Enterprises may be able to detect anomalous traffic originating from mobile devices, which could indicate compromise.