One of the many guidelines in mitigating APT attack via spear phishing is the implementation of a
well-defined security policy that clearly specifies and dictates the users’ responsibilities and rights within
BYOD environment, in order to achieve a proper balance between the privacy aspect of mobile device
users and the security aspect of the corporate data.