Executive Summary
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features available on those devices, but many of the features provide convenience and capability but sacrifice security.
This best practices guide outlines steps the users can take to better protect personal devices and information.