But if your phone is more likely to pose a security threat, then we can impose tighter controls on network access such as longer passwords or shorter reauthentication times.
FORBES: BYOD: Dr. Jekyll Or Mr. Hyde?
2.
This can often lead to reauthentication.
BBC: Three questions for CTOs: Anthony Haywood, Idappcom