WHY IT MATTERS: Digital Transformation
214.8K views | +30 today
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tag: 'Security'. Clear
Scooped by Farid Mheir
Scoop.it!

Hey, Alexa: Stop recording me - a great review of the possible privacy intrusions we face and that should also be a concern when those devices find their way in #doctor #lawyer offices via @WP #Was...

Hey, Alexa: Stop recording me - a great review of the possible privacy intrusions we face and that should also be a concern when those devices find their way in #doctor #lawyer offices via @WP #Was... | WHY IT MATTERS: Digital Transformation | Scoop.it

Our tech columnist listened to four years of his Alexa archive, and discovered Amazon tracks us in more ways than we might want.

Farid Mheir's insight:

WHY IT MATTERS: with voice enable devices making their way into the professional settings like doctors offices or lawyers office, the impact of devices that record everything that is being said in very private settings should concern us all.

Juan Pulido's curator insight, June 11, 2019 12:08 PM

From the beginning I knew that G is Big Brother.

Scooped by Farid Mheir
Scoop.it!

How to limit iPhone app tracking - 5 settings that you can change to return a bit of privacy into your digital lives, but be prepared to spend quite a bit of time to do so via @WP #WashingtonPost

How to limit iPhone app tracking - 5 settings that you can change to return a bit of privacy into your digital lives, but be prepared to spend quite a bit of time to do so via @WP #WashingtonPost | WHY IT MATTERS: Digital Transformation | Scoop.it

Our tech columnist offers some practical advice for fighting back against iOS apps hungry for your personal data.

Farid Mheir's insight:

WHY IT MATTERS: with digital transformation comes new tools and techniques that we need to learn to keep our privacy. These are 5 of them.

Scooped by Farid Mheir
Scoop.it!

The very long list of all the 100 trackers that find their way into our phones and websites via @disconnectme on @gitHub #privacy

The very long list of all the 100 trackers that find their way into our phones and websites via @disconnectme on @gitHub #privacy | WHY IT MATTERS: Digital Transformation | Scoop.it

The open source list of trackers that powers our browser extensions, Firefox’s private browsing mode, and other popular privacy tools can be found here along with a change log and notes.

Farid Mheir's insight:

WHY IT MATTERS: for geeks that want to understand which trackers exists and how they appear on mobile apps and websites. Can also be used to add them to your apps of sites, unfortunately...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Apple promises privacy, but 5400 iPhone apps share your data with #trackers, ad companies and research firms #nowhere2hide via @WP #WashingtonPost #privacy #adBlockers

Apple promises privacy, but 5400 iPhone apps share your data with #trackers, ad companies and research firms #nowhere2hide via @WP #WashingtonPost #privacy #adBlockers | WHY IT MATTERS: Digital Transformation | Scoop.it

We ran a privacy experiment to see how many hidden trackers are running from the apps on our iPhone. The tally is astounding. Apple says, “What happens on your iPhone stays on your iPhone.” Our privacy experiment showed 5,400 hidden app trackers guzzled our data — in a single week.

Farid Mheir's insight:

WHY IT MATTERS: I wrote about this many years back and it is worth an update given this very interesting article from WP. The growth of mobile tracking, yes even on iPhone, should be cause for concern. They also link to a solution, disconnect.me which I also covered in the past when it was launched as the collusion chrome plugin (in 2013!!!!). Moreover the very good github list of trackers is quite mindblowing. Yes it has been 6 years and the state of privacy has worsened in serious ways. Follow the links in the article for details but here are the 2 I consider most useful:

https://disconnect.me/

https://github.com/disconnectme/disconnect-tracking-protection

No comment yet.
Scooped by Farid Mheir
Scoop.it!

A great explanation of a "SIM port hack" that successfully was used to steal 100K$ and what to do so it does not happen to you #mustRead #pleaseShare HT thanks and good luck to @coonsesean

A great explanation of a "SIM port hack" that successfully was used to steal 100K$ and what to do so it does not happen to you #mustRead #pleaseShare HT thanks and good luck to @coonsesean | WHY IT MATTERS: Digital Transformation | Scoop.it

I lost north of $100,000 last Wednesday. It evaporated over a 24-hour time span in a “SIM port attack” that drained my Coinbase account. It has been four days since the incident…

Farid Mheir's insight:

WHY IT MATTERS: this should be essential reading for anyone to at the very least understand the potential dangers of hacking everywhere and the limits of 2 factor authentification (2FA). The recommendations are all very good and should be t least considered by everyone. Please share.

Scooped by Farid Mheir
Scoop.it!

Password Security: How to Avoid the Most Common Password Mistakes via @zapier

Password Security: How to Avoid the Most Common Password Mistakes via @zapier | WHY IT MATTERS: Digital Transformation | Scoop.it

Passwords. We all have lots of them these days. And yet we're told repeatedly to not reuse passwords and to make them strong. For most of us, that's an opposing set of directives. Unless you have some amazing memory, there's no way that we mere mortal

Farid Mheir's insight:

WHY IT MATTERS: remains as true this year as it was in the past.

Also read: https://zapier.com/blog/how-to-change-your-passwords/ 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Threat Intelligence is a new field of expertise with its set of resources, processes and tools - this report from via @Gartner provides insights into the field and solutions available

Threat Intelligence is a new field of expertise with its set of resources, processes and tools - this report from via @Gartner provides insights into the field and solutions available | WHY IT MATTERS: Digital Transformation | Scoop.it

Market Guide for Security Threat Intelligence Products and Services. Key Findings:
- The term “threat intelligence” covers a diverse set of capabilities.
Client interest in industry-led government and commercial TI has increased significantly during the past two years. There are still large numbers of providers in this market, with startups also entering.
- The number and diversity of TI services, as well as expertise, have created an environment in which purchasers often struggle to compare services, and there’s still no single provider to address all of them. Many vendors can provide access to information; fewer provide truly anticipatory content or curation based on customized intelligence.
- The value of these services is sometimes constrained by the customer’s ability to afford, absorb, contextualize and, especially, use the information provided by the services.

Farid Mheir's insight:

WHY IT MATTERS: threat intelligence is a new field introduced by digital transformation. As more data is created and more processes are transferred to digital, the potential threats of fraud and other security breaches increases and requires new resources, new processes and new tools. This Gartner report provides a reference document to understand the field and help select partners.

Hamza Yousaf's comment, April 5, 2019 10:17 AM
Best ever Apple accessories
https://bit.ly/2FNzXqJ
Scooped by Farid Mheir
Scoop.it!

Google rolls out Password Checkup and Cross Account Protection as a chrome extension that everyone should install and use via @google #security #privacy

Google rolls out Password Checkup and Cross Account Protection as a chrome extension that everyone should install and use via @google #security #privacy | WHY IT MATTERS: Digital Transformation | Scoop.it

We’re rolling out two new features, Password Checkup and Cross Account Protection, to keep your information safe beyond Google’s sites and apps.

Farid Mheir's insight:

WHY IT MATTERS: this simple extension will inform you when your user-password has been stolen - prompting you to change your password or take action. Must have for everyone.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

What Is The Magicverse (And Why)? explains how #AR will add layers of information that will persist over time to create a truly parallel universe. #wow #longPlay #mustRead via @MagicLeap

What Is The Magicverse (And Why)? explains how #AR will add layers of information that will persist over time to create a truly parallel universe. #wow #longPlay #mustRead via @MagicLeap | WHY IT MATTERS: Digital Transformation | Scoop.it

The Magicverse is an Emergent System of Systems bridging the physical with the digital, in a large scale, persistent manner within a community of people.

Farid Mheir's insight:

WHY IT MATTERS: want to know what augmented reality will look like in 10 or 20 years. Read this. But don't expect it to come together in the short-term, this is a *long* play

No comment yet.
Scooped by Farid Mheir
Scoop.it!

When surveillance meets incompetence- how an unsecured database of camera feeds and facial recognition data has exposed millions of private data in China may be a sign of things to come in the futu...

When surveillance meets incompetence- how an unsecured database of camera feeds and facial recognition data has exposed millions of private data in China may be a sign of things to come in the futu... | WHY IT MATTERS: Digital Transformation | Scoop.it

Last week brought an extraordinary demonstration of the dangers of operating a surveillance state — especially a shabby one, as China’s apparently is. An unsecured database exposed millions of records of Chinese Muslims being tracked via facial recognition — an ugly trifecta of prejudice, bureaucracy and incompetence.

Farid Mheir's insight:

WHY IT MATTERS: China is using facial recognition to monitor its citizens, this is a well documented fact. Unfortunately, not all the steps required to protect this very private information are being taken, as evidenced by this article. This raises again the importance of security to be built into our every activities, especially those that involve government or security activities.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Don’t Toss That Bulb, It Knows Your Password: explains how connected devices such as lightbulbs know much about you even after the end of their useful life #IOT #privacy #security

Don’t Toss That Bulb, It Knows Your Password: explains how connected devices such as lightbulbs know much about you even after the end of their useful life #IOT #privacy #security | WHY IT MATTERS: Digital Transformation | Scoop.it

Whether it was here on Hackaday or elsewhere on the Internet, you’ve surely heard more than a few cautionary tales about the “Internet of Things” by now. As it turns out, giving every gadget you own access to your personal information and Internet connection can lead to unintended consequences. Who knew, right? But if you need yet another example of why trusting your home appliances with your secrets is potentially a bad idea, [Limited Results] is here to make sure you spend the next few hours doubting your recent tech purchases.

Farid Mheir's insight:

WHY IT MATTERS: the article explains how this team has successfully retrieved private information from discarded connected devices. It raises concerns about the disposal of connected products which, has everyone knows, will soon included pretty much everything in our homes and offices, from lightbulbs to refrigerators.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

90% of cyber-attacks start with email: email security solutions to improve - @Gartner differentiates the 3 forms of phishing attacks and describes solutions that include #technology as well as huma...

90% of cyber-attacks start with email: email security solutions to improve - @Gartner differentiates the 3 forms of phishing attacks and describes solutions that include #technology as well as huma... | WHY IT MATTERS: Digital Transformation | Scoop.it

Phishing attacks are increasingly using impersonation to bypass traditional defense mechanisms. Weak sender identification will continue to present opportunities for creative attacks. Security and risk management leaders should use this research to adjust their strategy and business processes.
Key Challenges
Phishing attacks are still increasing as a targeting method of attackers. Phishing attacks targeting credentials will continue to escalate as applications and data migrate to better-protected cloud providers.
Email is not designed to truly authenticate sender identity. Efforts like DMARC to authenticate domains are not granular enough to authenticate users and do not address all attack types.
Most implemented secure email gateways (SEGs) are not designed with post-delivery detection and remediation techniques, costing incident responder and email admin time and reducing the feedback loop from end users.
User phishing education is a good start toward people-centric security, but current email security does not provide users with any indicators of the trust they can put in emails or the proper workflow for dealing with suspect emails.
Recommendations
Security and risk management leaders responsible for endpoint and mobile security should:
Upgrade secure email gateway solutions to cloud versions that include phishing protection, particularly for impostor or business email compromise (BEC) protection.
Integrate employees into the solution and build capabilities to detect and respond to suspect attacks.
Work with business managers to develop standard operating procedures for handling sensitive data and financial transactions.
Strategic Planning Assumptions
By 2023, sender identity verification will be a common critical component on secure email gateways and other anti-phishing solutions.
By 2023, anti-phishing education will be a critical part of the feedback loop between end users and email security solutions.
Through 2023, business compromise attacks will be persistent and evasive, leading to large financial fraud losses for enterprises and data breaches for healthcare and government organizations.

Farid Mheir's insight:

WHY IT MATTERS: we often forget that it is the simple things that make us vulnerable. Security remains a key challenge with any digital transformation and this report can help identify solutions.

Don Sadiri Daquitan Quia-eo's curator insight, February 20, 2019 8:09 PM
Phishing is a crime (cybercrime) where the criminals poses as someone. They would somehow create a poser account or they would create a fake website where the victims would log in and then their account would immediately appear to the criminals. Financial loss and stealing of other important documents or things are often the outcome of phishing crime. So, in order to avoid these incidents we need to check everything twice or thrice. For example, check the url of the website if it is legitimate like there would be "www" and "https", it means that the site you are using is SECURED.
Honnie Faith Balingway II's curator insight, February 20, 2019 10:03 PM
(My knowledge about computer networking basics)

From my knowledge, Computer networking is part of my knowledge as an i.c.t student and i konw that computer networking is as a group of two or more computer systems or other devices that are linked together to exchange data.

There are many types of computer networks. Common types of networks include the following:

The Local Area Network, Wide-area network, Metropolitan-area network,Home-area network, Virtual private network and Storage area network.
Networks share common devices and functions, such as servers, transmission media (the cabling used to connect the network) clients, shared data (e.g. files and email), network cards, printers and other peripheral devices.
And  an important relationship on networks is that of the server and the client. 
Edward Dimaden's curator insight, February 21, 2019 2:16 AM
their are many things in this world that they going to attacks some person for block mail and this issue is gonna be stop 
we us young people start to defense this issue, we united as one so stop cyber-attacks.
Scooped by Farid Mheir
Scoop.it!

Threat Intelligence Framework and Handbook by @RecordedFuture provides amazing framework to structure your security data gathering, processing and response #CIO #cybersecurity

Threat Intelligence Framework and Handbook by @RecordedFuture provides amazing framework to structure your security data gathering, processing and response #CIO #cybersecurity | WHY IT MATTERS: Digital Transformation | Scoop.it

This infographic breaks down the chapters of our new handbook by security roles to show how each role can identify risks faster and more accurately.

Farid Mheir's insight:

WHY IT MATTERS: this book provides a wealth of insights to help your IT team craft a proper threat intelligence strategy and organization.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

New year resolution: change your passwords - or better yet, start using a Password Manager via @SheHacksPurple #security #passwords #newYearResolution

New year resolution: change your passwords - or better yet, start using a Password Manager via @SheHacksPurple #security #passwords #newYearResolution | WHY IT MATTERS: Digital Transformation | Scoop.it

Passwords are awful. The software security industry expects us to remember 100+ passwords, that are complex (variations of upper & lowercase, numbers and special characters), that are supposed to be changed every 3 months, with each one being unique. Obviously this is impossible for most people, and for those whom it is possible, why would they want to waste all of that brain power on something that is, essentially, meaningless?

*** This article is for beginners in security or other IT folk, not experts.

Farid Mheir's insight:

WHY IT MATTERS: I wrote about it so much in the past but have not recently. I find new year resolution to be the best time to start good new habits. Here this article provides reasons why you should start using password manager tools, and provides a list to help you get started. Now, GO!

theclickfit's comment, January 6, 2019 12:22 PM
https://www.theclickfit.com/pro-testosterone/
speedtrafikk's comment, January 7, 2019 5:03 AM
interest
Scooped by Farid Mheir
Scoop.it!

The Best Open Source Intelligence #OSINT Tools and Techniques

The Best Open Source Intelligence #OSINT Tools and Techniques | WHY IT MATTERS: Digital Transformation | Scoop.it

This article breaks down the best OSINT tools, techniques, resources and websites available online for every stage of intelligence gathering process. From background reading, to organizing your research and getting the best out of search engines, Intelligence Fusion has created the ultimate list of open source intelligence tools. 

We cover the following;
What is OSINT?
The Best OSINT Websites for Background Reading
OSINT Techniques to Organise your Thoughts
Setting up Automated Alerts using OSINT Tools
OSINT Tools for Social Media
OSINT Techniques: Getting the Best out of Search Engines
Platforms and Dashboards for Open Source Intelligence
OSINT Websites for Online News Media
Other Useful OSINT Tools

Farid Mheir's insight:

WHY IT MATTERS: the article describes all the sources of information you can leverage to gather knowledge about the world.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Future of Security Guards from Securitas presents a #date-driven future full of technology - the transformation of a still very manual industry

The Future of Security Guards from Securitas presents a #date-driven future full of technology - the transformation of a still very manual industry | WHY IT MATTERS: Digital Transformation | Scoop.it

Securitas 2018 investor update conference presents the strategy for the future.

Farid Mheir's insight:

WHY IT MATTERS: the security industry will be transformed with digital technologies, sensors, big data, drones, AI and other disruptive technologies. Start the video around 1:20:00 in the section #3

No comment yet.
Scooped by Farid Mheir
Scoop.it!

This Tech Would Have Spotted the Secret Chinese Chip in Seconds via @IEEE_Spectrum

This Tech Would Have Spotted the Secret Chinese Chip in Seconds via @IEEE_Spectrum | WHY IT MATTERS: Digital Transformation | Scoop.it

So why isn’t this system in widespread use? After all, much of it has been available since 2014. (Tehranipoor even described some in his 2017 article for IEEE Spectrum about the dangers of cloned chips.) “Sometimes a technology is ready, but it’s not used by companies because an attack hasn’t been seen to be real,” Tehranipoor says. This attack might be enough to change that perception, he says.  

Farid Mheir's insight:

WHY IT MATTERS: as the article states, technology sometimes exists but most don'T feel this is an important issue - until it is too late or catastrophic event occurs. We can extrapolate this concern to pretty much everything regarding cybersecurity these days...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Turing use #AI and #robotics to create collaborative, end-to-end security solutions for service providers and end users #segway

Turing use #AI and #robotics to create collaborative, end-to-end security solutions for service providers and end users #segway | WHY IT MATTERS: Digital Transformation | Scoop.it

We use A.I. and robotics to create collaborative, end-to-end security solutions for service providers and end users.

Farid Mheir's insight:

WHY IT MATTERS: this device morphs a new transportation device - the segway - with AI and sensors to deliver a surveillance device that may provide a new type of remote operated, semi-autonomous surveillance system. I can see applications gated communities, very large facilities, etc. Plus the video is quite futuristic! https://www.youtube.com/watch?v=jhD9q7stHfY

No comment yet.
Scooped by Farid Mheir
Scoop.it!

New service from Firefox called Monitor helps you find out if your account has been hacked #security #hacking #password

New service from Firefox called Monitor helps you find out if your account has been hacked #security #hacking #password | WHY IT MATTERS: Digital Transformation | Scoop.it

Have your accounts been leaked or stolen in a data breach? Find out at Firefox Monitor. Search our database and sign up for alerts.

Farid Mheir's insight:

WHY IT MATTERS: this new service will help you determine if your account has been hacked and watch for it. This is a new twist on a service I discussed before http://fmcs.digital/?s=pwned but that remains more valuable than ever today.

Vezta & Co.'s curator insight, September 29, 2018 11:27 AM

WHY IT MATTERS: this new service will help you determine if your account has been hacked and watch for it. This is a new twist on a service I discussed before http://fmcs.digital/?s=pwned but that remains more valuable than ever today.

Scooped by Farid Mheir
Scoop.it!

Email Threat Report explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates #phishing #email #threat

Email Threat Report explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates #phishing #email #threat | WHY IT MATTERS: Digital Transformation | Scoop.it

As the point of entry for 91% of cyber attacks, email is every organization’s biggest vulnerability. From malware to malware-less attacks including impersonation attacks like CEO fraud, a single malicious email can cause significant brand damage and financial losses. Understanding these ever evolving attacks and identifying the tactics used, is key to staying one step ahead of cyber criminals.

Farid Mheir's insight:

WHY IT MATTERS: this very good paper explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates. Be aware!

Scooped by Farid Mheir
Scoop.it!

How We All Can Fight Misinformation- @HBR creates a series called "reality wars" on a much needed topic that is hard to fight for: truth on the Internet

How We All Can Fight Misinformation- @HBR creates a series called "reality wars" on a much needed topic that is hard to fight for: truth on the Internet | WHY IT MATTERS: Digital Transformation | Scoop.it

False news spreads online faster, farther, and deeper than truth does — but it can be contained. Here’s how.

Farid Mheir's insight:

WHY IT MATTERS: trust on the Internet is difficult to get. Harvard Business Review raises concerns and provides possible solutions in this special series. Much needed, the solutions do not however appear very easy to implement. Tough times ahead for the truth...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Looks like #SecurityKeys are a good way to protect your login/password: there were *no* successful #phishing against Google employees since using the devices in 2017 via @briankrebs

Looks like #SecurityKeys are a good way to protect your login/password: there were *no* successful #phishing against Google employees since using the devices in 2017 via @briankrebs | WHY IT MATTERS: Digital Transformation | Scoop.it

The most common forms of 2FA require the user to supplement a password with a one-time code sent to their mobile device via text message or an app. Indeed, prior to 2017 Google employees also relied on one-time codes generated by a mobile app — Google Authenticator.
In contrast, a Security Key implements a form of multi-factor authentication known as Universal 2nd Factor (U2F), which allows the user to complete the login process simply by inserting the USB device and pressing a button on the device. The key works without the need for any special software drivers.

Farid Mheir's insight:

WHY IT MATTERS: 2 factor authentication is great, especially when using a physical device like a secure key it seems. read the article for details on why this is so and how to use it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Podcast on digital disruption by #Accountants gives an idea of how much #AI #Blockchain #Automation #Cybersecurity will impact their industry - as I believe it will all professional services includ...

Podcast on digital disruption by #Accountants gives an idea of how much #AI #Blockchain #Automation #Cybersecurity will impact their industry - as I believe it will all professional services includ... | WHY IT MATTERS: Digital Transformation | Scoop.it

You’re surrounded by disruption and rapid change. Maybe you’re looking for solutions. A way to seize opportunities. We all are. It’s a sprint to stay ahead of technology. Blockchain. Automation. AI. Cybersecurity. It will forever change the way accounting is done. And forever change those who do it. It’s time to reset, redefine and reskill. The way we learn. The way we work. And the way we move forward. Here, you’ll find what you need to not just survive, but adapt and thrive. And disrupt disruption.

Farid Mheir's insight:

WHY IT MATTERS: I've been blogging about digital disruption since Jan 2013, and doing it since the early days of Internet in 1995. It is refreshing to see it being picked up by non technology professionals. Maybe a sign of the times that this thing is starting to really impact people, businesses and whole industries...?

No comment yet.
Scooped by Farid Mheir
Scoop.it!

You have data and here are your rights - Your data matters @ICO #UK #privacy

You have data and here are your rights - Your data matters @ICO #UK #privacy | WHY IT MATTERS: Digital Transformation | Scoop.it

We live in a data-driven world. Almost every transaction and interaction you have with most organisations involves you sharing personal data, such as your name, address and birth date. You share data online too, every time you visit a website, search for or buy something, use social media or send an email.

Farid Mheir's insight:

WHY IT MATTERS: ICO is the data protection organization in the UK. It provides a guide to your rights regarding data and privacy. Very useful and well done.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Plant Your Flag, Mark Your Territory so as to protect your #privacy and #onlineIdentity - if not others will do it — via @briankrebs

Plant Your Flag, Mark Your Territory so as to protect your #privacy and #onlineIdentity - if not others will do it — via @briankrebs | WHY IT MATTERS: Digital Transformation | Scoop.it

Many people, particularly older folks, proudly declare they avoid using the Web to manage various accounts tied to their personal and financial data — including everything from utilities and mobile phones to retirement benefits and online banking services. The reasoning behind this strategy is as simple as it is alluring: What’s not put online can’t be hacked. But increasingly, adherents to this mantra are finding out the hard way that if you don’t plant your flag online, fraudsters and identity thieves may do it for you.

Farid Mheir's insight:

WHY IT MATTERS: I've been writing about concerns regarding online identity and privacy for a long time with blog posts such as "pyramid of digital needs", "digital twin" and "10 urgents actions to protect your identity". This article from Brian Krebs reminds us all that online identity must be protected and that it requires active actions on our part.

http://fmcs.digital/blog/pyramid-of-digital-needs/ 

http://fmcs.digital/blog/digital-twin/ 

http://fmcs.digital/blog/digital-moi-get-started-10-actions/ 

Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/