Personal computing devices (smart watches, smartphones, tablets, convertible laptops, and various other personal computing devices) are becoming a standard in today’s computing environment. Their size, portability, and increasing functionality are making the devices desirable in replacing traditional desktop devices or more frequently used for work related purposes. However, the portability offered by these devices can also increase security exposure to individuals and the organization.