http://www.zdnet.com/article/best-practices-for-managing-the-security-of-byod-phones-and-tablets/#ftag=RSSbaffb68