INFO-60657Device Risks▪Data Storage▪Allow users to remove data from the organization▪Allow users to take pictures of sensitive areas▪Weak Passwords▪Users traditionally use weak passwords with mobiledevices▪If they have sensitive data on their device it is at risk▪Although you can centrally set password policies onsome devices it isn’t available to all mobile devices▪Often requires specific infrastructure components▪BES, Exchange, etc.