Consider this scenario: You are a lawyer heading to a café to meet with a client. At your side is your trusty tablet, a device whose use definitely tests the boundaries between professional and personal. With this device, you connect to the café’s wireless network. While going over work with your client and exchanging messages that will find their way onto ever more devices, the two of you are sharing a considerable volume of data, all of which is being transferred via the café’s unsecure network.

With much work remaining and never enough time in the day, you bring your tablet home with you. But while starting up your home computer, your pre-teen son starts bothering you. To keep him quiet while you focus, you concede the tablet, perhaps too willingly. And of course, your son isn’t thinking whatsoever about client confidentiality or information security when he decides to download apps and visit entertainment sites.