Tuesday, 7 June 2022

Cybersecurity Skills

Cybersecurity professionals should be well-versed in computer systems and networks and should have the ability to solve problems and communicate solutions despite the wide variance in job responsibilities across different cybersecurity roles in different industries, studies have shown that specific skills are universally essential for cybersecurity professionals. A recent study from labor market analytics firm Burning Glass showed that application development security and cloud security skills were the most in-demand for cybersecurity professionals, with five-year projected growth rates of 164 and 115 percent respectively. Those skills were also lucrative, each with a $12,000-15,000 average salary premium. With a 60 percent expected growth rate and a $13,000 cybersecurity analyst salary premium, risk management skills were next.

Cybersecurity Technical Skills


Networking
Understanding how computers connect and interact with each other is a key skill to succeed in cybersecurity. In a survey by The SANS Institute of more than 500 cybersecurity professionals, 85 percent of respondents ranked networking as a critical skill. Understanding elements like network architecture, routing and switching, network protocols, firewalls, and virtual private networks is key to planning security policies.

Operating systems and database management
Cybersecurity professionals need to understand information technology fundamentals for a range of systems, including Linux, Windows, and macOS. They should be knowledgeable on how operating systems and databases work and how to keep them secure.

Threat detection
The threat landscape in cybersecurity is constantly evolving. Threats and vulnerabilities, big or small, can come at any time and remain undetected if not carefully analyzed. Cybersecurity professionals need to know how to use the right tools and strategies to ensure that threats are identified and swiftly managed.

Risk management
In their role, cybersecurity professionals identify and mitigate any incoming security risk. Should a data breach occur, they need to be able to recover quickly so that damage is minimized.

Cybersecurity Analyst
A Cybersecurity Analyst enacts cybersecurity measures designed to protect and secure IT infrastructure including networks, hardware, and software from threats, attacks, and malicious actors.

1)  Phishing, often takes the form of fraudulent emails, calls, and other communications that aim to steal information including bank accounts, login information, and credit card numbers.
2)  Malware or other malicious computer software can take forms including viruses, Trojans, or spyware.
3)  Denial-of-service attacks where criminals try to overwhelm servers and a network with bogus traffic that locks out legitimate users.
4)  SQL injections into an application’s database that give criminal actors access to sensitive data.

Cybersecurity Important

Cybersecurity is important because so much of our sensitive information – including personal and health data, intellectual property, and governmental information systems – is vulnerable to attack, and it needs to be properly protected. The purpose of cybersecurity is to protect systems and data from cyber-attacks. Individuals and organizations use cybersecurity to ensure that their data is safe from unauthorized access. Cyber attacks can happen at any level, big or small. There have been incidences of governmental organizations being breached and citizens losing access to essential services. On an individual level, cybercrime victims have faced identity theft, blackmail, and extortion.

Cyber attacks are one of the world’s fastest-growing crimes, and cybersecurity is a crucial practice as the rate of cybercrime skyrockets. Risk Based Security found that, in 2019, over 15.1 billion records were exposed and 7,098 breaches were reported. By 2021, it is projected that damage from cybercrime will exceed $6 trillion, making cybersecurity more important now than ever. Cybercriminals are also becoming more innovative in their tactics, making cybersecurity critically important. Any business that relies on internet-connected systems (which is nearly every modern business) needs to put cybersecurity measures in place. A robust cybersecurity strategy involves implementing multiple layers of protection on devices, programs, and networks. Tools, such as firewalls and antivirus software, should be used alongside cybersecurity best practices to ensure that data is protected.

Network security monitoring tools


These tools are used to analyze network data and detect network-based threats. Examples of tools include Argus, Nagios, Pof, Splunk, and OSSEC.

Encryption tools

Encryption protects data by scrambling text so that it is unreadable to unauthorized users. Examples of tools include Tor, KeePass, VeraCrypt, NordLocker, AxCrypt, and TrueCrypt.

Web vulnerability scanning tools

These software programs scan web applications to identify security vulnerabilities including cross-site scripting, SQL injection, and path traversal. Examples of tools include Burp Suite, Nikto, Paros Proxy, and SQLMap.

Penetration testing

Penetration testing, also known as the “pen test”, simulates an attack on a computer system in order to evaluate the security of that system. Examples of penetration testing tools include Metasploit, Kali Linux, Netsparker, and Wireshark.

Antivirus software

This software is designed to find viruses and other harmful malware, including ransomware, worms, spyware, adware, and Trojans. Examples of tools include Norton 360, Bitdefender Antivirus, Norton AntiVirus, Kaspersky Anti-Virus, and McAfee Total Protection.

Network intrusion detection

An Intrusion Detection System (IDS) monitors network and system traffic for unusual or suspicious activity and notifies the administrator if a potential threat is detected. Examples of tools include Snort, Security Onion, SolarWinds Security Event Manager, Kismet, and Zeek.

Packet sniffers

A packet sniffer, also called a packet analyzer, protocol analyzer or network analyzer, is used to intercept, log, and analyze network traffic and data. Examples of tools include Wireshark, Tcpdump, and Windump.

Firewall tools

Top firewall security management suites include Tufin, AlgoSec, FireMon, and RedSeal.

Managed detection services

Managed detection services to analyze and proactively detect and eventually eliminate cyber threats. Alerts are investigated to determine if any action is required.





Monday, 6 June 2022

Marketing Techniques for Small Businesses

Flyers

This is the carpet-bombing method of cheap advertising. You find an area where you would like to do business and distribute flyers to all the mailboxes within reach. Your flyer should be brief and to the point, highlighting the services you offer or products you sell and providing contact information. Offering a free appraisal, coupon, or discount never hurts.

Posters

Most supermarkets, public spaces, and malls offer free bulletin board space for announcements and advertisements. This method is hit-or-miss, but you should try to make your poster reasonably visible and have removable tabs that the customers can present for a discount. Make each location a different color to get an idea from the tabs where the most leads are being generated. If one area is producing most of your leads, you can better target your campaign (flyers, ads in local media catering to those areas, cold calling, etc.)

Value Additions

Value additions (or value-ads) are powerful selling points for any product or service. On the surface, value additions are very similar to coupons and free appraisals, but they aim to increase customer satisfaction and widen the gap between you and the competition. Common value additions include guarantees, discounts for repeat customers, point cards, and referral rewards. The deciding factor for a customer choosing between two similar shops is the one that offers a point card or preferred customer card. You don’t have to promise the moon to add value. Instead, state something that the customer may not realize about your product or service. It's important to highlight the value additions when creating your advertising materials.

Referral Networks

Referral networks are invaluable to a business, which often include customer referrals, who are encouraged through discounts or other rewards per referral. However, referral networks also include business-to-business referrals. If you have ever found yourself saying, “We don’t do/sell that here, but X down the street does,” you should make certain that you are getting a referral in return. When dealing with white-collar professions, this network is even stronger. A lawyer refers people to an accountant; an accountant refers people to a broker; a financial planner refers to a real estate agent. In each of these situations, the person stakes their professional reputation on the referral. Regardless of your business, make sure you create a referral network that has the same outlook and commitment to quality that you do. As a final note on referral networks, remember that your competition is not always your enemy. If you are too busy to take a job, throw it their way. Most times, you will find the favor returned. Besides, it can be bad for your reputation if a customer has to wait too long.

Follow-Ups

Advertising can help you get a job, but what you do after a job can often be a much stronger marketing tool. Follow-up questionnaires are one of the best sources of feedback on how your ad campaign is going.

Why did the customer choose your business?

Where did they hear about it?

Which other companies had they considered?

What produced the most customer satisfaction?

What was the least satisfying?

Also, if your job involves going to the customer, make sure to slip a flyer into nearby mailboxes, as people of similar needs and interests tend to live in the same area.

Cold Calls

Cold calling—whether it happens over the phone or door to door—is a baptism of fire for many small businesses. Cold calling forces you to sell yourself as well as your business. If people can’t buy you (the person talking to them), they won’t buy anything from you. Over the phone, you don’t have the benefit of a smile or face-to-face conversation—a phone is a license for people to be as caustic and abrupt as possible (we are all guilty of this at one time or another). However, cold calling does make you think on your feet and encourages creativity and adaptability when facing potential customers.

The Internet

difficult to overstate the internet’s importance to building a successful business. Methods of marketing have stayed pretty much the same across the last 50 years, except for the birth and rapid evolution of the internet. No company (even a local café) should be without, at the very least, a website with vital details such as location and hours. You need a point of access for everyone who Googles first when they want to make a buying decision. You also need a social media presence (Facebook page, Instagram, and Twitter accounts) combined with a content management system (CMS) with good search engine optimization (SEO). All this digital dexterity may feel intimidating at first. However, publishing technology has evolved to the point where Wordpress—just one example of a free CMS—can meet all these needs. Yes, the internet is a beast. Make it your friendly one.

The Bottom Line

More than likely, you will find that the conversion rate on marketing is very low. Even the most successful campaigns measure leads (and converted sales from those leads) in the 10% to 20% range. This helps to shatter any illusions about instant success, but it is also an opportunity for improvement. Do you want a company to buy your product? Give a presentation showing its benefits to that company. Do you want someone to use your service? Give an estimate or a sample of what you will do for them. Be confident, creative, and unapologetic, and people will eventually respond.


Sunday, 5 June 2022

SEO

What Is SEO?

SEO stands for search engine optimization, which is a set of practices designed to improve the appearance and positioning of web pages in organic search results. Because organic search is the most prominent way for people to discover and access online content, a good SEO strategy is essential for improving the quality and quantity of traffic to your website.

Why is SEO important?

Organic search results:
The unpaid listings on a search engine results page (SERP) that the search engine has determined are most relevant to the user’s query. Ads (in this context, PPC Or Pay-per-click ads) make up a significant portion of many SERPs. Organic search results are distinct from these ads in that they are positioned based on the search engine’s organic ranking algorithms rather than advertiser bids. You can’t pay for your page to rank higher in organic search results.

Quality of organic traffic:
How relevant the user and their search query are to the content that exists on your website. You can attract all the visitors in the world, but if they're coming to your site because Google tells them you're a resource for Apple computers when really you're a farmer selling apples, those visitors are likely to leave your site without completing any conversions. High-quality traffic includes only visitors who are genuinely interested in the products, information, or other resources your site offers. High-quality SEO capitalizes on the search engine’s effort to match a user’s search intent to the web pages listed in the SERP.

Quantity of organic traffic:
The number of users who reach your site via organic search results. Users are far more likely to click on search results that appear near the top of the SERP, which is why it’s important to use your SEO strategy to rank relevant pages as high as you can. The more high-quality visitors you attract to your site, the more likely you are to see an increase in valuable conversions.

Seo Work

Search engines like Google and Bing use crawlers, sometimes also called bots or spiders, to gather information about all the content they can find on the internet. The crawler starts from a known web page and follows internal links to pages within that site as well as external links to pages on other sites. The content on those pages, plus the context of the links it followed, helps the crawler understand what each page is about and how it’s semantically connected to all of the other pages within the search engine’s massive database, called an index. When a user types or speaks a query into the search box, the search engine uses complex algorithms to pull out what it believes to be the most accurate and useful list of results for that query. These organic results can include web pages full of text, news articles, images, videos, local business listings, and other more niche types of content.

There are a lot of factors that go into the search engines’ algorithms, and those factors are evolving all the time to keep up with changing user behavior and advances in machine learning. 

SEOs use their understanding of these ranking factors to develop and implement search marketing strategies that include a balance of on-page off-page and technical best practices. An organization that hopes to earn and maintain high SERP rankings and, as a result, lots of high-quality user traffic, should employ a strategy that prioritizes user experience, employs non-manipulative ranking tactics, and evolves alongside search engines’ and users’ changing behaviors.




    Friday, 3 June 2022

    Google Keyword Planner

    Keyword Tool is free online keyword research instrument that uses google autocomplete to generate hundreds of relevant long-tail keywords for any topic.

    Google Autocomplete is a feature used in Google Search. Its purpose is to speed up the searches performed by users on Google.The search terms suggested by Google Autocomplete are selected based on many different factors. One of them is how often users were searching for a particular search term in the past. Keyword Tool helps you employ google suggest for keyword research. It extracts Google keyword suggestions and presents it to you in an easy-to-understand interface.

    To generate long-tail keyword suggestions, Keyword Tool prepends and appends the search term which you specify with different letters and numbers, places it into the Google search box and pulls out keyword suggestions. Best part, all of it happens in a split of a second!

    Using Keyword Tool, you can choose a specific Google domain out of 192 supported domains and one out of 83 languages that will be used to produce keyword suggestions.The free version of Keyword Tool can generate up to 750+ keywords from Google autocomplete in seconds.The advanced version of Keyword Tool, Keyword Tool Pro, provides on average two times more keywords in comparison to the free version and offers a handful of other useful features. You can find more information about keyword tools you can quickly find and analyze thousands of relevant long-tail keywords with free or paid versions of Keyword Tool and use them for content creation, search engine optimization, pay-per-click advertising, or other marketing activities.


    There are few places on the web where you can find keywords that people type in the Google search box. One of the most popular sources of this information is google keyword planner.

    Unfortunately, data presented by Google Keyword Planner is meant to be used for paid advertising inside the Google Ads platform. The keywords that you will find with this tool might be too generic and not very descriptive. In other words, barely useful for content marketing, blogging, or SEO. Keyword Tool does not use Google Keyword Planner to generate keyword ideas. We find keywords that people search for on Google using a different source - Google Autocomplete. Google Autocomplete, the source of data employed by Keyword Tool, was created by Google to make the search experience for people easier and faster.

    Basically, Google shows the autocomplete suggestions whenever you start typing anything into the Google search box. It is in Google's best interest to show the most relevant keywords in the autocomplete suggestions. Keywords that would help Google to retrieve the most relevant websites and help users find the most relevant content for their search query.


    Keyword Planner - is a tool created for advertisers and is not meant for content creation or SEO. Yes, it does contain valuable data about keywords such as competition, suggested bids, average monthly searches, etc.But, at the same time, it will hide profitable long tail keywords with thousands of monthly searches that can be used to create content for your website. Some digital marketing professionals think that it is done on purpose and helps Google to increase the competition and cost-per-click for a limited number of keywords.

    Keyword Tool is the best alternative to Google Keyword Planner for content marketing and SEO as it does not hide popular keywords that can be used to create content for your website.


    Keyword Tool For SEO And Content Creation

    If you want your website to get traffic from Google or other search engines, you need to make sure that it contains content created around the right keywords. What this means is that you should be utilizing words that your potential audience is already using while looking for similar content, products or services online.The best way to discover these keywords, as it was proven by thousands of thriving websites and online businesses, is to use keywords from Google search suggestions as a base to create content for your website.

    By creating content around the popular keywords that your audience is using to find information online, you are already giving great value to your website visitors. In return, Google will reward your web property with higher rankings which entails a traffic increase.


    If you are running pay-per-click (PPC) advertising campaigns and target your ads based on keywords that users type in Google, you know how important it is to select the right keywords for your campaigns.

    The relevant keywords that you target with your ads will bring the right audience to your website. Showing your ads to people that type relevant keywords will result in higher click-through rate (CTR), lower cost-per-click (CPC), and higher conversion rates for your business. As a result, you will spend less money on advertising and generate a better return on investment.

    Moody's changes Pakistan's outlook to negative from stable; affirms B3 rating

    Singapore, June 02, 2022 -- Moody's Investors Service ("Moody's")  has today affirmed the Government of Pakistan's B3 local and foreign currency issuer and senior unsecured debt ratings, the (P)B3 senior unsecured MTN programme rating, and changed the outlook to negative from stable.  The decision to change the outlook to negative is driven by Pakistan's heightened external vulnerability risk and uncertainty around the sovereign's ability to secure additional external financing to meet its needs. Moody's assesses that Pakistan's external vulnerability risk has been amplified by rising inflation, which puts downward pressure on the current account, the currency and – already thin – foreign exchange reserves, especially in the context of heightened political and social risk. Pakistan's weak institutions and governance strength adds uncertainty around the future direction of macroeconomic policy, including whether the country will complete the current IMF Extended Fund Facility (EFF) program and maintain a credible policy path that supports further financing.

    The decision to affirm the B3 rating reflects Moody's assumption that, notwithstanding the downside risks mentioned above, Pakistan will conclude the seventh review under the IMF EFF programme by the second half of this calendar year, and will maintain its engagement with the IMF, leading to additional financing from other bilateral and multilateral partners. In this case, Moody's assesses that Pakistan will be able to close its financing gap for the next couple of years. The B3 rating also incorporates Moody's assessment of the scale of Pakistan's economy and robust growth potential, which will provide the economy with some capacity to absorb shocks. These credit strengths are balanced against Pakistan's fragile external payments position, weak governance and very weak fiscal strength, including very weak debt affordability.

    The B3 rating affirmation also applies to the backed foreign currency senior unsecured ratings for The Third Pakistan International Sukuk Co Ltd and The Pakistan Global Sukuk Programme Co Ltd. The associated payment obligations are, in Moody's view, direct obligations of the Government of Pakistan.

    Concurrent to today's action, Pakistan's local and foreign currency country ceilings have been lowered to B1 and B3, from Ba3 and B2, respectively. The two-notch gap between the local currency ceiling and sovereign rating is driven by the government's relatively large footprint in the economy, weak institutions, and relatively high political and external vulnerability risk.  The two-notch gap between the foreign currency ceiling and the local currency ceiling reflects incomplete capital account convertibility and relatively weak policy effectiveness, which point to material transfer and convertibility risks notwithstanding moderate external debt.              


    RATINGS RATIONALE

    RATIONALE FOR THE CHANGE IN OUTLOOK TO NEGATIVE FROM STABLE

    HIGHER EXTERNAL VULNERABILITY RISK TO PERSIST DUE TO UNCERTAINTY AROUND ADDITIONAL EXTERNAL FINANCING

    Moody's expects Pakistan's current account to remain under significant pressure, on the back of elevated global commodity prices through 2022 and 2023. Pakistan's current account deficit has widened to a cumulative $13.8 billion since the start of the current fiscal year in July 2021 up until April 2022, compared to a deficit of $543 million in the same period a year earlier. In the absence of an equivalent inflow in the financial account, the rapid widening of the current account deficit has led to a large drawdown of the foreign exchange reserves. According to data from the IMF, Pakistan's foreign exchange reserves have declined to $9.7 billion at the end of April 2022, which is sufficient to cover less than two months of imports. This compares with the $18.9 billion of reserves at the end of July 2021.

    Moody's projects the current account deficit to come in at 4.5-5% of GDP for fiscal 2022 (ending June 2022), slightly wider than the government's expectations. As global commodity prices decline gradually in 2023 and as domestic demand moderates, Moody's expects the current account deficit to narrow to 3.5-4% of GDP. Moody's current account deficit forecasts are higher than previous (early February 2022) projections of 4% and 3% for fiscal 2022 and 2023, respectively.

    The larger current account deficits underscore the need for Pakistan to secure additional external financing, especially given its very low foreign exchange reserves. Pakistan is in negotiations with the IMF on the seventh review of the EFF programme. Moody's expects Pakistan to successfully conclude the review by the second half of the year, with the associated IMF financing to be disbursed then. Conclusion of the seventh review, and further engagement with the IMF, will also help Pakistan secure financing from other bilateral and multilateral partners. In this scenario, Moody's expects Pakistan to be able to fully meet its external obligations for the next couple of years.

    However, Moody's assesses that the balance of risks is on the downside. An agreement with IMF could take longer than expected, as the government may find it difficult to reduce fuel and power subsidies given rising inflation. Recent moves by the government to raise fuel prices signal its commitment to addressing issues raised by the IMF. Still, political and social challenges will complicate the government's efforts to agree on and implement further reforms, such as revenue raising reforms. While not Moody's baseline scenario, if Pakistan is unable to secure additional financing later this year, foreign exchange reserves will continue to be drawn down from already very low levels, increasing the risk of a balance of payments crisis.

    HEIGHTENED POLITICAL RISK CHALLENGES THE STABILITY AND PREDICTABILITY OF POLICYMAKING

    As mentioned above, Pakistan's rising external vulnerability risk has been amplified by rising inflation, particularly in the context of heightened political and social risks. In April 2022, inflation reached 13.4% year-on-year, with particularly high inflation in food and energy which account for a very large share of the most vulnerable households' budgets.

    Moody's assesses that political uncertainty in Pakistan remains high, even after the new government has been installed. The new ruling coalition comprises of multiple political parties with divergent interests, which is likely to make the enactment of any legislation difficult, including those related to reforms under the IMF EFF programme. Moreover, the next elections are due by the middle of 2023. In Moody's view, political parties will find it difficult to continually enact significant revenue-raising measures in the run-up to the elections, especially in a high inflation environment.

    Rising interest rates are also likely to increasingly constrain the government's policy choices, especially since interest payments already absorb more than 40% of revenue.

    Meanwhile, domestic political risk has also risen with a higher frequency of terrorist attacks over the last year. According to the Pak Institute for Peace Studies think-tank, the number of terrorist attacks increase 42% in 2021 compared to a year ago. More frequent terrorist attacks add to safety concerns, which may increase social risks, as well as constrain business conditions and limit investment.

    Moody's assesses that there is a material probability of a recurrence in domestic political stress that will impinge on the effectiveness of policymaking and the government's ability to implement timely economic reforms aimed at achieving macroeconomic stability.

    RATIONALE FOR THE AFFRIMATION OF THE B3 RATING

    The affirmation of the B3 rating reflects Moody's assumption that Pakistan will secure external financing, including through the conclusion of the seventh review and subsequent reviews under the IMF EFF programme and avoid a balance of payment crisis.

    Pakistan's B3 rating also reflects Moody's assessment that the country's large size and robust potential growth provides it with some capacity to absorb economic shocks. Pakistan's potential growth of about 5% in part reflects the country's favourable demographics with its sizable under-30 population. Nonetheless, Pakistan's potential growth is constrained by structural challenges, including weak governance and weak competitiveness.

    Pakistan, like many of its South Asian neighbours, is vulnerable to environmental risks. Pakistan drains a significant portion of its scarce fresh water resources every year and has a large share of its population exposed to unsafe drinking water. The country is also exposed to extreme weather events, such as heat waves and floods, which can create negative economic and social costs.

    Moody's projects Pakistan's real GDP growth to slow to 4.2% in fiscal 2023, moderately lower than the government's projections. This compares with growth of 6.0% in fiscal 2022. The moderation in economic activity reflects the drag on domestic demand from rising inflation and a tightening in monetary policy by the State Bank of Pakistan. Moody's expects Pakistan's real GDP to pick up gradually reaching 4.5-5% over fiscal 2024 and 2025.

    Meanwhile, Pakistan's fiscal strength is very weak, a long-standing feature of the sovereign's credit profile. Moody's expects fiscal consolidation to stall ahead of the next general elections. Moody's projects Pakistan's government debt to stabilise at around 70% of GDP for fiscal 2022 and 2023, higher than the median of 63% for B-rated sovereigns. Meanwhile, given a very narrow revenue base, Pakistan's government debt as a share of revenue is very high at around 560% in fiscal 2021. Moody's expects this ratio to remain elevated at 550-590% over fiscal 2022 to 2024, well above the 290% for the median B-rated sovereign. As mentioned, the sovereign also has very weak debt affordability – one of the weakest among Moody's rated sovereigns.

    ENVIRONMENTAL, SOCIAL AND GOVERNANCE CONSIDERATIONS

    Pakistan's ESG credit impact score is Highly Negative (CIS-4), reflecting its high exposure to environmental and social risks, as well as its weak governance profile. Relatively weak institutions and very weak fiscal strength constrain the government's capacity to address ESG risks.

    Exposure to environmental risk is Highly Negative (E-4 issuer profile score) because of Pakistan's vulnerability to climate change and the limited supply of clean, fresh and safe water. Pakistan drains a significant proportion of its scarce fresh water resources every year, and a large share of its population is exposed to unsafe drinking water. Water utility services tend to be intermittent, because of high leakage levels, limited supply and insufficient access to power. The inadequate quality of drinking water has health and economic consequences for Pakistan, such as contributing to stunting which undermines human capital.  With varied climates across the nation, Pakistan is significantly exposed to extreme weather events, including tropical cyclones, drought, floods and extreme temperatures. In particular, the magnitude and dispersion of seasonal monsoon rainfall influence agricultural sector growth and rural household consumption. Agriculture accounts for around 20% of GDP and exports, and nearly 40% of total employment. Overall, around 70% of the entire population live in rural areas. As a result, both droughts and floods can create economic, fiscal and social costs for the sovereign.

    Exposure to social risk is Highly Negative (S-4 issuer profile score), driven by safety concerns that have limited investment and diversification opportunities. Very low incomes as well as limited access to quality healthcare, basic services, housing and education, especially in rural areas, are also important social issues. In addition, rising inflation has also led to higher social tensions as cost of living increases. That said, the government has taken steps to reduce poverty and inequality, strengthening social safety nets, and promoting human capital as key priorities through its expansive 'Ehsaas' programme (national poverty alleviation programme), although effects will take time to materialise and are limited by still weak institutions and governance.

    Pakistan's governance risk exposure is Highly Negative (G-4 issuer profile score). International surveys of various indicators of governance, while showing some early signs of improvement, continue to point to weak rule of law and control of corruption, as well as limited government effectiveness. The score also takes into account Pakistan's efforts in improving its macroeconomic policy effectiveness in recent years. For example, the government has amended the State Bank of Pakistan Act to strengthen the independence of the central bank and restrict the central bank from extending credit to the government.

    GDP per capita (PPP basis, US$): 5,541 (2020 Actual) (also known as Per Capita Income)

    Real GDP growth (% change): -0.9% (2020 Actual) (also known as GDP Growth)

    Inflation Rate (CPI, % change Dec/Dec): 8.6% (2020 Actual)

    Gen. Gov. Financial Balance/GDP: -7% (2020 Actual) (also known as Fiscal Balance)

    Current Account Balance/GDP: -1.5% (2020 Actual) (also known as External Balance)

    External debt/GDP: 37.6% (2020 Actual)

    Economic resiliency: ba2

    Default history: At least one default event (on bonds and/or loans) has been recorded since 1983.

    On 30 May 2022, a rating committee was called to discuss the rating of Pakistan, Government of. The main points raised during the discussion were: The issuer's economic fundamentals, including its economic strength, have not materially changed. The issuer's institutions and governance strength, have not materially changed. The issuer's fiscal or financial strength, including its debt profile, has not materially changed. The issuer has become increasingly susceptible to event risks.

    FACTORS THAT COULD LEAD TO AN UPGRADE OR DOWNGRADE OF THE RATINGS

    FACTORS THAT COULD LEAD TO AN UPGRADE

    The negative outlook signals that a rating upgrade is unlikely over the near term. The outlook would likely be changed to stable if Pakistan's external vulnerability risks decreased materially and durably. This could come from access to material external financing that significantly raises foreign exchange reserves, potentially upon successful completion of the current IMF External Fund Facility programme, with credible commitment from the government to follow through the implementation of economic reforms. A resumption of fiscal consolidation, including through implementing revenue-raising measures, pointing to a meaningful improvement in debt affordability would also be credit positive.

    FACTORS THAT COULD LEAD TO A DOWNGRADE

    The rating would likely be downgraded if there were a further deterioration in Pakistan's external position that would threaten the government's external repayment capacity and balance of payments stability. This could come from protracted negotiations with the IMF, resulting in delays in securing additional financing from IMF or other sources beyond this year. Expectations that the government debt would rise markedly, with a related deterioration in debt affordability from already weak level, would also put downward pressure on the rating. Finally, an increase in social and political risk that disrupted policymaking and undermined Pakistan's ability to secure financing would also be negative for the rating.

    The principal methodology used in these ratings was Sovereign Ratings Methodology published in November 2019 and available at https://ratings.moodys.com/api/rmc-documents/63168. Alternatively, please see the Rating Methodologies page on https://ratings.moodys.com for a copy of this methodology.

    The weighting of all rating factors is described in the methodology used in this credit rating action, if applicable.

    REGULATORY DISCLOSURES

    The List of Affected Credit Ratings announced here are a mix of solicited and unsolicited credit ratings. For additional information, please refer to Moody's Policy for Designating and Assigning Unsolicited Credit Ratings available on its website https://ratings.moodys.com. Additionally, the List of Affected Credit Ratings includes additional disclosures that vary with regard to some of the ratings.  Please click on this link https://www.moodys.com/viewresearchdoc.aspx?docid=PBC_ARFTL466304 for the List of Affected Credit Ratings. This list is an integral part of this Press Release and provides, for each of the credit ratings covered, Moody's disclosures on the following items:

    • Rating Solicitation

    • Issuer Participation

    • Participation: Access to Management

    • Participation: Access to Internal Documents

    • Endorsement

    • Lead Analyst

    • Releasing Office


    For further specification of Moody's key rating assumptions and sensitivity analysis, see the sections Methodology Assumptions and Sensitivity to Assumptions in the disclosure form. Moody's Rating Symbols and Definitions can be found on https://ratings.moodys.com/rating-definitions.

    For ratings issued on a program, series, category/class of debt or security this announcement provides certain regulatory disclosures in relation to each rating of a subsequently issued bond or note of the same series, category/class of debt, security or pursuant to a program for which the ratings are derived exclusively from existing ratings in accordance with Moody's rating practices. For ratings issued on a support provider, this announcement provides certain regulatory disclosures in relation to the credit rating action on the support provider and in relation to each particular credit rating action for securities that derive their credit ratings from the support provider's credit rating. For provisional ratings, this announcement provides certain regulatory disclosures in relation to the provisional rating assigned, and in relation to a definitive rating that may be assigned subsequent to the final issuance of the debt, in each case where the transaction structure and terms have not changed prior to the assignment of the definitive rating in a manner that would have affected the rating.  For further information please see the issuer/deal page for the respective issuer on https://ratings.moodys.com.

    For any affected securities or rated entities receiving direct credit support from the primary entity(ies) of this credit rating action, and whose ratings may change as a result of this credit rating action, the associated regulatory disclosures will be those of  the guarantor entity.  Exceptions to this approach exist for the following disclosures, if applicable to jurisdiction: Ancillary Services, Disclosure to rated entity, Disclosure from rated entity.

    The ratings have been disclosed to the rated entity or its designated agent(s) and issued with no amendment resulting from that disclosure.

    Regulatory disclosures contained in this press release apply to the credit rating and, if applicable, the related rating outlook or rating review.

    Moody's general principles for assessing environmental, social and governance (ESG) risks in our credit analysis can be found at https://ratings.moodys.com/documents/PBC_1288235.

    At least one ESG consideration was material to the credit rating action(s) announced and described above.

    Please see https://ratings.moodys.com for any updates on changes to the lead rating analyst and to the Moody's legal entity that has issued the rating.




    Thursday, 2 June 2022

    Cryptocurrency

    Cryptocurrency is decentralized digital money that’s based on blockchain technology. You may be familiar with the most popular versions, Bitcoin and Ethereum, but there are more than 5,000 different cryptocurrencies in circulation.

    A cryptocurrency is a medium of exchange that is digital, encrypted, and decentralized. Unlike the U.S. Dollar or the Euro, there is no central authority that manages and maintains the value of a cryptocurrency. Instead, these tasks are broadly distributed among a cryptocurrency’s users via the internet.You can use crypto to buy regular goods and services, although most people invest in cryptocurrencies as they would in other assets, like stocks or precious metals. While cryptocurrency is a novel and exciting asset class, purchasing it can be risky as you must take on a fair amount of research to fully understand how each system works.

    Bitcoin was the first cryptocurrency, first outlined in principle by Satoshi Nakamoto in a 2008 paper titled “Bitcoin A peer-to-peer electronic cash system.” Nakamoto described the project as “an electronic payment system based on cryptographic proof instead of trust.”That cryptographic proof comes in the form of transactions that are verified and recorded on a blockchain.

    Blockchain

    A blockchain is an open, distributed ledger that records transactions in code. In practice, it’s a little like a checkbook that’s distributed across countless computers around the world. Transactions are recorded in “blocks” that are then linked together on a “chain” of previous cryptocurrency transactions.

    “Imagine a book where you write down everything you spend money on each day,” says Buchi Okoro, CEO, and co-founder of African cryptocurrency exchange Quidax. “Each page is similar to a block, and the entire book, a group of pages, is a blockchain.”With a blockchain, everyone who uses a cryptocurrency has their own copy of this book to create a unified transaction record. The software logs each new transaction as it happens, and every copy of the blockchain is updated simultaneously with the new information, keeping all records identical and accurate. To prevent fraud, each transaction is checked using one of two main validation techniques: proof of work or proof of stake.

    Proof of work and proof of stake are two different validation techniques used to verify transactions before they’re added to a blockchain that rewards verifiers with more cryptocurrency. Cryptocurrencies typically use either proof of work or proof of stake to verify transactions.

    Proof of Work

    “Proof of work is a method of verifying transactions on a blockchain in which an algorithm provides a mathematical problem that computers race to solve,” says Simon Oxenham, social media manager at Xcoins.com.Each participating computer, often referred to as a “miner,” solves a mathematical puzzle that helps verify a group of transactions—referred to as a block—then adds them to the blockchain ledger. The first computer to do so successfully is rewarded with a small amount of cryptocurrency for its efforts.

    This race to solve blockchain puzzles can require an intense amount of computer power and electricity. In practice, that means the miners might barely break even with the crypto they receive for validating transactions, after considering the costs of power and computing resources.

    To reduce the amount of power necessary to check transactions, some cryptocurrencies use a proof of stake verification method. With proof of stake, the number of transactions each person can verify is limited by the amount of cryptocurrency they’re willing to “stake,” or temporarily lock up in a communal safe, for the chance to participate in the process. “It’s almost like bank collateral,” says Okoro. Each person who stakes crypto is eligible to verify transactions, but the odds you’ll be chosen to do so increase with the amount you front.“Because proof of stake removes energy-intensive equation solving, it’s much more efficient than proof of work, allowing for faster verification/confirmation times for transactions,” says Anton Altement, CEO of Osom Finance. If a stake owner (sometimes called a validator) is chosen to validate a new group of transactions, they’ll be rewarded with cryptocurrency, potentially in the number of aggregate transaction fees from the block of transactions. To discourage fraud, if you are chosen and verify invalid transactions, you forfeit a part of what you staked.

    Role of Consensus in Crypto

    Both proofs of stake and proof of work rely on consensus mechanisms to verify transactions. This means while each uses individual users to verify transactions, each verified transaction must be checked and approved by the majority of ledger holders. For example, a hacker couldn’t alter the blockchain ledger unless they successfully got at least 51% of the ledgers to match their fraudulent version. The amount of resources necessary to do this makes fraud unlikely.


    Mining is how new units of cryptocurrency are released into the world, generally in exchange for validating transactions. While it’s theoretically possible for the average person to mine cryptocurrency, it’s increasingly difficult in proof of work systems, like Bitcoin.

    “As the Bitcoin network grows, it gets more complicated, and more processing power is required,” says Spencer Montgomery, founder of Uinta Crypto Consulting. “The average consumer used to be able to do this, but now it’s just too expensive. There are too many people who have optimized their equipment and technology to outcompete.”And remember: Proof of work cryptocurrencies require huge amounts of energy to mine. It’s estimated that 0.21% of all of the world’s electricity goes to powering Bitcoin farms. That’s roughly the same amount of power Switzerland uses in a year. It’s estimated most Bitcoin miners end up using 60% to 80% of what they earn from mining to cover electricity costs. While it’s impractical for the average person to earn crypto by mining in a proof of work system, the proof of stake model requires less in the way of high-powered computing as validators are chosen at random based on the amount they stake. It does, however, require that you already own a cryptocurrency to participate. (If you have no crypto, you have nothing to stake.

    Use Cryptocurrency 

    You can use cryptocurrency to make purchases, but it’s not a form of payment with mainstream acceptance quite yet. A handful of online retailers like overstock.com accept Bitcoin, but it’s far from the norm.

    Until crypto is more widely accepted, you can work around current limitations by exchanging cryptocurrency for gift cards. At eGifter, for instance, you can use Bitcoin to buy gift cards for Dunkin Donuts, Target, Apple, and select other retailers and restaurants. You may also be able to load cryptocurrency to a debit card to make purchases. In the U.S., you can sign up for the BitPay card, a debit card that converts crypto assets into dollars for purchase, but there are fees involved to order the card and use it for ATM withdrawals, for example. You may also use crypto as an alternative investment option outside of stocks and bonds. “The best-known crypto, Bitcoin, is a secure, decentralized currency that has become a store of value like gold,” says David Zeiler, a cryptocurrency expert and associate editor for financial news site Money Morning. “Some people even refer to it as ‘digital gold.’”

    Secure purchasing

    Using crypto to securely make purchases depends on what you’re trying to buy. If you’d like to spend cryptocurrency at a retailer that doesn’t accept it directly, you can use a cryptocurrency debit card, like Bitpay, in the U.S.If you’re trying to pay a person or retailer who accepts cryptocurrency, you’ll need a cryptocurrency wallet, which is a software program that interacts with the blockchain and allows users to send and receive cryptocurrency. To transfer money from your wallet, you can scan the QR code of your recipient or enter their wallet address manually. Some services make this easier by allowing you to enter a phone number or select a contact from your phone. Keep in mind that transactions are not instantaneous as they must be validated using proof of work or proof of stake. Depending on the cryptocurrency, this may take between 10 minutes and two hours.

    This lag time, though, is part of what makes crypto transactions secure. “A bad actor trying to alter a transaction won’t have the proper software ‘keys,’ which means the network will reject the transaction. The network also polices and prevents double spending,” Zeiler says.

    Invest In Cryptocurrency

    Cryptocurrency can be purchased on peer-to-peer networks and Cryptocurrency exchanges, such as Coinbase and Bitfinex. Keep an eye out for fees, though, as some of these exchanges charge what can be prohibitively high costs on small crypto purchases. Coinbase, for instance, charges a fee of 0.5% of your purchase plus a flat fee of $0.99 to $2.99 depending on the size of your transaction. Some brokerage platforms—like Robinhood, Webull, and eToro—let you invest in crypto. They offer the ability to trade some of the most popular cryptocurrencies, including Bitcoin, Ethereum, and Dogecoin, but they may also have limitations, including the inability to move crypto purchases off their platforms.

    “It was once fairly difficult but now it’s relatively easy, even for crypto novices,” Zeiler says. “An exchange like Coinbase caters to non-technical folks. It’s very easy to set up an account there and link it to a bank account.”

    It’s best to keep in mind that buying individual cryptocurrencies is a little like buying individual stocks. Rather than buying only security, it's better to spread your purchases out over many different options. If you want exposure to the crypto market, you might invest in individual stocks of crypto companies. “There are also a few Bitcoin mining stocks such as Hive Blockchain (HIVE),” says Zeiler. “If you want some crypto exposure with less risk, you can invest in big companies that are adopting blockchain technology, such as IBM, Bank of America, and Microsoft.”


    Experts hold mixed opinions about investing in cryptocurrency. Because crypto is a highly speculative investment, with the potential for intense price swings, some financial advisors don’t recommend people invest at all.

    For example, Bitcoin nearly quadrupled in value over the course of 2020, closing out the year above $28,900. By April 2021, the price of BTC had more than doubled from where it started the year, but all those gains had been lost by July. Then BTC more than doubled again, hitting an intraday high above $68,990 on November 10, 2021—and then dropped to around $46,000 at the end of 2021. As you can see, cryptocurrencies can be very volatile.

    That’s why Peter Palion, a certified financial planner CEP in East Norwich, N.Y., thinks it’s safer to stick to the currency that’s backed by a government, like the U.S. dollar.“If you have the U.S. dollar in your cash reserves, you know you can pay your mortgage, you can pay your electricity bill,” Palion says. “When you look at the last 12 months, Bitcoin looks basically like my last EKG, and the U.S. dollar index is more or less a flat line. Something that drops by 50% is not suitable for anything but speculation.”

    That said, for clients who are specifically interested in cryptocurrency, CFP Ian Harvey helps them put some money into it. “The weight in a client’s portfolio should be large enough to feel meaningful while not derailing their long-term plan should the investment go to zero,” says Harvey. As for how much to invest, Harvey talks to investors about what percentage of their portfolio they’re willing to lose if the investment goes south. “It could be 1% to 5%, it could be 10%,” he says. “It depends on how much they have now, and what’s really at stake for them, from a loss perspective.”

    Microsoft Thwarts Chinese Cyber Attack Targeting Western European Governments

      Microsoft on Tuesday   revealed   that it repelled a cyber attack staged by a Chinese nation-state actor targeting two dozen organizations...