Most business people rely heavily on their smartphones and tablets to help manage their personal and business lives. Which means that we use these devices to transact banking business, make travel plans, send and receive emails, access the Internet and social media sites and even transfer CAD drawings and other customer information. So anyone who gets their hands on the phone, itself, or hacks their way in has access to data that can cause us a world of hurt, as anyone who’s had a brush with identity theft or industrial espionage will tell you.