Smartphones and tablets ease everyday work. But such mobile technologies open up gateways for offenders to intrude into corporate IT. Yet clear rules for mobile communications for all employees, protective software and sophisticated encryption can stop invaders. Of course, all security upgrades imply investments. “But this is only a small fraction of the cost for devices and connections – and definitely a rewarding investment considering the importance of corporate data,” says Claus Heerlein from Arthur D. Little.