Bring Your Own Device – The Security Hole in Everyone’s Pocket?

How should firms counter the security threats that the use of personal mobile devices creates?

How should firms counter the security threats that the use of personal mobile devices creates?