As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it