Android mobile security threats today

As bring your own device (BYOD) policies become common practice for companies today, business owners must keep in mind the possible cybersecurity implications of connecting more devices to the company network. If your employees are using Android devices, here are the top five security threats they need to be aware of as well as how to steer clear from them.

5 uses of the Android phone/Chrome combo

The convenience provided by the iPhone/Mac combo is well-known, but syncing your Android phone with Chrome can give Apple a run for its money. Here are five nifty things you can do with Google’s combo.
Send directions from Google Maps to your Android phone
While Google Maps works great on smartphones, it’s often easier to use on larger screens.

5 great voice commands for Google Assistant

Google Assistant is essentially the next generation of Google Now. It performs all of the same tasks as Google Now, such as scheduling events and web searching, but has a better, more conversational interface. For a crash course in some of Google’s best AI-powered voice-commands, take a look at five of our favorites.

4 steps to erase data from your old phone

Avast, a cybersecurity software company, purchased 20 used Android phones from eBay in 2014. Even though previous owners had performed a factory reset to erase all their private data from memory, the company was able to recover 40,000 photos (including nudes and kids’ pictures), 1,000 Google searches, 750 SMS and email exchanges, and tons of contact details.