Five steps to mobile device management and security