Hey, sorry. Sent. I'm sorry. I was waiting here in the recording studio and I took the opportunity to answer an email. Don't tell me it never happens to you. We use smartphones all the time, not only in the work but also in our leisure time. We use smartphone to work, to send emails, to sending work emails, and stuff like that. We not only use smartphone, we also use, for example, tablets, laptops, and wherever. This is a mobile world. It's a very interesting world because with mobile technologies, we can have a balance between our work and our life. We can, for example, I have right now the opportunity to pick my children at noon, while I am working because I have my smartphone, and if something urgent happens, I can receive a call and I can man at this situation. So it's very interesting the mobile technology. But from the point of view of work, I'm also a sysadmin, and believe me, the mobile technologies for us, it's a real challenge today. When I hear smartphone in my company, I get a stress. Why? Because so far the traditional service security protection are basing to many requirements. The first one is that we have control or the physical access of all devices. For example, I've had control of who is using a specific computer that is in my company. The second requirement is that I have control of what installed applications you have in your computer. So you have a computer or the company, I can control what application are you executing, are you running in your computer. But what is the problem? That right now, that's not the situation. With mobile technology is not the situation because mobile is mobile. So it's not in a specific physical space, and also most of the times the technology that belongs to the company, belongs to the owner, to the employer. So that's a problem for us. So that's why we need your help. We have a lot of knowledge related with cybersecurity, but we also need that you help us. So we need that you interact with the cybersecurity mechanisms we provide you. Of course, you may think, okay, it's not my duty, it's just only for IT people. It [inaudible] in this way, when you go out, your home, for example, you lock your door. So you are using a security mechanism. Here in cybersecurity is the same. We're going to do a lot of work, a lot of strong work in service security terms, but we need that you do the final step. We need that you use the cybersecurity mechanism, the cybersecurity tool we are providing you. Maybe you can feel, yeah, okay, I want to help you, but I don't have enough knowledge. Yeah, not worries for that because we are working very hard to provide you with very easy-to-use tools for protect your communication, your data, your identity, and whatever other thing you consider inside this world. So in the next videos we are going to talk about mobile technologies in general. But we're going to focus in two main threats. The first one is that we are going to focus in protecting you from people spying your information. The second one is that we are going to talk about how to avoid that people rob your information for mobile technologies. So see you in next unit