Tethering, Security implications/privacy concerns, Enterprise Security Architecture