Forming and implementing a bring your own device policy will always have certain levels of complexity involved, but it is essential to keep this down to a minimum in industries such as finance and accounting where sensitive information reigns supreme. Jeffrey Stark, audit partner at CPA and business advisory firm Sensiba San Filippo, is also a cyber risk expert and told AccountingWEB that a network security policy must be in place and well known by employees.

"Also, you need to look at the skill sets of the people who are supporting your network," he said. "Are you outsourcing data storage to those people? Do they understand the security risks, or are they just IT guys who are pretty good at troubleshooting issues? You really need to understand where you are at in the evolution of the technology you are using."

Some tips from Stark for good BYOD security include:
- Assess risks and identify weaknesses of a policy
- Establish criteria for authorized and unauthorized users
- Have backup system to keep essential files in possession of the organization

TechTarget said pre-breach prevention should be emphasized to the same degree as post-breach response to ensure that even if something does happen, it will be taken care of quickly. Mobile device management can be a valuable tool in ensuring this happens.