HOW DO WE SECURE BYOD?

HOW DO WE SECURE BYOD?