* What are the corporate mobile data assets that require protection?
* What, how and where the corporate data systems are accessed by mobile employees?
* How mobile devices are being used, protected and managed?
* Do employees know the procedures in responding to an incident?
To fully determine an organization's mobile security posture, a comprehensive security assessment against an organization's specific business environment is needed.