Identify methods for securing mobile devices

Identification should include methods for securing mobile devices and relevant examples.

Teacher Resources: