Great article. It is eye-opening to realize the number of different mobile security threats that have developed. The data leakage portion of the article highlights the importance of looking at the types of software that are added to employee mobile phones.
Thank you for the summary. An example for social engineering: while using a popular business contact application, a user poses as a recruiter and asks to contact you privately over email. By looking at the "recruiters" work history and number of contacts, you can ascertain if they are real or if this is a phishing attack. Unfortunately in cases where people are looking for jobs, they might not thoroughly review the background of the requester.