This document discusses mobile security for businesses. It begins by noting that mobile devices present new security risks that companies often only address reactively after a breach. However, mobile security allows businesses to capitalize on opportunities from mobile applications if done properly. The document then provides an overview of common mobile security threats like malware, privacy issues, and social engineering. It concludes by offering a 7-step checklist for better mobile security practices that IT administrators can implement, including securing devices with passwords and preparing phone location/remote wipe services.