BYOD: (B)rought (Y)our (O)wn (D)estruction?

Next story

The paper discusses BYOD aspects: Pros and cons, an overview of all kinds, the apps problem, potential attack vectors on BYOD and data leakage through, advice and implementing a device management model. Integrating Mobile Device Management (MDM) inside corporate IT management protocols is a must.