Kolkata: The Kolkata Municipal Corporation (KMC) will conduct regular food drives during Durga Puja, with a special emphasis on keeping the quality of packaged drinking water and soft drinks in check. “For the last few years, we have been conducting drives during Puja to ensure that quality of food is not compromised with. But there are chances of tampering with packaged water and soft drinks. So, I have instructed my team of food inspectors to give special focus on the same,” Member, Mayor-in-Council (Health) Atin Ghosh said. Also Read – Rain batters Kolkata, cripples normal lifeHe added that food safety officers have been directed to take strong action against the businessmen who will be found selling inferior quality drinks. The drive that will start in a day or two, will continue on a regular basis till Kali Puja. Ghosh will himself lead drives at Borough 6 on October 9, in Kankurgachi area on October 10, in Park Cicus and Gariahat area on October 11. “There will be random drives in food stalls adjacent to puja pandals in South Kolkata on October 13 and in North Kolkata on October 14,” he added. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedGhosh further assured city residents that no trace of formalin has been found in fish brought from Andhra Pradesh. “This year, we have collected as many as 88 fish samples from 22 markets in the city. After the Bihar government imposed ban on fish from Andhra Pradesh, we collected six samples from Patipukur Market. All these samples have been found to be safe,” Ghosh said, adding that further drives will continue in this regard. KMC has already examined the various samples of fish, meat, meat products and other things that have been collected during food drives in the last few months.
Register Now » If the cellphone hacking scandal that caused the downfall of Britain’s best-selling tabloid, News of the World, made you wonder about your own vulnerability, consider these statistics.Globally, telecommunications-fraud losses, which includes cases of mobile-phone fraud, were estimated to hit $72 billion to $80 billion in 2009, up 34 percent from 2005, according to a 2009 survey of security experts from the Roseland, N.J.,-based Communications Fraud Control Association. Hacking alone accounted for $3.2 billion in losses for the telecom industry, says CFCA.What’s more, the problems have likely only expanded as smartphone use has escalated. In the U.S., smartphone ownership grew 60 percent from 2009 to 2010. And then from 2010 to 2011, the increase was 42 percent, according to Javelin Strategy & Research’s July Second Annual Antivirus, Browser, and Mobile Security Report.The uptick is significant because analysts had long suggested that cellphone insecurity wasn’t a huge threat because each phone and service provider offered different operating systems — making the creation of malware for mobile phones tricky. But as the devises proliferate, the category will become increasingly fruitful for fraudsters, according to Boaz Bechar, a vice president of business development at the Tel Aviv-based security firm, Humbug Telecom Labs, which works with international service providers.To protect yours and your company’s data here are three mobile phone security tips to consider:Lock it up. At the very least, make sure your phone and keypad are password protected, says Bechar. On some phones, you might even enable a so-called lock-out in which the phone locks itself after a set stretch of inactivity. “That way, if someone steals your phone, they can’t access your information,” he says. Then, make sure that you use strong passwords that are long and difficult to ascertain. They should also be completely different than the passwords you use for your banking and online accounts. And absolutely do not program your passwords into your phone.Make sure your voicemail password is also hard to crack, says Bechar. Even if you’re not worried about someone eavesdropping on your phone calls, fraudsters can certainly drain your bank account if you’re not wary. The code should be six to eight digits and don’t even consider using 1,2,3,4,5,6,7,8, he says. You might even call your provider and disconnect your ability to remotely check your messages.Watch that app. Last year, more than one million of China’s cellphone users were infected with a virus that automatically sends text messages. How did they catch that virus? They downloaded an antivirus application that they thought would help protect them against hackers. If you want to download encryption software, do. But just make sure it’s from a reputable seller. Bechar adds that sticking to apps in, say, Apple’s App Store, which certifies its apps, can also be a good idea.Keep it clean. Depending on what kind of phone you have, different applications can be used to help you remove your information remotely. For instance, MyMotoblur can erase your data from Motorola devises. Before you sell or discard a device, make sure you erase it then, too. July 8, 2011 min read Growing a business sometimes requires thinking outside the box. Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Opinions expressed by Entrepreneur contributors are their own.
Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Illustration from Shutterstock.comNever heard of a DDoS attack? Small companies that do business online ought to learn about this growing online threat — and figure out how they’ll respond should one ever hit them.Consider what happened to Los Angeles-based business-planning publishing and advisory company Growthink. Last September, a surprise flood of bogus traffic knocked its website off the internet for several days. Growthink turned to its hosting firm for help, only to have its website sidelined so other sites wouldn’t be collateral damage. It finally recovered by hiring a DDoS-protection firm, BlockDos, to filter out the bad traffic. Then it moved to a new hosting service, Rackspace, so it would be better prepared next time.”It was pretty intense,” says Kevin McGinn, Growthink’s IT director. “We had no idea why we were being singled out.”Growthink had suffered a “distributed denial-of-service” attack. In a DDoS attack, legitimate site visitors are denied access by hackers who immobilize the site either with a flood of bogus internet traffic or a surgical strike that exhausts the resources of a specific web application. Successful attacks can cripple business operations. Growthink estimates its website outage erased $50,000 in revenue.Related: Why You Might Need to Rethink Your Internet Security — NowAs Growthink discovered, it isn’t always clear who’s out to get you. Experts say e-commerce outfits and other businesses that rely heavily on the web for their livelihoods are most at risk. Smaller companies are most often attacked by unscrupulous competitors and extortionists, although disgruntled former employees, vandals and “hacktivists,” or hackers with a political agenda, are also known culprits.With both the number and ferocity of attacks rising, DDoS incidents are a growing threat. In the last year, CloudFlare, a San Francisco cloud-based web performance and security firm, said it has seen a 700 percent rise in DDoS traffic.Small companies are increasingly finding themselves in the crosshairs, experts say, as the cost of mounting attacks drops and large companies get better at stopping them. Attackers can rent “botnets” of 1,000 hijacked malware-infected home PCs capable of taking down sites of most small-to-medium-sized businesses for only $400 a week, according to Incapsula, a competitor to CloudFlare that’s a subsidiary of security firm Imperva, both of Redwood Shores, Calif.Even modest extortionists can profit. Australian e-commerce company Endless Wardrobe received an email in May demanding $3,500 via Western Union. When the firm didn’t comply, its site was knocked offline for a week by a torrent of bogus visits. The downtime cut revenue by at least the amount of the demanded ransom.Here are tips on how to survive if you find your business under a DDoS attack, too.Related: How to Make Your Website Hacker-ProofFind a hosting service or ISP that will help. Many hosting services put large numbers of small websites on the same servers to boost efficiency. That’s fine until one site is attacked and the hosting company takes it offline so other customers on the server aren’t hurt as well.Check your contracts and speak with your hosting service or internet service provider, or ISP, to find out what it will do if you come under attack. Will it help you stop the attack and recover, and if so, at what cost? Will it send you a giant bill because an attack generated a ton of extra traffic to your site?A growing number of these service providers are offering security features, including DDoS protection, as a way to differentiate themselves in a crowded market. Such companies, which often employ technology from specialists such as Arbor Networks, include Firehost, Rackspace and iWeb.Hire help.Companies that provide website acceleration services also often help fend off DDoS attacks. For instance, CloudFlare provides a free basic level of DDoS protection that it says will stop most attacks, and two tiers of service at $20 and $200 a month that can stop larger attacks. Incapsula includes DDoS protection as part of its Enterprise tier of service for an undisclosed fee.If you’re targeted with a highly sophisticated attack, however, you may want to consider hiring a DDoS-protection specialist, such as Prolexic, a cloud-based security company based in Hollywood, Fla.Investigate ways to fortify your site.CloudFlare co-founder and CEO Matthew Prince suggests using nginx web server software — favored by the likes of Netflix and WordPress — because it can be more resistant to DDoS than other programs. He also recommends using the latest versions of your web software, such as WordPress and shopping carts, to prevent some application-based attacks.Related: How to Determine If Cyber Insurance Coverage Is Right for You August 2, 2012 4 min read Opinions expressed by Entrepreneur contributors are their own. Growing a business sometimes requires thinking outside the box. Register Now »