Because mobile devices use wireless connections, the authorization credentials and message data transmitted between phones and servers are vulnerable and can be intercepted by third parties. It is recommended that mobile devices always be configured with encrypted connections. Encrypted wireless is less vulnerable to eavesdroppers and provides a necessary layer of defense using mobile networks and third party wireless hotspots.