Gardai and the Revenue Commissioners have competed a major operation in Letterkenny.A number of vehicles were stopped a short time ago outside the LYIT on the town’s Port Road.A number of car owners were spoken to and at least one car was seized and transported away on the back of a carrier vehicle. No further details on the operation have been made available at this stage. GARDAI AND CUSTOMS CARRY OUT MAJOR OPERATION IN LETTERKENNY was last modified: June 13th, 2012 by StephenShare this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window) Tags:GardailetterkennyRevenue Commissioners
Kolkata: A writ petition was filed at Calcutta High Court on Wednesday, pointing out the errors in the Bengali translation of the National Eligibility cum Entrance Test (NEET) question paper this year. Apala Debnath, a medical aspirant, had filed the petition, drawing the attention of the court to the ambiguity and mistakes that had occurred in the examination. It was mentioned in the petition that there were 180 mistakes out of 180 questions in the Bengali version of the NEET question paper. Also Read – Heavy rain hits traffic, flightsThe medical aspirants who appeared for the examination with Bengali as the medium were confused by the ambiguity, meaningless and incomplete Bengali translation. Most of these students became nervous and hence could not answer the questions which were known to them.It was not possible for the Bengali version students to finish all answers within 3 hours. The petitioner had also raised questions on the role of CBSE, which conducted the examination. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedThe petition also stated that the students of Bengal were compelled to appear for the examination with xerox copies of question paper and OMR answer sheet. Such incidents were reported on the day of examination as well. The petitioner pointed out that such activities were the result of absolute negligence on the part of CBSE.The petitioner moved to Calcutta High Court, seeking its intervention as neither the Centre nor the CBSE took any initiatives in this regard, particularly after Bengal Chief Minister Mamata Banerjee wrote to the Union Human Resources Development Ministry, calling for a re-examination.Following the incident, the city doctors had also written to the Chief Minister and Prime Minister, seeking their intervention.
3 min read When it comes to securing work data, mobile devices can leave the door wide open for cybercriminals looking to steal sensitive information. Smartphones and tablets can also serve as weak points if employees unknowingly leak data or lose their hardware. Mobile devices can be much harder for IT departments to secure than your typical office desktop computer, since these gadgets follow us out into the field, on business trips and out to conferences. If your company is reliant on mobile tech for internal communications, here are four ways to be proactive about security.1. Install mobile updates.Mobile operating systems are constantly being updated to address vulnerabilities in previous version releases. Apple’s iOS 8.1.1 update is a relevant current example. This version addresses several Lock Screen, Spotlight, and other system weak points that could compromise the security of your accounts and your data. Jailbreak group PanguTeam was credited for, and thanked by, Apple for alerting the tech company of the three vulnerabilities that were addressed in this update.Related: BYOD Is the Corporate Norm But Data Security Lags Far Behind2. Don’t permit jailbroken devices.Apple’s closed system might seem like a nuisance to some users, but it can be a major boon for companies that want to keep their data secure. Users with jailbroken devices gain the flexibility of installing unauthorized or unofficial apps and features onto their devices. However, these unregulated apps can contain malicious features. It’s important for companies to enforce a no-jailbreak policy, especially in environments that rely on Bring Your Own Device strategies.3. Use MDM solutions.Mobile Device Management services can be a great way to secure smartphones and tablets over-the-air while keeping track of your inventory. You can create custom user profiles to load onto specific devices, allowing your company to image in-house technology quickly. Your IT department can also define security settings for in-house network connections, wireless printing, “open in” app management and resource access. MDM is also a great way to manage work content on BYOD devices, allowing you to push relevant apps, updates and work materials to your employees wirelessly. You can also un-enroll users remotely if they leave your company, automatically removing managed work apps from their devices. This will prevent former employees from accessing sensitive company data.Related: The Threat Lurking in Bringing Your Own Device to Work4. Enforce passwords.Mobile devices that do not have complex passcode protection are a significant weak point for your company’s data security. For example, what happens if an employee leaves an unlocked tablet on a train before work? Someone who finds the device could suddenly access your company’s address book, correspondences and other internal systems. You can reduce the risk of unauthorized intrusions by enforcing passcode usage on work devices. It’s possible to set rules regarding passcodes via MDM.How safe are your company’s mobile devices? If you haven’t enacted proactive security measures for your work tablets and smartphones yet, then it’s time to work with your IT department to address these needs. As mobile devices become increasingly relevant in the workplace, companies will need to brace themselves for unintentional data leaks, malware and potential attacks.Related: 5 Ways to Encourage BYOD and Keep Your Company Data Secure January 28, 2015 Growing a business sometimes requires thinking outside the box. Opinions expressed by Entrepreneur contributors are their own. Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Register Now »