This video from Immunity shows how a mobile phone can be remotely exploited in order to gain access to the enterprise network and/or  steal the personal data stored in the phone itself.