Best practices for managing the security of BYOD smartphones and tablets