Technologies To Up Your Security

By | April 25th, 2017|Online Safety|

CSIDIn our fast-paced, increasingly digital world, more data is being shared and transferred than ever before. As we rely more and more on our digital devices, we must be aware of the risks that come with increased connectivity and take the necessary steps to help keep our information secure.

In the U.S. last year, there were up to 1,000 mobile malware attacks happening every hour. It’s no coincidence that cyber criminals are focusing their efforts and honing their skills on mobile attacks – cyber criminals are aware that mobile devices have become an extension of ourselves and are a high-value target. While you may not be able to make yourself completely immune to attack, there are many technologies and features on your mobile and other devices to help minimize risk.

Technologies to Turn On
Many of the technology features available right at our fingertips can help improve our security. To add an extra layer of protection to your accounts, enable two-factor authentication (2FA) whenever possible. This can take a variety of forms – enabling 2FA on an online banking account, for example, may send an additional code to your phone. If someone discovers your password, they won’t be able to access anything unless they also have your smartphone. 2FA may also take the shape of an additional security question, or entering a unique pin code, before you are able to access your account.

Especially when you’re traveling, it’s worth creating and connecting to a virtual private network (VPN). Wi-Fi options can be limited on vacation, and connecting to public Wi-Fi, which transmits data in cleartext, could allow a remote attacker to identify and extract information. With a VPN, if you need to access sensitive information, your IP address and personal details will remain hidden. VPN connections are encrypted, so even if an attacker captures the traffic, they will only see a handful of indecipherable characters.

While using unique, strong, passwords for your accounts is always recommended, there are additional steps to take to up your security. Strengthen your online accounts by utilizing authentication tools, such as biometrics or security keys, Another technique is to put a PIN lock on your SIM card, which prevents anyone from using your SIM on a different phone. If you were to lose your phone, these all provide an extra layer of security. Invest some time in learning the privacy and password settings of your phone to make sure you’re taking full advantage of these features.

At the rate technology is evolving, it can be difficult to stay on top of threats. Consider enlisting the help of a monitoring service to notify you if something is awry with your monitored personal information. These notifications empower you to respond quickly to a potential identity theft event so that you can minimize your risk.

Technologies to Turn Off
While new technology strives to make our lives easier and more convenient, sometimes having specific features “on” can contribute to a more insecure device. Particularly on our smartphones, there are several settings that may be worth disabling to minimize the risk of attack. For example, consider turning off Wi-Fi and Bluetooth when you’re not using them. If these features are on, they will constantly be searching for networks and devices to connect to in the area. For networks that span wider spaces, your movements could be tracked. Similarly, turning off your phone’s “Location” function will limit others from tracking the location of your phone. Keep in mind that you can always turn this feature back on if you need to use GPS. Turning off the “Location” function will also help with both your social media and SMS messaging because potential criminals won’t be alerted to your whereabouts. You might not think about risks associated with a phone’s geotagging and location functions, but they could be used for malicious purposes.

As cyber criminals continue to target mobile devices, it’s on all of us to ensure we’re taking the necessary steps to improve our security. Do you have a technology feature or best practice that helps you stay secure? Join the conversation – get in touch with us on Facebook, Twitter, or LinkedIn.


Privacy Settings for Your Favorite Browsers

By | April 7th, 2017|Online Safety|

CSIDAccording to a recent report from Pew Research, 88 percent of adults use the Internet. The way we access it varies – some use a computer, others a smartphone or tablet – but the fact remains that there are security vulnerabilities on any device.

There are steps you can take to keep your devices secure, but did you know there are also privacy and security settings you can enable on the browsers you use every day? Here are some quick and easy ways to minimize your risk of a cyber threat when using popular web browsers.

Google Chrome
Google Chrome in particular sends a large amount of data to Google’s servers. By default, your browser data is automatically synced to your Google account. You can view and change these sync options by clicking Menu -> Settings. Select “Disconnect your Google Account” to surf the web without associating a Google account to your browsing. Alternatively, you can click “Advanced sync settings” to only sync specific types of data. Chrome synchronizes a large amount of data, from installed apps and extensions to bookmarks, browsing history and saved credit cards. The checkbox “Encrypt all synced data with your own sync passphrase” will encrypt your data across Google’s servers. To do this, you’ll just need to establish a distinct sync passphrase and enter it into Chrome on all your devices.

You may already know about opening up incognito windows on Chrome, but there’s a host of additional privacy settings you can enable. On Chrome’s Settings page, click the “Privacy” section. There are features that help protect you and your device from dangerous sites and use a prediction service to help complete searches and URLs typed in the address bar. You’ve probably seen this when you start typing in a search and Google offers you several choices to finish the phrase.

Within the Privacy screen, you can click “Content Settings” to control what websites are able to do within Chrome. This primarily revolves around the use of cookies, which are used to save preferences on the web, such as login information. Clicking “Keep local data only until you quit your browser” will automatically clear cookies whenever you close your browser. You can also “Block third-party cookies and site data,” which will only keep cookies from the website you’re visiting. This will prevent cookies that are used for advertising or other purposes from being tracked. For more on Google Chrome security, check out Google’s Privacy Notice.

Mozilla Firefox
Of all the browsers, some argue Firefox is one of the strongest for private browsing. In the “Privacy” tab, you have a pair of Tracking options: “Request that Sites Not Track You” and “Use Tracking Protection in Private Windows.” The former will have Firefox request that every website you visit not track you – though some websites can and will still do so – and the latter will block advertisements and online trackers when you’re in private browsing mode. Under the “History” section, you can fiddle with your settings. Our recommendation is to only keep cookies until “I close Firefox” and to “Clear history when Firefox closes” but you can adjust accordingly.

Similar to Chrome, Firefox allows you to select what you share with Mozilla. You can access this within the Settings menu (Advanced -> Data Choices). Finally, in the Preferences tab you can click “Search” to choose your default search engine.

Safari has similar options to block cookies and enable incognito/private browsing, so we’ll highlight something that’s unique to Apple devices – excluding your browsing history from Spotlight Search. In your Settings app, go to General -> Spotlight Search, and toggle the switch for Safari. This prevents others from seeing what you’ve visited on your device. Additionally, you can turn off “Search Engine Suggestions” and “Safari Suggestions” to avoid Apple collecting your search queries, location, and other usage data. This same screen (accessed via Settings -> Safari) allows you to set your search engine from a choice of Google, Yahoo, Bing, or DuckDuckGo.

Whether you’re using the Internet on your desktop computer, a laptop, or a smart device, it’s a good idea to make sure you’re making the most of the privacy settings on your favorite browser. It will only take a few minutes and could help you stay more secure. Have some good tips of your own? Join the conversation – get in touch with us on Facebook, Twitter, or LinkedIn.


Tips for Staying Secure on Social Media

By | February 2nd, 2017|Online Safety|

CSIDWe recently celebrated Data Privacy Day, where industry leaders and experts shared security insights to help businesses and individuals protect themselves from cybercrime. Social media was a big focus throughout the day; in fact, Twitter celebrated by live streaming from its headquarters, hosting panels with some of the top minds in the industry. As social media continues to become more popular, there are new cybersecurity concerns to consider. Information that is shared on social media can be used to access other, more sensitive accounts – especially if that information is the answer to a password reset question, such as the name of a first pet or favorite teacher. Individuals and businesses alike can take basic precautions to minimize the risk of their information becoming compromised.

Social media networks are doing their part to keep their users’ information secure. Facebook just announced its updated “Privacy Basics” tool, which makes it easier for people to find the tools that control how their information is shared on Facebook. Twitter also updated their safety policy at the end of last year, allowing users to mute or report abusive or hateful content, even allowing bystanders to step in to report questionable content.

While we love seeing social media platforms upping their security, the responsibility ultimately falls on the individual to check out the privacy settings offered across platforms and use caution when sharing information. Here are a few tips and best practices to consider:

  • Facebook offers a Privacy Checkup, which walks users through their settings. The checkup reviews who can see your posts, which apps you’re using, and the privacy of critical pieces of information on your profile.
  • Turn on two-factor authentication. Many networks, including Facebook and Twitter, offer the option to have a security code sent to your phone whenever you log in from a new device. It’s a quick, convenient extra measure of security.
  • If you go on vacation, it’s tempting to share photos of your experiences as they happen. However, it’s best to wait until you’re back home to post. Otherwise, you’re alerting a potential cyber criminal to the fact that you’re away. An empty house is a much more attractive target for a thief.
  • While you’re at it, it’s worth turning off the geotagging feature of your networks. When you’re posting, there’s an option to share your location. Make sure that icon is unchecked, or people will know exactly where you are when you post. If you’re at home, they now have your address. If you’re out and about, they now know your home is unoccupied.
  • Keep your social media bios free of personally identifiable information. You can also remove the year from your birthday, and refrain from sharing other information like your mother’s maiden name or high school mascot, since they often serve as password reset questions to your online accounts.
  • When your favorite social media app offers an update, do this as soon as possible. Many updates fix bugs and potential vulnerabilities, so it’s worth taking the time to do it, even if it means waiting a few minutes before being able to log in.

What other tips do you have for staying secure on social media? Join the conversation on Facebook, Twitter, or LinkedIn.

Secure Your Information for Data Privacy Day

By | January 26th, 2017|Online Safety|

CSIDOn January 28, cybersecurity experts around the world will recognize Data Privacy Day. With efforts led by the National Cyber Security Alliance, Data Privacy Day invites industry leaders and experts to share security insights that can help safeguard businesses and individuals from cybercrime. CSID is proud to be a registered champion of the international event.

On Thursday, Data Privacy Day was celebrated with a daylong event featuring TED-style talks, interviews and tips for staying secure. The National Cyber Security Alliance traveled to Twitter’s San Francisco headquarters, where consumers and businesses were able to watch and engage in real-time through social media.

Practicing secure habits at home and in the workplace can and should happen every day. Here are some of our top tips:

At Work:

  • Create a culture of cybersecurity by discussing threats and best practices with all employees.
  • Develop a “Bring Your Own Device” policy for your company. Be sure to include insights and standards from your IT department, risk management, and legal counsel.
  • Require your employees to create long, strong, and unique passwords. Encourage employees to take advantage of two-factor authentication wherever possible.
  • Require your employees to update their software on devices whenever prompted to help address security vulnerabilities.
  • Be mindful of how you collect, use, and store employee and consumer information.
  • Carefully vet partners and third-party vendors to see how they manage data.

At Home:

  • Discuss security and privacy habits with your family. It’s never too early (or late) to create an ongoing conversation about best practices.
  • Talk to your family about which types of information should be kept private, both online and in-person.
  • As a family, create strong passwords, especially for social media accounts.
  • Discuss how spam and scams can appear through email and private messages. Avoid clicking on links if a message seems suspicious or you do not know the sender.
  • Familiarize yourself with your child’s gadgets and apps. Understand the data collected and consider the privacy settings on each device. Always opt for the strictest security settings to help keep your – and your child’s – information safe.
  • Talk about the permanence of posting to social media, as well as manners and cyberbullying.

How will you celebrate Data Privacy Day? Share your experience with us on our social media — Facebook, Twitter and LinkedIn. For more information around Data Privacy Day, please visit







Resolutions for a More Secure 2017

By | January 6th, 2017|Online Safety|

CSIDLast year is in our rearview mirror, and we’re moving full steam ahead into 2017. It’s around this time that people start focusing on their New Year’s resolutions. One resolution that should be on everyone’s list: improving personal online security. With the right resolutions, you can help minimize the risk of your information being compromised online.

Resolve to Use Strong Passwords and Update them Regularly
A quick look at the most common passwords from 2015 reveals a list that lacks complexity. The two most common are “123456” and “password,” with other easy-to-guess passwords like “football” and “abc123” high up on the list.

Yes, these passwords are easy to remember, but that also means they are easy to guess. Make a promise to yourself in 2017 that you won’t use your name (or a family member’s name, including pets) or birthday (or a family member’s birthday) in your passwords. Use long, strong, unique passwords with a mix of numbers, letters, and special characters. A technique that could help if you can’t think of anything is to start at a key on your keyboard and draw the shape of a letter. For instance, beginning at the “X” key, your password could be XdR5TgY&UjM, which makes the shape of the letter “M.” The end result is a password that’s difficult to crack but easy to remember.

Creating a strong password is the first step. To take your security even further, keep that password updated regularly – that means changing it every three to six months. Additionally, don’t reuse passwords across multiple apps and sites. Together, these steps will reduce the risk of your information being accessed.

Resolve to Think Before Clicking
Have you ever received an email or a link from a company or a person you knew, but something just seemed a little bit off? Maybe a word was misspelled, or the language just didn’t sound like it normally does. It’s possible the email was a phishing scam. Before you click on something that looks suspect, visit the sender’s website directly or give their customer service a call. And if the link was sent from a friend or colleague, pick up the phone and confirm they actually sent it themselves.

Resolve to Be More Proactive – And Make Your Devices Act Accordingly
Enabling two-factor authentication or setting up monitoring services can further bolster your protection. It’s always a good idea to keep an eye on your credit card and bank statements. If there’s a charge that looks unfamiliar, contact your credit card company or bank. Many credit card issuers give users the option of opting in to alerts if something seems out of the ordinary. It’s very easy to set these alerts up, and they’re incredibly helpful in keeping an eye on your data and sensitive information.

With these resolutions, you’ll be doing your part to make this year more secure. Another great resolution is to educate others: help a family member set up monitoring services, or encourage a friend to update their passwords. Together, we can help minimize the risk of cyber attacks.

Do you have any other cybersecurity resolutions for 2017? Share your tips with us on LinkedIn, Facebook and Twitter.

2017: The Evolution of the Password, IoT Threats and Other Predictions

By | December 27th, 2016|Online Safety|

CSIDFor both consumers and businesses, 2016 was a big year for cybersecurity. As we predicted at the beginning of the year, large-scale breaches continued to dominate the headlines and the Internet of Things (IoT) became a growing source of security concerns. But as the year comes to a close, it’s time to look to the future. Here are the trends we predict will shape the cybersecurity industry during the year ahead:

Consumer Password Practices: Same Problems, New Solutions
Poor password use continues to plague consumers, leaving them vulnerable to attack. With the volume of breaches increasing, it will be more important than ever for consumers to use long, strong and unique passwords across accounts. If any of your passwords made it on to last year’s list of “Worst Passwords,” you should take care to update now. Consumer adoption of biometric authentication will also increase, not only across traditional financial accounts, but other apps as well, as we saw with Google’s Trust API earlier this year.

IoT Threats Will Begin To Take Shape
IoT threats, once somewhat abstract, will start to become very real as more devices are connected and as consumers and businesses start to participate in the resulting connected ecosystems. Recent DDoS attacks in 2016 showed us that the IoT is, and will continue to be, a valuable tool and target for cyber criminals. The security industry, businesses and consumers will need to come to together to tackle IoT security – from education to product development.

BYOD Brings News Era of Workplace Threats
With evolving workplace cultures – including a rise in work from home and bring your own device (BYOD) policies – we’ll start to see a new era of threats facing businesses. Companies will need to prioritize building a BYOD policy in partnership with IT, risk management, and legal counsel. They’ll also need to educate employees on security best practices, like creating strong passwords and updating the software on their devices, to ensure all employees understand their role in protecting the business.

Hollywoodization of the Hacker Brings Mainstream Awareness
With shows like Mr. Robot gaining mainstream, loyal followings, we’ll see a new level of fascination with hacker culture and cybersecurity, especially from younger individuals, who are more digitally connected than any previous generation. Consumer interest in cybersecurity, along with attacks in the headlines, will drive popularity of these shows and start to blend entertainment with education.

Ransomware Will Threaten Hospitals And Other Enterprises
Hospitals and other healthcare organizations will be among the most vulnerable for attack, as moves to digital – including the shift to electronic health records (EHR) and launch of mobile applications – will introduce valuable targets for cyber criminals.

Have your own 2017 security predictions to share? Weigh in with us on FacebookTwitter and LinkedIn.

Safe Shopping Tips During the Holidays

By | December 9th, 2016|Identity Protection, Online Safety|

CSIDThe holiday season is a whirlwind of wintry weather, family and friends, and shopping – a lot of shopping. The National Retail Federation predicts retail sales in November and December will increase 3.6 percent, reaching $655.8 billion. Online shopping is expected to increase between seven and ten percent from last year to a staggering $117 billion.

Whether you’re battling the crowds or shopping from your smartphone, it’s important to protect your information.

When Shopping In Stores:

  • Before you leave for an afternoon of shopping, edit the contents of your purse and wallet. Only carry the cards and information you absolutely need. Not writing checks? Leave your checkbook at home. It’s important to note that you should avoid carrying your Social Security number with you year-round.
  • Protect your PIN when shopping by keeping a watchful eye on other shoppers, and covering the key pad.
  • Be aware of the information being collected (email, address, zip code, etc.) by retailers. Only share what is required, and feel comfortable asking how your information will be stored and used during future purchases.
  • Avoid sharing and accessing sensitive information over public Wi-Fi, including banking apps, social media, and online shopping. If there is no secured Wi-Fi network available, consider using a Virtual Private Network (VPN) while you shop.
  • Stay alert to your surroundings, and keep a close eye on your belongings. Never leave your purse and wallet in a car unattended.

When Shopping Online:

  • Be familiar with your merchant and ensure you’re using reputable online sites. First and foremost, always look for the HTTPS and green padlock icon in the address bar. You should avoid entering your credit card number or financial information if you don’t see this.
  • Create unique, cryptic passwords for each online customer account. Avoid using the same password across multiple websites and apps.
  • Take the time to logout of all online shopping accounts when your transaction is complete.
  • Make sure your devices are up-to-date, and that the latest security software and operating systems are being used for your phones, tablets, and computers.
  • Keep an eye out for phishing scams, as these fraudulent email messages are intended to look like legitimate offers during the holiday season. Never click on links in emails from unknown senders, and be wary of “too good to be true” deals. When in doubt, visit the retailer’s website directly or call their customer service to ensure the deal or email is legitimate.

Whether you are shopping at home or in-person, it’s important to keep track of your payments. Save records of your online purchases and check your bank account daily during this high-activity time. If you notice an unauthorized purchase, contact your bank or credit card company immediately.

We hope your holiday shopping is a breeze this season! What are your safe shopping tips? Share your advice with us on LinkedIn, Facebook and Twitter.

Educating Family on Security Best Practices

By | November 22nd, 2016|Online Safety|

CSIDThe winter holiday season is a special time of year. We see more festive lights, hear more cheerful music, and spend more time with family.

Unfortunately, it’s also one of the most lucrative seasons for cybercriminals. Forty-percent of all yearly cybercrime occurs during October, November, and December. While you may consider yourself cyber-aware, others in your family may not be. Here are a few things to look for during this holiday season, and how you can educate your family around staying secure:

Be Wary of Downloads
While many advertisements this holiday season are perfectly legitimate, there are also malware-infected advertisements designed to bring harm to your computer. Make sure you know exactly what you’re getting when you’re downloading a product, and only click on links from websites you trust. Teach your family members to do the same. Clicking on a malware-infected ad could not only bring up inappropriate images or videos, but could also install a virus or spyware on your computer, allowing a cybercriminal to access your files or personal information. Encourage children to ask before downloading anything from the Internet and help oversee their activity to prevent potential damage.

Be Proactive
Some of your relatives might not realize that two-factor authentication (2FA) exists, or how to set up monitoring services. These are layers of security that aren’t difficult to set up, and your family members will feel safer knowing they are taking additional steps to help secure their personal information and online accounts.

Additionally, most people tend to shop more around the holidays, which give scammers a better chance to steal their information. Keep a close eye on your billing statements. If you do not recognize a charge, report the suspicious activity to your bank or credit card issuer immediately. Talk to your relatives about setting up credit card alerts. Most credit card companies can give daily, weekly, or monthly updates on account balance, or can send a text message for transactions over a certain, pre-determined amount.

When in Doubt, Ask
During the holiday season, it’s no surprise to see a company offering a deal on their products or services. You probably have a family member that considers himself or herself a real bargain hunter, and perhaps they even take pride in seeing how much they can discount their purchase. This holiday season, tell them to take a moment to consider the deal – if it’s too good to be true, it probably is. If they receive an offer through email or find one on a site they don’t normally visit, a quick search online, even just the retailer’s name plus “scam,” is a good way to ensure validity.

Another imposter scam typically targets the elderly, but can affect anyone. A scammer will claim to be a grandchild or another family member who needs money to get out of an accident or another fabricated incident. Tell your grandparents, aunts, and uncles to be on the lookout for this kind of scam – and to contact the supposed person directly. They could also check in with someone who knows the person, and they should never send money unless they’re positive the person calling is indeed who they say they are.

Do you have any other advice for the holidays? Has one of your relatives fallen for a scam before? Join the conversation on FacebookTwitter or LinkedIn.

The Hollywoodization of the Hacker: Lessons From Mr. Robot

By | November 10th, 2016|Online Safety|

CSIDCurrent shows like Silicon Valley and Mr. Robot and movies like Blackhat have brought hackers into the ranks of pop culture’s most popular protagonists. Until recently, hackers in movies have largely been represented as zany sidekicks or mysterious recluses. But now hackers, and especially vigilante white-hat hackers, are being portrayed like real life, albeit unlikely, superheroes. With audiences so invested in their digital lives, it is easy to see why this shift has occurred. Especially among the younger crowd, who are more digitally active than any previous generation, it makes sense that those with the ability to directly impact digital spaces have become the subject of fascination. TechCrunch argues that these stories have also become popular because viewers are more educated and curious about cybersecurity: “They are finally starting to understand that cyberattacks are real threats and that cybersecurity matters.”

Mr. Robot has been a particularly good example of this change in how Hollywood writers represent hackers. It’s unlike many of the movies and television shows that came before it because of its realism. The main character, Elliot, is a cyber security professional by day and vigilante hacker by night. He exploits his targets using the same methods we’re seeing today, like DDoS attacks, tapping into unsecured Wi-Fi networks, and social engineering where hackers trick victims into sharing their personal information. Elliot joins a group of vigilante hackers called “fsociety,” many of whom are in their early to mid-20s. fsociety’s age range matches the real life trend of hackers getting younger and younger, especially as executing attacks no longer requires years of experience or an advanced technical background. Our CIO, Adam Tyler, will be speaking more on that topic at SXSW this year.

To mitigate the risk and consequences of attacks like those seen in Mr. Robot, here are some of the security measures you can implement:

  • Use strong passwords. Hackers can crack a weak password in minutes. Strong passwords are at least 12 characters long, are comprised of a cryptic combination of letters and numbers, and do not include any words found in a common dictionary.
  • Avoid unsecured Wi-Fi networks. Unsecured Wi-Fi connections, like those in airports and coffee shops, leave users wide open to a variety of man-in-the middle Hackers can capture Internet history tracking data, insert themselves into communications between systems and people, and track keystrokes. This is why users should avoid unsecured Wi-Fi wherever possible. Some great alternatives for connecting to the Internet on the go are secured personal hotspots, or a Virtual Private Network (VPN).
  • Practice good social media habits. Even seemingly innocuous information found on social networking sites, like your pet’s name or high school mascot, can be used by criminals to gain access into your accounts, as these often serve as the answers to popular password-reset questions. Check your privacy settings to make sure you’re not over-sharing information on social media.

Do you watch Mr. Robot or any other show featuring hackers? Tell us your thoughts over on Twitter, Facebook, and LinkedIn.


Cats, Geotags, and the Risks of Oversharing

By | November 1st, 2016|Online Safety|

CSIDIt’s important to remember that when we’re sharing selfies, back to school photos, and pictures of our kittens on social media, we’re also sharing much more.

I Know Where Your Cat Lives” is a project created by an associate professor at Florida State University, featuring one million Instagram, Twitpic, and Flickr pictures of cats (found through the hashtag #cat) from around the world. The online visualization is possible thanks to geotags, which are provided by photo sharing websites and publicly available APIs. After the initial cuteness of the cats wears off, it’s alarming to realize that these photos reveal the homes and locations of many individuals.

Geotags can be added to many different forms of media, including pictures and video, websites, and SMS messages. These meta tags can include latitude and longitude coordinates, altitude, bearing, distance, place names, and even time stamps. It is this data that makes aggregated sites like IKWYCL possible.

Sharing geotags can pose a risk to your safety and security. Whether you’re tagging animals in your home or your feet in the sand on an exotic vacation, you are alerting friends and strangers to your exact location. It’s important to note that some social platforms by default, like Instagram, do not reveal a user’s location coordinates. However, many users elect to add their location. This may put yourself or your belongings in danger, alerting criminals to your whereabouts.

If you hang around the cat site long enough, you are sure to see a gray box stating “Photo removed by user.” Users unsettled by the location of their cats can change the privacy setting in their apps to remove the data and their images from the site.

Regardless of your favorite social platform, it’s important to be cognizant about the information you’re sharing. Always opt for the strictest security settings to help keep your information safe.

Are you concerned about over sharing on social? Weigh in with us on FacebookTwitter or LinkedIn.


Load More Posts