Most businesses don't enforce mobile security policy.

"One policy that IT departments should be implementing is remote management capabilities that can help in case a device is lost or stolen... For example, synchronizing the device with back-end servers can ensure that data stored on the device isn’t lost. Enterprises can also implement remote wipe or kill features that delete data or make devices unusable if they are lost or stolen."