To add to what @PhilipDAth has written, bear in mind that smartphones and tablets are now used for Office/Google applications, in addition to laptops. Indeed I wish it was easier to carry out some actions on phones that are second nature on laptops and workstations. Kids, being kids, will detect any obvious chinks in security and exploit them. In my experience, getting a handle on phones is difficult. I have to visit certain sites where one leaves phones, computers, tablets, USB sticks, writing pads etc. in a locker before leaving the entrance lobby, because the security guys can't keep on top of BYOD kit or any device that goes off-premises. Just remember STUXNET. And the target machines in that project were air-gapped. Sometimes one has to ask oneself "how paranoid do I want to be?" The answer is always "a bit". So its a judgement call 😎
... View more