Essential Security Considerations Before Choosing a Technology for Mobile A