Mobile Security (Part 1)

This is the excerpt for your very first post.

Graduating from the school of failure to a world of success (Lecture 1)

There is a school of failure that everyone in order to be successful must go through and graduate from. Just like our normal formal educational system you can't get the certificate until you graduate by meeting all the requirements needed from you to make you learned of the course of study. In order to be … Continue reading Graduating from the school of failure to a world of success (Lecture 1)

Graduating from the school of failure into a world of SUCCESS (Lecture 1)

There is a school of failure that everyone in order to be successful must go through and graduate from. Just like our normal formal educational system you can't get the certificate until you graduate by meeting all the requirements needed from you to make you learned of the course of study. In order to be … Continue reading Graduating from the school of failure into a world of SUCCESS (Lecture 1)

WHY WE OFTEN FAIL TO TAKE ACTIONS.

The only principle guaranteed to lead or cause success is ACTION. Knowledge is acquiring information, while wisdom is applying the knowledge that has been gained. And there can never be wisdom without you applying it. As a saying goes "people don't care how much you know, until they know how much you care." People can … Continue reading WHY WE OFTEN FAIL TO TAKE ACTIONS.

JUST DO IT NOW!

Just do it now! I was at a training and i asked the attendees "How can you be successful?" The truth was that everyone at the training knew what is required of them to be successful, just as at whole of everyone else in the world - from changing your habit to changing your influence … Continue reading JUST DO IT NOW!

Mobile Security (Part 1)

“Mobile malware has been on the rise drastically in last couple of years,” Nathan Collier, Senior Malware Intelligence Analyst at Malwarebytes. There is an increase in the use of mobile devices for storing and transmitting larger volume of more sensitive data, personal and business information such as account details, location, online banking and shopping etc. … Continue reading Mobile Security (Part 1)