Best practices for securing mobile phones and laptops, including encryption, virtual private networks, and remote wiping.