শনিবার, ১ ডিসেম্বর, ২০১২

5 Ways to Keep your Website Secure

5 Ways to Keep your Website Secure 

 

  1. Strong Passwords: It all starts with the very basics. Don’t be so easy or laid back in creating a password because that is only going to make it that much more convenient for your account to be hacked. Remember the hacker isn’t going to be a complete novice and chances are that whoever is attempting to break in to your system will rely on ‘brute force hacking’ in which millions of character combinations are made to decipher the password. It also helps to regularly change your password, on a monthly basis for example. Every inch of effort on your part counts!
     
  2. Firewall Protection: Undoubtedly, utilizing firewalls is a crucial step in ensuring website security. To prevent unauthorized entries on to your server, a firewall is necessary to ensure bad information is blocked from infiltrating the system. A lot of companies hire specialists to set up string firewalls. In addition, it helps to keep the companies’ Web servers separate from the rest of the network to steer clear of break-ins.
     
  3. Malware Alert: You may have heard of this terminology before and if you have then you should know very well that if it manages to get on to your website, you’re in for trouble. Malware can get on to your server through a myriad of ways ranging from poor choice of passwords to unprotected permissions settings and using software that involves third party add-ons that only make it easier for sensitive information to be interpreted and misused. To avoid this, make sure you run spyware removal programs on a regular basis.
     
  4. Data Backup: The fact is that no matter what precautions you take, risk always exists. In order to deal with this, it only makes sense to back up all your data beforehand! Make sure you know exactly what to back up. All information that is required to get the website running to as it was initially is what is needed. Also, it should be noted that the backup should be kept off the site or on a different server. Website backup services can be offered by your hosting services or you can use third party plugins for Joomla, WordPress or other CMS powered websites. Here are some popular backup plugins for Joomla, WordPress and regular websites:
   Edited By:  Engr. Mahamud Hasan Sajib , IICT, BUET
                                                                                                           


10 Security Awareness Tips in Computer and  Internet Use 

 

  1. Use of Password: Password of Computer and Internet is like Lock & Key of your house. It is a major defense for computer and internet security. Good password practice will help in keeping personal & your organizational information more secure.
    1. Use of Strong Password-
      • Use a strong password to protect your data: use at least eight characters; combine letters (capital and lowercase), numbers and symbols. The greater variety of characters that you have in your password, the harder it is to guess. Don’t use personal information — name, child’s name, birthdates, etc. — that someone might already know or easily obtain and try to avoid common words: some hackers use programs that try every word in the dictionary.
      • Disable Auto complete/Password storage in-browser.
         
    2. Change your Password at Some Regular Intervals-
      • ​Changing your password at some reasonable interval will enhance the security of your password.
         
    3. Keep your Password Secret-
      • Your password should not be shared with anybody. Try to keep your passwords to memory with a strategy to memorize them. If you write password anywhere, be careful as to where you are storing it. Such recording should be secret and secured so that only you can access to it.
         
    4. Use Different Passwords-
      • As per as possible, use different passwords for each online account you access (or at least a variety of passwords). If you use the same passwords on multiple accounts, an attacker who gains the access to one account will be able to access all of your accounts.
         
  2. Secure your Computer: Lock your computer when you leave your desk for a meeting, a break or any other purpose. Utmost care and observation should be kept   when you at all allow other people to plug their USB drive into your computer.
     
  3. Don't install or use illegal and/or unauthorized software: Installing and using unauthorized software means compromising your data security and increase security vulnerabilities.
     
  4. Use e-mail and Internet with Care:
    1. Don’t open unknown e-mails and attachments.
    2. Don’t click on any hyperlinks contained in a suspicious email.
    3. Share documents in PDF format to ensure that the files cannot easily be changed.
    4. Do not share information about your organization and duties on social networking sites.
    5. Don’t download documents and material from untrusted parties.
    6. Do not access, download, store or send any illegal or offensive material.
       
  5. Use of Portable Devices:
    1. Laptops-
      • Use legal and authorized software.
      • Switch off wireless connection when not required.
      • Back up the information stored in your laptop.
      • Lock your laptop when you leave your desk to go for a meeting, a break and/or lunch.
      • Don’t leave your laptop unattended.
      • Don’t leave your laptop on view in the car.
         
    2. USB Drives-
      • Use an encrypted USB drive.
      • Scan USB flash drive after copying files from to avoid virus transmission.
         
    3. Mobile phones and Black Berrys-
      • Switch off wireless connections (i.e. Bluetooth and WLAN) when not in use.
      • Don’t leave your mobile and Black Berrys unattended.
         
  6. Handle Information with Care:
    1. Protect sensitive content with a password to help prevent someone from changing or deleting it.
    2. Don’t leave sensitive information in shared conference facilities or meeting room.
    3. Remember to collect all the printed documents from the printers' output-tray.
       
  7. Visitors:
    1. Take utmost pre-caution so that sensitive information from your table or computer are not disclosed to the inside or outside visitors.
       
  8. Use Personal Firewall Softwares: Any program on your computer that tries to access the Internet will be stopped by the firewall until you either approve it or disapprove it. Most programs today will at one time or another access the Web to look for updates for itself. After a bit of time, these interruptions do not occur nearly as often. As a tip, if you are warned that a program is trying to access the Web and you are not sure what the program is, you can Google the name of the file that is in question. Chances are very good that there is a website out there that will tell you what it is and if it can be considered safe.
     
  9. Follow your Corporate Policies and Legal Requirements:
    1. Follow your corporate / office policies relating to computer and internet use.
    2. Comply with legal requirements related to copyright restrictions, intellectual property, privacy and software licenses.
       
  10. Others:
    1. Install authentic and updated antivirus application.
    2. Remember that antivirus definition files are kept up to date.
    3. Regular scans are being run on your system.
    4. Backup your important data and files regularly. 
    5. Do not allow unknown individuals or third parties to access your computer at any time.
    6. Don't send personal or financial information over unsecure websites.
    7. When using a public computer, remember to log out your internet sessions and close the browser and clear your browser cache.
    8. Increase caution when using social media applications such as Facebook and Twitter etc.
    9. Do not click on links or open email attachments from unknown sources.
    10. Don't install programs coming from unknown sources.
    11. Do not visit sites which you don't know or which have a bad reputation.

সোমবার, ৫ মার্চ, ২০১২

Resume Mistakes

Resume Mistakes

 1. Structure

Do you know how long you have to make an impression on a recruiter? 20 seconds. That’s it. 20 short seconds. Why? Recruiters get hundreds of resumes for an opening. They can’t possibly look in detail through each of those hundreds of resumes. So to make their job more manageable, they first look to rule candidates out (not in) and get to a more manageable list of 10-20 resumes that they can examine in more detail.
STOP!!! That took you 20 seconds to read what I just wrote. Do you think your resume made a good enough impression to get through the first cut? I’m betting not. Doesn’t sound fair does it? How can a recruiter possibly see all the great things you have accomplished in 20 seconds? The short answer is they can’t. But we live in the real world, not the perfect world. But just because the odds are stacked against you, doesn’t mean you can’t win.
It starts with structure. Your resume needs to be structured so that recruiters can scan it quickly and the important pieces of information pop out at them. Here is an abbreviated version of how to structure your resume so the important things shine.
  • Use Bullets. It is impossible for recruiters to scan a resume quickly if it full of paragraphs. However, recruiters can quickly scan bullets for the pieces of information they are looking for.
  • List most important accomplishments first. Recruiters only scan the first couple of bullets for each work experience. If your most important accomplishment is in the sixth bullet for a job, they will never see it.
  • Put your most recent work experience first. No one wants to read what you did twenty years ago. And if you put that on the first page, you are just cutting into the twenty seconds a recruiter is going to spend on your resume.
  • Quantify Accomplishments. I go into detail on this below.

2. Quantify Accomplishments

Ultimately, everyone does one of three things in their job: Make Money, Save Money, or Improve a Process.
Technically if you improve a process, you are saving money but let’s not split hairs. Candidates that get the interview and ultimately land the job offer understand this and they do a fantastic job of thinking about and quantifying the value they bring their employers. So the first thing you need to do is to quantify your results. For example:
  • Reduced supplier base by 31% resulting in savings of $4 million through design engineering and standardization
  • Improved logistics route efficiency by 20% generating a cost savings of $2.6 million annually
  • Grew sales territory from $600,000 to $1.4 million in eight months
  • Streamlined audit process resulting $1.3 million in annualized savings
Now I know, this is where I start to lose people. They say “Jeff, that sounds great but in my job, I don’t do anything that I can quantify. I’m just a truck driver or administrative assistant or a banker. I just do the same job every day.” I hear these comments all the time. Most people don’t think they can quantify any results from their job. And if I was a betting man, which I am, I would say you’re probably saying the same thing right now as you read this. But the good news is, their wrong. EVERYONE has accomplishments they can quantify and I can prove it.
A while back, I was helping a kid graduating college re-write his resume. He wasn’t getting any interviews and he figured his resume was the problem. He was a good kid but didn’t really have any professional experience yet. He did however have a summer job with an auto loan processing company. His job was to make copies of loan files all summer long. Sounds exciting, doesn’t it? I digress. Anyways, the reason he wasn’t getting any interviews was because his resume was not impressive and there were no results listed. I challenged him to quantify his accomplishments, but he was quite resistant. He said “Jeff, all I did was make copies all summer long. How the heck am I going to quantify that?” He was quite dejected thinking he was never going to land an interview. I like a challenge so I started quizzing him about his job. That is when the conversation got interesting.
Jeff the Career Coach: “I know all you did was make copies all summer but did you change anything about your job for the better?”
College Student: “Well now that you mention it, the process they had to make copies was really inefficient. I determined that if I changed a few things, I was way more productive.”
Jeff the Career Coach: “How much more productive?”
College Student: “I don’t know”
Jeff the Career Coach: “Ok, how many files per hour do you think you copied using the old process?”
College Student: “Probably 15-17 per hour”
Jeff the Career Coach: “Ok, and how many files could you copy with your new process?”
College Student: “I’m not sure but at least 24. I also taught the other employees that were making copies as well”
Jeff the Career Coach: “Great, how many employees were making copies?”
College Student: “Five counting me.”
Jeff the Career Coach: “Ok. One last question. How much did that job pay per hour?”
College Student: “$10/hour”
Ok, now we have something to work with. Let’s start at the beginning. He increased his and the team’s productivity from 16 to 24 files per hour, a 50% increase (The # of additional files: 8 divided by his old rate of 16). But that’s not all. He saved the company a ton of money.
Each person makes $10/hour. However, they cost the company a lot more because the company need to pay for benefits, taxes, etc. A good rule of thumb is a 40% increase (remember that number). Therefore, the cost to the company for that person is $14/hour ($10 for wages and $4 for benefits & taxes). On an annual basis, each employee costs $28,000/year ($14/hour times 2,000 hours). Also there were five of them, so the cost for all five was $140,000/year ($28,000 times 5). Now, he increased their productivity by 50%. That means he saved the company $70,000/year ($140,000 times 50%). Why did he save $70,000? Because now they can do 50% more work which means they could either eliminate half of the positions OR do 50% more files with the same amount of staff.
Remember, when this conversation started, all this college student did was make copies all summer long. Now we determined that he saved this company almost three times his annual salary not to mention all the work he did in his normal job. With this new information, we changed the bullet on his resume.
Old resume:
  • Made copies for auto loan files
New resume:
  • Redesigned auto loan file process increasing efficiency by 50% and generating an annual savings of $70,000/year.
Each of these bullets describe the same person. However, after reading it, which candidate would you want to interview? If a college student that spent a summer making copies can find a way to quantify his accomplishments, so can YOU!!!
Armed with this knowledge, it is time to go through your experiences and ask yourself how you Made Money, Saved Money, or Improved a Process. It might seem hard at first, but if you ponder these questions, you will surprised at what you find. By the way, I go through all of this in great detail in my webinar series.

3. Resume Secret

If you thought the first two tips were good, this one will blow you away. I call this one the Resume Secret. It is the absolute key to getting any interview you want. I will give this game-changing tip for free. All you need to do is fill out the form below and I will give you access to this special report.

Why do you need my email address?

Let’s be candid with each other. You are looking for help to write a great resume and ultimately land your dream job. I am the #1 expert in the world at job search Visit My Bio. I am not one of these sites that only dangles great content but never delivers. I will give you a lot of great stuff for free. I only ask for three things in return. First, your email address. I have to be able to send it to you and the only way I can do that is with your email address. Second, if you like the content on this site, tell your friend s about it. And finally, after I have delivered a lot of great stuff, I will invite you to attend one of my paid webinars. At that point, if you think it’s worth spending a few bucks to land your dream job, great. If not, you can still enjoy all of the other great free content on this site. I think it is a fair deal. What’s the worst that can happen? You get a few emails from me that you don’t want? You can always hit the delete button or unsubscribe from our email list.
What I do promise is I won’t hammer you with spam and crappy content. That’s just not my style. If you are still not convinced, I will make one last guarantee. If after reading The Resume Secret, you don’t think it is one of the best pieces of job search advice you have ever received, email me at jeff@jeffthecareercoach.com, and I will send you a personal apology for wasting your time. No automatic response. No email from my executive assistant. I will take time out of my busy day to personally write an apology to you. That’s how strongly I feel about the content in the Resume Secret.
So here’s what happens next. Fill out the form below. After that, you will receive an email confirming your email address is valid. If you don’t see it in your inbox, check your junk folder. Click on that link to confirm and the report will be yours.

রবিবার, ২৯ জানুয়ারী, ২০১২

DMTBF Components

DMTBF Components

Component 1 : Strategic Policy, Planning and Budget Management
1.1  Macro Fiscal Policy and Management
1.1.1  Strengthen Technical Capacity for Macro-fiscal Forecasting and Analysis
1.1.2  Strengthen the operation of Monitoring and Evaluation Wing (MEW) in Finance Division
1.1.3  Develop  capacities  and skills for fiscal policy and analysis
1.2  Debt, Treasury and Cash Management
1.2.1   Developing  capacities for Debt Policy and Management
1.2.2   Strengthening  Treasury and  Cash Management  Systems
1.3  Strengthening Budget Management and MTBF 
1.3.1  Medium-term Budget Institutional Processes and System Development
1.3.2  Roll out of the MTBF Process in all line Ministries
1.3.3  Deepen and Institutionalise the MTBF Process
1.3.4  Strengthening Budget Management Wings / Branchs in line ministries
1.3.5  Internal Audit in Finance Division 
1.4  Developing capacity of Planning Commission in line with MTBF Approach
1.4.1  Strengthening GED capacity to design and implement Result Based Monitoring of Sixth
1.4.2  Strengthening Planning Process in the context of MTBF
1.5  PFM Legislation and Regulation
1.5.1  Review and support the introduction of the enabling legislation for PFM reform
1.5.2  Review and Revision of General Financial Rules (GFR) including Treasury Rules and Accounts
1.5.3  Review and revise /update the Public Expenditure Management Manual
Component 2 : Public Financial Systems
2.1  Accounting and Financial Reporting
2.1.1  iBAS design and Development
2.1.2  Accounting Procedures and Standards
2.1.3  Strengthening Budget / Accounts Classification and Fiscal Reporting
2.1.4  Capacity Building of FMSU
2.1.5  Self Accounting Entities
2.2  Payroll, Pensions, GFF, Loans and Advances, Assets
2.2.1  Strategy -  Payroll, Pensions, GPF, Loans, Advances and Assets
2.2.2  Payroll
2.2.3  Pensions
2.2.4  GPF, Loans and Advances
2.2.5  Assets
Component 3 : Capacity Building and Training
3.1  Strengthen Training in all Aspects of Financial Management
3.1.1  Provide support to Public Finance Foundation
3.1.2  Improve Local Training Facilities
3.1.3  Establish Training for Trainers Program
3.1.4  Create TMIS Data Base for managing  DMTBF & FA /PFF sponsored training activities
3.1.5  Award Graduate level  Scholarship for Professional Training
3.1.6  Publish Journal on  Financial Management
3.1.7  Upgrade and maintain PFF website
3.2 Develop Training  Strategy  Training Strategy Across Project Components
3.2.1  Develop a comprehensive training strategy based on Training Need Assessment of counter part staff in the areas of macro-economic and fiscal policy, budget management, accounting, financial /fiscal reporting and information technology.
3.2.2  Design, develop and deliver Modularized Curriculum in Public Financial Management
3.2.3  Develop Comprehensive Evaluation Framework
3.2.4  Implement short and long term courses to meet specific needs identified in the TNA
3.2.5  Provide support and logistics for component specific study tour abroad


ENGR. MAHAMUD HASAN SAJIB
Secretariate Building 3rd Phase
Office Of the Controller General of Accounts
Room No: 213/A, Finance Division
Government Of the People Finance Ministry of Bangladesh
Segun Bagicha, Dhaka-1000
Cell Phone: +88-01190480745


সোমবার, ১৬ জানুয়ারী, ২০১২

Deepening Medium Term Budget Framework (DMTBF) and Strengthening Financial Accountability Project

About us

Background
Deepening Medium Term Budget Framework (DMTBF) and Strengthening Financial Accountability Project under Strengthening Public Expenditure Management Program (SPEMP) was launched in April 2009. The project is financed by Multi-Donor Trust Fund (MDTF) and administered by the World Bank. Ministry of Finance is executing the project with  management and implementation support from PDP Australia.
DMTBF is successive to Reform in Budgeting and Expenditure Control (RIBEC) Project and Financial Management Reforms Program (FMRP), implemented as part of Public Financial Management reforms inBangladesh.

Overall Objectives
The overall objectives of the project are to strengthen and modernize core institutions of budgeting within the government with a particular emphasis on introducing a performance orientation in Public Financial Management.

Specific Objectives
1. Modernize long term strategic planning and policy development
2. Institutionalize and deepen the MTBF approach in budget planning
3. Improve budget classification for more effective budget management
4. Formulate debt strategy and modernize retail debt.
5. Provide adequate regulatory support to  reforms including  establishment of a Public Finance Act and revise the General Financial Rules, Treasury Rules and Accounts Code.
6. Modernize and streamline payroll, pensions, general provident fund, loans & advances, and assets.
7. Strengthen the financial and performance  management capacity within line ministries in order to establish greater accountability for utilization of resources and service delivery.
8. Improve the linkages between procurement planning and budgeting
9. Consolidate iBAS towards a modern integrated budget and accounting system
10. Develop and maintain in house capacity through Financial System Management Unit (FSMU) for providing support on technology and applications system, during and after life of the project.
11. Put in place the policies, processes and skills to manage and deliver a comprehensive training and development program in support of the Financial Management Reform Program (FMRP)
Key deliverables of DMTBF
—        Capacity development for macro-fiscal forecasting, policy & analysis
—        Improved public debt management process
—        Quality MTBF-related documents
—        Improved IT solutions and infrastructure for PFM
—        Improved Budget submissions appraisal techniques, including production of a manual
—        Preparation of a Budget Monitoring Manual
—        New processes for budget preparation, implementation and monitoring
—        Introduction of a program classification structure
—        Skilled human resources and customized training schemes for initiating and implementing reforms in PFM process
—        Development and implementation of an internal audit strategy

http://www.mof.gov.bd/dmtbf

http://www.mof.gov.bd/dmtbf/index.php/project-team

মঙ্গলবার, ১৩ সেপ্টেম্বর, ২০১১

SPEMP’s Mission & SPEMP'S Vision






  Deepening and Strengthening of existing Public Financial Management (PFM) reforms and initiation of new reforms to promote efficiency, accountability and transparency in PFM in Bangladesh. This is intended to promote better public service for enhanced quality of life and also to create a more aware pool of Bangladeshi citizens who take ownership of PFM and can sensitize a demand for better PFM on behalf of the Government.

     
Strong, transparent and accountable public financial institutions, improved public service delivery and a pool of citizens who are aware of their stake in public financial management (PFM) and can press for better PFM and enhanced service delivery.