Do your mobile devices have the latest available security-related patches installed upon general release by the device manufacturer or carrier?
Do your mobile devices allow for remote validation to download the latest security patches by company IT personnel?
Does your BYOD policy clarify the systems and servers allowed for use or access on the BYOD-enabled device?
Does your BYOD policy specify the user roles that are allowed access via a BYOD-enabled device?
Do you have a policy that requires BYOD users to perform backups of specified corporate data?
Do you have a policy that requires BYOD users to prohibit the usage of unapproved application stores?
Do you have a policy that requires BYOD users to use anti-malware software (where supported)?
Does your IT provide remote wipe or corporate data wipe for all company-accepted BYOD devices?
Does your IT provide remote wipe or corporate data wipe for all company-assigned mobile devices?
Do you manage all changes to mobile device operating systems, patch levels, and applications via your company’s change management processes?