Hope Rising World Prevetion Project
from Phishing and Vishing


Hope Rising World Prevention Project
from Phishing and Vishing

         Reported by Media Director Oshell Oh


Title: Combating Phishing and Vishing: A Comprehensive Guide to Safeguarding Your Information

Subtitle: Understand the differences between phishing and vishing attacks to better protect yourself and your organization from these threats

Introduction

Phishing and vishing are two types of social engineering attacks that trick individuals into providing sensitive information or performing actions that compromise their security. As cybercriminals continue to develop increasingly sophisticated techniques, understanding the differences between phishing and vishing attacks is crucial to preventing them. In this article, we will explore the key differences between phishing and vishing and outline essential steps to protect yourself and your organization from these threats.

Phishing vs. Vishing: Understanding the Differences

1. Phishing: Phishing attacks primarily occur via email, where attackers send fraudulent messages disguised as legitimate communications from trusted sources such as banks, government agencies, or popular online services. These emails often contain malicious links or attachments, which, when clicked or opened, can result in the installation of malware or the capturing of sensitive information. Phishing emails may also direct users to fake websites that mimic legitimate ones, tricking them into entering their login credentials, financial information, or other personal details.

2. Vishing (Voice Phishing): Vishing attacks use phone calls, voicemails, or other voice-based methods to deceive individuals. In vishing attacks, scammers often impersonate representatives from banks, government agencies, or tech support to gain the trust of their victims. They may use a sense of urgency, manipulation, or the victim's personal information to convince them to provide sensitive information such as account numbers, passwords, or security codes. Vishing attacks can also target organizations and employees by exploiting their vulnerabilities or lack of awareness.

Steps to Protect Yourself and Your Organization from Phishing and Vishing Attacks

1. Educate and Raise Awareness: Familiarize yourself, your friends, family, and colleagues with common phishing and vishing tactics. Regularly conduct security awareness training in your organization to keep everyone informed about emerging threats and how to report them.

2. Verify the Source: For phishing emails, hover over links to check their destinations before clicking and be cautious about opening attachments from unknown senders. For vishing calls, hang up and independently search for the organization's official contact number, then call the verified number to confirm the legitimacy of the initial request.

3. Use Multi-Factor Authentication: Enable multi-factor authentication (MFA) for all your online accounts whenever possible. MFA requires users to provide more than one piece of evidence to prove their identity when accessing online accounts or services, making it more difficult for attackers to gain access even if they have your credentials.

4. Monitor Your Accounts: Regularly check your bank statements, credit reports, and online accounts for any suspicious activity or unauthorized transactions. If you notice anything unusual, report it immediately to the relevant authorities or organizations.

5. Install Security Software: Keep your operating system, antivirus software, and other security tools up-to-date to protect against known vulnerabilities and emerging threats.

6. Be Cautious of Unsolicited Calls and Emails: Treat any unsolicited calls or emails with skepticism, especially if they request personal information or prompt you to take urgent action.

7. Report Phishing and Vishing Attacks: Report phishing emails to the Anti-Phishing Working Group (APWG) or the organization being impersonated. Report vishing attacks to the Federal Trade Commission (FTC), the Federal Communications Commission (FCC), or your local law enforcement agency. If you are a victim of online fraud, file a complaint with the Internet Crime Complaint Center (IC3).

Conclusion

Phishing and vishing attacks pose significant threats to individuals and organizations. By understanding their differences and following the steps outlined above, you can better protect yourself and your organization from falling victim to these.

____________________________________________________

Revised Article with more info:

Title: Combating Voice Phishing: A Comprehensive Guide to Safeguarding Your Information

Subtitle: Arm yourself with knowledge and best practices to protect against increasingly sophisticated vishing attacks

Introduction

Voice phishing, commonly referred to as "vishing," is a type of social engineering attack that utilizes phone calls, voicemails, or other voice-based methods to deceive individuals into providing personal information or performing actions that compromise their security. Vishing attacks have been on the rise over the past few years, with cases increasing almost 550% from Q1 2021 to Q1 2022²⁵. In 2020, the FBI’s Internet Crime Complaint Center logged 241,342 victims of phishing, vishing, smishing and pharming, more than double 2019’s total of 114,702 victims¹. With vishing attacks becoming more frequent and sophisticated, it's more important than ever to be informed and take necessary precautions. This article aims to provide an in-depth understanding of vishing and the essential steps you can take to protect yourself and your organization.

Understanding Voice Phishing

Vishing attacks often rely on a sense of urgency, impersonation, and manipulation to convince targets to reveal sensitive information or take action that exposes them to fraud. Scammers may pose as representatives from banks, government agencies, or even tech support to gain the trust of their victims. By leveraging this trust, they can manipulate victims into providing account numbers, passwords, and other valuable information. They may also use personal information about the victims harvested from earlier cyberattacks or public sources to make their requests more convincing. For example, a visher may call a victim and claim to be from their bank, using their name and account number to verify their identity. Then, they may ask for their PIN or security code to "confirm" a suspicious transaction or "unlock" their account.

Vishing attacks can also target organizations and employees by exploiting their vulnerabilities or lack of awareness. For instance, a visher may call an employee and pretend to be from IT support, asking for their login credentials or access to their computer. Alternatively, they may call a customer service representative and use social engineering techniques to bypass security questions or verification processes. These attacks can result in data breaches, identity theft, financial losses, or reputational damage for both individuals and organizations.

Steps to Protect Yourself and Your Organization from Vishing Attacks

The following are some best practices that can help you prevent or mitigate vishing attacks:

- Educate and Raise Awareness: Knowledge is your first line of defense. Familiarize yourself with common vishing tactics, such as spoofing caller ID numbers or using automated voice messages. Share this information with friends, family, and colleagues. Regularly conduct security awareness training in your organization to keep everyone informed about emerging threats and how to report them.

- Verify Caller Identity: If you receive a suspicious call, refrain from providing personal information or complying with any requests. Instead, hang up and independently search for the organization's official contact number. Call the verified number to confirm the legitimacy of the initial request. Alternatively, you can ask the caller for their name and extension number and call them back after verifying their identity.

- Use Multi-Factor Authentication: Multi-factor authentication (MFA) is a security feature that requires users to provide more than one piece of evidence to prove their identity when accessing online accounts or services. MFA can prevent vishers from accessing your accounts even if they obtain your passwords or other credentials. Enable MFA for all your online accounts whenever possible.

- Monitor Your Accounts: Regularly check your bank statements, credit reports, and online accounts for any suspicious activity or unauthorized transactions. If you notice anything unusual, report it immediately to the relevant authorities or organizations. You can also use identity theft protection services or credit monitoring tools to alert you of any potential fraud.

- Report Vishing Attacks: If you receive a vishing call or voicemail, do not respond or engage with the caller. Instead, report it to the Federal Trade Commission (FTC), the Federal Communications Commission (FCC), or your local law enforcement agency. You can also file a complaint with the Internet Crime Complaint Center (IC3) if you are a victim of online fraud.

Conclusion

Vishing is a serious threat that can affect anyone who uses a phone or voice-based communication device. By understanding how vishers operate and following the steps outlined above, you can protect yourself and your organization from falling prey to these scams. Remember: when in doubt, hang up and verify.

from Bing

(1) What is vishing? How voice phishing scams victims | CSO Online. https://www.csoonline.com/.../vishing-explained-how-voice....

(2) Vishing cases reach all time high - Help Net Security. https://www.helpnetsecurity.com/.../vishing-cases-increased/.

(3) What Is Vishing: Methods to Detect and Avoid a Voice Scam. https://securitygladiators.com/threat/phishing/vishing/.

(4) Cybersecurity Trends & Statistics For 2023; What You Need To Know - Forbes. https://www.forbes.com/.../cybersecurity-trends.../.

(5) 30 Shocking Vishing Statistics in 2023 - IncrediTools. https://increditools.com/vishing-statistics/.

(6) Voice phishing attacks reach all-time high | TechRepublic. https://www.techrepublic.com/.../voice-phishing-attacks.../.


Title: Combating Phishing and Vishing: A Comprehensive Guide to Safeguarding Your Information


Subtitle: Understand the differences between phishing and vishing attacks to better protect yourself and your organization from these threats

Introduction

Phishing and vishing are two types of social engineering attacks that trick individuals into providing sensitive information or performing actions that compromise their security. As cybercriminals continue to develop increasingly sophisticated techniques, understanding the differences between phishing and vishing attacks is crucial to preventing them. In this article, we will explore the key differences between phishing and vishing and outline essential steps to protect yourself and your organization from these threats.

Phishing vs. Vishing: Understanding the Differences

1. Phishing: Phishing attacks primarily occur via email, where attackers send fraudulent messages disguised as legitimate communications from trusted sources such as banks, government agencies, or popular online services. These emails often contain malicious links or attachments, which, when clicked or opened, can result in the installation of malware or the capturing of sensitive information. Phishing emails may also direct users to fake websites that mimic legitimate ones, tricking them into entering their login credentials, financial information, or other personal details.

2. Vishing (Voice Phishing): Vishing attacks use phone calls, voicemails, or other voice-based methods to deceive individuals. In vishing attacks, scammers often impersonate representatives from banks, government agencies, or tech support to gain the trust of their victims. They may use a sense of urgency, manipulation, or the victim's personal information to convince them to provide sensitive information such as account numbers, passwords, or security codes. Vishing attacks can also target organizations and employees by exploiting their vulnerabilities or lack of awareness.

Steps to Protect Yourself and Your Organization from Phishing and Vishing Attacks

1. Educate and Raise Awareness: Familiarize yourself, your friends, family, and colleagues with common phishing and vishing tactics. Regularly conduct security awareness training in your organization to keep everyone informed about emerging threats and how to report them.

2. Verify the Source: For phishing emails, hover over links to check their destinations before clicking and be cautious about opening attachments from unknown senders. For vishing calls, hang up and independently search for the organization's official contact number, then call the verified number to confirm the legitimacy of the initial request.

3. Use Multi-Factor Authentication: Enable multi-factor authentication (MFA) for all your online accounts whenever possible. MFA requires users to provide more than one piece of evidence to prove their identity when accessing online accounts or services, making it more difficult for attackers to gain access even if they have your credentials.

4. Monitor Your Accounts: Regularly check your bank statements, credit reports, and online accounts for any suspicious activity or unauthorized transactions. If you notice anything unusual, report it immediately to the relevant authorities or organizations.

5. Install Security Software: Keep your operating system, antivirus software, and other security tools up-to-date to protect against known vulnerabilities and emerging threats.

6. Be Cautious of Unsolicited Calls and Emails: Treat any unsolicited calls or emails with skepticism, especially if they request personal information or prompt you to take urgent action.

7. Report Phishing and Vishing Attacks: Report phishing emails to the Anti-Phishing Working Group (APWG) or the organization being impersonated. Report vishing attacks to the Federal Trade Commission (FTC), the Federal Communications Commission (FCC), or your local law enforcement agency. If you are a victim of online fraud, file a complaint with the Internet Crime Complaint Center (IC3).

Conclusion

Phishing and vishing attacks pose significant threats to individuals and organizations. By understanding their differences and following the steps outlined above, you can better protect yourself and your organization from falling victim to these.

____________________________________________________

Revised Article with more info:

Title: Combating Voice Phishing: A Comprehensive Guide to Safeguarding Your Information

Subtitle: Arm yourself with knowledge and best practices to protect against increasingly sophisticated vishing attacks

Introduction

Voice phishing, commonly referred to as "vishing," is a type of social engineering attack that utilizes phone calls, voicemails, or other voice-based methods to deceive individuals into providing personal information or performing actions that compromise their security. Vishing attacks have been on the rise over the past few years, with cases increasing almost 550% from Q1 2021 to Q1 2022²⁵. In 2020, the FBI’s Internet Crime Complaint Center logged 241,342 victims of phishing, vishing, smishing and pharming, more than double 2019’s total of 114,702 victims¹. With vishing attacks becoming more frequent and sophisticated, it's more important than ever to be informed and take necessary precautions. This article aims to provide an in-depth understanding of vishing and the essential steps you can take to protect yourself and your organization.

Understanding Voice Phishing

Vishing attacks often rely on a sense of urgency, impersonation, and manipulation to convince targets to reveal sensitive information or take action that exposes them to fraud. Scammers may pose as representatives from banks, government agencies, or even tech support to gain the trust of their victims. By leveraging this trust, they can manipulate victims into providing account numbers, passwords, and other valuable information. They may also use personal information about the victims harvested from earlier cyberattacks or public sources to make their requests more convincing. For example, a visher may call a victim and claim to be from their bank, using their name and account number to verify their identity. Then, they may ask for their PIN or security code to "confirm" a suspicious transaction or "unlock" their account.

Vishing attacks can also target organizations and employees by exploiting their vulnerabilities or lack of awareness. For instance, a visher may call an employee and pretend to be from IT support, asking for their login credentials or access to their computer. Alternatively, they may call a customer service representative and use social engineering techniques to bypass security questions or verification processes. These attacks can result in data breaches, identity theft, financial losses, or reputational damage for both individuals and organizations.

Steps to Protect Yourself and Your Organization from Vishing Attacks

The following are some best practices that can help you prevent or mitigate vishing attacks:

- Educate and Raise Awareness: Knowledge is your first line of defense. Familiarize yourself with common vishing tactics, such as spoofing caller ID numbers or using automated voice messages. Share this information with friends, family, and colleagues. Regularly conduct security awareness training in your organization to keep everyone informed about emerging threats and how to report them.

- Verify Caller Identity: If you receive a suspicious call, refrain from providing personal information or complying with any requests. Instead, hang up and independently search for the organization's official contact number. Call the verified number to confirm the legitimacy of the initial request. Alternatively, you can ask the caller for their name and extension number and call them back after verifying their identity.

- Use Multi-Factor Authentication: Multi-factor authentication (MFA) is a security feature that requires users to provide more than one piece of evidence to prove their identity when accessing online accounts or services. MFA can prevent vishers from accessing your accounts even if they obtain your passwords or other credentials. Enable MFA for all your online accounts whenever possible.

- Monitor Your Accounts: Regularly check your bank statements, credit reports, and online accounts for any suspicious activity or unauthorized transactions. If you notice anything unusual, report it immediately to the relevant authorities or organizations. You can also use identity theft protection services or credit monitoring tools to alert you of any potential fraud.

- Report Vishing Attacks: If you receive a vishing call or voicemail, do not respond or engage with the caller. Instead, report it to the Federal Trade Commission (FTC), the Federal Communications Commission (FCC), or your local law enforcement agency. You can also file a complaint with the Internet Crime Complaint Center (IC3) if you are a victim of online fraud.

Conclusion

Vishing is a serious threat that can affect anyone who uses a phone or voice-based communication device. By understanding how vishers operate and following the steps outlined above, you can protect yourself and your organization from falling prey to these scams. Remember: when in doubt, hang up and verify.

from Bing

(1) What is vishing? How voice phishing scams victims | CSO Online. https://www.csoonline.com/.../vishing-explained-how-voice....

(2) Vishing cases reach all time high - Help Net Security. https://www.helpnetsecurity.com/.../vishing-cases-increased/.

(3) What Is Vishing: Methods to Detect and Avoid a Voice Scam. https://securitygladiators.com/threat/phishing/vishing/.

(4) Cybersecurity Trends & Statistics For 2023; What You Need To Know - Forbes. https://www.forbes.com/.../cybersecurity-trends.../.

(5) 30 Shocking Vishing Statistics in 2023 - IncrediTools. https://increditools.com/vishing-statistics/.

(6) Voice phishing attacks reach all-time high | TechRepublic. https://www.techrepublic.com/.../voice-phishing-attacks.../.


- Vishing attacks  increasing almost 550% 

- Vishing attacks have been on the rise over the past few years, with cases increasing almost 550% from Q1 2021 to Q1 2022⁵.

- In 2020, the FBI’s Internet Crime Complaint Center logged 241,342 victims of phishing, vishing, smishing and pharming, more than double 2019’s total of 114,702 victims¹.

- Vishing attacks were reported in 69% of companies in 2021, an increase from 54% in 2020³.

- The global information security market is expected to reach $170.4 billion in 2022¹.

- Only 6% of people who reported government imitation vishing scams lost money, but those who did averaged $960 in losses².


Some common types of vishing attacks include:

- Banking scams: Vishing attackers attempt to steal financial information such as bank account and credit card numbers by posing as representatives from banks or other financial institutions and claiming that there is a problem with the target's account or card¹.

- Unsolicited investment and loan offers: Scammers often call their targets offering unrealistically enticing deals, such as quick fixes to pay off debts or get-rich-quick schemes. They ask the targets to provide personal information or pay an upfront fee or deposit before they can receive the offer¹.

- Social security and Medicare scams: Phone calls are the preferred method for scamming older targets. Vishers may pose as representatives from the Social Security Administration (SSA), Medicare, or other government agencies and claim that there is an issue with the target's benefits or eligibility. They ask the target to confirm their social security number, date of birth, bank account number, or Medicare ID number. They may also ask them to pay a fee or penalty for resolving the issue¹.

- Tax scams: Vishers may impersonate agents from the Internal Revenue Service (IRS) or other tax authorities and claim that the target owes taxes or has made an error on their tax return. They threaten the target with legal action, arrest, deportation, or asset seizure if they do not pay immediately. They ask the target to provide personal information or pay using unconventional methods such as gift cards, wire transfers, or cryptocurrency¹.


To protect yourself and your organization from vishing attacks, you should:

- Educate and raise awareness: Familiarize yourself with common vishing tactics and share this information with others. Regularly conduct security awareness training in your organization¹.

- Verify caller identity: If you receive a suspicious call, hang up and independently search for the organization's official contact number. Call the verified number to confirm the legitimacy of the initial request. Alternatively, you can ask the caller for their name and extension number and call them back after verifying their identity¹.

- Use multi-factor authentication: Multi-factor authentication (MFA) is a security feature that requires users to provide more than one piece of evidence to prove their identity when accessing online accounts or services. MFA can prevent vishers from accessing your accounts even if they obtain your passwords or other credentials. Enable MFA for all your online accounts whenever possible¹.

- Monitor your accounts: Regularly check your bank statements, credit reports, and online accounts for any suspicious activity or unauthorized transactions. Report any unusual activity to the relevant authorities or organizations. You can also use identity theft protection services or credit monitoring tools to alert you of any potential fraud¹.

- Report vishing attacks: If you receive a vishing call or voicemail, do not respond or engage with the caller. Report it to the Federal Trade Commission (FTC), the Federal Communications Commission (FCC), or your local law enforcement agency. You can also file a complaint with the Internet Crime Complaint Center (IC3) if you are a victim of online fraud¹.


Source: Conversation with Bing, 5/3/2023

(1) 3 Examples of Typical Smishing and Vishing Attacks in 2022. https://www.phonexia.com/blog/3-examples-of-typical-smishing-and-vishing-attacks-in-2022/.

(2) Spoofing and Phishing — FBI - Federal Bureau of Investigation. https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/spoofing-and-phishing.

(3) Vishing attacks on organizations worldwide 2022 | Statista. https://www.statista.com/statistics/1306269/volume-vishing-attacks-organizations/.

(4) The Rise of Vishing and Smishing Attacks – The Monitor, Issue 21. https://www.kroll.com/en/insights/publications/cyber/monitor/vishing-smishing-attacks.

(5) 30 Shocking Vishing Statistics in 2023 - IncrediTools. https://increditools.com/vishing-statistics/.

Introduction:

Hope Rising World (HRW) is a non-profit organization that is dedicated to resolving difficulties and improving the quality of life for people across the globe. Our innovative endeavors focus on providing assistance to homeless children, adoptees, and families, as well as creating educational opportunities for individuals in need.

Mission Statement:

Our mission is to support underprivileged individuals and communities by organizing fundraising events that promote music, documentary films, competitions, and other events. Through these initiatives, we aim to create a positive impact in the world by improving the lives of those in need.

Objectives:

To provide support for homeless children and families by organizing fundraising events that focus on providing them with shelter, food, and clothing.

To support the educational needs of underprivileged individuals by providing opportunities for them to learn, including funding for scholarships, learning materials, and other educational resources.

To create awareness about adoption and provide support for adoptees by organizing events, such as workshops and counseling sessions.

To promote the development of music and film culture by organizing events such as concerts and documentary film screenings. These events will also help us to fundraise for our various programs.

Approach:

HRW will use a multifaceted approach to achieve our goals. We will collaborate with other non-profit organizations and individuals who share our vision to leverage our resources and expertise. By creating partnerships with different organizations, we can share our knowledge, skills, and resources to better serve the communities we work with.

We will also work to establish relationships with businesses and organizations that can provide us with support in terms of funding, volunteers, and resources. Additionally, we will use social media platforms and other digital technologies to engage with our donors and supporters to create a wider network and reach a broader audience.


Hope Rising World (HRW)

Conclusion:

HRW is committed to creating positive change in the world by supporting underprivileged individuals and communities. We believe that by providing opportunities for those in need, we can help them improve their lives and create a brighter future. By organizing fundraising events that promote music, documentary films, competitions, and other events, we will work to achieve our goals and make a meaningful impact on the lives of those in need.


Hope Rising World Essay Competition 

Projects:

Introducing our upcoming Essay Competition Project: "Can We Solve the End of the World with AI?" by HRWUSA.org Communication Dept.

Purpose:

The HRWUSA.org Communication Dept. is organizing an essay competition entitled "Can We Solve the End of the World with AI?" to raise global awareness about the development of artificial intelligence and the environmental challenges facing our planet. This competition invites students to present fresh ideas and perspectives on how artificial intelligence can contribute to addressing Earth's problems through their creative insights.

Not only does this competition provide an opportunity for students to enhance their creative problem-solving and communication skills, but it also encourages the discovery of new ideas and solutions for humanity's enduring survival. By participating in this essay competition, students can make their voices heard and play an active role in shaping a brighter future for our world.

Join us in exploring the potential of AI to solve Earth's pressing issues and support Hope Rising World's mission to make a meaningful impact on the lives of those in need. Together, we can create a hopeful world.


Title: Establishing an Official Rescue Team for the Future of Humanity on Earth  by Hope Rising World

Title: Establishing an Official Rescue Team for the Future of Humanity on Earth  by Hope Rising World Director Oshell Oh

Introduction:

The earth has been through numerous natural catastrophes throughout its history, and the human race faces an unprecedented crisis. We must act now to ensure the survival and sustainability of our planet and its inhabitants for generations to come. It is essential to establish an official rescue team for the future of humanity on earth to prepare for and mitigate the impact of natural disasters, climate change, and other threats to our survival.

Background:

Throughout human history, political ideology has often focused on maintaining power rather than promoting new ideas or the freedom of individuals. This has led to violations of human rights and a lack of urgency in addressing global challenges such as climate change. Economic profit has become a central problem in contributing to global warming, and we must take steps to prioritize sustainability over short-term gain.

Goals:

The primary goal of the official rescue team is to ensure the survival of humanity on earth for generations to come. This will require a transformational approach to our political and economic systems, as well as the development of new solutions for mitigating the impact of natural disasters and climate change. The team must work towards creating a sense of urgency and solidarity among nations to prioritize sustainability over conflicts of interest.

Actions:

The official rescue team will work towards the following actions:

Develop new solutions for mitigating the impact of natural disasters and climate change on human life and the environment.

Establish space shelters for future natural disasters and explore the possibility of colonizing other planets.

Promote a sense of urgency and solidarity among nations to prioritize sustainability over conflicts of interest.

Develop a global framework for addressing climate change and other environmental challenges.

Create policies and regulations that prioritize sustainability over short-term economic gain.

Conclusion:

The establishment of an official rescue team for the future of humanity on earth is essential to ensure the survival and sustainability of our planet and its inhabitants. We must take immediate action to prioritize sustainability over conflicts of interest and work towards a transformational approach to our political and economic systems. Our descendants' future depends on our actions today.

Hope Rising World Director Oshell Oh

"Hope Rising World Logo Presentation:

The octagon shape in the logo represents renewal, rebirth, regeneration, and transition. It symbolizes the idea of new beginnings and starting afresh.

The eagle, placed at the top of the logo, represents inspiration, victory, longevity, speed, pride, fatherhood, and royalty. It symbolizes the soaring spirit and the courage to overcome challenges.

The balance scales in the logo symbolize justice and fairness, which are essential values for a world that aims to foster hope and optimism.

The star in the logo represents the warfare between light or spirit and darkness or material forces. It symbolizes the constant struggle between good and evil and the human quest for meaning and purpose.

The five sprouts in the middle of the logo represent new hope, a beginning or a fresh start, and growth. They also represent the five continents: Europe (blue), Asia (yellow), Africa (black), The Americas (red), and Oceania (green).

Each sprout has a heart symbol inside it, which represents compassion, understanding, life-giving, and complexity. It is a symbol for love and carries a sense of intellect and understanding, as well as connotations of the soul, will, and courage.

The Hope Rising World Logo was designed by Director Oshell Oh, who has imbued it with deep symbolism and meaning to inspire hope and optimism for a better future."