SlideShare a Scribd company logo
1 of 15
Download to read offline
10 CYBERSECURITY &
PRIVACY THREATS
DIGITAL SECURITY UPDATE:
2ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
These slides provide insight into apps, web
services, and devices designed to go unnoticed
as they capture your sensitive personal data.
3ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
This presentation was curated by Entefy, the company
building the first universal communicator—an AI-powered
communication platform that helps you seamlessly interact
with the people, services, and smart things in your life.
4ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Anonymous sperm donor
received a Facebook friend
suggestion to connect with
the child born of his donation.
Source: https://gizmodo.com/how-facebook-figures-out-everyone-youve-
ever-met-1819822691
5ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Mattel scuttled an
Internet of Toys product
after two Congressmen
questioned its use to
collect data on children.
Source: https://consumermediallc.files.wordpress.com/2017/09/markey-bar-
ton-letter-mattel-9-28-17.pdf
6ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
A tech journalist’s Google
Home Mini malfunctioned and
recorded him 24/7 without
his permission.
Source: https://www.androidpolice.com/2017/10/10/google-nerfing-home-minis-
mine-spied-everything-said-247/
7ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Apple’s Core ML: When
more and more apps
have access to user data,
it’s harder to guarantee
privacy and security.
Source: https://www.wired.com/story/core-ml-privacy-machine-learning-ios/
8ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
“Permit this app to use your
camera?” Hackers can take
control of smartphone cameras
without opening an app.
Source: https://motherboard.vice.com/en_us/article/mb3ezy/iphone-apps-cam-
era-permission-pictures-videos-without-you-noticing
9ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
There was a 2,502% increase
in malware sales on the Dark
Web during 2017.
Source: https://cdn.www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Re-
port-101117.pdf?utm_source=MIT+Technology+Review&utm_campaign=5e7f9142c5-The_Download&utm_medi-
um=email&utm_term=0_997ed6f472-5e7f9142c5-155902325
10ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Up to 2.6M Android phones are
infected with the Andorid.Sockbot
malware, which adds devices to
global botnets.
Source: https://www.symantec.com/connect/blogs/android-malware-google-play-
adds-devices-botnet-and-performs-ddos-attacks
11ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Researchers took control
of networked computers
using malware installed on
security cameras.
Source: https://www.sciencedaily.com/releases/2017/09/170919160228.htm
12ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
An emergency FDA notice
showed that not even
pacemakers are safe
from hackers.
Source: https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm573669.htm
13ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
A security backdoor was
detected in infrastructure
software used by 100 global
banks and energy companies.
Source: https://arstechnica.com/information-technology/2017/08/powerful-backdoor-
found-in-software-used-by-100-banks-and-energy-cos/
14ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
The original research in this presentation comes
from the Entefy article, “10 cybersecurity and privacy
threats that will make you miss Nigerian prince and
lottery email scams.”
15ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
About Entefy
©2018 ENTEFY INC. ALL RIGHTS RESERVED.
Entefy’s universal communicator is an intelligent
communication platform that seamlessly
connects the people, services, conversations,
contacts, files, apps, smart devices, and smart
things in your digital life.
contact@entefy.com | www.entefy.com

More Related Content

What's hot

Mobile security
Mobile securityMobile security
Mobile security
home
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 

What's hot (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
Digital Dating Safety
Digital Dating SafetyDigital Dating Safety
Digital Dating Safety
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacy
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 

Similar to Digital security update: 10 cybersecurity and privacy threats

11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
aulasnilda
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 

Similar to Digital security update: 10 cybersecurity and privacy threats (20)

10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West
 
9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
09 09 2014
09 09 201409 09 2014
09 09 2014
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
 
2012: This year I learned
2012: This year I learned2012: This year I learned
2012: This year I learned
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Out-Smarted!
Out-Smarted!Out-Smarted!
Out-Smarted!
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 

More from Entefy

More from Entefy (13)

10 Consequences of tech use and abuse
10 Consequences of tech use and abuse10 Consequences of tech use and abuse
10 Consequences of tech use and abuse
 
12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain  12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain
 
11 Tech habits that are bad for your health
11 Tech habits that are bad for your health11 Tech habits that are bad for your health
11 Tech habits that are bad for your health
 
AI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industriesAI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industries
 
9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening now9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening now
 
Collected, bundled, and sold: your sensitive private data
Collected, bundled, and sold: your sensitive private dataCollected, bundled, and sold: your sensitive private data
Collected, bundled, and sold: your sensitive private data
 
Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]
 
23 proven ways to boost focus
23 proven ways to boost focus23 proven ways to boost focus
23 proven ways to boost focus
 
What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...
 
Inattention: the brain’s complex relationship with social media by Entefy
 Inattention: the brain’s complex relationship with social media by Entefy Inattention: the brain’s complex relationship with social media by Entefy
Inattention: the brain’s complex relationship with social media by Entefy
 
Patients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by EntefyPatients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by Entefy
 
Old school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by EntefyOld school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by Entefy
 
Entefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexityEntefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexity
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Digital security update: 10 cybersecurity and privacy threats

  • 1. 10 CYBERSECURITY & PRIVACY THREATS DIGITAL SECURITY UPDATE:
  • 2. 2ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS These slides provide insight into apps, web services, and devices designed to go unnoticed as they capture your sensitive personal data.
  • 3. 3ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS This presentation was curated by Entefy, the company building the first universal communicator—an AI-powered communication platform that helps you seamlessly interact with the people, services, and smart things in your life.
  • 4. 4ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Anonymous sperm donor received a Facebook friend suggestion to connect with the child born of his donation. Source: https://gizmodo.com/how-facebook-figures-out-everyone-youve- ever-met-1819822691
  • 5. 5ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Mattel scuttled an Internet of Toys product after two Congressmen questioned its use to collect data on children. Source: https://consumermediallc.files.wordpress.com/2017/09/markey-bar- ton-letter-mattel-9-28-17.pdf
  • 6. 6ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS A tech journalist’s Google Home Mini malfunctioned and recorded him 24/7 without his permission. Source: https://www.androidpolice.com/2017/10/10/google-nerfing-home-minis- mine-spied-everything-said-247/
  • 7. 7ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Apple’s Core ML: When more and more apps have access to user data, it’s harder to guarantee privacy and security. Source: https://www.wired.com/story/core-ml-privacy-machine-learning-ios/
  • 8. 8ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS “Permit this app to use your camera?” Hackers can take control of smartphone cameras without opening an app. Source: https://motherboard.vice.com/en_us/article/mb3ezy/iphone-apps-cam- era-permission-pictures-videos-without-you-noticing
  • 9. 9ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS There was a 2,502% increase in malware sales on the Dark Web during 2017. Source: https://cdn.www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Re- port-101117.pdf?utm_source=MIT+Technology+Review&utm_campaign=5e7f9142c5-The_Download&utm_medi- um=email&utm_term=0_997ed6f472-5e7f9142c5-155902325
  • 10. 10ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Up to 2.6M Android phones are infected with the Andorid.Sockbot malware, which adds devices to global botnets. Source: https://www.symantec.com/connect/blogs/android-malware-google-play- adds-devices-botnet-and-performs-ddos-attacks
  • 11. 11ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Researchers took control of networked computers using malware installed on security cameras. Source: https://www.sciencedaily.com/releases/2017/09/170919160228.htm
  • 12. 12ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS An emergency FDA notice showed that not even pacemakers are safe from hackers. Source: https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm573669.htm
  • 13. 13ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS A security backdoor was detected in infrastructure software used by 100 global banks and energy companies. Source: https://arstechnica.com/information-technology/2017/08/powerful-backdoor- found-in-software-used-by-100-banks-and-energy-cos/
  • 14. 14ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS The original research in this presentation comes from the Entefy article, “10 cybersecurity and privacy threats that will make you miss Nigerian prince and lottery email scams.”
  • 15. 15ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS About Entefy ©2018 ENTEFY INC. ALL RIGHTS RESERVED. Entefy’s universal communicator is an intelligent communication platform that seamlessly connects the people, services, conversations, contacts, files, apps, smart devices, and smart things in your digital life. contact@entefy.com | www.entefy.com