What can a malicious user do with a shared android tablet on a corporate network via connected to corp WIFI?

We are deploying android tablets with a shared pin for users in an office.
If the device was stolen or in the hands of a hacker, what can a hacker do on the network (realistically)?
Android does NOT have a command prompt so therefore would… Continue reading What can a malicious user do with a shared android tablet on a corporate network via connected to corp WIFI?