As mobile devices become primary tools for government and personal utility, their security is paramount. We provide technical guidance on securing mobile endpoints, managing application permissions, and mitigating risks associated with mobile connectivity