-- Security: Setting an appropriate level of password - protected and for employee - owned devices is one priority, but
establishing centralised access control could be a larger concern if authorised members of the IT
team ever need to wipe compromised devices
remotely