The document discusses the security challenges posed by mobile devices, emphasizing their intimate role in personal and professional lives while highlighting the risks associated with bring-your-own-device (BYOD) policies. It outlines various mobile operating systems' security features and vulnerabilities, particularly focusing on Android and its susceptibility to malware, compared to more secure options like Blackberry and iOS. The text includes security checklists and training recommendations for organizations to protect sensitive information in the face of increasing mobile device usage.