Saturday, 14 May 2016

WORKING PAST AGE 65 MAY RESULT IN LONGER LIFE


Working after the age of 65 may result in a longer life, according to a new study from Oregon State University.

Researchers examined data from nearly 3,000 adults in the Health and Retirement Study from 1992 until their retirement in 2010. To explore how factors other than health impact mortality, researchers split participants into two groups: unhealthy retirees, who cited poor health as one reason they decided to retire, and healthy retirees.

Taking into account participants’ demographic, lifestyle and health factors, results showed that working one year past the typical retirement age of 65 had a positive impact on mortality rate, regardless of health status, a press release from OSU states. Healthy retirees who worked a year past age 65 had an 11 percent lower risk of death from all causes; for unhealthy retirees, the risk was 9 percent lower.

The findings indicate that staying active could benefit longevity, researchers said, adding that further research is necessary to explore the connection between work and health.

“It may not apply to everybody, but we think work brings people a lot of economic and social benefits that could impact the length of their lives,” Chenkai Wu, lead study author and doctoral student in the university’s College of Public Health and Human Sciences, said in the release.

Friday, 15 April 2016

Staying Safe in Construction: Steps To Note

The steps are:

For new employees:

1
Establish a buddy system for all new hires.
2
Hold safety orientation sessions for all new hires, including temporary workers.

Ongoing training:
3
Ensure managers and supervisors have the appropriate leadership and effective communication skills to instil safety culture and concepts into the workforce.
4
Institute two separate Pre-Task Hazard Analysis training programs.
5
Hold monthly “lunch and learn” safety training programs.
6
Require all foremen and superintendents to attend “Leadership in Safety Excellence” certification courses.
7
Hold targeted safety training to address all safety incidents.
8
Make sure all training and materials are available in languages that can be read by all members of your workforce.
9
Train your trainers.

Operating procedures:
10
Create worker task-specific “pocket safety guides” for every assigned task.
11
Establish craft-specific safety mentoring programs.
12
Issue easy-to-read badges to all workers indicating their level of training.
13
Authorize all workers to issue “stop work” cards to address safety risks.

Monday, 11 April 2016

Guide To Safe Lifting

Lifting and carrying objects is common for many workers in most industries. But training is important. If performed improperly, lifting and carrying items can lead to injuries. Common materials-handling injuries include strains and sprains (specifically to the back), cuts, fractures, and bruises.
Manual materials handling is a very complex combination of moving body segments, changing joint angles, tightening muscles and loading the spinal column. 

The following DOs and DON'Ts are recommended by the National Safety Council pertaining to lifting.

Do:
  • Eliminate manual lifting whenever possible to help reduce injuries.
  • Stay in good physical shape if lifting items is part of your job.
  • Keep materials within easy reach and have handling aids around in case you need them.
  • Make sure you have a good grip on any item you attempt to lift. Test the weight and balance of items before moving them. Too heavy? Get a mechanical lifting aid or ask a co-worker for assistance.
  • Keep the item you are lifting close to your body. Ensure your feet are close to the load, stand in a stable position with your feet pointed in the direction you’re moving, and lift mostly by straightening your legs.


Don’t:
  • Twist your back or bend in a sideways direction.
  • Attempt to lift or lower an object if you’re in an awkward position.
  • Feel compelled to lift an item that is too heavy – get help instead.
  • Lift or lower an object if your arms are extended.
  • Continue to lift an item if you realize it’s too heavy.
  • Lift above your shoulders or below your knees.


Friday, 8 April 2016

Climate Change Can Adversely Affect Worker Health and Safety

Climate change may increase the frequency and severity of occupational hazards and exposures – and create new ones, according to a report from the US Global Change Research Program. 

Outdoor workers are often some of the first people exposed to the effects of climate change through higher temperatures, lower air quality, extreme weather, diseases, industrial exposures and environment changes, the report states. These exposures can result in heat-related illnesses, stress and fatigue, potentially raising the risk of injury.

Affected workers include agricultural workers, fishermen, construction workers, first responders and transportation workers. Workers in hot indoor environments, such as steel mills, warehouses and dry cleaners, also are at risk. Health effects from climate change can increase for certain workers, such as migrant workers and day labourers, who lack access to air conditioning or live in poorly insulated housing.


In addition, climate change can lead to severe weather events, such as flooding and drought, resulting in a greater need for first responders and potentially exposing those responders to hazards, the report states. Wildfires are also increasing in severity and frequency, posing danger to fire-fighters.

The report lists factors that can contribute to climate change exposure, including:

  1. Occupation

  2. Spending time at risky locations, such as urban areas, areas with allergens and pollutants, and    flood-prone areas

  3. Response to extreme weather events

  4. Socioeconomic status

  5. Older buildings

  6. Limited mobility and function

Friday, 4 March 2016

Top 10 "Serious" and "Wilful" Safety Violations of 2015

A “serious” violation is defined by OSHA as “one in which there is substantial probability that death or serious physical harm could result, and the employer knew or should have known of the hazard.”





OSHA defines a “willful” violation as one “committed with an intentional disregard of or plain indifference to the requirements of the Occupational Safety and Health Act and requirements.”


Thursday, 3 March 2016

Tired of sitting all day? Walk it off, researchers suggest

Sweden – Workers who sit all day and go home tired at night should try getting up for a brisk walk or two during the workday, suggests a new study by Swedish and Australian researchers.

The researchers compared five hours of uninterrupted sitting to sitting with three minutes of light-intensity walking every 30 minutes. The study’s 19 participants, who were between 45 and 75 years old and were overweight or obese, then reported their fatigue levels.

Researchers found that fatigue levels for participants who walked were lower than those who sat the entire time. “Interrupting prolonged sitting with light-intensity walking breaks may be an effective fatigue countermeasure acutely,” the researchers said in the study.

The study was conducted by researchers from UmeĆ„ University in Sweden, and Australian universities in Melbourne, Brisbane and Perth.

Monday, 4 January 2016

TOP 10 RULES TO STAY SAFE IN THE CYBER WORLD

Rule 1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore
Most hacks begin this way - you receive an email, or SMS, you visit a link and are given a convincing reason why you have to install something.
Or, you receive an email with a document attached, open it and it installs the malware for you.
Think twice, click once.
If something is unexpected don't trust it: delete it.

Rule 2: If a bad guy can alter the operating system on your computer, it's not your computer anymore
In the end, an operating system is just a series of ones and zeroes that, when interpreted by the processor, cause the computer to do certain things.
 If a bad guy can change them, the now-untrustworthy files will do his bidding, and there's no limit to what he can do. He can steal passwords, make himself an administrator on the computer, or add entirely new functions to the operating system. To prevent this type of attack, make sure that the system files (and the registry, for that matter) are well protected.
If at all possible, buy devices that give you the necessary data - original keys and software - to reinstall the operating system.
A fresh install is the only way you can be certain of what you're getting.

Rule 3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore
Most people are completely unaware of how vulnerable their machines are to uploading malicious software simply by allowing someone to plug in a USB stick.
Even if your computer is powered off, a hacker might be able to boot off a USB stick and install malware or add hidden elements.
Unless you want to superglue shut all of the physical connections on your device - not recommended - just do not give anyone "alone time" with you precious machine.
And, if at all possible, encrypt your hard drive so it is more secure when powered off.

Rule 4: If you allow a bad guy to upload programs to your website, it's not your website any more
With over a billion active websites in the world, hackers don't just target individuals' machines.
They can upload code in unexpected ways.
We have seen major brands breached as they didn't prevent hackers injecting code into web forms. We have seen malware being passed onto visitors via embedded adverts.
Website developers typically don't think like hackers. They design their sites to be helpful and friendly.
You need professional cynics who will advise on how hackers can abuse such features.
Nothing destroys a brand faster than a website that visitors think cannot be trusted.
Rule 5: Weak passwords trump strong security
Always use a password on your computer—it's amazing how many accounts have blank passwords. And develop a complex one and avoid using single “dictionary words”
Once you've picked a strong password, handle it appropriately. Don't write it down. If you absolutely must write it down, at the very least keep it in a safe.
Build a password that has a mix of upper- and lower-case letters, numbers, punctuation marks, and so forth. Make it as long as possible; consider using two words in combination.
You need to practice good password hygiene: use complex passwords, don't share passwords - between people or systems - and don't write them on white boards or post-it notes.

Rule 6: A computer is only as secure as the administrator is trustworthy
The "insider threat" is a growing problem.
Remember that if you give someone privileges on your systems, you are giving them the keys to the crown jewels.
Plus don't assume that simply because someone works in technology that they are not subject to human frailties.
They can be scammed out of logon credentials just the same as mere mortals, and unless your systems are configured to prevent it, those credentials could enable a hacker to walk away with data.
Make sure valuable data needs more than a simple username and password for access.
Some major data breaches have happened this way.

Rule 7: Encrypted data is only as secure as the decryption key
Encryption can be a great tool to prevent criminals getting at data if a machine is stolen.
But, as computers increase in power, decryption becomes simpler unless you have a key that is long enough.
Look for encryption that is known to be strong - for example the Advanced Encryption Standard (AES) - and has keys that are considered "long".
Also, most encrypted devices have some means of recovering data if, as we all do, we forget our passwords, or something similar.
If you've ever encrypted a disk you'll probably find you were asked to make a recovery key using a USB stick or even to print out some long sequence of letters and numbers.
If you store this recovery information with the protected device it's hardly worth the effort of encrypting it in the first place.
Lock your recovery keys away somewhere safe and don't carry it with you.

Rule 8: An out of date virus checker is only marginally better than none at all
Malicious software is being adapted at an increasing rate.
Hundreds of thousands of new variants appear each year in addition to completely new strains.
The set of malware that your virus checker knew about when you first installed it is out of date very quickly.
Hackers do still try to use older versions of malware but they know many of us fail to keep our systems up to date, so they tweak the malware in the hope that the virus checker will miss it.
Update your virus checker as regularly as you possibly can, and do the same for your operating system.
If you tend to turn on your machine infrequently then do your updates before you start checking those emails or visiting your banks website.

Rule 9: Absolute anonymity isn't practical, in real life or on the web
Not everyone who wishes to browse the web anonymously is doing so for illegal reasons.
But be aware that many technologies out there that can provide anonymity need to be used correctly otherwise you can be tracked.
And remember that being tracked is becoming the norm online.
If you're not a paying customer you are probably the product, as marketers track you to more accurately target you.
Try using a browser that has "private mode "or "do not track". It doesn't always work but it may lessen the degree to which you are monitored.

Rule 10: Technology is not a panacea
Don't assume that just because your machine is using the latest versions of everything, and you have the full array of security software installed, that you are fireproof.
The weakest link in any security chain is us: humans. We fall for scams, we do silly things and we suffer from security fatigue very quickly.
Worst of all we assume it won't happen to us - until it does.
Phones, tablets or wearables are all essentially small computers, and the laws written back in 2000 apply to these devices as much as they ever did to the computers of 15 years ago. In fact, there is a real danger that we are forgetting the lessons of the last 15 years as hackers hope to catch us off guard.

These rules have proven to be fundamental in nature, so keep them in mind no matter what form your "smart" technology takes.
And if in doubt ask someone who knows.