After the decision has been made to incorporate mobile computing into an organization’s IT infrastructure, the new security risks related to this implementation must be properly addressed. The two primary technologies that are being used by the majority of companies as well as CPA firms to alleviate the risks associated with mobile computing includes automated wireless security management systems (WSMS) for larger organizations, and thin computing for smaller organizations. From an organizational standpoint, “the primary benefit of automated WSMSs and thin computing is the ability to consistently enforce security controls at the point of use (Aldhizer 60).” The implementation costs associated with these two technologies can vary greatly, with the implementation of an automated WSMS involving the purchase of expensive software, while thin computing is a much more cost-effective solution. There are a number of reasons as to why thin computing is considered to be such a cost-effective solution. These reasons include the fact that “thin mobile devices have little or no operating systems, they cannot store data, and the devices generally only have enough computing power to access the internal network where the applications and data needed by remote users are stored (Aldhizer 60).” Another benefit of thin computing is that all of the associated applications and data are stored on a central server controlled by the organization. Additionally, smaller organizations can benefit from the use of thin computing due to the fact that thin computing devices crash less frequently and linking them to internal networks is generally considered to be less complex. While thin computing is better suited to smaller organizations, larger organizations should consider implementing automated WSMS systems due to the fact that they can be customized to fit the unique needs of the organization. The initial steps for the implementation of an automated WSMS system involve the organization conducting a feasibility study, which is immediately followed by management rallying key stakeholders in order to reach a consensus concerning the most sensitive data that needs to be protected. One of the primary benefits of an automated WSMS is that “if a user is in the process of violating the organization’s security policy, the WSMS can automatically shut down the procedure and send an alert to management for immediate investigation (Aldhizer 60).”