(Source: Infosecurity Magazine (blog)) That is, if you want BYOD, you need to accept some level of corporate control over the system. These are … Training of the system has historically been difficult.