. . . . . "Businesses must also determine what devices and systems they can support including security requirements for hardware, apps and data." . .