(Source: TechRepublic) SEE: Mobile device security: A guide for business leaders (Tech Pro Research) … due to security implications of connecting unauthorized devices to a network.