Decide on your mobiles policy, then choose the technology that allows that policy to be delivered says Sergio Galindo.
Mobile Application Management, with secure access and separation of work and personal use can establish employee trust in a company's BYOD policy says Alan Hartwell.
Paul Bonner advises companies merging to take the best security practice from each component company, and not impose the practices of the dominant player - or resistance is likely.
Having comprehensive cyber risk policies that are not followed can be as detrimental as not having a policy at all says Peter Given.Good who advises that good risk-insurance will demand appropriate procedures are both in place and implemented.
Privilege controls can work, but cannot cater for all eventualities, says Quocirca analyst Rob Bamforth.
The UK Information Commissioner's Office has issued guidelines to help data controllers secure work data held on employees' smartphones and tablets.