Keep your iPhone text messages private with these tips

If you’re a business owner who relies on text messages to communicate with employees, clients, or customers, it’s essential to ensure the privacy and security of your messages. Unfortunately, there are many ways for others to go through your texts if they have access to your mobile phone. In this blog post, we will discuss five ways to keep your text messages private on your iPhone. Turn off message previews By default, your iPhone shows a preview of every text message that comes in, along with the sender’s name. This can be a security risk, as someone nearby could easily read your messages over your shoulder. To prevent this from happening, go to Settings > Notifications > Messages. Under Lock Screen Appearance, click Show Previews and select Never. With the preview setting turned off, you’ll still get a notification that you have a new message, but the sender’s name and the message itself will be hidden until you unlock your phone and open the Messages app. Set messages to auto-delete Another way to keep your text messages private is to set them to auto-delete after a certain period. That way, even if someone does manage to get access to your phone, they won’t be able to see any of your messages because they’ll already be gone. To set your messages to auto-delete, go to Settings > Messages > Keep Messages. Then, you can choose to automatically delete your messages after 30 days or 1 year. Use Invisible Ink in iMessage If you’re sending sensitive information, images, or videos via iMessage, you can use the Invisible Ink feature to make sure the content is hidden until the recipient taps on it. To use this, open the Messages app and type out your message. Then, tap and hold on the send button and select Invisible Ink in the “Send with effect” menu that pops up. Lock third-party messaging apps with Face ID or Touch ID If you’re using a third-party messaging app like WhatsApp or Messenger, you can lock the app with Face ID or Touch ID to make sure only you can access it. To do this, open the app and go to Settings. Then, look for the option to enable Face ID or Touch ID lock and turn it on. For WhatsApp, this option is located in Settings > Account > Privacy > Screen Lock. For Messenger, you need to tap your profile picture in the top left corner, then select Privacy > App lock to enable the feature. Lock the Messages app using Screen Time Currently, you can’t lock built-in Apple apps like Messages with Face ID or Touch ID. However, you can use Screen Time to password-protect them. This will prevent anyone who doesn’t know your passcode from opening your Messages app. If you’re using Screen Time for the first time, go to Settings > Screen Time and turn it on. Follow the on-screen instructions from there to set up your preferences. After that, select Use Screen Time Passcode to enable the passcode. Take note that this passcode is different from the passcode you use to unlock your iPhone. To lock the Messages app, go to App Limits > Add Limit > Social. Select Messages from the list, then click Next in the top right corner of the screen. Finally, set the time limit to one minute before clicking Add. Your Messages app will now require your Screen Time passcode to unlock it after one minute of usage every day. These five simple privacy measures can go a long way in keeping your text messages safe and secure. Do you want more tips on how to protect your business data? Give our experts a call today. Published with permission from TechAdvisory.org. Source.
What is firmware and why is it important?

Securing your small business is a never-ending battle, but there are some steps you can take to make it a little bit easier. One of those steps is making sure your firmware is up to date. But what is firmware and why is it crucial to update it regularly? Read on to learn more. What does firmware do? Firmware is a type of software that is stored on read-only memory (ROM) chips. It is used to control the hardware of a device, such as a computer, and is typically permanently programmed into the ROM. Firmware is different from other types of software, such as application software and operating system software, as it is designed to work with specific hardware components and cannot be easily transferred to another device. Firmware typically contains instructions for how the hardware should interact with the rest of the system, as well as low-level routines for tasks such as booting up the device or managing memory. While firmware can be updated, it is usually more difficult than updating other types of software, and in some cases may require special equipment or knowledge. As a result, firmware updates are often reserved for fixing critical bugs or adding new features to the hardware. Why is it crucial to upgrade firmware? Microsoft’s 2021 Security Signals report warns that firmware attacks are increasing. These types of attacks force malware onto computer systems in order to disrupt the firmware on motherboards or hardware drivers. They can use such malware to remotely control the infected devices, extract data, and even block users from their devices and systems. Updating your business devices’ firmware ensures that everyone is using the most recent version of the firmware. This can help prevent data breaches, as well as keep your devices running smoothly. In addition, updating firmware can help improve compatibility with other devices and software, as well as provide new features and bug fixes. In this way, updated firmware protects your business and maintains peak device performance. What is the best way to install firmware updates? The procedure for upgrading firmware varies from device to device. On iOS and Android devices, you may simply download and install firmware upgrades. However, devices such as routers will require firmware updates that can only be accessed from the manufacturer’s website or administrative console. Updating the firmware may be time-consuming and laborious. Firmware updates might cause your devices to be reset, resulting in lost customizations on your computers, routers, and other devices. Additionally, you could also risk damaging your equipment if you do not follow the manufacturer’s instructions to the letter. Firmware updates are an important part of keeping your business secure, and it’s something that you should be doing on a regular basis. This task can be daunting, but it’s a crucial step that should not be ignored. If you need help getting started, contact us today. Our IT experts are here to guide you. Published with permission from TechAdvisory.org. Source.
What are the costs associated with owning a VoIP system?

Voice over Internet Protocol (VoIP) systems are a more cost-effective alternative to traditional phone systems. For a fixed monthly bill, you get enterprise-grade business communication tools but without the expensive call rates of old landline telephones. But despite its affordability, there are still several costs associated with implementing a VoIP phone system. 1. Initial costs Initial costs are the expenses related to acquiring the VoIP system. Most businesses usually pay a monthly subscription fee to access VoIP software and services, but the costs will vary depending on the VoIP provider. Some large corporations may even choose to set up their own VoIP infrastructure to establish private and more secure communication channels, but this comes at a more expensive price tag. Beyond the price of the VoIP system, initial costs also include hardware like headsets, webcams, IP phones, and voice-optimized network connections. 2. Setup costs Implementation costs refer to the money spent on setting up the new VoIP system. If you hired a consultant or managed IT services provider (MSP) to customize and deploy your VoIP system, you should account for their service rates when calculating implementation costs. You should also consider the costs of hiring network engineers who are responsible for installing new network routers, cables, and security software to accommodate your VoIP systems. What’s more, if your employees are not familiar with VoIP, you’ll need to invest additional cash in training and instructional materials for future reference. 3. Operational expenses Operational costs are the monthly recurring expenses that are required to keep your VoIP system running. These include the costs of monthly data plans as well as any VoIP-specific local and long-distance call fees. There’s also the cost of managing the VoIP hardware, software, and network, which is usually included in the monthly subscription fee. But if you own the VoIP infrastructure, you’ll have to shoulder all of these costs yourself. 4. System upgrade budget VoIP technology is adaptable and constantly evolving, which is why you need to budget for potential upgrades down the line. For instance, you could integrate VoIP with business intelligence and customer relationship management (CRM) software to distill valuable insights from client interactions. Alternatively, there may be plans to increase internet bandwidth and purchase additional hardware if you anticipate steady growth in your company’s future. Finally, you should also set aside some of your budget for consultations from your MSP. These experts will evaluate the effectiveness of your current communications technology and find ways to streamline it even further while taking into account your company’s needs and budget. If you need help setting up and managing VoIP, call our experts today. We’ll help you find the best VoIP solution and make sure you get nothing but crystal-clear calls. Published with permission from TechAdvisory.org. Source.
Streamline your schedule with Microsoft 365

Microsoft 365 is chock-full of features that can help businesses stay organized and connected. One of these is the ability to share calendars with co-workers. In this blog post, we will walk you through the steps in sharing calendars using Microsoft 365. What is Outlook? Outlook is a personal information manager from Microsoft, available as part of the Microsoft 365 suite. Aside from managing multiple email accounts, Outlook also allows users to quickly access calendar and task features. Users can also customize their view of Outlook through several ways, including the use of add-ons and plugins that improve productivity. Overall, Outlook is a powerful tool that can help individuals and organizations stay on top of their communications. Use Outlook on the web Outlook on the web is a free, web-based version of Microsoft Outlook that includes many of the same features as the desktop version. You can use Outlook on the web to access your email, calendar, contacts, and tasks from any computer with an internet connection. Additionally, you can connect your Microsoft 365 or another email service based on Microsoft Exchange Online to Outlook. Through this integration, you can then easily share your calendar by following these steps: To access the Calendar, click on the calendar icon at the bottom of the page. Go to the Calendar page and find the toolbar at the top of your screen. Click on Share and then select which calendar you want to share with others. Remember that you can only share calendars that you own. Enter the email address or name of who you’d like to share your calendar with. To secure your calendar, determine the permission levels of your recipients. These options include: Can view when I’m busy – allows users to view only certain details of your calendar when you’re busy Can view titles and locations – shows users when you’re not available, including additional details such as the event’s title or location Can view all details – lets users see all details about an event in your calendar Can edit – enables permitted users to modify details in your calendar Delegate – authorizes users to edit your calendar and share it with others The final step is to click on Share. You can cancel sharing your calendar by clicking on the Trash icon. Another method of sharing your calendar is by publishing it and sending the URL to others. Here’s how you can do this: Go to Settings, then View all Outlook settings in Calendar. Click on Shared calendars. After you select Publish a calendar, choose which calendar to make public and how much information recipients will be able to see. Once you’ve set the permission levels, you can click Publish. Next, choose between an HTML or an ICS link. The HTML link allows recipients to view your calendar through a browser like Google Chrome or Mozilla Firefox. Meanwhile, users can use an ICS link to import your shared calendar and view it on their own Outlook calendar. Share via Outlook.com Just like Outlook on the web, Outlook.com allows you to share your calendar directly or publish it. The methods for sharing on these two platforms are similar, with the exception that you have just two choices for how recipients may utilize your calendar: Can view all details and Can edit. Here’s how you can publish your calendar on Outlook.com: Open the Calendar view by clicking on the calendar icon. Go to the Settings menu and choose View all Outlook settings. Go to Calendar and choose Shared calendars. In “Publish a calendar,” choose the Calendar you want to publish and how much information it will show. Once you’re done, click on Publish and share your calendar either through an HTML or ICS link. Easy access through Outlook on iOS and Android If you’re on the go or don’t have access to your desktop, you can still share your calendar via Outlook’s mobile app by following these steps: On your Outlook app, select Calendar from the hamburger menu at the top-left corner of the screen. Go to Share then, under Add People, select the recipients you’d like to invite by inputting their names or email addresses. Next, go to the top-right corner of the app and tap on the Check button. To edit the permission level of a certain user, you can tap their name on the list of recipients. Like with Outlook on the web, you can choose the permission options such as “Only When I’m Busy,” “Only Titles and Locations,” “All Details,” “Can View,” “Can Edit,” and “Delegate.” If you want to remove a user from your recipients, go to the bottom of the page and tap on Remove. After you’ve set permissions, tap on the Check button at the top-right corner of the page to share your calendar with your selected users. There’s no doubt that Microsoft 365 offers a variety of tools that help you stay organized. If you’re interested in learning more about the benefits of Microsoft 365, please don’t hesitate to contact us. Our IT experts will be glad to help. Published with permission from TechAdvisory.org. Source.
What is single sign-on and why should you be using it

If you use multiple applications and accounts for work, you know how frustrating it can be to have to enter different usernames and passwords for each one. That’s where single sign-on comes in. What is single sign on? Single sign-on or SSO is an authentication method that lets users access several applications and websites with a single set of login credentials. For example, if you log in to Gmail, SSO will automatically sign you into other Google applications, such as Analytics and AdSense. How does SSO work? SSO is built on the concept of federated identity, which allows multiple systems to share identification information. When a user logs in to a service with their SSO credentials, an authentication token is generated and stored on their browser or in the SSO provider’s servers. Any app or website that the user visits afterward will verify the user’s identity with the SSO provider, which will then deliver the user’s token to confirm their identity and grant them access. This forms the foundation for modern SSO solutions that use protocols such as OpenID Connect and SAML 2.0. What are the benefits of SSO? Apart from being more convenient and simpler to use, SSO offers these key benefits: Better password management SSO makes it easier for workers to manage their login information since they only need to remember one set of credentials instead of dozens. And users only need to remember one password, they can create more unique and use stronger passwords for individual accounts, making it harder for cybercriminals to access and steal their information. Improved password policy enforcement Because password entry is centralized, SSO makes it easy for IT teams to enforce password security policies. For example, many businesses require employees to change their passwords regularly. Rather than having to reset several passwords across various applications and services each time, IT teams only need to reset one for each user. SSO also helps IT administrators implement the reentering of login information after a given period to ensure an employee is still active on the signed-in device. This is a critical security measure for businesses, as it can prevent dormant accounts from being used to access company data. Less time wasted recovering forgotten passwords By utilizing SSO, IT staff can reduce the number of password recovery or reset requests they receive, and users can spend less time waiting for password resets. This can help raise employees’ productivity levels and allow IT personnel to focus on more important issues. If you think SSO is ideal for your business, give us a call. Our experts are ready to help you. Published with permission from TechAdvisory.org. Source.
Avoid these 5 common IT investment mistakes

Investing in new technology is a great way to drive business growth. For instance, purchasing new servers can boost your employees’ ability to multitask and their productivity, while subscribing to a project management solution can help everyone meet their deadlines. However, you can only enjoy these business benefits if you avoid the following mistakes when purchasing new IT. 1. Failing to align new tech with business goals While many advertisers sell new technologies as the ultimate solution to all your problems, the truth is that not every IT solution is a good fit for all businesses. That’s why you need to clarify your company’s needs and goals, so you can make the right investments. 2. Not doing your homework Before investing in a new IT solution, you should ask for IT recommendations from people you trust. Read reviews and case studies about these recommendations and similar IT solutions. Check if those IT solutions will work well with your existing IT systems and if they can accommodate your company’s future growth. By conducting research, you can better understand how those IT solutions work, what short-term and long-term benefits they can bring, and which IT solution is the best fit for your company. 3. Failing to do a cost-benefit analysis Before purchasing a new IT solution, you must conduct a cost-benefit analysis. This means comparing the costs of the investment (i.e., the price of the IT solution and the costs related to the training, infrastructure, and maintenance required) against the benefits it can bring to your company. Doing so will help you make an informed decision on whether to proceed with the purchase. 4. Not considering your cash flow When you’re evaluating the costs of a new IT solution, it’s important to consider your company’s cash flow. If you’re tight on cash, you may want to wait until your financial situation improves before making an IT investment. While you can always finance the purchase through a loan or line of credit, remember that interest rates will add to your overall costs. A great way to manage your cash flow is to pick an IT solution that requires a monthly subscription fee rather than a huge upfront cost. But be sure to draft a budget first, as recurring costs can still exhaust your finances. 5. Failing to train the end users Investing in a great IT solution is pointless if your team doesn’t know how to use it. That’s why you must set aside time and money for user training. It’s best to ask an IT specialist to conduct the training, as they would know how to simplify complicated steps and take advantage of the IT solution’s features. They may also offer tips on getting the most out of your new IT investment. Avoiding these mistakes can help you enjoy a positive return on your IT investment. When making major IT decisions for your business, don’t be afraid to seek professional help. Consult with us today. Published with permission from TechAdvisory.org. Source.
Windows 11 update: New features you need to know about

On September 20, 2022, Microsoft released the first major update for Windows 11 in line with the operating system’s upcoming first anniversary. This free upgrade will make PCs more accessible, convenient, secure, and eco-friendly. Here are some features that come with the Windows 11 update. Improved Start Menu Windows 11 22H2 update features three new settings for customizing the Recommended section in the Start menu. Although you cannot disable or remove the Recommended section, you can now choose to show fewer recommended items or more pins by choosing from one of these options: Default – Displays three rows of pinned items and three rows of recommended items. More Pins – Only displays a list of pinned items. More recommendations – Displays more recommended items and two rows of pinned items. Tabs in File Explorer With the new update, File Explorer will be capable of supporting tabs. This new tab system is similar to how tabs work in Microsoft Edge. When you open File Explorer, a plus sign (+) is now included on the Ribbon. Clicking on the plus sign lets you open multiple folders in one window. This prevents your screen from getting cluttered with too many open windows, which can be distracting. Better video calls If your PC or mobile device has artificial intelligence chips built into it, the new Windows 11 update can remove background noise during video chats, allow the camera to track you as you move around, and even change your video feed to make it appear like you’re making eye contact with others on the call at all times. Smart App Control Windows 11 version 22H2 comes with Smart App Control, a new security feature that prevents untrustworthy or unapproved applications, dangerous macros, and script files from running on your computer. Built using the same AI found in Windows Defender Application Control, Smart App Control can analyze an application’s safety in real time before it runs on your computer. This is an ideal security solution for companies not using a modern device management tool like Microsoft Intune. Do Not Disturb mode The new Do Not Disturb mode turns off application notifications and taskbar badges, allowing you to focus on your work. You can turn this feature on by right-clicking on the date and time section on the taskbar and selecting Notification settings. From there, you can set rules and conditions that will automatically turn on Do Not Disturb mode. For example, you can set Do Not Disturb before a conference call or video meeting. You can also set which reminders can break through Do Not Disturb mode, such as a call or meeting reminder. Eco-friendly features Windows 11 version 22H2 was designed to reduce your computer’s carbon emissions. For example, when your computer is on, Windows will schedule updates at points in the day that may result in lower carbon emissions. If regional carbon intensity data is available, it can further optimize when to install updates so they have less of an impact on the environment. Microsoft has also changed the default power setting for Sleep and Screen off to help reduce emissions when your computer is idle. How to install the Windows 11 version 22H2 update? Computers already running Windows 11 can install the new update by going to Settings > Windows Update > Check for updates. The update will automatically be downloaded and installed onto the devices. Those still using Windows 10 can check if their computer is compatible with Windows 11 by going to Settings > Update & Security. A download and install button will be present for computers that are eligible for the new OS. For more information on the new Windows 11 update, get in touch with our experts today. Published with permission from TechAdvisory.org. Source.
7 Ways to keep your email account safe

Email is one of the most essential business tools today. It enables swift, efficient communication within a company and with their customers and partners. Email’s popularity among businesses is what makes it a target for hackers looking to get ahold of critical business and client information. It’s therefore crucial to safeguard your email account, and in this blog post, we’ll discuss seven ways to help you do so. Use strong passwords Many email users fail to realize how important it is to have a strong password. A large number of people still use weak passwords, such as “123456,” “qwerty,” or even just “password.” What’s worse, they often reuse these same passwords for multiple accounts. To keep all password-protected accounts secure, utilize strong passphrases that are unique to each account. Enabling multifactor authentication (MFA) for your email account is also a good security measure. With MFA, a user would have to verify their identity by providing their username and password as well as a valid fingerprint scan or an answer to a security question. This makes it more challenging for malicious actors to access your account. Encrypt emails Email encryption is a process that transforms readable text into unreadable code. This code can be read only by someone who has the corresponding decryption key, keeping your email safe from unauthorized access. Don’t ignore security updates Always install the most recent updates for your antivirus, firewalls, and email security software. Doing so can protect you from cyberattacks, as it enables these cybersecurity solutions to detect and filter out even the newest email-based cyberthreats. Installing these updates also fixes software vulnerabilities that can be exploited by hackers. Do not click on suspicious links and email attachments Refrain from downloading or opening files and links in emails if you’re not 100% certain they are safe. These links may direct you to fraudulent websites or these email attachments may install malware on your computer. Beware of phishing scams Phishing is an online scam in which criminals pose as legitimate businesses or individuals to obtain personal information, such as passwords or credit card numbers. Phishing scams can use different communication platforms, but they often involve fake emails that contain links to spoofed websites. When unsuspecting users input their personal information into these fake sites, criminals can use that information to commit identity theft or fraud. Phishing scams are becoming increasingly common, so it’s important to be aware of how they work. Take note that reputable companies would never ask for such sensitive data via email. If you believe that the email you received might be from a phishing attempt, contact the company directly using the contact details on their official website. Don’t use the contact details in the dubious email as these might be fake too. Regularly monitor account activity Monitor for any suspicious behavior, which involves checking your logs for things like unusual devices or IP addresses that have accessed your account. Such activity could indicate a security breach. If you think your account was hacked, sign out of all web sessions and immediately change your password. Use different email accounts Don’t use one email account for everything. Otherwise, if someone gains access to that account, they could also easily steal any stored information or connected online accounts associated with that email. This could lead to hackers using your account for fraud and other illegal activities. That’s why you should create separate email accounts, such as a personal account dedicated to communicating with your friends and family, and a professional account for work-related tasks only. You can also create another email account for miscellaneous things, such as online shops, gaming sites, newsletter subscriptions, and the like. As we become increasingly reliant on technology, the importance of email security grows even more. To protect yourself and your loved ones, you must take steps to secure your email account. If you have any other cybersecurity concerns, contact us now and our IT experts will be glad to help you. Published with permission from TechAdvisory.org. Source.
BYOD and CYOD: What can they do for your business?

When it comes to choosing the right work device policy for your business, you will likely come across two options: bring your own device (BYOD) and choose your own device (CYOD). Both of these solutions have their own unique benefits, but which one is right for your business? Let’s take a closer look at both BYOD and CYOD. What is BYOD? With BYOD, employees use their own devices, such as smartphones and laptops, to connect to the company network, access business data and applications, and perform work-related tasks. Since staff members are already familiar with these devices, your employees can get right to work, which leads to higher efficiency and better employee experience. BYOD also gives employees greater flexibility and increased mobility, enabling them to work anywhere, anytime. They don’t have to be chained to a desk in order to do their tasks. Instead, they can use their smartphones to check emails or their laptops to edit documents even when they’re on the go. Your business stands to gain a lot from BYOD as well. Aside from enjoying enhanced employee productivity, you don’t have to buy new equipment and spend on maintenance and upgrades. The money you save can be invested in other things that further improve your bottom line. However, there are a few risks to consider before implementing a BYOD policy in your workplace. First, there is the potential for data breaches. If an employee’s device is lost or stolen, sensitive company information could be at risk. Additionally, BYOD policies can lead to increased support costs, as employees may need help troubleshooting issues with their personal devices. If you’re considering adopting BYOD, you must implement a BYOD security policy to ensure that your company’s assets are well protected. This policy should outline key elements such as: Access rights ‒ What are the apps and data that employees can access from their personal devices? Security requirements – What security measures must an employee’s device have to be deemed fit to be used for work? Mobile device management (MDM) solution – What MDM solution must your IT team use to remotely wipe company data from lost or stolen devices? What is CYOD? CYOD allows users to choose from a list of devices provided by the company. In this regard, CYOD is similar to BYOD — it gives employees freedom of choice. While not everyone may like the selection of available devices, they may appreciate having a say regarding what computer or mobile device they’ll be using for work. You can also offer employees the option to purchase the device from the company, paying in installments or upfront. For businesses, the biggest advantage of CYOD is security. You can equip devices with security features to ensure that sensitive data is properly protected. However, since you own the devices, the responsibility of spending on security and optimization will fall on you. This may not be ideal for small businesses or those with a limited budget. Which policy should your company adopt? Ultimately, the choice between BYOD and CYOD boils down to what your business needs. If you’re operating on a tight budget, a BYOD policy is the right option for you. On the other hand, CYOD is perfect if you want to ensure the security of your data and other company assets. Whichever policy you choose, it is essential to carefully consider the implications before making a decision. Call us today and our IT experts will be happy to guide you. Published with permission from TechAdvisory.org. Source.
Call recording: How it can benefit your business

Many businesses are looking for ways to boost sales, improve customer service, and grow their business. To achieve these, they’re turning to various technologies such as call recording. But what exactly are the benefits of call recording and why is it essential to your business? Read on to learn more. Pinpoint problem areas Call recording can help you pinpoint areas in your processes and conversations that need improvement, such as communication problems that lead to a drop in customer satisfaction. It also allows you to identify roadblocks that are preventing you from delivering quick solutions to your customers. Improve assessment and feedback processes By recording calls, managers can hear how their employees speak with customers. They can review the recordings and give feedback about phone etiquette, communication skills, tone, and choice of words. They can even offer guidelines on how to sound when selling a product or resolving a customer’s issues. Resolve disputes If you have a dispute with a customer, it can be problematic for both sides to establish their allegations. Reviewing recorded calls can help you better understand the situation and find a solution. For example, if a customer insists they were promised something that was never delivered, you can go back and listen to past phone conversations to see if this is true. You can even share these recordings with the customer, so you can both find a peaceful resolution to the problem and prevent it from happening again. Create better marketing campaigns By analyzing customer calls, marketing teams can identify pain points and positive feedback about a specific product or service. This information can be used to develop more effective marketing campaigns that deliver better results. Reviewing recorded calls also allows marketers to identify important keywords frequently mentioned by customers. These keywords can be used to optimize online ads, blogs, and email campaigns to increase click-through rates and conversions. Comply with industry regulations Some companies, such as insurance and financial firms, are legally required to record calls for compliance and data protection purposes and to ensure they can defend themselves in court in case of lawsuits. However, federal and state laws require businesses to inform customers or get their consent before recording a call. When used correctly, call recording is a powerful tool that can push your business past the competition. If you want to learn more, give our experts a call today. Published with permission from TechAdvisory.org. Source.