Security ArchitectureThe perils of blocking BYODGil FreidrichMarch 25, 2013IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.