This document provides steps for organizations to better secure mobile devices. It begins by noting that over 75,000 mobile devices are left in London taxis each year, containing photos, documents, emails and more. It then lists the top 10 risks to mobile devices like loss, theft, malware and data interception. The document outlines a 5 step process to improve security: 1) Quantify the problem and risks, 2) Draft policies for device use, 3) Configure devices with security settings, 4) Encrypt data, and 5) Establish incident response plans as part of business continuity. It provides examples of specific policy rules and technical configuration options to better secure mobile devices.