Monday, August 21, 2023

COVID-19 Africa Response & Rebuild Facility is hiring: Senior Grants Officer

The Rebuild Facility is hiring a Senior Grants Officer into the project team. The preference is for the successful candidate to be based in Uganda but we will consider applications from candidates based in any of the priority countries including Uganda, Ethiopia, Kenya, Ghana and Cote d’Ivoire. The Senior Grants Officer will work closely with the Team Leader on all aspects of managing the returnable grant portfolio and other emerging grant/financing mechanisms for the Rebuild Facility.
 
The Senior Grants Officer is a valued member of the team completing a variety of substantive and administrative tasks that are critical to high-quality project management. You will be responsible for the oversight, relationship management, and monitoring of a portfolio of Grantees in all five project priority countries. This role encompasses project management, financial management, monitoring and evaluation, and relationship building.


This is a one year, fixed-term contract with potential for extension. Hiring is subject to the approval of programme extension beyond November 2023.
 
The deadline for applications is 4th September, 09.30 BST

Calculate eBay and PayPal fees and profit before selling

If you buy and sell items online to earn income as one of your side-hustle to supplement your primary job to reach your financial goals, and the payments are handled by eBay, or PayPal, then websites like finalfeecalc.com (also available on Google Play) or ebayfeescalculator.com (also available on Apple's App Store) can help with calculating and evaluating final value fees and profit to see if it is worth it before buying and selling an item.

finalfeecalc.com is simple and offers calculators for eBay and PayPal 


ebayfeescalculator.com is much more detailed and offers calculators for countries other than the US and more stores other than just eBay, such as Amazon, Etsy, Cash App, Square, Copart, Stripe, Depop, and Reverb.



Sunday, August 20, 2023

I troubleshoot software and these are Steps you can take secure your phone, tablet, laptop

I work in an industry where part of my job is to ensure a company's equipment and devices are secured to meet industry security standards and protect clients and consumers against digital attacks and the loss of company and individual data.

Here are some measures we take every day that you or anyone else can also use to protect your electronic devices so that hackers do not gain unauthorized access to your device and tamper with your data and information.

  1. Everyone needs to be using Two-Factor Authentication (2FA). Everyone. No exception. Personal or small business, it doesn't matter. You should be using 2FA. Everyone should. If you think you are a nobody or your business is too small to be hacked, think again because we see attempts to hack just regular individuals and normal people who consider themselves "a nobody" or not so important or wealthy for anyone to waste their time trying to hack them, but it happens. Hackers may target a random person to practice on or as a conduit to get into their employer's company system. It is very important to enable 2FA whenever possible for your accounts to make it harder for hackers to get into your device. You need a second form of verification, for example, a code from an app such as Google Authenticator, Authy, Microsoft Authenticator, etc. If you are unable to use an authenticator app (which is more secure), you can set up your phone number or email address to receive a code via text message, phone call, or email as a 2FA in addition to your passphrase or password.
  2. Do this simple thing: No sharing of PINs, passwords, or passphrases Please, just don't.
  3. Do not write your PINs, passwords, or passwords anywhere. The best practice is to use a password manager such as KeePass, Bitwarded, LogMeOnce, Avira Password Manager, Enpass Password Manager, 1Password, etc. to store your passwords and passphrases and you will have to remember only one master password or passphrase. It is very convenient, easy to use, and not complicated as people who have not used it think.
  4. Passwords, passphrases, and PINs: Use passphrases whenever possible, then a password, PIN, or pattern lock for your device. Avoid using information that can be guessed easily, such as your date of birth, street address, zip code, P.O. Boxes, plate number, name of a city, school, place of worship, or personal names. Longer passphrases are great for added security. If you are bilingual, using a password containing words from more than one language can be an added advantage. For example, instead of using PIN = 1986 or password = Moon345 or passphrase = I met her in Moshi, you could use a passphrase = In1986/WemetinMosh!
  5. Use Biometric Authentication if possible: Newer smartphones, tablets and laptops offer fingerprint or facial recognition. Use them whenever possible for an additional layer of security to make it a little difficult for hackers to bypass.
  6. Update your device's operating system and apps: If your device or apps are not set up to automatically download and install updated versions of the operating system or apps, make it a habit to manually check for updates, download them, and install in order to apply the latest bug fixes and security patches which fix vulnerabilities that hackers could use to exploit your device. Installing updates and upgrades may also improve the efficiency of your device. Caution: Please, backup data before installing updates because some updates may break stuff and cause issues, including the loss of data.
  7. Install and enable Security Apps: Always use reputable security applications, antivirus, or antimalware software to detect and prevent virus and malware attacks. Check your device settings and each application to ensure they are only granted permissions they truly need to perform what the app is intended to do. Some applications or operating systems will even allow you to only allow certain permissions when using the application itself. Revoke any permission you may think the app doesn't need. Some permissions you want to limit include location, camera, microphone, storage, files, etc.
  8. Make it a habit to review App Permissions by regularly reviewing app permission settings to ensure that only the necessary permissions that an app requires to function are granted.
  9. Lock SIM Card: This is very important, especially if you want to avoid phone or tablet SIM card jacking for 2FA. Contact your mobile carrier to enable a SIM card lock with a PIN or other security measures instituted by your carrier in order to block someone from porting, switching, and using your SIM card on another device.
  10. Be Careful with Downloads: Only download apps from official app stores, such as Microsoft's Windows Apps, Apple's App Store, or Google's Play Store, and from reputable websites for applications you may need on your computer. Avoid apps from third-party sources or attachments in an email or text.
  11. If you have to use a public Wi-Fi network, do not access sensitive data on your device while connected to the public Wi-Fi because it is less secure and more vulnerable to hacking. Use a Virtual Private Network (VPN) instead if it is urgent and you do not have any other option.
  12. Data Backup: Schedule a regular data backup of your device's data to a secure location such as the cloud storage service, an external storage device, or an isolated computer for data backup, and make sure the last two are offline or using a separate network or internet connection from the main. This is to ensure that, in the event of an attack, you are able to recover data that was stored separately offline or off the main grid. If you store data in the cloud, use a reputable and secure cloud storage service that offers strong encryption.
  13. Enable Remote Device Lock, Erase, or Wipe. This is very important, especially for a phone. In your Apple or Android device settings, check and enable the option that will let you remotely lock or wipe your phone, tablet, or laptop's data if it is lost or stolen to prevent unauthorized access to some sensitive information that can be used against you or for fraudulent activities.
  14. Send Secure emails if you have to share some sensitive information, such as Personally Identifiable Information (PII), Protected Health Information (PHI), Social Security Number (SSN), Date of Birth (DOB), physical address, a phone number, an email address, etc.
  15. Use Encrypted Messaging Apps: If you are unable to send a secure email or are concerned about messages being intercepted, if applicable, by your company, use encrypted messaging apps like Confide, Signal, WhatsApp, Threema, Voxer, Element, Wickr Me, Skred, Briar, Viber, etc.
  16. Screen Calls and Texts: Not all are genuine, especially if they come from an "unknown" or from a number not in your contact list, or an anonymous call or text. If you receive a call, text, or email and in the middle of the conversation you are asked to share some sensitive information or read a code sent to you, hang up or stop responding to a text. Legitimate companies do not call you asking for this information so they can stop a transaction or process one because they already have it. Some legitimate companies may ask for some information to confirm your identity if you call them first to report suspicious activity in your account. Do not share your information or confirm anything, especially if you didn't initiate the communication and you are being pressured or threatened.
  17. Those Bluetooth and NFCs. Disable them when they are not in use, as they can be used to gain unauthorized access.
  18. Do not use public USB charging ports. You want to always bring and use your own charge on the available electric outlet instead of free USB ports in airports, shopping centers, hotels etc. to avoid becoming a victim of "juice jacking" where hackers can load malware onto those USB ports.
I may have missed some tips, but these are also some of the most common practices that, if followed correctly, can significantly reduce the risk of getting compromised or hacked. You can stay informed about the latest security threats and best practices for mobile device security by following tech news websites, blogs, and social media accounts.

Friday, August 18, 2023

Free online advanced image editors


Krita is a free and open-source painting program made by artists that want to see affordable art tools for everyone.

Krita can be used to create concept art, texture and matte painters, illustrations and comics.


Photopea is a free online image editor.

It supports PSD, XCF, Sketch, DD and CDR formats (Adobe Photoshop, GIMP, Sketch App, Adobe XD, CoreIDRAW)

You can create a new image or open image form your computer and export or save them in various formats such as PAD, JPG / PNG / SGV, WEBP, PDF, GIF, MP4, RAW, ICO, BMP, TIFF, TGA, EMF, PPM etc.

Photopea is available at photopea.com


Thursday, August 17, 2023

Manager - Refugee Programmes

Primary Roles and Responsibilities:

Programme Design & Business Development Design of refugee support programmes
  • Identification of new partners and consortium design and negotiation
  • Conducting fact-finding/project scoping missions as appropriate
  • Assessing client requests for services and projects (i.e. analysis of donors’ strategic action plans/national indicative programs etc.)
  • Refugee sector market monitoring
  • Pro-active building and management of client and network relationships
  • Preparation of technical proposals: bid process management, research, analysis, bid writing, selection of experts and CVs preparation, etc.
  • Preparation of project budgets and financial proposals

Programme Delivery:
  • Project management of assigned portfolio projects (including quality and risk management and financial oversight)
  • Establishing/recruiting a team to deliver assigned projects
  • Developing client KPIs and leading client relationship management for assigned projects
  • Contribution to other technical and strategic aspects of the team’s work.
Key Competencies Required:
  • Experience designing and delivering refugee support programmes in the Global South or in the UK or EU
  • Experience in business development and/or tender preparation, ideally for a range of HMG clients such as Local Authorities, Home Office, FCDO, or DWP

Job: Desk Officer

The job

The Desk Officer will be the focal point within the organization for assigned countries, liaising with all directorates/departments in relation to these countries. The Desk Officer will provide advice and management support to country programmes and keep the Regional Director briefed on pertinent issues and changing circumstances as they arise. The Desk Officer will promote strong engagement with Concern’s Grant Management System (GMS) and data integrity.

You will report to the Regional Director and work with Strategy, Advocacy, and Learning (SAL), Emergency Directorate, Public Affairs, Finance, Human Resources, IT and Overseas fields, and the wider Concern team.

The salary is from KES 355,572 to 537,835 (Kenya Grade 9). This is a fixed-term contract.


Closing Date: 30 August 2023

Research Assistant

RESEARCH ASSISTANT AT INVESTING IN CHILDREN AND THEIR SOCIETIES (ICS SP)

ICS- SP is an innovative African NGO that works in Africa together with families, communities, and other stakeholders to create safe and nurturing environments for children to reach their full potential.

Read more about this company on https://www.icsafrica-sp.org

Position: Research Assistant

Job type: Temporary, Short -term.

Location: Nairobi, Machakos (Kangundo), Kiambu (Limuru), Kisumu and Busia

Duties and Responsibilities:
  • Conducting qualitative and quantitative data collection in accordance with established research methodologies.
  • Conducting interviews, focus group discussions, and surveys with project beneficiaries and stakeholders.
  • Transcribing qualitative data accurately and efficiently.
  • Organizing and managing collected data to ensure accuracy and reliability.
  • Attend training workshop for Research Assistants
  • Maintaining clear and organized documentation of all research activities.
  • Participate in de-brief meetings after data collection.
  • Protect all project equipment and ensure that they are all safe and accounted for
  • Perform any other duties assigned by Research supervisor.
Qualifications and Skills:
  • University degree in Social Science or any relevant degree
  • Proven experience in conducting qualitative and quantitative data collection for research projects.
  • Have experience of carrying out In-depth Interviews and Focus Group Discussions (FGD)
  • Proficiency in transcription techniques
  • Good written and oral communication in English and Kiswahili.
  • Proficiency in local languages will be an added advantage
  • Excellent interpersonal skills for effective stakeholder engagement.
  • Ability to work independently and as part of a collaborative team.
  • Have previous experience using KOBO collect and Microsoft Office Suit (Microsoft Word and excel)
  • Must be a local from the survey areas i.e., Kiambu (Limuru), Nairobi (Kamkunji), Machakos (Kangundo), Kisumu (Kisumu West) and Busia (Teso North/Matayos)
Terms of Engagement:

Successful candidates will be engaged in short term contract during end of project evaluation.

How to apply

Method of Application:

If you are a professional with a passion for research and meet the outlined qualifications, send your application letter, CV and relevant copies of academic certificates to [email protected] . Application deadline is 22nd August 2023.

Only shortlisted candidates will be contacted. Please indicate the position and location (Nairobi or Kisumu or Busia) you are applying for as the subject of your email.

ICS SP absolute priority is protecting children, vulnerable communities and our own staff. We have zero tolerance of incidents of violence or abuse against children and other people in the communities we serve, either committed by our staff or others connected to our work. Successful applicants will be required to sign and adhere to our safeguarding, child protection and prevention of sexual exploitation and abuse (PSEA) code of conduct and policies.