Anatomy of an Enterprise Mobile Security Incident