WHY IT MATTERS: Digital Transformation
214.7K views | +1 today
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tag: 'Privacy'. Clear
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

The Future Of Retail Might Get Under Your Skin: get #RFID implants

The Future Of Retail Might Get Under Your Skin: get #RFID implants | WHY IT MATTERS: Digital Transformation | Scoop.it

Early this year the staff at Epicenter, a Stockholm based high-tech company, were given a choice; they could either be issued a standard employee ID card for access to the building and office equipment, or they could be injected with a tiny radio frequency identification device, placed just under the skin of their hand – otherwise known as a subcutaneous implant. Surprisingly, a number chose the chip, on the promise that with a wave of their hand they would be able to access the building, open doors, operate photocopiers and even pay for lunch in the company cafeteria. No ID cards to forget at home or passwords to remember.

In fact, the Epicenter case is hardly the first experiment of its kind. Going back as far as 2004, Barcelona nightclub owner Conrad Chase offered RFID chipping to his VIP clients enabling access to special lounges and payment capability.


Via André Bélanger, Farid Mheir
Farid Mheir's insight:

I knew they did this for dogs but never thought they did it for humans. But come to think of it, makes perfect sense. Or it will become the biggest invasion of privacy ever.

 

Farid Mheir's curator insight, November 11, 2015 7:50 PM

I knew they did this for dogs but never thought they did it for humans. But come to think of it, makes perfect sense. Or it will become the biggest invasion of privacy ever.


Great insight from André!

Luigi Cappel's comment, November 21, 2015 2:25 PM
For me it would depend on what part of the world I live in. In New Zealand I would have no problem wearing a chip that I could use for ID for building access, customs, instead of passwords or finger scanners. Being a law abiding citizen in a relatively corruption free country, I'd be more than happy, providing as per the law, I knew how any information about me was being used and could revoke access where it was abused. If I was living in other countries, which may remain nameless, I would steer well clear, because being innocent and law abiding doesn't mean that you are safe.
Farid Mheir's comment, November 21, 2015 5:33 PM
@Russell R. Roberts, Jr. @Luigi Cappel both of you thank you for insightful comments and reshare... as always!
Rescooped by Farid Mheir from Les mutations numériques
Scoop.it!

The Future Of Retail Might Get Under Your Skin: get #RFID implants

The Future Of Retail Might Get Under Your Skin: get #RFID implants | WHY IT MATTERS: Digital Transformation | Scoop.it

Early this year the staff at Epicenter, a Stockholm based high-tech company, were given a choice; they could either be issued a standard employee ID card for access to the building and office equipment, or they could be injected with a tiny radio frequency identification device, placed just under the skin of their hand – otherwise known as a subcutaneous implant. Surprisingly, a number chose the chip, on the promise that with a wave of their hand they would be able to access the building, open doors, operate photocopiers and even pay for lunch in the company cafeteria. No ID cards to forget at home or passwords to remember.

In fact, the Epicenter case is hardly the first experiment of its kind. Going back as far as 2004, Barcelona nightclub owner Conrad Chase offered RFID chipping to his VIP clients enabling access to special lounges and payment capability.


Via André Bélanger
Farid Mheir's insight:

I knew they did this for dogs but never thought they did it for humans. But come to think of it, makes perfect sense. Or it will become the biggest invasion of privacy ever.


Great insight from André!

Luigi Cappel's comment, November 21, 2015 2:25 PM
For me it would depend on what part of the world I live in. In New Zealand I would have no problem wearing a chip that I could use for ID for building access, customs, instead of passwords or finger scanners. Being a law abiding citizen in a relatively corruption free country, I'd be more than happy, providing as per the law, I knew how any information about me was being used and could revoke access where it was abused. If I was living in other countries, which may remain nameless, I would steer well clear, because being innocent and law abiding doesn't mean that you are safe.
Farid Mheir's comment, November 21, 2015 5:33 PM
@Russell R. Roberts, Jr. @Luigi Cappel both of you thank you for insightful comments and reshare... as always!
Farid Mheir's curator insight, December 9, 2016 3:22 PM

I knew they did this for dogs but never thought they did it for humans. But come to think of it, makes perfect sense. Or it will become the biggest invasion of privacy ever.

 

Scooped by Farid Mheir
Scoop.it!

Australia to trial cloud passports in world-first move

Australia to trial cloud passports in world-first move | WHY IT MATTERS: Digital Transformation | Scoop.it
Under a cloud passport, a traveller's identity and biometrics data would be stored in a cloud, so passengers would no longer need to carry their passports and risk having them lost or stolen. DFAT says 38,718 passports were registered as lost or stolen in 2014-15, consistent with the 38,689 reported missing the previous year.
Farid Mheir's insight:

Part of a brainstorming exercise by the Foreign Affairs Minister of Australia. 


WHY THIS IS IMPORTANT

Not having to carry papers and documents with you is always a good idea. We do it for our personal information and contacts, our emails, calendars, documents and pictures, and soon with our money (apple pay, google wallet, etc.). Moving to the cloud for your government identification makes perfect sense as well. 


Security will need to be bullet proof, but given the number of stolen or lost passports (due mostly to human error I am sure), I would bet that technology would do a much better job.


Concerning privacy and global surveillance, that's a different story...

Farid Mheir's comment, November 6, 2015 6:07 PM
Yes indeed, all good points - but I don't see them as showstoppers but rather as technical constraints, that may ultimately the solution impractical until cloud access maturity is there. But I thought it is a great example of digital transformation, no? ;-)
youngcelery's comment, November 6, 2015 11:16 PM
Helpful...!!
Ms. Stephens's curator insight, November 9, 2015 9:41 AM

This could revolutionize travel, but will your information be safe from hackers?

Scooped by Farid Mheir
Scoop.it!

Hackers Can Silently Control Siri From 16 Feet Away

Hackers Can Silently Control Siri From 16 Feet Away | WHY IT MATTERS: Digital Transformation | Scoop.it
SIRI MAY BE your personal assistant. But your voice is not the only one she listens to. As a group of French researchers have discovered, Siri also helpfully obeys the orders of any hacker who talks to her—even, in some cases, one who’s silently transmitting those commands via radio from as far as 16 feet away.
Farid Mheir's insight:

This article describes a research experiment where radio waves were used to control a phone - from a distance of up to 16 feet - to make phone calls, visit websites or other activities that may profit a thief.


WHY THIS IS IMPORTANT

As we carry cell phones everywhere with us, we extend the digital threat that we are exposed to. Having someone access our phone from 16 feet may not appear to be much of a threat, it may in fact be very useful in crowded environments as the article states.


Moreover we've seen from the Snowden leaks that NSA has been creating remote hacking solutions to read keyboard keystrokes from a distance - or remote control the camera or microphone. As we carry digital devices with us - now it is phones and watches, but soon implants will come - this further opens threats to our digital selves. Let's be careful!


Also read stuff I wrote about this in the past: http://www.scoop.it/t/digital-transformation-of-businesses?q=nsa

No comment yet.
Scooped by Farid Mheir
Scoop.it!

These are the 7 easy steps a teen used to hack the director of the #CIA

These are the 7 easy steps a teen used to hack the director of the #CIA | WHY IT MATTERS: Digital Transformation | Scoop.it
How a teen hacker used social engineering to get into the email account of the CIA director.
Farid Mheir's insight:

Explains how a teenager was able to fool VErizon and AOL employees into giving him access to CIA director email account.


This shows that the weak link in all of our technology remains the people. The solution thus is not more technology or information security restrictions (because everyone will bypass them anyways), but rather better education and technology that is transparent so that people don't bypass it or make insecure by their actions.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Don't throw away your Boarding Pass: its Barcode contains a lot of private data via @Krebs

Don't throw away your Boarding Pass: its Barcode contains a lot of private data via @Krebs | WHY IT MATTERS: Digital Transformation | Scoop.it

The next time you’re thinking of throwing away a used boarding pass with a barcode on it, consider tossing the boarding pass into a document shredder instead. Two-dimensional barcodes and QR codes can hold a great deal of information, and the codes printed on airline boarding passes may allow someone to discover more about you, your future travel plans, and your frequent flyer account.

Farid Mheir's insight:

Boarding pass barcodes contain a lot of private and personally identifiable information. Krebs provides an account of what that information allows you to find on the boarding pass holder. 


WHY THIS IS IMPORTANT

Very private information is often stored in plain sites on things that we do not even think about trowing in the garbage. Let's be careful!

No comment yet.
Scooped by Farid Mheir
Scoop.it!

How to disappear from the web: what happens to your #ereputation when you're dead (french)

How to disappear from the web: what happens to your #ereputation when you're dead (french) | WHY IT MATTERS: Digital Transformation | Scoop.it
Modifier les résultats de recherche de Google. Contrôler ses informations personnelles sur le web. Disparaître de l'internet. Après deux décennies d'indolence, des...
Farid Mheir's insight:

How to manage your e-reputation and some methods to disappear from the web. In french.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Homepage | Silent Circle

Homepage | Silent Circle | WHY IT MATTERS: Digital Transformation | Scoop.it
To build a truly private product, you have to build a truly private company.
Farid Mheir's insight:

SilentCircle is the company behind the Blackphone and is now launching software and services, not only devices.


I wrote about the blackphone before and why it matters: http://www.scoop.it/t/digital-transformation-of-businesses?q=blackphone


WHY THIS IS IMPORTANT

The niche of extreme privacy and extreme secrecy will grow, as user and organizations are willing to pay a premium for security and privacy. Blackberry had the upper hand in this, not sure where they'll be in the future but it would make sense for them to consolidate this emerging market.


Also read: https://gigaom.com/2015/03/02/silent-circle-shows-off-more-powerful-blackphone-2-privacy-phone/

No comment yet.
Scooped by Farid Mheir
Scoop.it!

How to download everything LinkedIn knows about you — well, almost everything

How to download everything LinkedIn knows about you — well, almost everything | WHY IT MATTERS: Digital Transformation | Scoop.it

Privacy is a serious consideration for anyone that uses digital products, services and social networks. LinkedIn recently made it possible for its users to download an archive of all the information it has about you. After all, it is our data: we should be able to get retrieve it easily. Below is a screengrab of all the information LinkedIn has emailed back to me when I placed my request.  

Farid Mheir's insight:

A recent post of mine on the information that LinkedIn allows you to download, and the other information it does not let you to download.


WHY THIS IS IMPORTANT

All the data transparency and privacy policies of social networks and cloud providers often hides a lots of very private and personal information. It raises the questions on how to access this information, in world where more and more of our lives is in the hands of others without our knowledge (but often with our consent).

Craig Broadbent's curator insight, September 20, 2015 10:25 PM

Interesting article to start you thinking about all the personal info that is now available about you on the internet. 

Scooped by Farid Mheir
Scoop.it!

LinkedIn invalidates passwords of users that have been hacked elsewhere

LinkedIn invalidates passwords of users that have been hacked elsewhere | WHY IT MATTERS: Digital Transformation | Scoop.it
Learn how LinkedIn protects our members and businesses. Read our best
practices and tips to keep your information safe.
Farid Mheir's insight:

In a recent post, LinkedIn shared how their security experts roam the dark web to capture all passwords that have been breached and compares them to their users. If a stolen password is found, LinkedIn automatically resets the user password to protect the account.


WHY THIS IS IMPORTANT

This practice shows that large cloud service providers have security practices that are way more evolved than most corporations. Indeed I do not know any company that protects its systems in a way that LinkedIn claims to be doing here. It demonstrates how important security is to these cloud providers and the level of protection their users have against hackers. I often feel that my information is safer on cloud services than it is on my own laptop.


Privacy, on the other hand, is a different matter altogether.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

No, You Can't Hire A #Hacker To #Erase You From The Ashley Madison Leak

No, You Can't Hire A #Hacker To #Erase You From The Ashley Madison Leak | WHY IT MATTERS: Digital Transformation | Scoop.it
Some desperate Ashley Madison users hope hired hackers can scrub their names from the leaked database, but experts say that's not possible.
Farid Mheir's insight:

Oh well, too bad.

Made me think of stories I published in the past about how to disappear from the web http://sco.lt/4pi8g5 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Ashley Madison hack was actually pretty small

The Ashley Madison hack was actually pretty small | WHY IT MATTERS: Digital Transformation | Scoop.it
Only 32 million data records were stolen, far less than in recent hacks of Adobe, eBay, and the US military.
Farid Mheir's insight:

A good visual summary of recent data breaches.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Security researchers identify 1,600 Internet of Things devices with a drone over Texas

Security researchers identify 1,600 Internet of Things devices with a drone over Texas | WHY IT MATTERS: Digital Transformation | Scoop.it
Praetorian tracking all IoT devices in Austin, Texas running on ZigBee protocol, similar to the Shodan scanner.
Farid Mheir's insight:

A project has been devised to map all internet of things devices in the Austin Texas area, and identify vulnerabilities. Cool demonstrations of what you can do with a drone and some technology skills.


See the full map here:

https://www.praetorian.com/iotmap/ 


WHY THIS IS IMPORTANT?

There will be 9B IoT devices soon and many more in the future. Great opportunities but it needs to be safe and private.

Tracy Harding's comment, September 1, 2015 9:19 AM
You need to work on formatting of your replies. This is one giant sentence. Remember the requirements. You need a 2-3 sentence summary, at least 1 sentence of IR implications and 1 sentence about your thoughts.
Farid Mheir's comment, September 1, 2015 9:23 AM
@Tracy Harding: not sure I understand your comment re: formatting. Can you be more specific and email me a screengrab? thank you!
Farid Mheir's comment, September 1, 2015 9:24 AM
@Jake D'Imperio gis thank you for the comment!
Scooped by Farid Mheir
Scoop.it!

Hackers Finally Post Stolen Ashley Madison Data: what can we learn from this data breach?

Hackers Finally Post Stolen Ashley Madison Data: what can we learn from this data breach? | WHY IT MATTERS: Digital Transformation | Scoop.it
The other shoe just dropped. The hackers who breached the cheating site AshleyMadison.com appeared to make good on their threat to expose customer data on Tuesday, dumping the stolen information online.
Farid Mheir's insight:

A review of what we know about the data breach.


WHY IS THIS IMPORTANT

Interesting to see how pirates distribute their loot and wha constitutes valuable information, other than credit card numbers.


What is most interesting here I believe are these stats:

thousands of fake female profiles

- 90-95% of actual users are male

Speaks volume on the anonymity of the Internet and the lack of reliable information out there.


Also read this most insightful post on the Verge: http://www.theverge.com/2015/8/19/9178855/ashley-madison-data-breach-implications

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Apps to track your #period reviewed by @Exist

Apps to track your #period reviewed by @Exist | WHY IT MATTERS: Digital Transformation | Scoop.it

Apple just announced they’re adding period tracking to the built-in iOS Health app, but there are plenty of apps for iOS and Android that have been offering in-depth period tracking for ages.

Here are some of the best I found.

Farid Mheir's insight:

This is getting very personal.


WHY THIS IS IMPORTANT?

Most people would not even think about tracking their every move and data like the quantified self movement is promoting. However, we are providing more and more of our intimate data to our apps and websites, as evidenced by these apps, some of which come pre-installed on iPhones. This is bound to raise privacy issues in the future.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Here’s what your stolen #identity goes for on the internet’s black market

Here’s what your stolen #identity goes for on the internet’s black market | WHY IT MATTERS: Digital Transformation | Scoop.it
Tens of millions of people have lost their private information in data breaches over the past few years. But what happens after that—how the data are leveraged for financial gain—remains murky.
Farid Mheir's insight:

Reporter has gone to dark web to find out that user information of quality is worth almost 100$.


WHY THIS IS IMPORTANT?

There is an opportunity for a company to start charging higher fees to collect and protect your digital identity. Today it seems Apple may be gearing towards that model: you pay more for its services than Google, Amazon, Facebook and others but they - as far as we know - do not sell your data.

agilITe Services's curator insight, August 3, 2015 7:46 AM

Reporter has gone to dark web to find out that user information of quality is worth almost 100$.


WHY THIS IS IMPORTANT?

There is an opportunity for a company to start charging higher fees to collect and protect your digital identity. Today it seems Apple may be gearing towards that model: you pay more for its services than Google, Amazon, Facebook and others but they - as far as we know - do not sell your data.

Rescooped by Farid Mheir from SME Cyber Security
Scoop.it!

Some hackers make more than $80,000 a month — here's how

Some hackers make more than $80,000 a month — here's how | WHY IT MATTERS: Digital Transformation | Scoop.it
Here's an inside look at the crazy business models ruling the hacking world, where hackers can make more than $80,000 a month by infecting people's computers.

Via Roger Smith
Farid Mheir's insight:

Some very interesting data and review of how hackers break computer security mechanisms and violate our privacy.


WHY IS THIS IMPORTANT

Privacy is one of our biggest digital challenge I believe. Being aware of the problem is the first step.

Roger Smith's curator insight, July 19, 2015 12:09 AM

Cybercrime 101 = business 101?

Scooped by Farid Mheir
Scoop.it!

Best #password managers for PCs, Macs, and mobile devices

Best #password managers for PCs, Macs, and mobile devices | WHY IT MATTERS: Digital Transformation | Scoop.it
10 local and cloud-based contenders make passwords stronger and online life easier for Windows, OS X, iOS, Android, BlackBerry, and Windows Phone users
Farid Mheir's insight:
Great review of essential tools in everyone's computer and mobile phone.WHY THIS IS IMPORTANTStrong password are our only protection for our digital lives and yet to many people still rely on simple and easy to guess ones. I wrote about this many times before http://www.scoop.it/t/digital-transformation-of-businesses?q=password, and this article provides links and ratings for different solutions on the market.And by the way, when possible, always turn on two-factor authentication : see http://sco.lt/6DAZgv
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Beam will change dental insurance one connected toothbrush at a time

Beam will change dental insurance one connected toothbrush at a time | WHY IT MATTERS: Digital Transformation | Scoop.it
Beam Technologies wants to change the dental insurance market, starting with data.
Farid Mheir's insight:

Insurance company offers bluetooth toothbrushes to clients to reduce their premiums - if they brush well.


WHY THIS IS IMPORTANT

Big data and digital connected things have the potential to transform entire industries and it looks like the insurance industry is one of them. With Desjardins ajusto mobile app (http://www.desjardins.com/ca/personal/insurance/car-insurance/ajusto/) good drivers get up to 25% premium discounts, Oscar fitbit tracker users get lower premiums as well (and the startup gets a crazy 15B$ valuation http://www.businessinsider.com/oscar-raises-145-million-at-a-15-billion-valuation-2015-4), the trend appears to be clear: give us access to your data and we'll give you a better deal.

Scooped by Farid Mheir
Scoop.it!

#wow: data is the pollution of the information age. #mustListen talk via @GoogleTalks @schneierblog

Bruce Schneier, American cryptographer, computer security and privacy specialist, will be coming to Google to talk about his new book: "Data and Goliath: The...
Farid Mheir's insight:

Bruce Schneier is a legend in the security and privacy world and he explains in a 30 minute talk (20min if you listen at 1.5x speed ;-) the content of his new book. He makes me want to read it (good job I guess) but also closes with an interesting analogy: data is the pollution of the information age.


WHY THIS IS IMPORTANT

Bruce raises the issue of privacy but also ventures into solutions, which is rare because it is a difficult subject with no straight answer. He makes the case that there is duality in producing data and analyzing it: it is both useful and dangerous. Every company is faced with the questions that Bruce raises.

Scooped by Farid Mheir
Scoop.it!

#Digital #Wellness now a corporate strategic pillar- EmoryU uses Fitbits to help employees 'Move More'

#Digital #Wellness now a corporate strategic pillar- EmoryU uses Fitbits to help employees 'Move More' | WHY IT MATTERS: Digital Transformation | Scoop.it
"This program fits within the Healthy Emory strategic plan which focuses on three key areas: increasing physical activity; improving healthy eating and nutrition; and enhancing stress management skills," he says.
Farid Mheir's insight:

Emory University subsidizes fitbit wearable step tracking devices to improve 1200 employee wellness, leveraging the fitbit corporate wellness program http://bit.ly/1cNGtgv


WHY THIS IS IMPORTANT

We think digital devices, wearables, watches, and fitness apps as personal health improvement devices. Corporations are also seeing them as useful ways to improve their bottom lines as they expect that healthier employees are more productive, less prone to taking sick days, etc. I expect this trend to grow at a rapid pace in the future.


Warning: of course, this raises a number of concerns regarding information privacy and the use of private health data by corporations. The fear that employees may have - I know I would - is that the corporation will use the data to discriminate against employees. For example, they could raise or lower certain benefits, such as insurance premiums, for employees that do not exercice as much as others. Big data coming from millions of device users could provide those "standards" or benchmarks. A proper governance program must be put in place along with strong and long-term communication plan.


Further reading using the wearables, data or privacy tags in my blog

http://bit.ly/1cNHSU4

http://bit.ly/1cNI1Hb

http://bit.ly/1cNI5Xj 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The effects of end of year festivities on health habits via @withings

The effects of end of year festivities on health habits via @withings | WHY IT MATTERS: Digital Transformation | Scoop.it
An overview of the impact of the end of year festivities on health: sleep, weight and physical activity
Farid Mheir's insight:

No surprise in the data: people go to bed late on xmas and new year and wake up later the next morning. But the difference in each country seems to demonstrate that Americans don't party a lot and that French party more than many others. Here again, no surprise... ;-)

Farid Mheir's comment, June 2, 2015 5:16 PM
thank you @Hany Aly @Vandana Verma. Feel free to recommend my topic
Scooped by Farid Mheir
Scoop.it!

Lessons learned from Flame, three years later, demonstrates sophistication of computer viruses via @Securelist

Lessons learned from Flame, three years later, demonstrates sophistication of computer viruses via @Securelist | WHY IT MATTERS: Digital Transformation | Scoop.it

Three years ago, on May 28th 2012, we announced the discovery of a malware known as Flame. At the same time we published our FAQ, CrySyS Lab posted their thorough analysis of sKyWIper. A few days earlier, Maher CERT published IOCs for Flamer. In short, Flame, sKyWIper and Flamer are different names for the same threat, which took the world by surprise as the first major discovery after Stuxnet and Duqu.

Since the discovery of Flame, we reported on many other advanced malware platforms, including Regin and Equation, yet Flame remains special in terms of being one of the most complex, surprising and innovative malware campaigns we have ever seen.

Looking back at the discovery of Flame, here are some lessons we learned.

Farid Mheir's insight:

A short account of the level of sophistication that computer viruses have achieved. And a video that pleades for the need to keep computers secure.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

We know where you’ve been: Ars acquires 4.6M license plate scans from the cops

We know where you’ve been: Ars acquires 4.6M license plate scans from the cops | WHY IT MATTERS: Digital Transformation | Scoop.it
One citizen demands: "Do you know why Oakland is spying on me and my wife?"
Farid Mheir's insight:

And to think people are scared of being spied on because of digital technology, mobile phones and web browsers. Looks like just driving around is now sufficient... ;-)

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Unmasked: An Analysis of 10 Million Passwords via @wpengine @stumbleupon

Unmasked: An Analysis of 10 Million Passwords via @wpengine @stumbleupon | WHY IT MATTERS: Digital Transformation | Scoop.it
How strong are your passwords? Here's an analysis of 10 million via @wpengine
Farid Mheir's insight:

This analysis is very in depth and looks at many different angles to show how and why we pick simple passwords. I continue to be amazed by the lack of proper passwords being used by people in general.


This study is recent but I assume things may change quite rapidly and solutions such as lastpass or password box are helping change this trend.


Also I assume this applies well to the USA but may be different in Canada, Quebec and elsewhere due to differences in language and culture.


Also consider reading: Kill the Password: Why a String of Characters Can't Protect Us Anymore | Gadget Lab | Wired.com

Oksana Borukh's curator insight, March 29, 2015 9:10 AM

Interesting analysis of passwords.

Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/