Copyright © 2017 ALM Media Properties, LLC. All Rights Reserved.
Consider this scenario: You are a lawyer heading to a café to meet with a client. At your side is your trusty tablet, a device whose use definitely tests the boundaries between professional and personal. With this device, you connect to the café’s wireless network. While going over work with your client and exchanging messages that will find their way onto ever more devices, the two of you are sharing a considerable volume of data, all of which is being transferred via the café’s unsecure network.