Contact us today!

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Managing Your Software Requires Three Actions

Managing Your Software Requires Three Actions

It’s imperative that your organization’s software is managed properly. If you can’t do this, then your operations can suffer in the long run. While this might sound like a lot of work, software management isn’t as difficult as it sounds if you break it down into compartmentalized tasks. Ultimately, you can group it into three major steps: leveraging available assets, testing strategies, and understanding the software.

0 Comments
Continue reading

Get Rid of Those Filing Cabinets with Document Management

Get Rid of Those Filing Cabinets with Document Management

The file cabinet. It may be a staple of the office, but boy can they be a pain in the neck. Every file needs to be printed and collated only to be filed in a dingy file cabinet with the off chance that it will ever be needed again. For businesses that have a lot of paper filed away, a document management system can go a long way toward modernizing your organization, and providing a access-controlled database where you can find any file in seconds.

0 Comments
Continue reading

Medical IT: How Is HITECH Doing?

Medical IT: How Is HITECH Doing?

Compliance laws regarding the storage and dispersion of healthcare records were implemented with the intended purpose of urging healthcare providers to better take care of their patients’ personal information, but how effective are they? Unfortunately, there are many providers that have failed to meet the standards for the HIPAA and HITECH compliance laws, and it has brought a hefty price tag along with it.


In 2016, the Office for Civil Rights (OCR) and the Department of Health investigated several data breaches that led to a considerable sum being claimed in response to violations of these compliance laws. In what totaled to 12 settlements following the investigations of data breaches caused by failure to comply with these laws, as well as one monetary civil penalty, these claims amounted to approximately $25,505,300 in fines.

Compare this to the more recent data. In 2017, there were only nine HIPAA settlements that produced a total of $19,393,000, as well as a single monetary civil penalty paid, a considerably smaller sum than the previous year. Clearly something is working here, but what is it? Perhaps it’s the fear that being negligent with important data could mean a large sum raining down on the heads of those who fail to adhere to these laws.

What’s even more interesting are the types of violations that led to these penalties. While the majority of these involve a failure to protect protected health information, or PHI, and its digital counterpart electronic protected health information (ePHI), there are a couple of outliers that are interesting to look at. Here are some of them:

  • Insufficient ePHI access control
  • Impermissible disclosure of ePHI
  • Careless handling of PHI
  • Multiple HIPAA violations
  • Delayed breach notifications
  • Lack of security management process
  • Lack of a business associate agreement

The majority of the issues revolving around HIPAA and HITECH compliance come from an inability to secure mobile devices, failure to implement proper security processes, and delaying breach notifications for far too long.

As for HITECH specifically, a recent lawsuit was filed in federal court against 60 hospitals over alleged failure to adhere to the HITECH Act. Specifically, these hospitals failed to adequately provide records and documentation for 50% of their patients within three business days of the request. This is one of the specific requirements for securing funding through the HITECH Act, so you can understand that this was quite a big red flag for government.

Consequently, these 60 hospitals from the state of Indiana now face charges totaling over $1 billion for failure to provide records as required, despite receiving the incentive payments totaling around $324 million. Additionally, these hospitals face claims that they violated the Anti-Kickback Statute and the False Claims Act for claiming that they were HITECH-compliant, when in reality they failed to meet the requirements of the regulation.

Not all practices fail to adhere to HIPAA and HITECH, though. Is your practice one of them? Answer with confidence today by reaching out to Telesys Voice and Data at (800) 588-4430.

0 Comments
Continue reading

Hackers Prey on Social Media Users

Hackers Prey on Social Media Users

Social media has been an emerging technology in recent years, and has produced many threats. Hackers have learned that they can take advantage of these communication mediums to launch dangerous new attacks on unsuspecting users. With enough ingenuity on a hacker’s part, they can potentially steal the identity of a social media user. Here are some of the best ways that your organization can combat identity theft through social media.


First, it helps to understand why social media is such an attractive vector of attack for identity thieves. For one, the anonymity provided by the Internet has long been a staple reason why it’s been commonly used by hackers to steal sensitive information from organizations. This was (and still is) done through spam and scam emails, but nowadays, strategies have changed enough where individuals have to be more cognizant of their personally identifiable information, because by using social media constructs like Facebook, Instagram, Twitter, and the like, they are much more exposed. Enterprise-level spam filters are readily available to all kinds of organizations, prompting hackers to step up their game and create nefarious new ways of stealing information.

Spear phishing tactics were the result of these efforts. Intending to bypass the likes of spam blockers and content filters through seemingly legitimate sources, phishing tactics come in a variety of forms, with the most successful of these coming from sources that hide the true intentions of the one making the attack. The Internet can mask the true identity of hackers so that they can seem to be someone else, either in an email scam, social media attack, or otherwise. This is known as spoofing, and has been a infiltration tactic for decades.

In particular, social media can provide attackers with a lot of information without them working too hard. Think about the kind of information that you might have on your personal Facebook or Twitter feed. Do you have a phone number? What about an email address or physical address? Do you have any information about the musicians you listen to, or the books that you enjoy? All of this information (and more) can be used to help a potential scammer steal your identity and use it for various ill offenses - the gravest of which could be stealing your identity and using it to attack those you hold dear.

Imagine what could happen if someone were to steal the credentials to your social media pages and use them to impersonate you. They could fool all of your closest friends and family into giving up whatever information they are looking for. For example, they might be able to coax your parents or loved ones into parting with personally identifiable information such as your Social Security number or credit card number, which could be used to open new lines of credit or make fraudulent purchases. Regardless, the threat posed by identity theft through social media is considerable, and you must take precautions to ensure that you don’t fall for these traps in the future. Here are some ways that you can make sure this doesn’t happen.

  • Be on the lookout for suspicious activity on your accounts: If you suspect for even a second that your accounts have been compromised, be sure to change your passwords so that they can’t be used to hurt those closest to you.
  • Look out for dangerous messages sent to you: If you suddenly receive messages from those who you haven’t heard from in a long time, and their behavior is suspicious, perhaps it’s best to ignore these messages or alert those who you think may be affected.
  • Limit the information you share on social media accounts: Information can’t be stolen if you don’t choose to share it. Consider implementing more powerful privacy settings for your accounts.

Businesses are just as vulnerable to spear phishing attacks as individuals, if not more so. If you are like billions of others, social media has become an important part of your life, and quite possibly, your business. To ensure that you are doing what you can to protect yourself and your organization from the threats that social media and other innovative communications technologies enable, consider reaching out to the IT professionals at Telesys Voice and Data.

0 Comments
Continue reading

How to Go About a Technology Needs Assessment

How to Go About a Technology Needs Assessment

If there is one thing that you can always count on from your business’ technology, it’s that it will inevitably fail at some point in the future. Therefore, your business should have a plan to keep this from happening at all costs. It’s understandable that you would want to make sure that your needs are properly evaluated both now and in the future. To this end, a technology assessment is incredibly helpful.

0 Comments
Continue reading

Tech Term: Bandwidth Defined

Tech Term: Bandwidth Defined

The Internet has become an irreplaceable part of many business’ operations, which brings the thought into question of how much you rely on it for your daily duties. Technology has changed the way that the Internet works for the better, but there is one part of its operations that still lies at the heart of it: bandwidth.

0 Comments
Continue reading

What You Need to Know About Data Recovery

What You Need to Know About Data Recovery

Data backup is one of the most critical parts of protecting your business, but there are a lot of moving parts that need to be considered before implementing a solution. For example, did you know that data backup and disaster recovery are two different things completely? While they may both be involved in the business continuity process, the two represent equally important, yet disparate, parts.


Do you know what the major difference in them is? Data backup focuses on creating data backups in the event that you are to suffer from a loss incident. Disaster recovery is the act of actually restoring the data backup as well as any other operational function that may have been interrupted by a incident. In many senses, data backup is the event that begins the process while disaster recovery ends it, ensuring that your organization recovers swiftly and efficiently.

There are several features that contribute to a successful data backup and disaster recovery solution. Here are just a few of them:

Recovery point objective: How much data needs to be backed up (and ultimately restored) in the event of a loss incident in order to continue or sustain operations? For a higher RPO, you will want to restore as much data as possible.

Recovery time objective: How long will it take to have your backed up data restored in order continue or sustain operations? Time is a luxury that you don’t have when your organization’s future hangs in the balance. The faster you can recover your data, the less downtime you’ll suffer from.

Depending on the type of solution you have in place, your RPO and your RTO will vary. A quicker RTO will likely result in a lower RPO, as the more data you need to have restored will cause longer recovery delays. You will have to alter your recovery plans based on your particular configuration. It is also worth mentioning that not all backup solutions are as effective as others.

Tape backup, the staple solution for many years, needs to be manually run in order for you to get back in business following a disaster scenario. Furthermore, due to the cumbersome nature of tape backup, it’s possible to lose at least a day’s worth of data. The alternative, network-attached data backup and disaster recovery (BDR) with cloud functionality offers faster recovery times and more thorough recovery options. All you have to do is restore the data to any device via an Internet connection. Since modern data backup solutions can take snapshots frequently, it’s a great way to minimize data loss and ensure protection from the increased downtime that many data loss situations would produce.

Does your business need help implementing a new data backup and disaster recovery solution? Telesys Voice and Data can help. To learn more, reach out to us at (800) 588-4430.

0 Comments
Continue reading

Varieties of Smart Tech to Consider

Varieties of Smart Tech to Consider

How often do you see smart technology in headlines? The term is thrown around a lot, and it’s because there are countless products circulating in both the consumer and business environments. These connected devices range from smart forks to smart cars, so you can imagine that there are a fair number of useful (as well as useless) applications of this technology. How has it changed in recent months, and what will smart technology look like in the future?


For Your Person
Smart products are produced for a variety of reasons with one of the more practical ones being monitoring your physical wellbeing. One of the best and most recognizable devices for this purpose is Fitbit, which has ushered other companies dedicated to health monitoring devices through the door. Health bracelets, watches, and smart fabrics all contribute to this trend of connected devices encouraging people to care more about their health using technology.

These devices contain microprocessors, sensors, and energy sources, and they contain the hopes and dreams of engineers who have worked tirelessly to create some of the most compact technology solutions on the market today. These devices are so useful that there were 125 million wearables shipped in 2017 alone. Here are some of the most popular smart technologies on the market today:

  • Fitness trackers: The most simple fitness trackers can count your steps and estimate calorie loss, as well as distance traveled, sleep quality, and speed.
  • Smart watches: Some smart watches can track fitness information, as well as other features that work with other apps on your mobile device.
  • Smart clothes: As you might imagine, most smart clothes are typically designed for use with fitness. There are self-cooling shirts that react to your body temperature, as well as yoga outfits designed to help your yoga posture.

For Transportation
Automobiles have also made great strides in smart technology. You’ll see cars that offer everything from heads-up displays to screens that can showcase all kinds of content. Some cars are even capable of driving themselves, though this is a technology that’s still developing. The concept, however, is that connected technology is fueling future transportation initiatives. It’s thought that in the future, this will be a major part of the automobile industry.

Technically, smart technology in cars has been being used since 1996. Every single car that has been manufactured since has a built-in on-board diagnostic system. This helps mechanics understand some of the intricacies of vehicles by accessing data stored by the computerized system. You may have even used some of these diagnostic tools yourself when you see your Check Engine light turn on.

Some smart enhancements go beyond the practicality of diagnostics and simply make the user experience better. There are navigation systems designed to help users make their way to their destination, as well as control interfaces for temperature, media, and gear status. There are cameras that activate while your vehicle is in reverse to help drivers safely back up, as well as side-sensors to detect when something is a little too close for comfort.

Augmented reality could also make a move on smart cars. Windshields and rear-view mirrors with augmented reality can (and likely will) become standard features on new automobiles. Google and Apple have begun to design devices for integration with these smart car features, allowing for a consistent connection for use with music or other media.

For Your Home
Most smart devices are designed of use in the home. There are some that have no business being connected, but there are others that are designed to save on energy costs and other practical uses. The most popular smart devices include Amazon Echo and Google Home. Since they can perform multiple different roles and control certain devices, they are quite helpful. Other devices used in the smart home include locks, cameras, lights, thermostats, and anything else that can be controlled digitally through a smartphone app.

Several of today’s most used appliances come with smart technology installed, including refrigerators, ranges, faucets, washers, dryers, dishwashers, vacuums, and so much more. Questions have arisen about the practical use of many of these smart appliances, but their major draw is that they get smarter and more efficient depending on how they are used. They can lead to lower energy costs in the long run and effectively offer value for a longer length of time than a normal device. Just about all smart technology has this principle in mind.

While smart technology generally comes with a higher price tag than usual, this is only because it hasn’t become mainstream yet. Once more of these devices flood the market, the price of it will drop considerably. How will your organization leverage smart technology in the future? To find out, reach out to the IT professionals at Telesys Voice and Data.

0 Comments
Continue reading

5G Improves Upon What 3G and 4G Established

5G Improves Upon What 3G and 4G Established

You might see 3G and 4G on your mobile devices and wonder what it all means. If so, we have an answer for you, and just in time for a brand-new iteration: 5G. With this new technology on its way, it’s time to take a look at what exactly 5G should be capable of, and how it can differentiate itself from its predecessors.

0 Comments
Continue reading

Why Nanotechnology is the Next Big Thing

Why Nanotechnology is the Next Big Thing

One of the primary goals of technology development has long been to make technology as small as possible, while simultaneously improving its performance. The result of these efforts is the field of nanotechnology, which is now applied in a variety of uses.

0 Comments
Continue reading

Tech Term: Cookies

Tech Term: Cookies

Browser cookies might not sound delicious, but they are a particularly important part of your browser’s technology. Do you actually know what they do, though? Today’s tech term will explain just what these cookies are, as well as the purpose they serve for your organization.

0 Comments
Continue reading

Reduce Your Technology Headaches Go with Managed IT

Reduce Your Technology Headaches Go with Managed IT

Does your business have trouble with managing and maintaining your technology? If so, you’re not alone. Many small businesses struggle with even the most basic elements of IT maintenance. Wouldn’t it be nice if you could just take this responsibility and shift it off of your employees? The best way to approach technology maintenance is to implement managed IT services.


Small businesses often neglect IT maintenance because they can’t afford to hire in-house technicians. These kinds of skills are in high demand, which often means that small businesses--with their limited budgets--have trouble finding technicians that they can afford. Furthermore, these skills might be region-locked, meaning that they are more difficult to find in certain areas than others, making it challenging to find the skills you need, when they’re needed.

A lot of businesses tend to do one of two things: have their current employees (who aren’t trained IT technicians) perform most of the work, or they simply don’t get the work done at all. Both of these situations are far from desirable. Either the work will get done poorly, or the work doesn’t get done at all. In fact, a project implementation gone wrong could be even more costly if it has to be redone, putting even more pressure on your organization.

In these types of situations, it’s helpful to have someone you rely on to get the work done right. Managed IT services allow small businesses to take advantage of many services that allow them to focus on creating revenue, rather than managing technology. Your company can leverage all of the great technology solutions that larger businesses don’t think twice about. Whether you need supplemental technology maintenance or full-on management of your in-house network, Telesys Voice and Data has you covered.

We offer several services to small businesses in your area, including:

  • Security solutions: Spam protection, content filtering, antivirus, and firewalls
  • Business continuity: Data backup, disaster recovery
  • Communications: Voice over Internet Protocol, email hosting
  • Network management: Remote monitoring and management
  • Software and hardware procurement

Does your business need help managing technology? Telesys Voice and Data wants to make sure that you’re always on top of your technology maintenance. To learn more, reach out to us at (800) 588-4430.

0 Comments
Continue reading

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

0 Comments
Continue reading

Power Off, or Leave It On?

Power Off, or Leave It On?

At the end of the day, do you shut down your computer or do you put it into sleep mode? Depending on what you need from your device the next day, you might want to consider which option benefits you the most. Here are some of the pros and cons of both approaches so that you can pick which one best suits your situation.

0 Comments
Continue reading

Hosted Utility Computing Allows Businesses to Centralize Their IT

Hosted Utility Computing Allows Businesses to Centralize Their IT

Your business relies on technology to ensure operations proceed smoothly, but the way that it’s managed can have a major impact on the way your company functions. Think about it like this: if you have software solutions hosted on different computers, but not in any centralized location, only those computers will be able to use these solutions--potentially hampering your staff’s ability to be productive. How can you make sure that this doesn’t become a major problem?


Centralizing your company’s IT assets should be a priority, as it promotes accessibility and flexibility for your entire company. When you have your business network assets centralized in one location, all sorts of possibilities open up. For example, you don’t have to worry about data being inaccessible at any point, which can often be a major hurdle.

For a lot of businesses, centralization means hosting company assets in a place where every single employee can access what they need to do their job. In essence, it means utilizing an innovative technology plan led by cloud computing. Cloud computing is the act of making assets available through the virtual environment known as the cloud. It can be something as simple as email access, or it can be something as complex as infrastructure hosting. Either way, the point that we’re trying to get across is that it’s a centralized location for important information.

There are many important factors to keep in mind that stem from centralizing your business’ IT. Here are just a few of them.

  • Near-constant access: Hosting applications and programs in your cloud solution allows for access to just about anything that a business might need to remain active. Since access is near-constant, your employees will be able to work remotely if needed, allowing them to either catch up on missed work or get ahead from anywhere there is an Internet connection.
  • User-based delegation: If your employees have access to all information on your network, you’re managing a considerable amount of risk. You can limit how much damage is done through limiting data access based on user roles. For example, the average employee doesn’t need access to personally identifiable information, like your HR department would.
  • Security: Since most of your assets are located in one place, they will be easier to protect and secure in the long run. Of course, this type of security also needs to extend to devices that access this information. With the right amount of control over security, your business can fully take advantage of centralized IT assets.

We’d like to round this out by suggesting a centralized way of managing your IT assets as well, and that’s by outsourcing the responsibility to Telesys Voice and Data. We can remotely monitor and maintain your infrastructure without the need for an on-site visit, thus redirecting valuable capital to projects that can help you build revenue. To learn more, reach out to us at (800) 588-4430.

0 Comments
Continue reading

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

0 Comments
Continue reading

Four Questions to Ask Your Cloud Provider

Four Questions to Ask Your Cloud Provider

The cloud has revolutionized the way that businesses approach computing. Companies can implement solutions in a flexible and accessible model that makes it much easier to take advantage of technology solutions. Yet, you should know that not all clouds are the same, and you can’t treat them as such. Here are four questions that you need to ask your cloud provider about the services that you’ve been rendered.

0 Comments
Continue reading

How Your Smartphone Keeps Your Data Safe

How Your Smartphone Keeps Your Data Safe

Smartphones are the predominant mode of communication, as well as now being the devices most used to access the Internet. With so much depending on the modern smartphone, it has become one of the largest, and most competitive, markets of any consumer item. As a result, manufacturers are building devices with software that is able to encrypt the phone against unauthorized access.

0 Comments
Continue reading

Tech Term: Motherboard

Tech Term: Motherboard

A computer is made up of many parts, one of which is today’s Tech Term: the motherboard. We’ll discuss what the motherboard does for your computer and why it’s such an important part for its continued operation.

0 Comments
Continue reading

A New Perspective on Ransomware

A New Perspective on Ransomware

We are going to switch things up a bit and walk you through a retelling of a ransomware attack through the eyes of a business owner. Usually when we talk about these types of threats, we approach it from our perspective and talk about what you should do to prepare and what the threats are, but we wanted to try to show you what an event like this could feel like, for you, in your position, and in your own eyes. We hope that this will raise awareness of how crippling an event like this can be on your company, and we hope you let us know if this perspective helps you, your colleagues, and your staff get a more personal sense of what ransomware can do. Enjoy!


What a day it has been!

Typically, when I have a day like I just had, I wouldn’t sit here and write about it, but since our story is sure to help people, I thought that I should. Besides, my adrenaline is still pumping, and I don’t think I can sleep yet anyway.

The day I had was terrifying but started just like any other. I got through my morning routine and made my way to the office. I even stopped at the shoppe to get coffee. Once I entered the building I knew something was wrong. I had two employees beat me to the office. They were milling around almost aimlessly in the hallway. Before I even reached my desk, I was inundated with bad news.

“We are locked out!”
“What are we supposed to do?”

After getting past my employees into my office, I tried to ascertain what the problem was. It was evident very quickly that we had a major problem on our hands.

@!#?! It’s ransomware! I can’t believe it!

It could only be ransomware.

I wasn’t sure what allowed this to happen. Did one of my staff click on a bad link? Was our network vulnerable from the get go? Since the ransomware had spread onto the network, I could tell that the affected computer had to be used to manage other endpoints, pushing ransomware to all the endpoints the terminal had managed. This is why the computers that were on the network had the same message. This means that it ended up stealing usernames and passwords to open each endpoint and lock down the data on them.

It is during this period that the entity that unleashed this beast on us would look to take as much data as they could. It turned out that my company was using a global password configuration and the ransomware spread throughout our network like wildfire. So, when I was met with the message, I knew exactly what I was dealing with.

I never for a second thought that it would happen to us. Our business doesn’t deal with major financial institutions or medical records, so it would seem to keep us safe from these kinds of security breaches. I guess I’m just the latest person to ask, “why us?”

For those who don’t know, ransomware is any type of malicious application that “kidnaps” the data and holds it for ransom. It can shut down the files of a single computer, or in our experience, it can spread over the network to several endpoints; effectively shutting down operations for long stretches of time. I wanted to share my experience to help you know what to expect if you are one of the unfortunate business owners that have to have all the answers.

Don’t Panic
No matter how prepared you are for something like this, at first, you feel panic. Typically, you are immediately overwhelmed and are left kind of dumbfounded, glancing around the room, looking for answers that aren’t there. Regrettably, if you are doing that, the damage is done and there is nothing you can do about that. Scenarios race by in your head and the more they turn negative, the more the fear builds up in the base of your neck, in your throat, or in the pit of your stomach. You need to stay as calm as you can and begin troubleshooting immediately. The thing about ransomware is you can’t just wait it out. Once that wave of fear subsides, you have to make a measured response, because you likely have people that are on the clock, and an IT infrastructure that is locked down.

After the initial shock, I went to work.

ransomware ib

Fighting Ransomware
I learned quickly that there are two main types of ransomware:

  • Locker - Malware that locks the computer or device.
  • Crypto - Malware that encrypts data and files.

The type we were unfortunate enough to encounter was WannaCry, a crypto ransomware that has infected millions of people worldwide by taking advantage of an unpatched Windows vulnerability. As a small business, our technology management was pieced together, but after this event, and all we’ve learned from it, we will definitely be sure to make our staff cognizant of how to avoid situations like this.

For us, we had three machines infected with a variant of WannaCry. The ransomware stated that if we pay $300 in Bitcoin for every machine that was locked, we could get our data back... and the clock was ticking, literally.

At that point, we had three options. We could abandon the machines and buy new ones, we could pay the hackers that had encrypted our data, or, we could attempt to restore our systems.

Part of me wanted nothing more than to just abandon the machines, bust our IT budget for the year and be done with it. We instead decided to try to restore the machines to a prior version, because paying the hackers was never a real option. First of all, any person that could inflict this kind of fresh hell on a small business was not to be trusted; and, I felt if I were to pay the ransom, there was no guarantee that we would a) get our files back; or, b) not get harassed again by the same people.

Since cost was a factor, we reached out the IT professionals at Telesys Voice and Data, and they walked us through the process of restoring our terminal and the two machines connected to it. Luckily for us, they had the knowledge and expertise to help us get through this horrible time. We will lose quite a bit of work, but, as of right now, it looks like we are going to come out of this whole thing much better than the majority of companies that have dealt with it.

I know we were lucky. I know we have to try harder. I know we aren’t out of the woods just yet, but I have to thank the people at Telesys Voice and Data. They really came through for us!

Ransomware attacks are rampant. If your small business isn’t proactive about its network security and if you don’t train your people on what to look for, you could be dealing with a problem that could potentially sink your business. For more information about ransomware, WannaCry, or other threats your organization faces today, call us today at (800) 588-4430.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code

Blog Archive

2014
January
February
March
April
May
June
July
September
October
November