Blog

February 23rd, 2015

SocialMedia_Feb23_BAre you tired of waffling around on social media in an attempt to boost business? Maybe you have accounts on LinkedIn, Twitter, Instagram, Reddit and more, but you seem to be making little progress. To make matters worse, you’ve gained less than 50 Facebook likes since starting out. What gives? Well, there are some sensible social media strategies that can pull you out of the trenches. Read on to learn how you can put them into action.

Undoubtedly, the most important strategy to use in your social media plan is...to have a strategy to begin with. Know how much time you can dedicate to social media, block out the hours to focus on it and don’t waste that time checking out friends’ vacation photos or celebrity twitter feeds.

If you don’t have a strategy, you’re going to waste time posting irrelevant updates that won’t engage with your audience. To help you plan an effective social media strategy, here are three crucial tips to get you off on the right foot.

Initially focus on the big three

Most social media experts agree that the three platforms that generate the most business leads, engagement and brand exposure are Linkedin, Facebook and Twitter. When you’re getting started, your efforts should be primarily focused on these three. After you’ve gained followings here, then you can start forging paths into YouTube, Instagram, and Pinterest amongst others.

Post at prime exposure times

Studies have shown that around lunch and dinner time are ideal posting times (since everyone is uploading photos of their meals). As for which days, many marketers agree your posts are most likely to get noticed on Tuesdays and Thursdays. So these are the times to deliver those high-impact messages you’ve been randomly shooting out.

Find the value in your post

On social media, you should always be focused on selling your services, right? Wrong. Only 15% of your posts should concern news about your business and its products. The other 85% should focus on providing fun, valuable and timely content.

When you create a new post, you should ask yourself what’s in it for the customer. What do they get from reading it? Seriously, why is someone going to share your post or talk about your business unless it adds value to their life? Think about the posts you share personally. Do they provide value to your friends and family? We’re guessing the answer is yes.

For more tips on how social media can create buzz for your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
February 18th, 2015

Security_Feb18_BWe have become acclimatized to ever-present threats to the security of the information and files we share and store online. But we all still want our data to be as secure as possible and, following high-profile breaches such as the celebrity photo leaks of 2014, if anything the issue of online security is even more prominent in our minds. Since those leaks took place, the security of Apple platforms has in particular been the subject of public scrutiny - it is therefore good news that Apple has now extended its two-step authentication feature to popular applications FaceTime and iMessage.

After the fall-out from the celebrity photo leaks, Apple extended the two-step authentication process (also known as two-step verification) to iCloud, the online storage platform at the center of the scandal. The feature was initially introduced only to the user IDs for access to Apple accounts; the motivation for the launch of that extra security measure was the hacking of a journalist’s data back in 2013. But what is two-step authentication and how does it work to protect your data?

The premise behind two-step authentication, which experts recommend all businesses implement as part of their security strategy, is actually pretty simple. Usernames and passwords are all too easily stolen by malicious parties, whether by phishing emails or a more sophisticated hacking attack. So, rather than typing just your username and password to access your account, the password is teamed up with a four-digit verification code which is newly and uniquely generated each time you attempt to access your account.

The verification code is delivered by text message (meaning that to use the two-step verification feature, you’ll need to have a cellphone to receive the SMS on). As a result, even if a hacker manages to get hold of your password, unless they also have your phone by their side then they won’t be getting into your account. This authentication method is already used by organizations around the world including banks, mobile service providers and other companies who recognize the added layer of security that it brings. And now you can give yourself the same level of protection to ensure that only you can FaceTime your family and send iMessages to your friends.

Fear not, there’s a backup plan to ensure that you can still access your accounts if you happen to forget your password or if something happens to your phone so you can longer receive authentication codes. Apple also provides you with a 14-character recovery key that will get you back in if all else fails. To enable two-step authentication for your FaceTime and iMessage applications, login to your Apple ID account, select Password and Security and then click Get Started under Two-Step Verification.

To find out more about using two-step verification and other security measures to protect your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
February 13th, 2015

BC_164_BDisasters, whether man-made or natural, can happen to anyone. While most people will admit this, a lot of us still have the mindset of “it won’t happen to me.” However, according to one study, storms and extreme weather alone have personally affected one-third of small business owners. And that doesn’t include other disasters such as earthquakes, fires or theft. So if you don’t want your business disrupted in the event of a catastrophe, it’s time to prepare for the worst. Here are a few ideas to get started with a business continuity plan that will ensure you are ready.

The difference between disaster recovery and business continuity

While it’s easy to overlook the differences between a disaster recovery and business continuity plan, there are actually some key variations you should be aware of.

Disaster recovery is the restoration of business operations and IT infrastructure after a disaster has already occurred. Business continuity, on the other hand, is focused on maintaining business operations and profits throughout a disaster. While disaster recovery is mainly focused on the slice of time immediately following a disaster (how you replace your equipment and restore IT infrastructure asap), business continuity looks at the bigger picture - the continuity of the company as a whole. It ensures you can run your business and maintain profits during the process of recovering from a catastrophe. It generally includes a disaster recovery plan as part of it.

Creating your business continuity plan

The first step in creating your plan is to identify which of your IT assets are vulnerable to disaster. To do this, you need to ask yourself some important questions, starting with what might happen if you were to lose the functionality of a specific asset for a day, a week or even longer. Answering this question will help you identify your most critical IT assets; the ones that are integral to your business operations.

Here are some other important questions to ask when drafting your business continuity plan:

  • What is the purpose of my business continuity plan?
  • What disasters can affect my IT infrastructure?
  • What are my key business areas?
  • Which different business areas, assets and departments depend on each other?
  • What is the longest amount of time I can go without functionality of IT assets?
Once you can answer these, it’s time to start planning. Write down your thoughts, and then contact an IT provider like us for assistance. We’ve helped countless businesses just like yours prepare themselves in order to remain operational throughout catastrophes. We can also help you identify potential problems that you may not have thought of.

Need help creating your business continuity plan? Contact us today to see how we can help you stay running and turning profits when disaster hits.

Published with permission from TechAdvisory.org. Source.

February 12th, 2015

SocialMedia_Feb12_BIf you thought your Facebook feed already contained enough pictures of funny cats and other wacky memes, then you’re in for a treat. Fueled by increasing consumer concern about the impact of social media usage on individual privacy - which has already led to the growth of self-destructing image sharing apps like Snapchat - a new arrival on the app scene wants to take things in a different direction to guarantee your privacy. Its secret tool? Cat photos - specifically, bombarding Facebook with lots and lots of them.

But there is more to it than that: the team behind social messaging app Wickr aren’t looking to post images of our furry friends just for the fun of it. In fact, the feline factor is just one feature of the app, known as the Wickr Timed Feed. Wickr actually promises to offer greater security and privacy controls than similar apps like Snapchat - but whereas Snapchat simply lets you set your images to self-destruct once they have been seen by the recipient, Wickr takes an alternative approach.

As well as allowing only pre-approved friends to see your photos within your Wickr feed, the app lets you share each photo through Facebook and control which of your friends can see it. So where do the cats come in? Well, when you first share to Facebook, no-one will see your photo - instead, they’ll see a decoy image of a funky-looking cat. However, Facebook users then have the option to click through to Wickr and, if they are one of up to 151 people you have pre-approved to have access to your real photo, it will be unlocked and the cat will disappear - at least, until the photo automatically self-destructs 24 hours later, as do images on your feed in the Wickr app itself.

If it all sounds a bit like security overkill, then that’s probably because it is. Sharing Wickr photos to Facebook also sounds a little cumbersome, and even more so the process for unlocking a cat-guarded photo, and this could have an adverse effect on widespread take-up of the feature. But it does address genuine concerns surrounding the far and often uncontrollable reach of images and information we post online. What’s more, it appears to be a way to prevent Facebook from claiming ownership of the photos we upload - as much a concern for professional photographers and companies using Facebook for marketing purposes, as for individuals using the platform to keep in touch with friends. Wickr claims that, because the cat photo is all that will be publicly visible unless the bona fide picture is unlocked, that will be the only thing to which the social network could claim to have ownership or reproduction rights.

Whether it catches on or not, the emergence of apps like Wickr is telling of the growing pressure for the usability of social media networks to be balanced with protection for their users’ privacy. It acts as a reminder to businesses to be aware both of potential issues with usage rights for corporate images shared online, and of the need to keep consumer concerns about data misuse in mind when designing social media marketing strategies.

To learn more about how to effectively put social media to work for your business, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
February 11th, 2015

Androidphone_Feb11_BFor Android smartphone fans, the start of 2015 means the release of new products, and better ones too. The world of Android is full of companies ready to respond to customers with high expectations, especially when the number of smartphone users is on the rise. With an extensive range of Android phones out there, how can you determine which one works best for you? Here’s a glimpse of the top four Android phones that you can expect to arrive within this year.

Samsung Galaxy S6

If you’re a Samsung Galaxy S5 fan, the new Galaxy S6 will be just what you’re looking for. Samsung plans to change the overall design of this model following criticism of Galaxy S5’s conservative style. There are rumors about its quad-HD screen with 2560x1440 resolution, metal unibody, a 64-bit Snapdragon 810 processor with 3GB of RAM, and better camera and battery performance. As usual, the S6 will be available in three storage options: 32GB, 64GB, and 128GB.

Galaxy S6 is expected to debut at the Samsung Unpacked event, scheduled for March 1st in Barcelona. The release date should be around a month after the official announcement. It’s unlikely that Samsung will be making the Galaxy S6 any cheaper than the current Galaxy S5. So far, the estimated price for the 32GB model is around $650, the 64GB model around $800, and the 128GB version could cost an extra $100 more.

Samsung Galaxy Note 5

The Note series from Samsung has always managed to impress Android users. This means Samsung has to come up with something special to stand out further. Word has it that the Note 5 will employ an Ultra HD, 4K display and a camera with up to 50 megapixels. You can also expect wireless charging and a two-day battery life.

The release date for Note 5 is still yet to be confirmed, but Samsung tradition suggests the launch will be somewhere during September and October. As for the starting price, Samsung’s Note series has always been costly, and Note 5’s additional features could further increase the price up to around $750.

Sony Xperia Z4

After Xperia Z3’s debut in September 2014, Sony has been working around the clock to strengthen its Z-series products. The Xperia Z4 is expected to have a 5.5-inch quad-HD screen with a Snapdragon 810 processor. Sony’s smartphones are well-known for their camera quality, and the Xperia Z4 may pack in an even more impressive camera and image sensor. The new sensor will be able to record videos much faster and smoother than the previous Xperia Z3.

Sony has announced that it will not be presenting Xperia Z4 at the world’s largest mobile trade show this March, so we can assume that it will be released at a later stage in 2015. The price is rumored to be around $600-$650.

LG G4

The one thing LG prides itself on is its innovation, and the new LG G4 is sure to house some extra features. There’s a possibility that the G4 will have an eye scanner to gain secure access to the phone, but a fingerprint scanner would be more likely. LG’s smartphones are already on top when it comes to screen resolution, so G4’s display will probably be ahead of its competitors. Furthermore, a new stylus known as the G Pen will replace the poorly received LG G3 stylus.

Since the G3 is available for $600, we can assume G4 to cost the same or more at its launch. Its release is expected to come in May 2015.

Want to find out how Android phones can fit into your workplace? Get in touch with us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

January 29th, 2015

Security_Jan28_BMost of us have suffered the horrors of a computer virus at some point, and we know the damage that can be caused by these security infections. Our work gets disrupted as IT systems go down and, if we’re really unlucky, sensitive and valuable data might be lost or even leaked. But there’s a silver lining to most viruses, worms and other such malware, in that they can at least be tracked down and removed. Well, not always - enter the invisible Poweliks, which even your most sophisticated anti-virus software might not be able to protect you against. So, what do you need to know and how can you protect yourself?

What is Poweliks?

Security firm Symantec describes Poweliks as a trojan horse that performs malicious activities on the compromised computer. But it’s no ordinary trojan - unlike the majority, which infect your computer with malicious files, Poweliks is a silent and invisible threat that hides away in the memory registry of your system. It’s not entirely new for a virus to seek to cover its tracks by making itself "file-less" but, in contrast with Poweliks, most are wiped when you restart your computer and its memory is cleared. Worse still, Poweliks hijacks the legitimate processes and applications running on your network, inserting its code into them where it can largely evade detection.

First discovered back in August 2014, Poweliks has therefore created something of a headache for firms behind conventional security solutions like anti-virus software. Symantec and others have admittedly managed a number of updates to their protection in response to the threat posed by Poweliks. But although very minor records of the presence of the trojan are left behind by way, for instance, of registry logs, the signs of its destructive presence are much lower key than the computer world is used to, meaning Poweliks is unlikely to show up on most system scans.

Poweliks has links to Kazakhstan, the home of two servers the malware connects to once it is up and running from within your computer. The servers in Kazakhstan then send commands to the bug to tell it what to do next. In theory, this then makes way for the tool to be used to download other undesirable programs that could infect your system without your knowledge. It could equally be used to steal and disseminate data from your network.

How can I best protect myself?

As well as the anti-virus updates that have gradually been released - but which are still likely to have only a limited impact on threats of this type compared with those of the past - a number of Poweliks removal guides are now available online. Nevertheless, prevention as ever, remains better than cure. One method reported to have been employed in the distribution of the Poweliks infection is embedding it in a Microsoft Word document, which is then sent as an attachment to spam emails, and which the attackers hope your curiosity will lead you to open. Among the senders that these spam messages have masqueraded as being from are the United States Postal Service and Canada Post. Of course the best advice remains to be suspicious of any and every email attachment you open, particularly if you weren’t expecting mail or it's from someone you don’t know.

Should I be concerned?

In fact, revisiting your everyday security precautions is probably pretty good advice all round, since experts predict that this type of threat is likely to become ever more common as attackers seek to exploit the techniques of Poweliks in order for their infiltration to remain unnoticed for as long as possible. Sure enough, a number of copycat threats have already been detected by security specialists as of the start of 2015.

General awareness around web sites you choose to visit is also recommendable in particular, since others have also reported the bug making its way onto their systems thanks to so-called ‘drive-by download attacks’ - whereby simply visiting a malicious web site is enough to trigger the infection, and actively downloading a file isn’t even necessary. As a result, organizations may wish to consider more comprehensive filtering of internet access, or at the very least reactive blocking of known malicious sites, in order to prevent employees from inadvertently infecting a company network.

To find out more about IT security solutions and protecting your technology from attack, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
January 27th, 2015

iPhone_Jan27_BWe’re all busy. Our schedules are loaded with work, fitness regimes, kids’ soccer practices – it’s enough to make your head spin. So when your son or daughter gets sick, how do you squeeze their care into your day? The iPhone’s latest health apps and accessories may be the solution you’ve been searching for, giving you the ability to book a virtual doctor appointment from home and even keep track of your own medical history to speed up those in-person doctor visits. For three ways the iPhone is revolutionizing health care, read on.

At-home ear infection diagnosis

If you have a young child, you’ll already know that ear infections are a common nuisance. By the age of 3, roughly 80% of all children have suffered from this affliction. And this problem alone costs the medical industry roughly 3.5 billion dollars annually.

In today’s world, full of long work hours and overloaded schedules, it can be difficult to find the time to visit a doctor. And if you live in a remote area, the challenge is even greater. But when little Johnny’s ear infection means you’re waking up at night to deal with a screaming toddler, you know that something needs to be done. The iPhone’s new Oto Home device could be your solution.

For $79 you can bring the technology of an otoscope (the device your doctor uses to look into your ear at a checkup) directly into your home. Not the whole thing of course. Instead, the Oto Home is just the small black cone-like part at the tip of the otoscope that the doctor inserts into your ear. Now you can attach this tool to your iPhone’s camera, and use it to take a video of the inside of your child’s ear, which can then be sent to your doctor via email. For a $49 fee, your doctor can diagnose and provide a prescription almost instantly.

At this time, the device is only available in California, but will likely be approved for use in more states soon.

Medical history for quicker doctor appointments

Whether you need to keep a close eye on a sick relative’s temperature or want to have a record of your own medical history, iPhone’s new Swaive app can help. Like the Oto Home device, the Swaive also involves your ear. But instead of diagnosing ear infections, the Swaive acts as an in-ear thermometer.

In combination with Apple’s Health app, the Swaive can keep track of your temperature over weeks, months or years. With this app, you can also record any kind of recurring physical symptom or medication you’re taking. This information can then be sent to your physician.

Even better, the next time you pop in for an in-person doctor visit, this info can speed up the process as it acts as a recent medical history.

Virtual doctor appointments from anywhere

But if you’d rather not visit the doctor at all, now you can make a virtual appointment through an app called Amwell. This allows you to Facetime with your physician at anytime, with no appointment necessary.

The way Amwell works is simple. A patient can open the app and scroll through the physicians who are part of the Amwell network. Just like other online health databases, you’ll be able to see the doctor’s years in practice, education and patient rating. Once you’ve made your choice, you can sign up for a $49 virtual visit where a doctor can provide instant feedback, diagnosis and treatment. Best of all, Amwell visits are covered by some insurance providers. So once you get your printable receipt, you can still get reimbursed.

Looking for more tips on how your iPhone can make life easier? Contact us today and learn how we can help.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
January 22nd, 2015

socialmedia_Jan20_BIn today’s digital world, social media has become a vital tool that effectively helps accelerate business development and the relationship-building process between different organizations. And with solid communication being at the core of business development, let’s take a look at how social media can help drive partnering processes for the better.

In most cases, a business development manager already has an idea of the kind of company with which to partner. Their next step is to contact that company via a phone call or email. However, this can be an unreliable way to reach out, especially when your potential partner has never heard of you. Social media speeds up this process by identifying the best person to contact, as well as determining if you have any mutual connections.

Simply put, social media lets you understand the background of different companies and gives you an idea of the different players involved, before you even engage in a dialogue. With this in mind, let’s take a look at four ways you can utilize information available on social media to enhance your business development success.

  1. Social media is an extra pair of eyes Social media allows you to see first-hand what potential partners, competitors, and customers are doing, which is a major asset when it comes to your business development and performance. This can also reveal business-relationship possibilities or even warn where it is best to stay away. It’s crucial to position yourself and your company as industry experts by sharing mind-blowing content as well as highlighting recent successes.
  2. There’s no universal message in social media The way people behave and connect across different social media platforms varies, therefore it is important to adjust accordingly. For instance, you might use Twitter to promote ongoing marketing campaigns, share content, and direct customer service requests. You may use Facebook for larger marketing initiatives, such as showcasing a company’s culture and resources. It’s important to remember that there’s no universal rule to utilizing social media and that it is beneficial to be flexible. Think about what your individual goals are and work out which social media platform is the best avenue to explore.
  3. Leverage employee relationships If you’re looking to connect with an individual in a specific company, make it a habit to check and see if anyone in your company has a pre-existing relationship with that person. Social media channels like Facebook and LinkedIn make it fairly easy to spot mutual connections, so it is a good idea to get into the habit of checking. Whether you ask your colleague to help make an introduction or to arrange a meeting, a mutual connection gives you the competitive edge in effective business development.
  4. Use social media as a touchpoint Social media is not only essential to business development, but also complements other more traditional practices, such as when you’ve sent an email or voicemail to a business prospect that has gone unanswered. It’s understandable that people get so busy they can delay, forget or pass over an inquiry, but instead of passively waiting for a reply, why not make it standard practice to follow up separately via LinkedIn or other social media platforms? This way you can build additional opportunities with potential partners, increase the likelihood of a response, and even forge a future business relationship.
The fundamentals of business development are strong relationships with a partner or companies with a good reputation, who will have a positive impact on your business, such as marketing an initiative collaboratively. Social media can get this whole process started, so the next time you’re looking to contact a business prospect or potential partner, start by visiting their social media channels to get the heads up to help you in your quest.

Looking to learn more about the benefits of social media in business? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
January 14th, 2015

Security_Jan12_BAny business can become the victim of security breaches on a mass scale, as shown by the debacle which recently eclipsed Sony and forced it to temporarily cancel the release of blockbuster movie The Interview. Beneath the dramatic headlines are lessons for small business owners everywhere in how simple errors in IT security management can have grave consequences. These tips will help prevent your firm being the next to suffer Sony’s fate.

Don’t let basic security habits slip

Our modern-day instinct tells us that the answer to potential security breaches is to install new layers of antivirus software, firewalls and further encryption systems. While these are all worthy additions to your company’s armor of security shields, they will do little to help if good old-fashioned protective habits are allowed to slide.

Instill a disciplined, security-conscious mentality in your organization, and keep the messages simple so that staff remember and follow them. Focus on regularly changing passwords and keeping them secret, being vigilant about avoiding unexpected links in email messages, and limiting network access for the likes of external contractors to that which is absolutely necessary.

One of the ways hackers made their way into the Sony network was by tricking administrators into thinking they had a legitimate need for access: teach your staff to be careful, and praise cautiousness even if it turns out access is warranted. Encourage staff to flag up potential security lapses, and make sure they know that reports will be followed up and loopholes closed.

Take a flexible and agile approach to IT

IT changes, and so do the ways best suited to keeping it safe. This means it is vitally important to keep your IT systems up to date, and where necessary to do away with outdated practices that could leave your business technology exposed. This involves more than just ensuring that your network is running updated antivirus software to catch the latest bugs and worms - it means staying abreast of emerging methods to mitigate potential threats from hackers worldwide.

All of this uses staff and resources that your small business might not have - which is where outsourced managed services come in. Using a managed service provider as an add-on to your own IT team can give you extra flexibility and the ability to keep abreast of industry security developments, even when you lack the time to do so yourself.

Equally, know when it is time to ditch data - think of emerging social networks like Snapchat, which set messages to self-destruct after a set time, as your cue to make your data retention policy less permanent, particularly in relation to email. If you no longer have a business need or a regulatory requirement to retain information, then delete it - in the process you can limit the possible damage even if the worst should occur and you fall victim to an external attack.

Backup, backup, backup

The last thing you want in the event of a security breach is for it to hit your day-to-day operations - the potential damage caused by the hack itself is likely to give you enough to worry about. But that is exactly the situation Sony found itself in after its latest hack, with its email system down and staff forced to return to the days of pen, paper and even the fax machine.

As well as ensuring alternative means of communication remain open to your business in the aftermath of a possible attack, it is also vital to make sure that you retain access to the information most critical to your work. Regular, secured backups help ensure that, whatever happens, the show is able to go on and your firm’s productivity and revenue are not unduly hit. Engaging professionals to undertake your backups on a managed service basis also means this can happen routinely and without fail, while you stay focused on running your business.

Want to learn more about how to reduce your IT network’s vulnerability to attack? Get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
January 13th, 2015

iPad_Jan12_BSince the arrival of the iPad back in 2010, businesses have been able to stay connected and easily work on-the-go like never before. Still, many people are constantly looking to increase their iPad’s versatility through different applications available in the App Store. And now, thanks to Duet Display, you can effortlessly turn your iPad into your second Mac screen!

Duet Display, developed by a former Apple engineer, Rahul Dewan, will turn your iPad into an external screen for your Mac, and does so using a cable that you already use to charge and sync your iPad. To be precise, it’s actually two apps — one for your iOS device and a companion app for your Mac that lets it recognize an iPad or iPhone as a second screen.

How does Duet Display work?

  1. Download Duet Display from the Apple Store for $14.99
  2. Install Duet Display for OS X
  3. Duet Display will add a little settings icon to the right side of your menu bar and requires a password when you’re installing it on your Mac. This is because the app needs to install display drivers.
  4. Open the Duet Display app on your iPad and plug it into your Mac with a lightning cable (or a 30-pin cable if you’ve got an older iPad that’s still supported).
  5. Now you can enjoy working with two screens!
Because your iPad is plugged in, you won’t have to worry about your iPad’s battery. And while you’re using Duet Display on the iPad, you’ll still get your regular iOS notifications. You can also set your computer to use all the pixels on your iPad’s Retina display (2,048x1,536 pixel resolution), or you can set your iPad to regular resolution too. Duet Display works with all Macs running on OS X Yosemite and any iPads or iPhones running iOS 5.1.1 or above, meaning it will work with your old iPad. The only downside is you can only connect a single iOS device for now.

The growing number of applications in the App Store means there are often new ways to make use of your iPad being introduced. Looking to learn more about the iPad and its capabilities? Contact us and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic iPad