Don’t judge a book by it’s cover!


Appearance vs Reality is one of the most common themes used in literature to this day and has been explored in many ways. We can judge more than just people on their appearance or outward expression.

Success has just as many faces as any other possible theme, depending on the society in which it is measured, and the character of the person who measures it. Wrongfully, many people confuse success is only associated with wealth: they assume that a person’s triumph can be concluded from the expensiveness of his or her watch, car, or house. But will they be successful just because they are rich?

Success is not the key to happiness. Happiness is the key to success. If you love what you are doing, you will be successful.’ For it’s only when you find satisfaction with what you’re doing and don’t dread facing every new day when your task has to be embarked upon, that you are really successful. Therefore, success should be not only being measured with wealth but also with happiness. Since time immemorial everybody has been striving for success which could fulfill many dreams. It is generally accepted that success is not easy to achieve and depended on a lot of factors, such as hard work, good luck, health condition or even the once-in-a-lifetime chance. Today, people are pushing, but in vain, for a shortcut to their desired successes. Through my lens, I have faith that a grand success primarily comes from hard work, and also from good luck partially. In this train of thought, I would say that I agree that success is the main consequence of hard work.

How to deal with increasing cyber crimes

The development and advancements and the unprecedented use of technologies have created a threat ground where organizations now need to leverage effective cyber security strategy. From securing networks and hardening systems to safeguarding data from cyber attacks, cyber security has become a bedside approach than ever.

EDR is an emerging cyber security solution that collects, records, and stores a large amount of data from endpoint activities to provide a different capability to the security stack. It advances threat detection far beyond the capabilities of traditional EPP solutions and actively finds out anomalies using behavioral monitoring and AI tools. By leveraging EDR, security teams in an organization can continuously monitor access data points, which provide them with surveillance-like visibility that can be used to inspect a past incident or to proactively hunt for threats in their environment.

India  also taken major steps toward securing the citizens data by clearing the paths to introduce the National Cyber security Strategy. Currently, the Information Act, 2000 is the primary law for dealing with cyber crime and digital commerce in the country. In an attempt to bolster the cyber security ecosystem, the Ministry of Electronics and Information Technology (MeitY) of India has launched Cyber Surakshit Bharat initiative, in association with the National e-Governance Division (NeGD). Also, many crucial steps have been taken against potential cyber attacks, including National Critical Information Infrastructure Protection Centre  (NCIIPC), appointment of chief security officer, crisis management plan, training and mock drills, and more. Now the country is going to publish the National Cyber security Strategy in January 2020.

Over the years, making sure cyber  security has always been a challenge for businesses across the globe. And it is anticipated that the quantity of data theft by cyber criminals could rise by an enormous percentage over the next five years. In the current scenario, it has become the primary concern not only for protecting citizens’ data from cyber attacks but also to protect the corporate, public and private sectors data itself

WhatsApp Snooping and Data Privacy

WhatsApp is a popular free platform used by billions of internet users. They install it to take advantages of a large number of its simple, useful features and exchange text messages with attached videos and audio files, using Android or iOS phone, PC or Mac computer or another smart mobile device. They can easily share a lot of information.

It is a common notion that instant messaging apps like WhatsApp must implement the strongest possible encryption to prevent user tracking and privacy invasion. That’s fine from a user’s perspective. But now, WhatsApp is prone to attack by a spyware named Pegasus.

Pegasus is the name of spyware that can be installed on devices running certain versions of iOS, Apples’s mobile Operating System. Upon clicking on a malicious link, Pegasus secretly enables a jailbreak on the device and can read text messages, track calls, collect passwords, trace the phone location, as well as gather information from apps including (but not limited to) iMessage, Gmail, Viber, Facebook, WhatsApp, Telegram, and Skype. It has been revealed that Pegasus can also target Android devices.

We can see that this situation is alarming. No one’s data is safe. All of us need to be careful with Spywares and safeguard our personal and professional data in our mobile phones.

Introduce Yourself (Example Post)

This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right.

You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click the “New Post” button, and tell us why you’re here.

Why do this?

  • Because it gives new readers context. What are you about? Why should they read your blog?
  • Because it will help you focus you own ideas about your blog and what you’d like to do with it.

The post can be short or long, a personal intro to your life or a bloggy mission statement, a manifesto for the future or a simple outline of your the types of things you hope to publish.

To help you get started, here are a few questions:

  • Why are you blogging publicly, rather than keeping a personal journal?
  • What topics do you think you’ll write about?
  • Who would you love to connect with via your blog?
  • If you blog successfully throughout the next year, what would you hope to have accomplished?

You’re not locked into any of this; one of the wonderful things about blogs is how they constantly evolve as we learn, grow, and interact with one another — but it’s good to know where and why you started, and articulating your goals may just give you a few other post ideas.

Can’t think how to get started? Just write the first thing that pops into your head. Anne Lamott, author of a book on writing we love, says that you need to give yourself permission to write a “crappy first draft”. Anne makes a great point — just start writing, and worry about editing it later.

When you’re ready to publish, give your post three to five tags that describe your blog’s focus — writing, photography, fiction, parenting, food, cars, movies, sports, whatever. These tags will help others who care about your topics find you in the Reader. Make sure one of the tags is “zerotohero,” so other new bloggers can find you, too.

Design a site like this with WordPress.com
Get started