Banks, personal pictures, work mail, and access to business systems are now kept in mobile devices, which means that a single compromised gadget can have an...