Pacific Associates Limited Minato-ku Tokyo Japan, Recruiting in Tokyo is my life’s work

I have been in the recruiting industry in Tokyo since graduating business-school at the end of the ’80s. Growing up in Chicago in the ’60s and high-school there in the ’70s, the thought of moving to California and graduating from U.C. San Diego (Economics) would have seemed a dream. Leaving for London with a duffle-bag on graduation-day and never coming back certainly would have seemed the things of fantasy, but if one follows their heart good things can happen. Thus it was I arrived, in due-course, in Japan in 1985. The opportunities and dignity of the place have kept me here ever since.

paul-a-levine

The opportunity to help professional (people to whom career is vitally important) find a path to a better life via proactive career building is, in my opinion, an honorable undertaking. That it can be done in the elegant way of Japan, where each placement we do is ‘hand-made’ after intensive in-person discussion with our candidates and clients has led me to dedicate my life to this work. An important goal of mine has long been to be a master-craftsman in the art of recruiting. To this end I am still meeting candidates and clients to further develop my art.

K.K. Pacific Associates Limited

President, Paul A. Levine

President Bio & History

In 1998 I made the decision to move my own career forward from being a senior recruiter who happens to own a head-hunting company to being a full-time president who happens to be expert in recruiting. Though the difference may sound pedantic or rhetorical, the day-by-day reality is quite different. The bottom line is that from the time of making this transition, my company at that time Access Technology Japan, grew from roughly 10 staff to 189 with operations in four countries in the space of three years. Further evolving, in 2004 I changed my role to Chairman, appointing one of my long-term managers as President. This facilitated the sale of that company in 2007; the largest such deal in the Tokyo recruiting-market up to that point.

My goal then was to discover life beyond that of 12+hours days and enjoy the life of the early-retired. This allowed time with my family, work my limited abilities in photography, enjoy travel and compete more often in power-lifting.

Like a pleasant afternoon nap that comes to a refreshing end, my time in retirement came to a happy finish with my establishment of Pacific Associates Limited in 2010. Pacific Associates Limited (PAL) is established as a partnership rather than sole-proprietorship. The difference is huge: my current professional objective, beyond growing my skills as in pursuit of being a master-craftsman in recruiting, is to lead my partners to be presidents. As far as I know, in the Tokyo recruiting market there has not yet been a company dedicated to helping its staff to leave the company by becoming, first a partner and then president of a separate company.

Paul Levine’s Profile

Paul Levine first visited Japan in 1985. He got an MBA at the University of San Diego and the California State University in 1989, and in the same year, came back to Japan to be a headhunter. In 1992, he established Access Technology Japan; the very first Japanese headhunting company specialized in the high-tech industry. He obtained a master’s degree in business administration at Harvard University in 2007. He established K.K. Pacific Associates Limited in February 2010, and continues to expand the company to new heights every day.

He has been married with two children. He loves bourbon, photograph taking and weightlifting and his skills in both fields are semi-professional. He is still active in the weightlifting field, winning first prize at a tournament in Tokyo. He still works out twice a day, coached by Chuck Wilson, his friend for over 10 years.

His trademark white shirt, red tie and red suspenders have been prominent since 1995. “I meet different candidates in the same meeting room, dressed in the same clothes. Staying consistent really helps you to concentrate on the people you meet. As a professional in judging people, “I can understand an individual within about five minutes of speaking with them”.

Advertisements

Heimdal Online Security – 15 Steps to Maximize your Financial Data Protection

heimdal-online-security-15-steps-to-maximize-your-financial-data-protection

We use computers to pay bills, shop online, chat and even keep in touch with friends on social media platforms. You might not realize it, but this makes us vulnerable.

Because we willingly broadcast over the Internet valuable details, such as our credit card information or bank account credentials – information usually needed by cyber criminals – we can never be too careful when securing our financial transactions or personal information.

A 2016 report from the PricewaterhouseCoopers indicates that cybercrime is the “2nd most reported economic crime, affecting 32% of organizations.” And the same study reveals another cause for concern, apart from the economic impact:

“The insidious nature of this threat is such that of the 56% who say they are not victims, many have likely been compromised without knowing it.”

The data clearly shows that cybercrime affects individuals and global economic growth. Cyber-attacks on financial institutions or with financial consequences for users like you and me are putting financial assets at risk. Consequently, financial data protection should be a strong concern for anyone.

So is there a way to for our online activities to remain private and safe from cybercriminals?

Definitely! Here are a few best practices that will keep your system protected:

  1. Check the link before you click it

Pay attention to the links you want to access. To make sure you are not deceived; simply hover the mouse cursor over the link to see if you are directed to a legitimate location.

If you were supposed to reach your favorite news website, such as “www.cnn.com”, but the link indicates “hfieo88.net“, then you should resist the urge of clicking the link. Hyperlinking is a common practice in phishing attacks and it’s always best to double check embedded URLs.

Most of us use shortening services for their links, such as goo.gl or tinyurl. But in some cases an unknown link may send you to a malicious site that can install malware on the system. So, how can you know where you’ll arrive if you click it?

To make sure you are about to access the right online destination, use a free tool such as Redirect Detective. This tool will allow you to see the complete path of a redirected link.

Alternatively, you can also check the suspicious links using a reliable URL checker, such as VirusTotal.

  1. Check the file before you click it

We all know malware is everywhere. But how can we make sure a file (or an executable file) we just downloaded is what it’s pretending to be? Can we tell the difference between a safe file and a malicious one?

An important step for everyone is to use a browser which integrates a reputation-based technology. This technology uses a cloud scoring system to analyze each application downloaded and where it comes from. As a result of the analysis, websites that distribute malicious software – not yet detected by existing defense mechanisms – are more easily blocked. For more details, you can access the following article.

To make sure you are not running a malicious executable file (which may download a Trojan virus on your system), use VirusTotal, which analyzes suspicious files on multiple antivirus solutions.

  1. Use secure websites to run financial transactions

Financial operations and transactions should be given high scrutiny, as they hold the key for cyber criminals to cashing out your life’s savings.

Here’s how to make sure you visit a secure website:

  1. Look to the left of the web address and find the “Lock” icon. This indicates that you are visiting an encrypted and/or a verified website.
  2. Make sure the web address starts with “https://”. The “s” comes from “secure socket layer” and it indicates you are connected to a website where data, which is sent and received, is encrypted.
  3. Set strong passwords for your accounts

Your passwords should contain around 20 characters. Don’t forget to combine upper and lowercase letters, numbers, and symbols. Don’t use the same password for all your accounts. Make a habit of changing your main passwords every 30 days. Even if you are hacked, having different passwords for each account will help you limit a potential loss.

For more information on how to set strong passwords and manage them safely, see our step by step guide on password security. This includes details on how to use a strong and secure password manager like LastPass or Sticky Password.

  1. Use two-factor authentication

This is one of the best ways to ensure your online accounts or your email inbox are not accessed by anyone else but you.

This option means that, besides entering your credentials, you will be required to enter a one-time code sent to your phone. Use this method to protect confidential information from social media accounts, such as Facebook, Twitter or valuable data from email accounts.

Read More About 15 Steps to Maximize your Financial Data Protection