Security
executives and enterprise officials can use tools to physically protect mobile
devices as well as the information contained in them. One example is
software-based “black-listing” applications.
But what threats do business and consumer users encounter
when they own and carry mobile phones? One of the biggest worries is loss or
theft, and, most importantly, the loss and misuse of business or personal data
with it.