The document provides six tips for securing mobile devices in the workplace for midsize businesses in the era of bring your own device (BYOD). The tips are to 1) apply mobile device management software to gain control of employee devices, 2) rethink perimeter security strategies to accommodate different user types and assets, 3) classify data and user roles to identify critical information and restrictions, 4) identify important business information and start security efforts in controlled areas, 5) conduct functional exercises to determine secure access policies for different asset types, and 6) prepare for lost or stolen devices by enabling remote wiping and strong security practices.