What we can learn from the Facebook data breach

What to consider before implementing a BYOD policy