Browsing "Life Partner Permit"

IBM cuts a further 2 000 workers

IBM’s retrenchment of 2 000 employees can be viewed as refinement by a company that has been struggling for the past decade, an analyst said today.
The New York-based firm confirmed to media on Friday that the 2 000 employees to be retrenched represent only 1% of its global workforce. It is not yet clear if any IBM South Africa staff would lose their jobs, as the company is yet to comment on the matter.
On Friday, IBM Global confirmed in a statement that a “small percentage of employees” who are not performing “at a competitive level” would be leaving the company.
Further, the IBM statement read: “We are continuing to re-position our team to align with our focus on the high value segments of the IT market – while aggressively hiring in critical new areas that deliver value for our clients and IBM.”
IBM has previously shed jobs for two consecutive years.
The first job losses were in 2016 when the company was shifting its focus towards cloud computing; the following year, 2017, the jobs bloodbath continued at IBM with more jobs being cut.
One analyst says the job losses are a continuation of a process IBM began a decade ago.
Senior equity analyst at Cape Town-based Mergence Investment Managers, Peter Takaendesa, says: “The job layoffs can be viewed as a way of refining a process IBM started a decade ago. The journey of shifting from hardware to software a decade ago has had challenges. Software services require less resources than hardware and also automation keeps going, also affecting jobs.”
Takaendesa also points out that competition has severely affected IBM’s performance as new entrants had performed better.
“The smaller guys (SMEs) have also given IBM strong competition; they came into the market smaller but they have done better in terms of services offering,” he says.
IBM has for years been viewed by analysts as lagging behind the overall technology sector. It went for six years declining in sales until 2018 when it grew revenue by a meagre 1%.

Setting the Record Straight About African Migration

May 13, 2019 – Project Syndicate
Cynical politicians in Europe and the United States claim, for the sake of winning votes, that immigrants are “invading” their countries, threatening to steal locals’ jobs, or worse. When it comes to Africa, nothing could be further from the truth, because, contrary to widespread belief, no mass exodus is occurring.
ABIDJAN – In recent years, images of young Africans attempting to reach Europe, sometimes through the most daring and desperate routes, have become a fixture on global and national news channels. Cynical politicians in Europe and the United States have argued, for the sake of winning votes, that these (largely male) immigrants are “invading” their countries, threatening to steal locals’ jobs, or worse.
1. The Growing Risk of a 2020 Recession and Crisis
The Growing Risk of a 2020 Recession and Crisis
Across the advanced economies, monetary and fiscal policymakers lack the tools needed to respond to another major downturn and financial crisis. Worse, while the world no longer needs to worry about a hawkish US Federal Reserve strangling growth, it now has an even bigger problem on its hands.
Nothing could be further from the truth. As we were reminded during the 2019 Mo Ibrahim Foundation Governance Weekend, there is, in fact, no mass exodus from Africa at all.In 2017, more than 50% of the world’s migrants originated from just 21 countries. The top four were India (6.4%), Mexico (5%), Russia (4.1%), and China (3.9%). The African country that accounted for the largest share of migrants, Egypt, ranked 19th.Africa as a whole accounts for only around 14% of global migrant flows, most of which are confined to the continent. Several recent reports – by the International Organization for Migration and the United Nations Conference on Trade and Development, among others – indicate that around 70% of Sub-Saharan African migrants remain on the continent, mostly within East and West Africa (18.5% and 16.7%, respectively). Almost half (46%) of all intra-regional African migrants are female.Western countries thus face little risk of a massive wave of African migrants. And a substantial number of migrants is not necessarily a bad thing for the African countries that receive most of them. As intra-African migration fosters economic connections between rural and urban areas, and among regional neighbors, host countries can reap important economic and social benefits.This point is underscored by a 2018 Afrobarometer survey of 34 African countries, which shows that younger, better-educated urbanites are more likely to have considered emigrating than their older, less-educated rural counterparts. They are motivated, most often, by the desire to find a job (43%) or to escape economic hardship (33%).
Tapping these migrants’ potential, and ensuring that intra-African migration is a safe, orderly, and productive process, will require African governments, with the support of international institutions, to create better frameworks for managing migration on the continent. Beyond collecting and sharing data, international institutions can share knowledge and best practices with governments, as the Migration Dialogue in West Africa has done. African governments should increase their contributions to such initiatives, which have so far been funded largely by Western donors.
Technology can also help. The non-profit Techfugees, for example, is already working to coordinate the tech industry’s response to the refugee challenge, spurring the development of solutions “for and with displaced people.” Existing projects include Migreat, which helps refugees navigate the asylum application process, and GeeCycle, focused on recycling and donating mobile phones to refugees.More fundamentally, keeping migrants safe requires governments and media to set the record straight. In South Africa, for example, anti-immigrant rhetoric has recently fueled xenophobic attacks on Malawians and Zimbabweans.While African migration flows are not as large as some politicians claim, they could increase, as the effects of climate change – such as droughts, floods, and other natural disasters – intensify. Already, climate change is contributing both to extreme events, such as Cyclones Idai and Kenneth in Mozambique, and to chronic emergencies, such as increasingly unpredictable weather patterns in the Sahel. These trends highlight the growing urgency of improving how migration is managed. Of course, migrants’ home countries also have a role to play. Migration represents a brain drain within Africa – given that most young African migrants are educated, their departure undermines development in the countries that need it most, while fueling growth in host countries by filling labor gaps, boosting consumption, and expanding the tax base.Migrants do send back remittances, which amount to one of the largest sources of financial flows to developing countries globally. But this money is used mainly to supplement consumption for recipient families and pay for school fees, rather than to finance productive investments. That is why home-country governments – again, with international support – should be working to generate the quality jobs needed to entice young Africans to stay home.In recent years, entrepreneurship has been hailed as the solution to Africa’s jobs problem. But spurring entrepreneurial activity will require concerted action from governments. For example, to address the mismatch between the skills private companies seek and those Africa’s young people possess, governments should invest in education in science, technology, engineering, and math, and in improving vocational training. Moreover, governments should work with the private sector to improve the business environment.Governments should also capitalize on the dynamism of the large informal sector, which employs an estimated 75-90% ofAfricans. Formalizing agriculture, agro-processing, and many small-scale manufacturing and service enterprises will require governments to provide infrastructure, public services, and access to credit.At the Now Generation Forum in Abidjan earlier this month, debates among youth delegates made clear that African young people will no longer passively await a better future. They are doing everything in their power not just to develop their skills and find quality jobs, but also to bring about political change, even if it means taking to the streets to challenge their governments, as just occurred in Algeria and Sudan. But they cannot do it alone. African governments and the international community must do more to support their ambitions – and the continent’s future.
www.sami.co.za

7 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these seven issues this year.
Mobile security is at the top of every company’s worry list these days — and for good reason: Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive info out of the wrong hands is an increasingly intricate puzzle. The stakes, suffice it to say, are higher than ever: The average cost of a corporate data breach is a whopping $3.86 million, according to a 2018 report by the Ponemon Institute. That’s 6.4 percent more than the estimated cost just one year earlier.
While it’s easy to focus on the sensational subject of malware, the truth is that mobile malware infections are incredibly uncommon in the real world — with your odds of being infected significantly less than your odds of being struck by lightning, according to one estimate. That’s thanks to both the nature of mobile malware and the inherent protections built into modern mobile operating systems.
The more realistic mobile security hazards lie in some easily overlooked areas, all of which are only expected to become more pressing as we make our way through 2019:
1. Data leakage
It may sound like a diagnosis from the robot urologist, but data leakage is widely seen as being one of the most worrisome threats to enterprise security in 2019. Remember those almost nonexistent odds of being infected with malware? Well, when it comes to a data breach, companies have a nearly 28 percent chance of experiencing at least one incident in the next two years, based on Ponemon’s latest research — odds of more than one in four, in other words.
What makes the issue especially vexing is that it often isn’t nefarious by nature; rather, it’s a matter of users inadvertently making ill-advised decisions about which apps are able to see and transfer their information.
“The main challenge is how to implement an app vetting process that does not overwhelm the administrator and does not frustrate the users,” says Dionisio Zumerle, research director for mobile security at Gartner. He suggests turning to mobile threat defense (MTD) solutions — products like Symantec’s Endpoint Protection Mobile, CheckPoint’s SandBlast Mobile, and Zimperium’s zIPS Protection. Such utilities scan apps for “leaky behavior,” Zumerle says, and can automate the blocking of problematic processes.
Of course, even that won’t always cover leakage that happens as a result of overt user error — something as simple as transferring company files onto a public cloud storage service, pasting confidential info in the wrong place, or forwarding an email to an unintended recipient. That’s a challenge the healthcare industry is currently struggling to overcome: According to specialist insurance provider Beazley, “accidental disclosure” was the top cause of data breaches reported by healthcare organizations in the third quarter of 2018. That category combined with insider leaks accounted for nearly half of all reported breaches during that time span.
For that type of leakage, data loss prevention (DLP) tools may be the most effective form of protection. Such software is designed explicitly to prevent the exposure of sensitive information, including in accidental scenarios.
2. Social engineering
The tried-and-true tactic of trickery is just as troubling on the mobile front as it is on desktops. Despite the ease with which one would think social engineering cons could be avoided, they remain astonishingly effective.
A staggering 91 percent of cyber crime starts with email, according to a 2018 report by security firm FireEye. The firm refers to such incidents as “malware-less attacks,” since they rely on tactics like impersonation to trick people into clicking dangerous links or providing sensitive info. Phishing, specifically, grew by 65 percent over the course of 2017, the company says, and mobile users are at the greatest risk of falling for it because of the way many mobile email clients display only a sender’s name — making it especially easy to spoof messages and trick a person into thinking an email is from someone they know or trust.
In fact, users are three times more likely to respond to a phishing attack on a mobile device than a desktop, according to an IBM study — in part simply because a phone is where people are most likely to first see a message. While only 4 percent of users actually click on phishing-related links, according to Verizon’s 2018 Data Breach Investigations Report, those gullible guys and gals tend to be repeat offenders: The company notes that the more times someone has clicked on a phishing campaign link, the more likely they are to do it again in the future. Verizon has previously reported that 15 percent of users who are successfully phished will be phished at least one more time within the same year.
“We do see a general rise in mobile susceptibility driven by increases in mobile computing overall [and] the continued growth of BYOD work environments,” says John “Lex” Robinson, information security and anti-phishing strategist at PhishMe — a firm that uses real-world simulations to train workers on recognizing and responding to phishing attempts.
Robinson notes that the line between work and personal computing is also continuing to blur. More and more workers are viewing multiple inboxes — connected to a combination of work and personal accounts — together on a smartphone, he notes, and almost everyone conducts some sort of personal business online during the workday. Consequently, the notion of receiving what appears to be a personal email alongside work-related messages doesn’t seem at all unusual on the surface, even if it may in fact be a ruse.
3. Wi-Fi interference
A mobile device is only as secure as the network through which it transmits data. In an era where we’re all constantly connecting to public Wi-Fi networks, that means our info often isn’t as secure as we might assume.
Just how significant of a concern is this? According to research by enterprise security firm Wandera, corporate mobile devices use Wi-Fi almost three times as much as they use cellular data. Nearly a quarter of devices have connected to open and potentially insecure Wi-Fi networks, and 4 percent of devices have encountered a man-in-the-middle attack — in which someone maliciously intercepts communication between two parties — within the most recent month. McAfee, meanwhile, says network spoofing has increased “dramatically” as of late, and yet less than half of people bother to secure their connection while traveling and relying on public networks.
“These days, it’s not difficult to encrypt traffic,” says Kevin Du, a computer science professor at Syracuse University who specializes in smartphone security. “If you don’t have a VPN, you’re leaving a lot of doors on your perimeters open.”
Selecting the right enterprise-class VPN, however, isn’t so easy. As with most security-related considerations, a tradeoff is almost always required. “The delivery of VPNs needs to be smarter with mobile devices, as minimizing the consumption of resources — mainly battery — is paramount,” Gartner’s Zumerle points out. An effective VPN should know to activate only when absolutely necessary, he says, and not when a user is accessing something like a news site or working within an app that’s known to be secure.
4. Out-of-date devices
Smartphones, tablets and smaller connected devices — commonly known as the Internet of Things (IoT) — pose a new risk to enterprise security in that unlike traditional work devices, they generally don’t come with guarantees of timely and ongoing software updates. This is true particularly on the Android front, where the vast majority of manufacturers are embarrassingly ineffective at keeping their products up to date — both with operating system (OS) updates and with the smaller monthly security patches between them — as well as with IoT devices, many of which aren’t even designed to get updates in the first place.
“Many of them don’t even have a patching mechanism built in, and that’s becoming more and more of a threat these days,” Du says.
Increased likelihood of attack aside, an extensive use of mobile platforms elevates the overall cost of a data breach, according to Ponemon, and an abundance of work-connected IoT products only causes that figure to climb further. The Internet of Things is “an open door,” according to cybersecurity firm Raytheon, which sponsored research showing that 82 percent of IT professionals predicted that unsecured IoT devices would cause a data breach — likely “catastrophic” — within their organization.
Again, a strong policy goes a long way. There are Android devices that do receive timely and reliable ongoing updates. Until the IoT landscape becomes less of a wild west, it falls upon a company to create its own security net around them.
5. Cryptojacking attacks
A relatively new addition to the list of relevant mobile threats, cryptojacking is a type of attack where someone uses a device to mine for cryptocurrency without the owner’s knowledge. If all that sounds like a lot of technical mumbo-jumbo, just know this: The cryptomining process uses your company’s devices for someone else’s gain. It leans heavily on your technology to do it — which means affected phones will probably experience poor battery life and could even suffer from damage due to overheating components.
While cryptojacking originated on the desktop, it saw a surge on mobile from late 2017 through the early part of 2018. Unwanted cryptocurrency mining made up a third of all attacks in the first half of 2018, according to a Skybox Security analysis, with a 70 percent increase in prominence during that time compared to the previous half-year period. And mobile-specific cryptojacking attacks absolutely exploded between October and November of 2017, when the number of mobile devices affected saw a 287 percent surge, according to a Wandera report.
Since then, things have cooled off somewhat, especially in the mobile domain — a move aided largely by the banning of cryptocurrency mining apps from both Apple’s iOS App Store and the Android-associated Google Play Store in June and July, respectively. Still, security firms note that attacks continue to see some level of success via mobile websites (or even just rogue ads on mobile websites) and through apps downloaded from unofficial third-party markets.
Analysts have also noted the possibility of cryptojacking via internet-connected set-top boxes, which some businesses may use for streaming and video casting. According to security firm Rapid7, hackers have found a way to take advantage of an apparent loophole that makes the Android Debug Bridge — a command-line tool intended only for developer use — accessible and ripe for abuse on such products.
For now, there’s no great answer — aside from selecting devices carefully and sticking with a policy that requires users to download apps only from a platform’s official storefront, where the potential for cryptojacking code is markedly reduced — and realistically, there’s no indication that most companies are under any significant or immediate threat, particularly given the preventative measures being taken across the industry. Still, given the fluctuating activity and rising interest in this area over the past months, it’s something well worth being aware of and keeping an eye on as 2019 progresses.
6. Poor password hygiene
You’d think we’d be past this point by now, but somehow, users still aren’t securing their accounts properly — and when they’re carrying phones that contain both company accounts and personal sign-ins, that can be particularly problematic.
A new survey by Google and Harris Poll found just over half of Americans, based on the survey’s sample, reuse passwords across multiple accounts. Equally concerning, nearly a third aren’t using two-factor authentication (or don’t even know if they’re using it — which might be a little worse). And only a quarter of people are actively using a password manager, which suggests the vast majority of folks probably don’t have particularly strong passwords in most places, since they’re presumably generating and remembering them on their own.
Things only get worse from there: According to a 2018 LastPass analysis, a full half of professionals use the same passwords for both work and personal accounts. And if that isn’t enough, an average employee shares about six passwords with a co-worker over the course of his or her employment, the analysis found.
Lest you think this is all much ado about nothing, in 2017, Verizon found that weak or stolen passwords were to blame for more than 80 percent of hacking-related breaches in businesses. From a mobile device in particular — where workers want to sign in quickly to various apps, sites, and services — think about the risk to your organization’s data if even just one person is sloppily typing in the same password they use for a company account into a prompt on a random retail site, chat app, or message forum. Now combine that risk with the aforementioned risk of Wi-Fi interference, multiple it by the total number of employees in your workplace, and think about the layers of likely exposure points that are rapidly adding up.
www.vsoftsysyems.co.za

Home Affairs bungle makes elderly woman one year older than her son

Nontizana September says she was born in 1953 while Home Affairs claims she was born in 1973. Picture: Ayanda Ndamane/African News Agency (ANA)
Cape Town – Confusion over her birth date has left Nontizana September destitute with little hope of escaping her life of poverty and pain.
She lives in a dilapidated shack with no windows, a broken door and openings all around the frame of her tiny home.
According to September and her family, this was as a result of an error by the Department of Home Affairs when she first applied for an ID.
September’s memory is not as sharp as it may have been and she does not remember when she moved to Cape Town from the Eastern Cape, but she remembers having worked as a domestic worker for many years before things turned sour.
“I’ve been here for many years working and cleaning in people’s homes, most of my belongings and documentation was left back home and burnt in a fire which destroyed most of the house,” she said.
“I went to the Department of Home Affairs to apply for an ID but they gave me the wrong identity number and now I cannot apply for an old age grant. I use to get a TB grant many years ago, but that expired because I was cured. Now I have no source of income,” she said.
September’s younger sister, Monica, 63, confirmed that Nontizana was her older sister, but that she had no form of identification.
September’s only surviving son was arrested last Sunday for the alleged murder of his live-in girlfriend, Zoliswa Keke.
The couple lived close to September and Keke was her carer. “I don’t know what I am going to do now,” cried the elderly woman.
“She helped me with everything, food, cleaning of my house and even taking me to wherever I needed to be because I cannot walk,” she’s aid.
Muneera Allie from the Human Settlements Department told Weekend Argus that September would have to “get assistance” from her local ward councillor.
According to local ward councillor, Thando Mpengesi, September’s case had been referred to the Khayelitsha Home Affairs Department.
“What was most striking for us was the fact that her temporary ID says she was born in 1972 while her son was born in 1973. Obviously something is amiss there,” said Mpengesi.
“We are now trying to gather enough information to prove that she was indeed born in 1952,” Mpengesi added.
September spends most of her days on her three-quarter bed with a blanket over her legs.
She depended on Keke to help her onto her wheelchair and push her around. “I had an operation on the one leg which is why I can’t walk, so I have to keep it warm,”she said.
“I lost my four children. Zola Bangisa is my second-born, he was born in 1973 and he is the one who lived with Keke, and the one closest to me. My sister also lives around but works really odd hours. I see her every now and then,” said the teary grandmother.
September said she would love to go back to the Eastern Cape where her deceased husband’s family lives.
“I still have a house there, but with no form of income, I would only serve to be a burden to those who are there. I don’t know what I am going to do now that Keke is gone because she was my hope and helper,” she said.
Home Affairs provincial manager Yusuf Simons told Weekend Argus it would take six months to get her identity number rectified.
“It is a long process we would have to conduct interviews with her and her family, she would have to undergo an age estimation test from a health facility to have a date of birth determined. All of this information will be sent to our head office in Pretoria and the process could take up to six months before it is proved that she was indeed born in 1952,” he said.
“The department will contact the person and deal with the matter.”
www.samigration.com

Motsoaledi wants to revamp Home Affairs

Wednesday 12 June 2019 – DSTV

Minister, Aaron Motsoaledi, wants to bring the Home Affairs portfolio back online. Courtesy of #DSTV403
JOHANNESBURG – Minister Aaron Motsoaledi, wants to bring the Home Affairs portfolio back online.
He wants officials stationed at hospitals to help ease the application process for birth certificates.
Motsoaledi’s also visited several of the department’s offices and said he wants more reliable computer systems.
The minister said the main function of the department is to document South Africans and the process is made much easier with a birth certificate.

China warns foreign tech firms after Huawei ban

China has reportedly summoned global technology companies for talks to warn they could face dire consequences if they co-operate with the Trump administration’s ban on sales of key American technology to Chinese companies.
Citing people familiar with the matter, The New York Times reports the companies summoned include Microsoft, Dell and Samsung.
Last month, the Chinese government said it was putting together an “unreliable entities list” of foreign companies and people.
China’s ministry of commerce said the list would contain foreign companies, individuals and organisations that “do not follow market rules, violate the spirit of contracts, blockade and stop supplying Chinese companies for non-commercial reasons, and seriously damage the legitimate rights and interests of Chinese companies”.
This after the Trump administration added Huawei to a trade blacklist, enacting restrictions that will make it very difficult for the company to do business with US companies.
According to Reuters, a person at US software giant Microsoft said the company’s session with Chinese officials was not a direct warning but it was made clear to the firm that complying with US bans would likely lead to further complications for all sector participants.
See also
It adds that Microsoft was asked not to make hasty or ill-considered moves before the situation was fully understood.
The US has for months been rallying its allies to cut Huawei out of planned 5G networks, citing “national security threats” due to the company’s close ties to the Chinese government.
Huawei has denied installing any backdoors in its networking equipment for alleged government spying.
Last month, Huawei filed a motion for summary judgement as part of the process to challenge the constitutionality of Section 889 of the 2019 National Defence Authorisation.
It called on the US government to halt its state-sanctioned campaign against Huawei because it will not deliver cyber security.
Huawei is the second biggest smartphone maker in the world behind Samsung. It recently overtook Apple, which is now number three in the smartphone market. Huawei is the world’s biggest telecommunications equipment-maker, leading in technologies like 5G

Passport safety 101: 6 ways to safeguard your identity during travel

2019-06-10 – Traveller24

6 ways to ensure the safety of your identity. (Photo: iStock)
There’s nothing quite as stressful as the permanent worry of losing your passport and legal doccies while in transit.
Not to mention the stresses that accompany where to safeguard your legal docs while settled into a new destination in new unchartered (by you) lands…
It is absolutely frightening and daunting that this little booklet we whip out so rarely (unless you’re on that frequent traveller lush life buzz) can hold all of our traveller legitimacy and fate within its green casing.
But fret not my fellow occasional and frequent travellers – we’ve got you sorted with some pro tips.
Check out six ways to keep your docs and identity protected during your travels below:
IN TRANSIT
Copies, copies, copies…
Always, always, always make a copy or more of your passport in case of an emergency. And to ensure they don’t also go missing along with your passport (in the event that it does go missing), keep the copies separate from the actual passport so that you’ve got your proof of ID on you should push come to shove and your pocket gets picked.
Make copies of the page that has your photo and full name on it and store them away in random places of your luggage. Leave one copy of your passport at home, with an emergency contact or trusted colleague. (If you find yourself needing to replace your passport, have ID sized photos at the ready and bring extras along with you as well).
Conceal, but feel
Speaking of easy-to-pick pockets – don’t keep your passport in loose pockets or even your carry on bag. Your best bet is to strap it to your body like you’re ready for the combat of travel. Whether you opt for undies with hidden zip-up pocket compartments or the spy-worthy inside jacket pocket or a classic trendy fanny pack (or money bag) be sure to keep it close and inconspicuously check or feel for it regularly.
Packing it in your carry on is risky should your carry on need to be checked in last minute and you forget to retrieve it before it goes into the unknown realm the conveyer belt leads to.
If you do opt for a fanny pack – consider strapping it diagonally over your shoulder and across your chest as this option allows you to have more control and protection over the bag from any wandering or prying sticky fingers.
And if the thought of being caught fanny-pack-handed (or -chested) is a bit much, invest in a good travel purse that has several internal compartments as well as a closed zip section that you can keep in your spacey zip up pocket or in your front-way worn back pack (front-way worn for the ultimate safety, of course).
Keep it crisp
Keeping your passport safe goes beyond just making sure you don’t lose it – you’ve also got to keep it in a good physical condition. Customs can be quite picky when it comes to how your passport looks. So be sure to keep it straight and tighly flattened to avoid any unwarranted curled corners or ripped page edges and nosily unnecessary custom delays and interrogations.
This means ensuring that your passport also doesn’t get wet or weathered either to keep it in solid vampiristic condition until it actually expires. Investing in a good waterproof cover and keeping it concealed until necessary ought to help keep it in mint condition.

Divide to conquer
Avoid clumping all of the passports together when travelling in groups. If you’re travelling in groups or as a family divide the passports among the adults and if you’re all adults – carry your own passport. This way if one of your group members loses their passport, the rest of the group will not be inhibited or affected.
However, if one person is carrying everyone’s passports, you run the risk of losing all of the passports should the person misplace the documents or have them pickpocketed.
Be vigilant
And, most importantly, be nonchalantly vigilant of your surroundings. By this I mean that you should be alert to what is happening around you and always check regularly that your doccies are still all in place and in order, however, it is vital to be casually alert. Do not look too alert should you attract any actual danger toward you or your possessions.
Basically – try not to look frantic while checking for your passport or docs, make the act seem seamless and inconspicuous – so that you’re safe about staying safe.
AT YOUR DESTINATION
Lock it up
When at your destination – your best bet is to simply lock up your passport at the place you’re staying. You needn’t conceal a complicated safe within the hotel wall, but merely invest in a good and solid suitcase with a lock system that you can trust to leave your passport in while touring the new city or town.
If you worry about having to present proof of identity while trekking around – keep one of those fifty copies on you, just in case, but keep your actual passport locked away safely at your place of stay.
www.samigration.com

Pages:1234567...104»