Mobile computing allows a user to take her office with her anywhere she goes, but it also gives thieves more of an opportunity to steal files and other sensitive information. This is accomplished by hacking a user's device or Internet access point. The latter is especially risky if the user is using a public Internet access point such as a wireless hot spot at a coffee shop.
Those who use mobile computing never have to worry about leaving anything behind when they go to a meeting or on a business trip. They can also get faxes and voicemails without going to the office. Using a virtual private network, or VPN, with mobile computing also allows users to share files and information with each other and remain connected, even when they are not in the same office.
The major disadvantage of mobile computing is circumvented by encrypting data and by using passwords, a secure Internet connection and a VPN. VPNs are heavily used by companies to allow employees to access company files, while keeping the data as secure and private as possible. This is because a VPN acts as a secure Internet tunnel on the information superhighway through which only certain users are allowed to drive.