For businesses, deciding what devices to support and having clear, enforceable policies for those devices is key. That means understanding what your company’s goal is from a security management perspective. Best practices include having the ability to wipe a device remotely, as well as policies around encryption and passwords. Education for end users is also important. For example, security experts advise mobile users pay attention to the privacy permissions applications ask for on their Android phones, and have noted that jailbreaking iPhones can increase the potential threat level because it circumvents Apple’s security approach.