SlideShare une entreprise Scribd logo
1  sur  18
10
                                   Essential
           10                   Mobile Apps
                  Essential Mobile Apps




Presentation by
  G McKnight
Is your
mobile
at risk?
Security Protection




ANDROID
Free WIFI




 WIFI Risks
#1
VPN - a Virtual Private Network




    VPN - a Virtual Private Network.
# 2 Encryption Software
Productivity

   Tools
Productivity

   Tools
#3

     WriteThat.Name
#4
#5
#6
#7
#8
#9
# 10
Thank you for Watching

Contenu connexe

Tendances

Samsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung at Work
 
How 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturersHow 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturersrajpatel787077
 
Wifi Cat Startup Riot
Wifi Cat Startup RiotWifi Cat Startup Riot
Wifi Cat Startup RiotPaul Freet
 
Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wirelessFedora Leo
 
Security Matters : The Evolution of Samsung KNOX™
Security Matters: The Evolution of Samsung KNOX™Security Matters: The Evolution of Samsung KNOX™
Security Matters : The Evolution of Samsung KNOX™Samsung at Work
 
Insight about Smart Home Control -Zipato
Insight about  Smart Home Control -ZipatoInsight about  Smart Home Control -Zipato
Insight about Smart Home Control -ZipatoNaveen Buddhar
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech BrandSimon Loe
 
Mobile security in smartphone
Mobile security in smartphone Mobile security in smartphone
Mobile security in smartphone Chico Mobile
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronDejan Jeremic
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour
 
Hacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire networkHacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire networkMatt Boddy
 
Meetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en securityMeetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en securityDigipolis Antwerpen
 
Cisco mwc2013 barcelona
Cisco mwc2013 barcelonaCisco mwc2013 barcelona
Cisco mwc2013 barcelonaIT Tech
 

Tendances (18)

Samsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise Mobility
 
How 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturersHow 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturers
 
Wifi Cat Startup Riot
Wifi Cat Startup RiotWifi Cat Startup Riot
Wifi Cat Startup Riot
 
Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wireless
 
Security Matters : The Evolution of Samsung KNOX™
Security Matters: The Evolution of Samsung KNOX™Security Matters: The Evolution of Samsung KNOX™
Security Matters : The Evolution of Samsung KNOX™
 
Insight about Smart Home Control -Zipato
Insight about  Smart Home Control -ZipatoInsight about  Smart Home Control -Zipato
Insight about Smart Home Control -Zipato
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech Brand
 
Mobile security in smartphone
Mobile security in smartphone Mobile security in smartphone
Mobile security in smartphone
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
Dmr corteva
Dmr cortevaDmr corteva
Dmr corteva
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Referentie calypso
Referentie calypsoReferentie calypso
Referentie calypso
 
Referentie calypso
Referentie calypsoReferentie calypso
Referentie calypso
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space Age
 
Hacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire networkHacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire network
 
Nanu
NanuNanu
Nanu
 
Meetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en securityMeetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en security
 
Cisco mwc2013 barcelona
Cisco mwc2013 barcelonaCisco mwc2013 barcelona
Cisco mwc2013 barcelona
 

En vedette

Political Transparency
Political TransparencyPolitical Transparency
Political TransparencyGlenn McKnight
 
Financial Transparency
Financial TransparencyFinancial Transparency
Financial TransparencyGlenn McKnight
 
Royal Canadian Legion Ontario Command Fact Sheet
Royal Canadian Legion Ontario Command Fact SheetRoyal Canadian Legion Ontario Command Fact Sheet
Royal Canadian Legion Ontario Command Fact SheetGlenn McKnight
 
Moodle presentation (1)
Moodle presentation (1)Moodle presentation (1)
Moodle presentation (1)Glenn McKnight
 
Internet streaming survey isoc
Internet streaming survey isocInternet streaming survey isoc
Internet streaming survey isocGlenn McKnight
 
Naralo Mobile Strategy
Naralo Mobile StrategyNaralo Mobile Strategy
Naralo Mobile StrategyGlenn McKnight
 
Craptioning to captions how to
Craptioning  to captions how toCraptioning  to captions how to
Craptioning to captions how toGlenn McKnight
 

En vedette (9)

Political Transparency
Political TransparencyPolitical Transparency
Political Transparency
 
Financial Transparency
Financial TransparencyFinancial Transparency
Financial Transparency
 
Royal Canadian Legion Ontario Command Fact Sheet
Royal Canadian Legion Ontario Command Fact SheetRoyal Canadian Legion Ontario Command Fact Sheet
Royal Canadian Legion Ontario Command Fact Sheet
 
Moodle presentation (1)
Moodle presentation (1)Moodle presentation (1)
Moodle presentation (1)
 
Internet streaming survey isoc
Internet streaming survey isocInternet streaming survey isoc
Internet streaming survey isoc
 
Naralo Mobile Strategy
Naralo Mobile StrategyNaralo Mobile Strategy
Naralo Mobile Strategy
 
Photo your Haunt
Photo your HauntPhoto your Haunt
Photo your Haunt
 
Craptioning to captions how to
Craptioning  to captions how toCraptioning  to captions how to
Craptioning to captions how to
 
Naralo slideshow
Naralo slideshowNaralo slideshow
Naralo slideshow
 

Plus de Glenn McKnight

Vsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sigVsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sigGlenn McKnight
 
Vsig Orientation Session for Group B
Vsig Orientation Session for Group BVsig Orientation Session for Group B
Vsig Orientation Session for Group BGlenn McKnight
 
Virtual school of Internet Governance
Virtual school of Internet Governance Virtual school of Internet Governance
Virtual school of Internet Governance Glenn McKnight
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallGlenn McKnight
 
Oh What a Lovely War- Probus Presentation
Oh  What a Lovely War- Probus  PresentationOh  What a Lovely War- Probus  Presentation
Oh What a Lovely War- Probus PresentationGlenn McKnight
 
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...Glenn McKnight
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview Glenn McKnight
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything EverywhereGlenn McKnight
 
Alan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA StewardshipAlan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA StewardshipGlenn McKnight
 
Allan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA StewardshipAllan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA StewardshipGlenn McKnight
 
J.G Harrington: Securing our Internet Traffic
J.G Harrington:  Securing our Internet Traffic J.G Harrington:  Securing our Internet Traffic
J.G Harrington: Securing our Internet Traffic Glenn McKnight
 
William Sandiford TorIX
William Sandiford TorIXWilliam Sandiford TorIX
William Sandiford TorIXGlenn McKnight
 
Karen Rose, ISOC The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC  The IANA FUnctions and Stewardship TransitionKaren Rose, ISOC  The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC The IANA FUnctions and Stewardship TransitionGlenn McKnight
 
Fayre of opportunties pdf version
Fayre of opportunties pdf versionFayre of opportunties pdf version
Fayre of opportunties pdf versionGlenn McKnight
 
Isoc canada presentation
Isoc canada presentationIsoc canada presentation
Isoc canada presentationGlenn McKnight
 

Plus de Glenn McKnight (20)

Vsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sigVsig belli sustainable connectivity virtual sig
Vsig belli sustainable connectivity virtual sig
 
Vsig Orientation Session for Group B
Vsig Orientation Session for Group BVsig Orientation Session for Group B
Vsig Orientation Session for Group B
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Virtual school of Internet Governance
Virtual school of Internet Governance Virtual school of Internet Governance
Virtual school of Internet Governance
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
 
Oh What a Lovely War- Probus Presentation
Oh  What a Lovely War- Probus  PresentationOh  What a Lovely War- Probus  Presentation
Oh What a Lovely War- Probus Presentation
 
Afralo presentation
Afralo presentationAfralo presentation
Afralo presentation
 
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
Design and Implementation of a Low Cost and Resilient Wireless Network for Fi...
 
APRALO
APRALO  APRALO
APRALO
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything Everywhere
 
Alan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA StewardshipAlan Greenberg ICANN Accountability and the Transition of IANA Stewardship
Alan Greenberg ICANN Accountability and the Transition of IANA Stewardship
 
Allan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA StewardshipAllan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
Allan Macgillivray: ICANN Accountability and the Transition of IANA Stewardship
 
J.G Harrington: Securing our Internet Traffic
J.G Harrington:  Securing our Internet Traffic J.G Harrington:  Securing our Internet Traffic
J.G Harrington: Securing our Internet Traffic
 
William Sandiford TorIX
William Sandiford TorIXWilliam Sandiford TorIX
William Sandiford TorIX
 
Karen Rose, ISOC The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC  The IANA FUnctions and Stewardship TransitionKaren Rose, ISOC  The IANA FUnctions and Stewardship Transition
Karen Rose, ISOC The IANA FUnctions and Stewardship Transition
 
Oh What a Lovely War
Oh  What a Lovely WarOh  What a Lovely War
Oh What a Lovely War
 
Fayre of opportunties pdf version
Fayre of opportunties pdf versionFayre of opportunties pdf version
Fayre of opportunties pdf version
 
Isoc canada presentation
Isoc canada presentationIsoc canada presentation
Isoc canada presentation
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Dernier (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 

10 Essential Mobile Apps for Security and Productivity

Notes de l'éditeur

  1. Welcome to the last of the four part series designed for the mobile professional It is essential for anyone on the move especially those in business to want to save time and become more productive . More and more business transactions can now be done from your phone untethering you from an office location . This presentation focuses on ten great apps to help you manage your data, time, schedules and clients. As a Road Warrior make your Smartphone truly be smart. Lets start .
  2. Before you start downloading a long list of applications from soup to nuts. . I recommend you think first about the the health of your mobile device and consider the first two applications to protect your mobile phone
  3. The first app should deal with real threats Mobile phones are under attack, Malware is designed to target the device itself are similar to the PC attacks of the past. Key are are Browser-based attacks, buffer overflow exploitations, blacklisting, and call blocking The short message service (SMS) and multimedia message service (MMS) offered on mobile devices afford additional avenues to hackers. Device attacks are typically designed to either gain control of the device and access data, or to attempt a denial of service (DoS)
  4. Malware attacks are no longer confined to PCs. Mobile malware threats are on the rise and continue to focus on the most prevalent mobile operating systems. Google’s Android operating system has begun to dominate market share, malicious code developers are following . According to a Juniper Networks study, malware for Android rose 400 percent between 2010 and 2011. Android malware is up 700% in the last twelve months, this newest threat
  5. Wi-Fi-enabled smartphones are susceptible to the same attacks that affect other Wi-Fi-capable devices. The technology to hack into wireless networks is readily available, and much of it is accessible online, making Wi-Fi hacking and man-in-the-middle (MITM) attacks easy to perform. Cellular data transmission can also be intercepted and decrypted. Hackers can exploit weaknesses in these Wi-Fi and cellular data protocols to eavesdrop on data transmission, or to hijack users’ sessions for online services, including web-based email. For companies with workers who use free Wi-Fi hot spot services, the stakes are high. While losing a personal social networking login may be inconvenient, people logging on to enterprise systems may be giving hackers access to an entire corporate database.
  6. A VPN creates an encrypted Wi-Fi channel, what many describe as your own personal Wi-Fi tunnel. When you turn on your Wi-Fi and activate the VPN, whatever Internet connection you make is encrypted and sent to a secure server, then transmitted from this secure server to wherever it needs to go on the Internet. Data coming back to you travels through this same encrypted private tunnel.
  7. This is an well rated VPN App found on ITUNES After 300 megs a fee is charged Provides a Virtual Private Network when you use a WIFI location As ofther VPN apps it he best way to protect your sensitive information is to use a Virtual Private Network, or VPN, which encrypts the data moving to and from your laptop. The encryption protects all your Internet communication from being intercepted by others in wifi hotspots. In addition, VPNs can prevent hackers from connecting to your laptop and stealing your data files.
  8. It’s so easy to intercept cellular and other digital communications that even teenagers can do it. But it’s not teenagers that represent the worst threat. Corporate espionage, terrorist activities and kidnapping for ransom are just a few of the risks you face when your business and personal conversations are open to anyone who cares to listen. One product is called Gold Lock products which is licensed by the Israel Ministry of Defense https://www.gold-lock.com/en/home/
  9. A wealth of Productivity tools exist for your Mobile Phone. I have put together a short list of tools which have been reviewed and rated as essential and can't live without these apps to make your life a bit easier
  10. Write That Name is a handy tool when you need a contact's phone number. WriteThat.Name improves mobile productivity by automatically scanning the signatures of people that email you, extracting their information, and merging it with your contacts in both your email and phone. If they haven't emailed you before, WriteThat.Name adds them as a contact or if they already exist, it updates their information for you. WriteThat.Name, stores the contacts in the cloud, so they're safe even if something happens to your phone. Www.writethatname.com
  11. http://getsigneasy.com Scan and Digital signature of documents All basic accounts are free and get 3 documents to sign for free. Afterwards, you can upgrade to our premium plan for signing unlimited documents, cloud storage integration (Dropbox, Box, Evernote) and offline signing at a subscription price of 19.99 US$ per year or buy pay-as-you-go credits for 5 documents at 1.99 US$
  12. Free Android and IPHONE App This app is probably my favorite, and it's one I use every single day--even when I know how to get to where I'm going. . Tell this app where you're headed, and it gives you different routes and tells you how long each will take based on the current traffic conditions. You can even use it when you're taking public transportation.
  13. Google Drive is an alternative to Dropbox. It's a place to store all your files, but much more handy and secure than a hard drive because it's in the cloud. I can access my files from my phone, my computer, or even from my friend's phone or computer. I never have to worry about losing important documents I'm working on because everything is automatically saved as I write, and can easily be shared with the rest of my team.
  14. Simple Glympse is easier and faster than a phone call or text message, simply select a contact, set a duration, and hit send. Flexible Anyone with an Internet-enabled phone or computer can receive a Glympse – no software or setup required. You can send a Glympse to a specific person, several people, or even to Facebook and Twitter. Safe Only Glympse puts you in control – you set who sees you and for how long. Safe for families, friends, colleagues, and one-time meetings.
  15. Www.mobileday.com If you use conference lines frequently especially if you work with people from various timezones, these calls typically all have their own conference number and conference code. When calling from my cell, it's a huge annoyance to have to search my email on my phone and keep track of all the dial-in codes. The MobileDay app works with any conference call service by looking through your calendar, reminding you of the call, and with one click calling the conference line and dial any necessary codes for you.
  16. This is app made for IoS, Android and Windows Mobile Wunderlist 2 is a simple to-do list and task management app that is now native for Android and iOS. The previous version was an HTML5 app. The new app offers expanded features, including push notifications and reoccurring tasks, as well as smoother and speedier functionality. http://www.6wunderkinder.com/wunderlist
  17. Last but not least of apps for your business is Glyder Glyder makes it easy to send messages to your mailing lists and social network accounts from your mobile device. With content templates, professional visual designs, and one touch distribution to email, social and mobile platforms, Glyder is the fast, easy way to communicate with your audience.
  18. We hope you have found this series useful and we appreciate your suggestions of other apps that are essential for your business.