A. Encrypt the devices
B. Enable installation of applications from unknown sources
C. Root the devices to install third-party security software
D. Only install applications from authorized stores
E. Access web stores to purchase applications
F. Disable location services