When looking to write up a bring your own device policy, organizations need to make sure they are keeping security policies in place and making sure everything is as safe as possible. Bill Ho wrote on ZDNet that the main security challenge lies in the dual nature of mobile devices, as they can cause some serious damage if they are stolen or misplaced.

"Consider mobile device management software that can provide secure client applications like email and web browsers, over the air device application distribution, configuration, monitoring, and remote wipe capability," Ho wrote on the website. "Note that some providers require applications to be re-written specifically to support their platform, so you may find some of your applications will not run in the solution you pick."

Other tips for securing a BYOD policy, according to Ho, include:
- Reviewing security policies to make sure they are up to date
- Set expectations for the program from right off the bat
- Determine which apps are off limits and which should have limitations
- Always train employees for the security best practices

CIO.com pointed out another important step, which is that companies must specify which devices will be permitted to use under a bring your own device policy. If a security system cannot control one kind of device, a company may want to ban its use.