If businesses don't secure the data that they want to keep secure, that data won't be secure for long. The sad fact is that security is hard, and most people aren't good at it. Your business is probably full of people who are very good at lots of things, but can't operate their DVR. You can tell those people that they have to keep their devices secure, but that won't mean they have a clue how to do it. Perhaps you can expect more of your technical people, but not everyone can be a UNIX system administrator - which is exactly what you need to be if you're running iOS or Android. Today nearly everyone in your company carries around a supercomputer with powers that were science fictional not so long ago. The unavoidable reality is that when we talk about BYOD, we're really talking about BYOMSH -- Bring Your Own Massive Security Hole. This is a scary new world for those charged with IT security, and while they can try to pass the buck to their users, they'll inevitably be the ones to take the blame when the users make catastrophic mistakes. Instead of passing the buck, we need a new strategy. The flood of new devices will demand new levels of automation just to cope with the sheer number of machines that come and go on your network. Beyond that, we should strive towards a system architecture in which most of the work, including most of the security, takes place on servers rather than user devices. The smaller and simpler we can make the corporate footprint on the user's device, the less we'll have to administer, and the fewer points of failure that device will have. Fortunately, we're at a good moment in the history of computing for dealing with this situation. Cloud computing is the perfect paradigm for achieving these goals, and an aggressive embrace of the cloud paradigm, even for "internal" applications, is the best way to minimize corporate problems on the user's device. Stepping back a level, it appears that the whole notion of "internal" applications may be obsolete. Traditionally -- and starting long before the emergence of WiFi -- a secure internal network led to an attitude of relative trust for other machines on that network. But BYOD brings an endless parade of devices that may enter and leave your network many times per day, making the folly of trusting "local" machines apparent. Ultimately, no device should have a shortcut to your trust. The bottom line is that you need to secure your data and your servers, and treat all client machines with skepticism. If the user devices are secure, that's great, but you can't afford to assume that. We may even find ourselves giving up on general-purpose connection mechanisms, such as VPN's, in favor of application-specific ones, so that other applications can't piggyback on your authentication. Basically, the user's device should be viewed as a marvelous user interface, and nothing more. Any computation that can be done on your own servers should be done on your own servers. In the long run, your whole IT infrastructure should come to look like a cloud service -- or to be outsourced to one.