IBM Security Services

Friday, 24 January 2014

How to Design a Process Flow Chart

Hi Everyone,

In this blog series of Skills for 2014 #GettingRelevant, we shall be engaging ourselves on how to remain relevant in the workplace and adding valuable skills that will propel us to greatness in our chosen fields.
Today, we shall be examining how to design process flow charts in its basic form. A process in an organization is an activity carried out by a unit to bring about a desired outcome. So, as you’ll agree we have many processes in an organization that eventually leads to the desired outcome in form of products and services. There are industry-certifications dealing with process creation, improvement and optimization like Lean and Six Sigma – you can Google and read more.
First step in creating your flowchart is sketching it on a piece of paper, indicating both the start and end positions. Then you decide on which tool to use – Visio, SmartDraw, Word or Excel. We will make use of MS Visio.
In this guide, we will examine a process flowchart for a network implementation. This process has steps defined which are listed in order: Conduct a Needs Analysis and establish Business Case, Management Approval, Technical Site Survey, Gather Requirements, Network Planning and Design, Document Bill of Materials, Project Management/Implementation Plan, Execute, Evaluate Objectives/Optimize and Closing.
Let’s Begin: In your design you need to understand what each flowchart shape means. These are examples of flowchart shapes. So depending on each step of your design will determine what shape to drag to the work area.




So, after listing out your flowchart steps then start dragging the shapes into the work area.



You can use the tools provided in Visio to add text, connectors etc to your chart



After all the adds, deletes, and everything our flowchart diagram will look as follows:



There are tonnes of simple as well as complex designs available online that can help you to come up with a professional flowchart for your software, engineering and other administrative use.
Hope this little information will propel you to take on this skill and add value to yourself.
For ideas and contributions mail me sonde.damilol@gmail.com


Thursday, 27 June 2013

Three Rules for Making Yourself Indispensable at Work


With increased turnover and less time to prove yourself to higher-ups, how can you make yourself indispensable?

Demonstrate measurable results. “You’re only going to be as valuable as your last project,” says Levit. Resumes are quickly becoming irrelevant, she says – it’s not about titles or official responsibilities. (After all, even poor performers can sometimes hide behind an illustrious pedigree.) Instead, it’s about results. “You have to be able to explain your projects in a way that shows how you added value to the bottom line,” she says.

Sell yourself. Squeamish about tooting your own horn? Levit says to get over it. “You have to be very good at your job,” she says. “But you also have to make sure the right people know about your results, and subtly tout your accomplishments.” Without building a cadre of supporters in your organization, your career may be in imminent jeopardy if your boss or mentor departs. When it comes to job security, says Levit, “If higher-ups don’t know the value you add, your contributions don’t matter.”

Forget authenticity. In the Internet era, we’ve heard plenty about the need to “be yourself” and “express the real you.” Levit isn’t convinced. “You need to be the most professional version of yourself,” she argues. That doesn’t mean inventing a new personality or pretending to be someone else. But it does mean filtering anything that would embarrass you at work. “I believe in self-censorship,” she says. “Even online, regardless of privacy settings, there’s no forum where you can say absolutely anything you want.”

Source: Forbes

Wednesday, 26 June 2013

Must-Have Job Skills in 2013


Even as employers remain cautious next year about every dollar spent on employees, they'll also want workers to show greater skills and results.
For employees who want to get ahead, basic competency won't be enough.
To win a promotion or land a job next year, experts say there are four must-have job skills:
1. Clear communications
Whatever their level, communication is key for workers to advance.
"This is really the ability to clearly articulate your point of view and the ability to create a connection through communication," says Holly Paul, U.S. recruiting leader at PricewaterhouseCoopers, the accounting and consulting firm based in New York.
Looking for a job? Looking for a promotion? Marketwatch's Kelli Grant and WSJ's Simon Constable discuss the top skills you must have to have a successful career in 2013.
For job seekers in particular, clear communication can provide a snapshot of their work style to employers. "I can walk away from a five-minute conversation and feel their enthusiasm and have a good understanding of what's important to them," Ms. Paul says.
As office conversations increasingly move online, some workers are losing or never developing the ability to give a presentation, for example. Others may be unable to write coherently for longer than, say, 140 characters.
"Technology in some ways has taken away our ability to write well. People are in such a hurry that they are multitasking," and they skip basics such as spelling and proofing, says Paul McDonald, senior executive director of Robert Half International, a Menlo Park, Calif., staffing firm.
2. Personal branding
Human-resources executives scour blogs, Twitter and professional networking sites such as LinkedIn when researching candidates, and it's important that they like what they find.
"That's your brand, that's how you represent yourself," says Peter Handal, CEO of Dale Carnegie Training, a Hauppauge, N.Y., provider of workplace-training services. "If you post something that comes back to haunt you, people will see that."

Workers also should make sure their personal brand is attractive and reflects well on employers. "More and more employers are looking for employees to tweet on their behalf, to blog on their behalf, to build an audience and write compelling, snappy posts," says Meredith Haberfeld, an executive and career coach in New York.
Ms. Haberfeld has a client whose employee recently posted on her personal Facebook  page about eating Chinese food and smoking "reefer."
"I saw it on Facebook. Her supervisors saw it," Ms. Haberfeld says.
3. Flexibility
The ability to quickly respond to an employer's changing needs will be important next year as organizations try to respond nimbly to customers.
"A lot of companies want us to work with their employees about how to get out of their comfort zone, how to adapt," says Mr. Handal. "Somebody's job today may not be the same as next year."
The ability to learn new skills is of top importance, says George Boué, human-resources vice president for Stiles, a real-estate services company in Fort Lauderdale, Fla. "We want to know that if we roll out a new program or new tools that the folks we have on board are going to be open to learning," he says.
4. Productivity improvement
In 2013, workers should find new ways to increase productivity, experts say. Executives are looking for a 20% improvement in employee performance next year from current levels, according to a recent survey by the Corporate Executive Board, an Arlington, Va., business research and advisory firm.
"When you are at your job, do you volunteer for projects? Are you looking for creative ways to help your organization," Mr. McDonald says. "The way to really differentiate yourself is to be proactive."
Companies that are considering adding workers in coming years want current employees to operate in growth mode now. "My clients are looking for employees that have a great ability to understand what is wanted and needed, rather than needing to be told," Ms. Haberfeld says.
Even hiring managers need to work on certain skills as organizations consider expanding next year. "The ability to spot talent and hire people has fallen out of use over the last several years," says Ben Dattner, an organizational psychologist in New York. "As the economy turns around, companies will have to work harder to retain talented employees. Companies have trimmed the fat, and now they have to build the muscle."

Source: Wall Street Journal

15 Top Paying Certifications for 2013



Having earned an IT certification, many individuals think they are automatically entitled to a huge raise. The truth is that several factors, including geography, industry, experience, and yes, certifications, combine to play a major role in determining an individual's salary. However, certain certifications do have greater impact on the earning potential of an individual. Here, we take a look at the 15 certifications with the highest earning potential for 2013.
Note: The rankings below are derived from certifications that received the minimum number of responses to be statistically relevant in the Global Knowledge annual salary survey completed in October 2012. Certain certifications pay more, but are not represented due to their exclusive nature. These include CCIE: Cisco Certified Internetworking Expert and VCDX: VMware Certified Design Expert, for example.
1. PMP: Project Management Professional - $105,750
The Project Management Institute's (PMI) Project Management Professional (PMP) credential is recognized as the most important certification for project managers. It is globally acknowledged, in heavy demand, and highly sought after by corporations and individuals alike. A Project Management Professional designation demonstrates that you have not only the experience but also the education to successfully lead and direct projects. The PMP credential is for experienced project management professionals, as the qualifications and testing for this certification are rigorous, as are the required continuing education requirements. All of these factors ensure that the PMP credential is widely respected. The PMP experience and exam requirements focus on five process groups: Initiating, Planning, Executing, Controlling, and Closing.
2. CISSP: Certified Information Systems Security Professional - $103,299
The Certified Information Systems Security Professional (CISSP) credential is primarily intended for security managers and profes¬sionals who develop policies and procedures in information security. The CISSP certification has become the gold standard in information security certifications and education. Earning and maintaining a CISSP certification is required for many government, military, and civilian security positions. The CISSP was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Organization for Standardization) Standard 17024:2003.
3. MCSD: Microsoft Certified Solutions Developer - $97,849
The Microsoft Certified Solutions Developer is the new Microsoft developer certification that replaces the old Microsoft Certified Solutions Developer certification. The new certification validates a candidate's ability to design and build application solutions. These solutions may span multiple versions of a single technology or integrate multiple technologies. Developers are expected to analyze and design enterprise solutions using different Microsoft languages and development tools.
Currently, there are three separate certification tracks for those seeking to earn this certification: MCSD: Windows Store Apps, MCSD: Web Applications, and MCSD: Application Lifecycle Management. Each MCSD track requires anywhere from three to six separate exams. Microsoft has introduced a recertification requirement for the new MCSD. Current certification holders will have to recertify every two years, ensuring that they remain current on the base technology that will have changed due to service packs, revisions, and new product releases. (Those holding MCSE certifications will have to recertify every three years).
4. MCDBA: Microsoft Certified Database Administrator - $95,950
Access to information is critical in today's fast-paced, global environment. Corporations are even more dependent on quick and reliable systems to process and retrieve information. This means they must operate their own database servers and business intelligence software to access this information in order to grow and become more successful, and Microsoft Certified Database Administrators (MCDBA) are the ones who provide this expertise. An MCDBA-certified individual has proven his or her ability to design, implement, and manage SQL Server 2000 databases. This certification was retired on September 30, 2012, though if you achieved it before that date it will still appear on your transcript as a legacy certification. There are two new MCSE certifications for SQL 2012: Microsoft Certified Solutions Expert (MCSE): Data Platform and Microsoft Certified Solutions Expert (MCSE): Business Intelligence.
5. CCDA®: Cisco Certified Design Associate - $94,799
The Cisco Certified Design Associate (CCDA) indicates that the certified individual has a strong foundation and apprentice knowledge of network design for Cisco converged networks. A CCDA certification is for network design engineers, technicians, and support engineers, who enable efficient network environments. The CCDA-certified individual has the skills to design a routed and switched network infrastructure and services involv¬ing LAN, WAN, and broadband access for businesses and organizations.
6. MCAD: Microsoft Certified Application Developer - $93,349
The Microsoft Certified Application Developer (MCAD) credential provides industry recognition for professional developers who build powerful applications using Microsoft Visual Studio .NET and Web services. Responsibilities include implementing requirements, developing, testing, deploying, and maintaining department-level applications components, Web or desktop clients, or back-end data services by using Microsoft tools and technologies. The MCAD certification is appropriate for Programmers, Analysts, Software Engineers, Software Application Specialists and Application/Software Developers.
7. VCP-DV: VMware Certified Professional Datacenter Virtualization - $92,400
Virtualization, and those who are knowledgeable on virtualization products, are in heavy demand, especially those professionals with datacenter virtualization skills. In the highly competitive virtualization market it is essential to distinguish yourself with a certification that validates your technical capabilities. VMware is one of the leading vendors of virtualization products and earning a VMware certification is the first step toward gaining industry-recognized expertise in virtual infrastructure. Earning the VCP-DV certification demonstrates that you have not only completed a VMWare-authorized training course but also have the necessary experience and training to successfully install, deploy, scale, and manage VMware vSphere environments.
8. CNE: Certified Novell Engineer - $91,350
The Certified Novell Engineer (CNE) shows that those certified individuals have the expertise and knowledge to solve advanced company-wide support problems and high-level network problems. They perform planning, installation, configuration, troubleshooting, and upgrade services for networks. The Certified Novell Engineer (CNE) has been recognized as one of the IT industry's leading certifications for advanced networking and troubleshooting professionals.
9. ITIL v3 Foundation - $90,900
The Information Technology Infrastructure Library (ITILv3) is a foundational process that provides for quality IT Service Management. The success of ITIL is through the use of documented and proven processes that cover the entire Service Lifecycle. The ITIL Expert level is the third of four levels. The ITIL Expert level certification is aimed at those individuals who are interested in demonstrating a superior level of knowledge of ITIL Version 3 (v3) in its entirety. Once you have achieved ITIL Expert level you will also satisfy the pre-requisite entry criteria for the ITIL Master Level; the highest level of certification within the ITIL v3 scheme, though the Master level is still under development.
10. CCA: Citrix Certified Administrator - Citrix XenServer 6 - $90,850
The Citrix CCA is an entry-level certification. Earning this certification validates the candidate's skills with one of 11 specific Citrix products, the most popular being XenApp, XenDesktop, and XenServer. The Citrix Certified Administrator (CCA) for Citrix XenServer 6 certification validates the certified individual's ability to effectively install, configure, administer, troubleshoot, and maintain XenServer 6.0 Enterprise edition and Provisioning Services 6.0 in an enterprise environment.
11. MCITP: Database Administrator - $90,200
The MCITP certification validates that the IT professional is capable of deploying, building, designing, optimizing, and operating technologies for a particular job role. MCITP certifications builds on the technical proficiency measured in the Microsoft Certified Technology Specialist (MCTS) certifications. In order to earn the MCITP: Database Administrator you must first pass the Microsoft Certified Technical Specialist certification in SQL Server 2008 (by passing the 70-432 exam) and then pass the 70-450 exam. The MCITP Database Administrator demonstrates knowledge of SQL Server instances and database solutions, database server security solutions, high availability databases, backup and recovery solutions, monitoring strategies, database management and maintenance strategies, and data distribution strategies.
12. MCTS: SQL Server 2005 - $90,100
Those who have earned the MCTS: SQL Server 2005 certification are IT professionals who may pursue careers as database administrators, database developers, or business intelligence developers. They may also be people who do not work with Microsoft SQL Server as a part of their primary job functions but who want to show their breadth of technology experience, such as developers, systems administrators, and others. This certification validates that the IT professional can implement and maintain databases by using specific instructions and specifications.
13. MCT: Microsoft Certified Trainer - $89,949
Those holding the Microsoft Certified Trainer (MCTs) certification are the premier technical and instructional experts on Microsoft technologies. An MCT has earned at least one premier certification on a Microsoft product and maintains that certification. Some of the benefits of earning and maintaining an MCT include access to the complete library of Official Microsoft Learning Products; substantial discounts on exams, books, and Microsoft products; members-only newsgroups and online community resources; and invitations to exclusive events and programs. MCT's must renew each year by completing an online application, pay an annual fee, and meet a number of program requirements to renew your certification for the coming year.
14. CCNP®: Cisco Certified Network Professional - $89,749
There are two tracks available at the Associate and Professional levels - Designing and Networking. The Cisco Certified Network Professional (CCNP) demonstrates that you have the ability to plan, implement, verify, and troubleshoot local and wide-area enterprise networks. A CCNP-certified individual is expected to work collaboratively with other Cisco specialists on advanced products such as security, voice, wireless, and video solutions.
15. CCA: Citrix Certified Administrator - Citrix XenDesktop 5 - $89,499
The Citrix CCA is an entry-level certification. Earning this certification validates the candidate's skills with one of 11 specific Citrix products, the most popular being XenApp, XenDesktop, and XenServer. The CCA for Citrix XenDesktop 5 certifies the expertise required to install, administer, and troubleshoot an enterprise environment containing a XenDesktop implementation, including Provisioning Services, XenServer, XenApp and the Desktop Delivery Controller
Summary
Earning a certification does not guarantee that you will walk into a higher paying job. Certification counts, but employers look at several factors, including experience. There was a time when certification holders were reasonably assured of landing a job. Today it is more of a qualifier - not having a certification means you may not even get an interview.

Source: Global Knowledge

Wednesday, 12 June 2013

PRISM Would Have Come Off Better With Better PowerPoint Design


I don’t know what to believe about the world anymore. First of all, how does an NSA contractor have the ability to wiretap anyone, ANYONE, from an infrastructure level to a legal level? Is the legal part that “terrorism” is important enough to bypass a court? Is the infrastructure part that the data is available on the NSA’s servers somewhere, and this guy who worked at Booz Allen for three months was given clearance for it? How did this happen?
This part isn’t clear for me, though Michael Arrington has some plausible theories.
Still, I and the rest of the world, six days after the first story broke, have little idea whether this AIM, Facebook Messenger, Paltalk conversation you and I are having is directly accessible to the U.S. government, which, at anytime — and whether or not anyone has clearance — can look at it (Hi guys?!). What we do know for a fact though is that the NSA sucks at PowerPoint. 
Whistleblower Edward Snowden says you can wiretap Obama if need be, but the NSA has done a poor job of expressing that impact through its PRISM PowerPoint presentation. Exactly how much access the government has to company data is completely belied by its shitty graphic design skills.
“The top banner with the logos, it’s horrible, you cannot avoid it,” French PowerPoint designer Emiland De Cubber, who turned the government’s laughable deck into something more design-friendly (above), tells me. “You cannot say it’s bad — for someone who is not a designer to not know design at all. But you can say you didn't think very much about what you wanted to say. It’s sad. Because people did not think about those slides.”
And their eventual audience of, I dunno, 2 billion or so people.
De Cubber is, yes, a PowerPoint slide designer who believes the U.S. government could have conveyed its message more effectively through visual design: “Half of the people don’t care about design, but the other half do care about it. It’s like a PowerPoint clichĂ©, and not as threatening as it actually is.”
And his opinion on the guy who leaked the terrible slides in the first place? “He’s in a good place to be TIME Man Of The Year.”
Stop spying on us, American government.
Source: TechCrunch