Six (6) Android Games You Should Play Now not Tomorrow

Got a new device? You need to get some new games. Here are some quick recommendations for great Android games. Some are familiar from other platforms. Some are free. Some are paid, and some have specific hardware requirements. All are listed here.
1.  Minecraft Pocket Edition
Why it is great: Minecraft is an entertaining block-building and survival game. You can play either in creative mode where you build and invent things in your own randomly generated world or you can play in survival mode where you use your wits and resources to survive against the creepers who come out at night.
Note – this does not connect with your main Minecraft account if you play the computer version of the game.
Play for yourself or keep it around to entertain kids. (Turn off in-app purchases if you do this.)
Minecraft is a paid app ($6.99) but you can find occasional sales, in-app purchases run from $0.50 to $1.99.   More »
2.  Lara Croft Go
Based on the popular Tomb Raider series and developed by Square Enix, Lara Craft Go is a relatively simple but very addictive puzzle game you can take with you. The puzzles are designed for short bursts of play, so pull it out in the doctor’s office waiting room or while riding the bus home.
Lara Croft Go sells for $4.99 but is occasionally on sale for $0.99. It allows in-app purchases. If you like this game, you can also check out Hitman Go, which is also from Square Enix.  More »
3.  Buttons and Scissors
This is a free puzzle game where you try to cut matching color buttons off of a square of denim. Mechanically this feels similar to Bejeweled, but not completely the same. The logic puzzles offer great challenges for players of all ages.
The other big advantage to this game is that it does not require any connectivity. You can play this game on devices that aren’t connected to Wi-Fi or in that signal dead spot.
Buttons and Scissors is a free download but allows in-app purchases.  More »
 Did you want to try out the new trend in adult coloring books, but you don’t want to carry around coloring pencil and a coloringb book? Try out this app instead. It’s appropriate for kids or adults, and while it’s not the same as coloring in an actual coloring book, it is still very satisfying.
Mandala Coloring Pages is free (with ads) but also allows in-app purchases.  More »
Yes. You can play an Android version of Portal. This is a real console game. As such, it requires a real console. This version will only work on the Nvidia Shield version of Android TV.  The Nvidia Shield starts at around $199 but allows you to stream movies and play Android games on your TV.
Portal starts at $1.99 but this is “introductory pricing.”  More »
If you have a phone with a fast processor and terrific screen display, you can take it for a ride with this virtual reality game. This is a first-person shooter where you aim at balloons. You’ll need Google Cardboard. This is an inexpensive accessory that you can either make or buy for around $15 and will turn your phone into a virtual reality device. Obviously not a game you can play while waiting in a doctor’s office (unless your doctor is awesome) but a fun novelty game to play by yourself or after having one of your friends try on the headset.
VR Cardboard Shooter 3D is a free download.  More »

Disclosure: This page may contain external affiliate links that may result in us receiving
 a commission if you choose to purchase said product. The opinions on this page are our own.
 We do not receive payment for positive reviews.

Help protect your mobile workforce from cyber attacks


Help protect your mobile workforce from cyber attacks

The shift from office workers becoming mobile and at-home workers is unavoidable.  As technology makes it easier for employees to access the same information outside the office as inside, companies are often left scrambling to figure out how to keep their data secure.

Mobile employees take their notebook PCs with them when they’re traveling or working from home, yet they access information in the same way they would in the office. One problem that mobile workers face is they might not always have the full protection of the corporate firewall or other security systems. As a result, their notebook PCs have increased exposure to viruses, worms, and other types of malware, increasing the risk that these machines will become infected or compromised. When these notebook PCs are later reconnected to the office network, their machines can be used as an entry-point for theft or other attacks.

Below are some of the key issues that companies and mobile workers need to be aware of.

Staying safe in a VPN environment
Virtual private networks (VPN) are often assumed to be a fail-safe solution for remote users, but that’s not always the case. While VPNs prove a tunneled connection that allows only authorized users to access corporate networks, they are not considered to be a complete end-to-end solution. One of the shortcomings of VPNs is that they do not ensure that mobile devices are free from software and personal configuration vulnerabilities. Malware, such as viruses or worms could spread within these environments, and are easily introduced through standard connections like DSL or cable.

Even with its limitations, using a VPN as much as possible is still the safest bet for a remote worker. With many locations offering public Wi-Fi networks, it’s important to utilize a VPN to encrypt your activity and keep private information out of the wrong hands.

Some ways to keep your VPN secure:

  • Using a password manager like LastPass or 1Password can help to manage the mess of creating—and keeping track of—numerous passwords to be used on multiple online accounts.
  • Everyone has their preference of browsers, but it’s worth investigating the different browsers to determine which one is the most secure. Many browsers now offer apps or extensions that can encrypt the information you transmit online.

Keeping your mobile workers’ data more safe and secure
Whether it’s protecting the notebook itself from quick hands in an airport security line, or the information stored within in the notebook, a comprehensive mobile security plan that educates users is a necessity. At its core, the plan should raise awareness among employees about vulnerabilities that currently exist—including ways people can take advantage of those vulnerabilities, and the steps that mobile workers should take to prevent them.

However, developing a comprehensive security plan is often easier said than done. For instance, many mobile workers might think they have a solid grasp of what it takes to keep their confidential data secure. Another obstacle is that the plan will need to be refined on a constant basis to account for new trends and security threats.

Is your notebook as secure as your data?
Notebooks are convenient because of their flexibility and ever-shrinking designs, but those same features are what make them so appealing to thieves. You can protect your data as much as possible when working online, but what happens if someone steals the notebook containing all of your (and your company’s) data? Is it secure?

Here are some ways to keep your notebook—and the data stored on it—safe:

  • Lock it up—there are a variety of metal cables and locks available that let you secure your notebook to a desk when in use, and keep them locked in drawers when they’re not.
  • Say goodbye to usernames and passwords—many new notebooks come equipped with fingerprint scanners, smart card readers and recognition.
  • Secure your data—encrypting files stored on your computer makes them viewable only with proper authorization.

Keeping your printer safe
It’s easy to overlook the printer as part of your mobile technology, but with many businesses using printers with HP ePrint, the printers are now just as connected as your notebook. By utilizing the HP ePrintCenter, users can configure their printer settings as little or as much as you like, including limiting the users allowed to print to the printer.

Attackers today are far more likely to exploit a poorly protected network or system then a secure one. When companies institute a comprehensive set of best practices, ensuring that all systems are secure, they not only protect their employees but the company’s data as a whole.

Disclosure: This page may contain external affiliate links that may result in us receiving
 a commission if you choose to purchase said product. The opinions on this page are our own.
 We do not receive payment for positive reviews.

Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time