SlideShare a Scribd company logo
1 of 18
10
                                   Essential
           10                   Mobile Apps
                  Essential Mobile Apps




Presentation by
  G McKnight
Is your
mobile
at risk?
Security Protection




ANDROID
Free WIFI




 WIFI Risks
#1
VPN - a Virtual Private Network




    VPN - a Virtual Private Network.
# 2 Encryption Software
Productivity

   Tools
Productivity

   Tools
#3

     WriteThat.Name
#4
#5
#6
#7
#8
#9
# 10
Thank you for Watching

More Related Content

What's hot

Samsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung at Work
 
How 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturersHow 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturersrajpatel787077
 
Wifi Cat Startup Riot
Wifi Cat Startup RiotWifi Cat Startup Riot
Wifi Cat Startup RiotPaul Freet
 
Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wirelessFedora Leo
 
Security Matters : The Evolution of Samsung KNOX™
Security Matters: The Evolution of Samsung KNOX™Security Matters: The Evolution of Samsung KNOX™
Security Matters : The Evolution of Samsung KNOX™Samsung at Work
 
Insight about Smart Home Control -Zipato
Insight about  Smart Home Control -ZipatoInsight about  Smart Home Control -Zipato
Insight about Smart Home Control -ZipatoNaveen Buddhar
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech BrandSimon Loe
 
Mobile security in smartphone
Mobile security in smartphone Mobile security in smartphone
Mobile security in smartphone Chico Mobile
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronDejan Jeremic
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour
 
Hacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire networkHacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire networkMatt Boddy
 
Meetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en securityMeetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en securityDigipolis Antwerpen
 
Cisco mwc2013 barcelona
Cisco mwc2013 barcelonaCisco mwc2013 barcelona
Cisco mwc2013 barcelonaIT Tech
 

What's hot (18)

Samsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise Mobility
 
How 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturersHow 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturers
 
Wifi Cat Startup Riot
Wifi Cat Startup RiotWifi Cat Startup Riot
Wifi Cat Startup Riot
 
Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wireless
 
Security Matters : The Evolution of Samsung KNOX™
Security Matters: The Evolution of Samsung KNOX™Security Matters: The Evolution of Samsung KNOX™
Security Matters : The Evolution of Samsung KNOX™
 
Insight about Smart Home Control -Zipato
Insight about  Smart Home Control -ZipatoInsight about  Smart Home Control -Zipato
Insight about Smart Home Control -Zipato
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech Brand
 
Mobile security in smartphone
Mobile security in smartphone Mobile security in smartphone
Mobile security in smartphone
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
Dmr corteva
Dmr cortevaDmr corteva
Dmr corteva
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Referentie calypso
Referentie calypsoReferentie calypso
Referentie calypso
 
Referentie calypso
Referentie calypsoReferentie calypso
Referentie calypso
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space Age
 
Hacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire networkHacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire network
 
Nanu
NanuNanu
Nanu
 
Meetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en securityMeetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en security
 
Cisco mwc2013 barcelona
Cisco mwc2013 barcelonaCisco mwc2013 barcelona
Cisco mwc2013 barcelona
 

Viewers also liked

Political Transparency
Political TransparencyPolitical Transparency
Political TransparencyGlenn McKnight
 
Financial Transparency
Financial TransparencyFinancial Transparency
Financial TransparencyGlenn McKnight
 
Royal Canadian Legion Ontario Command Fact Sheet
Royal Canadian Legion Ontario Command Fact SheetRoyal Canadian Legion Ontario Command Fact Sheet
Royal Canadian Legion Ontario Command Fact SheetGlenn McKnight
 
Moodle presentation (1)
Moodle presentation (1)Moodle presentation (1)
Moodle presentation (1)Glenn McKnight
 
Internet streaming survey isoc
Internet streaming survey isocInternet streaming survey isoc
Internet streaming survey isocGlenn McKnight
 
Naralo Mobile Strategy
Naralo Mobile StrategyNaralo Mobile Strategy
Naralo Mobile StrategyGlenn McKnight
 
Craptioning to captions how to
Craptioning  to captions how toCraptioning  to captions how to
Craptioning to captions how toGlenn McKnight
 

Viewers also liked (9)

Political Transparency
Political TransparencyPolitical Transparency
Political Transparency
 
Financial Transparency
Financial TransparencyFinancial Transparency
Financial Transparency
 
Royal Canadian Legion Ontario Command Fact Sheet
Royal Canadian Legion Ontario Command Fact SheetRoyal Canadian Legion Ontario Command Fact Sheet
Royal Canadian Legion Ontario Command Fact Sheet
 
Moodle presentation (1)
Moodle presentation (1)Moodle presentation (1)
Moodle presentation (1)
 
Internet streaming survey isoc
Internet streaming survey isocInternet streaming survey isoc
Internet streaming survey isoc
 
Naralo Mobile Strategy
Naralo Mobile StrategyNaralo Mobile Strategy
Naralo Mobile Strategy
 
Photo your Haunt
Photo your HauntPhoto your Haunt
Photo your Haunt
 
Craptioning to captions how to
Craptioning  to captions how toCraptioning  to captions how to
Craptioning to captions how to
 
Naralo slideshow
Naralo slideshowNaralo slideshow
Naralo slideshow
 

More from Glenn McKnight

Vsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sigVsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sigGlenn McKnight
 
Vsig Orientation Session for Group B
Vsig Orientation Session for Group BVsig Orientation Session for Group B
Vsig Orientation Session for Group BGlenn McKnight
 
Virtual school of Internet Governance
Virtual school of Internet Governance Virtual school of Internet Governance
Virtual school of Internet Governance Glenn McKnight
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallGlenn McKnight
 
Oh What a Lovely War- Probus Presentation
Oh  What a Lovely War- Probus  PresentationOh  What a Lovely War- Probus  Presentation
Oh What a Lovely War- Probus PresentationGlenn McKnight
 
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...Glenn McKnight
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview Glenn McKnight
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything EverywhereGlenn McKnight
 
Alan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA StewardshipAlan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA StewardshipGlenn McKnight
 
Allan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA StewardshipAllan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA StewardshipGlenn McKnight
 
J.G Harrington: Securing our Internet Traffic
J.G Harrington:  Securing our Internet Traffic J.G Harrington:  Securing our Internet Traffic
J.G Harrington: Securing our Internet Traffic Glenn McKnight
 
William Sandiford TorIX
William Sandiford TorIXWilliam Sandiford TorIX
William Sandiford TorIXGlenn McKnight
 
Karen Rose, ISOC The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC  The IANA FUnctions and Stewardship TransitionKaren Rose, ISOC  The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC The IANA FUnctions and Stewardship TransitionGlenn McKnight
 
Fayre of opportunties pdf version
Fayre of opportunties pdf versionFayre of opportunties pdf version
Fayre of opportunties pdf versionGlenn McKnight
 
Isoc canada presentation
Isoc canada presentationIsoc canada presentation
Isoc canada presentationGlenn McKnight
 

More from Glenn McKnight (20)

Vsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sigVsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sig
 
Vsig Orientation Session for Group B
Vsig Orientation Session for Group BVsig Orientation Session for Group B
Vsig Orientation Session for Group B
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Virtual school of Internet Governance
Virtual school of Internet Governance Virtual school of Internet Governance
Virtual school of Internet Governance
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
 
Oh What a Lovely War- Probus Presentation
Oh  What a Lovely War- Probus  PresentationOh  What a Lovely War- Probus  Presentation
Oh What a Lovely War- Probus Presentation
 
Afralo presentation
Afralo presentationAfralo presentation
Afralo presentation
 
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
 
APRALO
APRALO  APRALO
APRALO
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything Everywhere
 
Alan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA StewardshipAlan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA Stewardship
 
Allan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA StewardshipAllan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
 
J.G Harrington: Securing our Internet Traffic
J.G Harrington:  Securing our Internet Traffic J.G Harrington:  Securing our Internet Traffic
J.G Harrington: Securing our Internet Traffic
 
William Sandiford TorIX
William Sandiford TorIXWilliam Sandiford TorIX
William Sandiford TorIX
 
Karen Rose, ISOC The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC  The IANA FUnctions and Stewardship TransitionKaren Rose, ISOC  The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC The IANA FUnctions and Stewardship Transition
 
Oh What a Lovely War
Oh  What a Lovely WarOh  What a Lovely War
Oh What a Lovely War
 
Fayre of opportunties pdf version
Fayre of opportunties pdf versionFayre of opportunties pdf version
Fayre of opportunties pdf version
 
Isoc canada presentation
Isoc canada presentationIsoc canada presentation
Isoc canada presentation
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

10 Essential Mobile Apps for Security and Productivity

Editor's Notes

  1. Welcome to the last of the four part series designed for the mobile professional It is essential for anyone on the move especially those in business to want to save time and become more productive . More and more business transactions can now be done from your phone untethering you from an office location . This presentation focuses on ten great apps to help you manage your data, time, schedules and clients. As a Road Warrior make your Smartphone truly be smart. Lets start .
  2. Before you start downloading a long list of applications from soup to nuts. . I recommend you think first about the the health of your mobile device and consider the first two applications to protect your mobile phone
  3. The first app should deal with real threats Mobile phones are under attack, Malware is designed to target the device itself are similar to the PC attacks of the past. Key are are Browser-based attacks, buffer overflow exploitations, blacklisting, and call blocking The short message service (SMS) and multimedia message service (MMS) offered on mobile devices afford additional avenues to hackers. Device attacks are typically designed to either gain control of the device and access data, or to attempt a denial of service (DoS)
  4. Malware attacks are no longer confined to PCs. Mobile malware threats are on the rise and continue to focus on the most prevalent mobile operating systems. Google’s Android operating system has begun to dominate market share, malicious code developers are following . According to a Juniper Networks study, malware for Android rose 400 percent between 2010 and 2011. Android malware is up 700% in the last twelve months, this newest threat
  5. Wi-Fi-enabled smartphones are susceptible to the same attacks that affect other Wi-Fi-capable devices. The technology to hack into wireless networks is readily available, and much of it is accessible online, making Wi-Fi hacking and man-in-the-middle (MITM) attacks easy to perform. Cellular data transmission can also be intercepted and decrypted. Hackers can exploit weaknesses in these Wi-Fi and cellular data protocols to eavesdrop on data transmission, or to hijack users’ sessions for online services, including web-based email. For companies with workers who use free Wi-Fi hot spot services, the stakes are high. While losing a personal social networking login may be inconvenient, people logging on to enterprise systems may be giving hackers access to an entire corporate database.
  6. A VPN creates an encrypted Wi-Fi channel, what many describe as your own personal Wi-Fi tunnel. When you turn on your Wi-Fi and activate the VPN, whatever Internet connection you make is encrypted and sent to a secure server, then transmitted from this secure server to wherever it needs to go on the Internet. Data coming back to you travels through this same encrypted private tunnel.
  7. This is an well rated VPN App found on ITUNES After 300 megs a fee is charged Provides a Virtual Private Network when you use a WIFI location As ofther VPN apps it he best way to protect your sensitive information is to use a Virtual Private Network, or VPN, which encrypts the data moving to and from your laptop. The encryption protects all your Internet communication from being intercepted by others in wifi hotspots. In addition, VPNs can prevent hackers from connecting to your laptop and stealing your data files.
  8. It’s so easy to intercept cellular and other digital communications that even teenagers can do it. But it’s not teenagers that represent the worst threat. Corporate espionage, terrorist activities and kidnapping for ransom are just a few of the risks you face when your business and personal conversations are open to anyone who cares to listen. One product is called Gold Lock products which is licensed by the Israel Ministry of Defense https://www.gold-lock.com/en/home/
  9. A wealth of Productivity tools exist for your Mobile Phone. I have put together a short list of tools which have been reviewed and rated as essential and can't live without these apps to make your life a bit easier
  10. Write That Name is a handy tool when you need a contact's phone number. WriteThat.Name improves mobile productivity by automatically scanning the signatures of people that email you, extracting their information, and merging it with your contacts in both your email and phone. If they haven't emailed you before, WriteThat.Name adds them as a contact or if they already exist, it updates their information for you. WriteThat.Name, stores the contacts in the cloud, so they're safe even if something happens to your phone. Www.writethatname.com
  11. http://getsigneasy.com Scan and Digital signature of documents All basic accounts are free and get 3 documents to sign for free. Afterwards, you can upgrade to our premium plan for signing unlimited documents, cloud storage integration (Dropbox, Box, Evernote) and offline signing at a subscription price of 19.99 US$ per year or buy pay-as-you-go credits for 5 documents at 1.99 US$
  12. Free Android and IPHONE App This app is probably my favorite, and it's one I use every single day--even when I know how to get to where I'm going. . Tell this app where you're headed, and it gives you different routes and tells you how long each will take based on the current traffic conditions. You can even use it when you're taking public transportation.
  13. Google Drive is an alternative to Dropbox. It's a place to store all your files, but much more handy and secure than a hard drive because it's in the cloud. I can access my files from my phone, my computer, or even from my friend's phone or computer. I never have to worry about losing important documents I'm working on because everything is automatically saved as I write, and can easily be shared with the rest of my team.
  14. Simple Glympse is easier and faster than a phone call or text message, simply select a contact, set a duration, and hit send. Flexible Anyone with an Internet-enabled phone or computer can receive a Glympse – no software or setup required. You can send a Glympse to a specific person, several people, or even to Facebook and Twitter. Safe Only Glympse puts you in control – you set who sees you and for how long. Safe for families, friends, colleagues, and one-time meetings.
  15. Www.mobileday.com If you use conference lines frequently especially if you work with people from various timezones, these calls typically all have their own conference number and conference code. When calling from my cell, it's a huge annoyance to have to search my email on my phone and keep track of all the dial-in codes. The MobileDay app works with any conference call service by looking through your calendar, reminding you of the call, and with one click calling the conference line and dial any necessary codes for you.
  16. This is app made for IoS, Android and Windows Mobile Wunderlist 2 is a simple to-do list and task management app that is now native for Android and iOS. The previous version was an HTML5 app. The new app offers expanded features, including push notifications and reoccurring tasks, as well as smoother and speedier functionality. http://www.6wunderkinder.com/wunderlist
  17. Last but not least of apps for your business is Glyder Glyder makes it easy to send messages to your mailing lists and social network accounts from your mobile device. With content templates, professional visual designs, and one touch distribution to email, social and mobile platforms, Glyder is the fast, easy way to communicate with your audience.
  18. We hope you have found this series useful and we appreciate your suggestions of other apps that are essential for your business.