5 Steps for Stopping Mobile Threats Before Damage Is Done