whether it’s in a wired or wireless environment or in the cloud. It’s about the policy elements of interaction. And it’s about your data, how it’s secured, and how it traverses inside all of those differentenvironments. All of these things must be taken into account when moving to BYOD – it really is a change in mindset. The cost of just one data breach can be staggering for an enterprise – PonemonInstitute estimates range anywhere from $1m to $58m. The cost is not just financial, either – damage to corporate reputation and loss of customers and market share are potential side effects of a high-profile data loss incident. As more employees become mobile workers and use multiple devices to access company assets and rely on collaborative applications to work with others while outside the traditional ‘four walls’ of the enterprise, the potential for data loss grows.Enterprises are steadily losing controlover who has access to their corporate network. And the simple fact that more employees are using mobile devices for work – and sometimes multiple devices – means that the potential for data loss due to theft or loss of a device is greater. “You can’t build rings of security around what you need to protect if you don’t know what those things are” Cybercriminals’ growing preference toward the use of low-volume, targetedattacks, such as spear-phishing campaigns to steal information from high-value