Many companies now allow employees to use their own devices for work email and other work-related functions. Allowing employees to “bring your own device,” or BYOD, provides companies with cost savings and employees with flexibility, but also presents serious cybersecurity challenges. This first article in our two-part series on designing cybersecure BYOD policies discusses BYOD risks and recommends strategies to reduce these risks, including employee training. Part two will discuss mobile device management tools and software as well as handling lost devices, outgoing employees and discovery. See “Strategies for Preventing and Handling Cybersecurity Threats from Employees” (Apr. 8, 2015).