(Source: CSO Australia) Since most strategies from a typical enterprise security procedure list (such as installing security patches, running latest OS, application whitelisting, etc.) apply to mobile, creating a separate mobile security strategy is not advisable. Instead, smart device security policies should be crafted to match the overarching security …