This is a really interesting article by my colleague, Dan Hedley, about protecting data when an employee accesses company information from their own device