Pretty close to the truth. The missing piece is that a being plus body has more insanities than a being without a body.
The destructive intentions and evil purposes that a being has do not die with the body so you are better off cleaning those up as soon as possible.
An easy place to start on that path is to never go past a word you do not fully understand as misunderstood words restimulate evil purposes. The fewer misunderstood words, the fewer evil purposes in restimulation, the happier the life.
Storm Sky
Turnbull Government's fraudulent Centrelink debt letter system
Have you, or anyone you know, been targeted by the Turnbull Government’s fraudulent Centrelink debt letter system?
If so, here’s something you can do about it. And if not, here’s a free community service you can share to help people who need it.
More than 250,000 letters have been sent already, and a staggering 20,000 more are churned out each week. Reports in today’s papers suggest as many as 90% are wrong.
That’s why we’ve set up FraudStop.com.au – a free and easy way to formally appeal the Turnbull Government’s fabricated debt letters.
Leveraging GetUp’s years of tech expertise, and powered by the generous donations of more than 3,000 incredible incredible GetUp members, FraudStop lets anyone challenge their debt claim online in less than five minutes, instead of waiting hours on the phone with no result.
Got a debt letter to appeal? Click here: https://getup.org.au/fraudstop
We Started The Women’s Movement
Measles Bombshell – This Is HUGE!
Two recognised laboratories, including the world’s largest and leading genetic Institute, arrived at exactly the same results independently.The results prove that the authors of the six publications in the measles virus case were wrong, and as a direct result all measles virologists are still wrong today: They have misinterpreted ordinary constituents of cells as part of the suspected measles virus.
Because of this error, during decades of consensus building process, normal cell constituents were mentally assembled into a model of a measles virus. To this day, an actual structure that corresponds to this model has been found neither in a human, nor in an animal. With the results of the genetic tests, all thesis of existence of measles virus has been scientifically disproved.
http://globalfreedommovement.org/measles-virus-disproved-in-bombshell-german-court-ruling/
Great news! France has prohibited the use of pesticides in public “green spaces.”
Learn more: http://orgcns.org/2iNPBWN
Why You Should Take Your Apple Cider Vinegar at Night
Baby Spinach Leaves
Some plants have concentrations of micronutrients that are exceptionally high. Tomatoes and lycopene, Brazil nuts and selenium, or limes and vitamin C for instance. Spinach is a great source of several, highly protective nutrients. It contains large amounts of glutathione if eaten raw. It is also an excellent source of magnesium, the eye-protecting carotenoid lutein, as well as calcium and vitamin C. But spinach’s greatest contribution to our body’s nutrient needs might be its potassium nitrate content.
Of course spinach isn’t alone. Swiss chard, beet greens, mustard greens and romaine lettuce are also very high in potassium nitrate. All are excellent choices to eat daily. Potassium is extremely important on its own, but potassium nitrate is unique. This form of potassium is highly effective at helping the body correct major imbalances in the area of hemodynamics. Factors such as blood pressure, platelet aggregation, and a variety of inflammatory mediators need to be constantly adjusted by the body based upon the situation and/or what our diet has been like over the past several days.
Many people eat foods that create significant imbalance. Their blood pressure rises with an inability for the smooth muscle fibers that make up artery walls to relax. Often a number of factors increase an individual’s chances for forming a clot. These are life changing (cerebrovascular accident) and sometimes life-ending process (myocardial infarction) when they occur regularly and/or too intensely.
Enter dark greens, most notably the aforementioned ones that are high in potassium nitrate. When we absorb this form of potassium we immediately get help in the areas needed. Blood pressure drops as nitric oxide production increases and the smooth muscle arterial walls relax. Inflammation is curbed as the antioxidants and essential micronutrients work their free radical-scavenging magic. Platelet aggregation is decreased as both the potassium nitrate and other substances (such tocopherols) thin the blood.
One recent investigation revealed this unique ability to counter the effects of a typical Standard American Diet (SAD). Rats were fed a high fructose-containing diet coupled with a large amount of highly processed fats and oils (this by the way is possibly the most lethal combination of macronutrients in a population’s diet). The results were amazing. The consumption of spinach, rich in potassium nitrate, corrected more than just blood pressure and markers of inflammation, it also significantly improved insulin resistance or reversed processes associated with diabetes.
http://robynobrien.com/the-power-of-dark-greens-and-spinach/
3 ways to protect your business from ransomware
In recent months, ransomware has been increasingly garnering headlines here and across the globe. If you’ve been keeping your head down and believe that it won’t happen to you or your business – now is a good time to think again.
Step 1. Prepare a recovery plan: Recover without paying
- What: Plan for the worst-case scenario and expect that it will happen at any level of the organization.
- Why: This will help your organization:
- Limit damage for the worst-case scenario: Restoring all systems from backups is highly disruptive to business, but it’s still more efficient than trying to do recovery using low-quality attacker-provided decryption tools after paying to get the key. Remember: paying is an uncertain path; you have no guarantee that the attackers’ key will work on all your files, that the tools will work effectively, or the attacker—who may be an amateur using a professional’s toolkit—will act in good faith.
- Limit the financial return for attackers: If an organization can restore business operations without paying, the attack has effectively failed and resulted in zero return on investment for the attackers. This makes it less likely they will target your organization again in the future (and deprives them of funding to attack others). Remember: attackers may still attempt to extort your organization through data disclosure or abusing/selling the stolen data, but this gives them less leverage than possessing the only means of accessing your data and systems.
- How: Organizations should ensure they:
- Register risk. Add ransomware to the risk register as a high-likelihood and high-impact scenario. Track mitigation status via your Enterprise Risk Management (ERM) assessment cycle.
- Define and backup critical business assets. Automatically back up critical assets on a regular schedule, including correct backup of critical dependencies, such as Microsoft Active Directory.
- Protect backups. To safeguard against deliberate erasure and encryption, use offline storage, immutable storage, and/or out-of-band steps (multifactor authentication or PIN) before modifying or erasing online backups.
- Test ‘recover from zero’ scenario. Ensure that your business continuity and disaster recovery (BC/DR) can rapidly bring critical business operations online from zero functionality (all systems down). Conduct practice exercises to validate cross-team processes and technical procedures, including out-of-band employee and customer communications (assume all email and chat are down). Important: protect (or print) supporting documents and systems required for recovery, including restoration-procedure documents, configuration management databases (CMDBs), network diagrams, and SolarWinds instances. Attackers regularly destroy these documents.
- Reduce on-premises exposure. Move data to cloud services with automatic backup and self-service rollback.
Step 2. Limit the scope of damage: Protect privileged roles (starting with IT admins)
- What: Ensure you have strong controls (prevent, detect, respond) for privileged accounts, such as IT admins and other roles with control of business-critical systems.
- Why: This slows or blocks attackers from gaining complete access to steal and encrypt your resources. Taking away the attacker’s ability to use IT admin accounts as a shortcut to resources will drastically lower the chances that they’ll be successful in controlling enough resources to impact your business and demand payment.
- How: Enable elevated security for privileged accounts—tightly protect, closely monitor, and rapidly respond to incidents related to these roles. See Microsoft’s recommended steps that:
- Cover end-to-end session security (including multifactor authentication for admins).
- Protect and monitor identity systems.
- Mitigate lateral traversal.
- Promote rapid threat response.
Step 3. Make it harder to get in: Incrementally remove risks
- What: Prevent a ransomware attacker from entering your environment, as well as rapidly respond to incidents and remove attacker access before they can steal and encrypt data.
- Why: This causes attackers to fail earlier and more often, undermining their profits. While prevention is the preferred outcome, it may not be possible to achieve 100 percent prevention and rapid response across a real-world organization with a complex multi-platform, multi-cloud estate and distributed IT responsibilities.
- How: Identify and execute quick wins that strengthen security controls to prevent entry and rapidly detect and evict attackers, while implementing a sustained program that helps you stay secure. Microsoft recommends following the principles outlined in the Zero Trust strategy. Against ransomware, organizations should prioritize:
- Improving security hygiene by reducing the attack surface and focusing on vulnerability management for assets in their estate.
- Implementing protection, detection, and response controls for digital assets, as well as providing visibility and alerting on attacker activity while responding to active threats.
The takeaway
To counter the threat of ransomware, it’s critical to identify, secure, and be ready to recover high-value assets—whether data or infrastructure—in the likely event of an attack. This requires a sustained effort involving obtaining buy-in from the top level of your organization (like the board) to get IT and security stakeholders working together asking nuanced questions. For example, what are the critical parts of the business that could be disrupted? Which digital assets map to these business segments (files, systems, databases)? How can we secure these assets? This process may be challenging, but it will help set up your organization to make impactful changes using the steps recommended above.
To learn more, visit our page on how to rapidly protect against ransomware and extortion.
To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity.