The first impact of mobile devices is the making of cyber security a complex venture with regards to the development and enforcement of effective strategies. These devices are brought into and out of workplaces regularly with managers finding it hard to impose restrictions on their use. In fact, a majority of modern-day employees prefer working from their personal mobile devices, a trend referred to as “bring your own device” or BYOD by Drew (2012, 44). This model allows such employees to connect to their corporation’s networks. Despite this having a myriad of benefits, the lack of control over these devices used for work poses serious cybersecurity threat. According to Metzler, management of such devices owned by employees is complex “because it is much more difficult to maintain standardization… and to install software and agents designed to lock them down” (2011, 12). In fact, their small sizes could make them unnoticed, giving attackers the opportunity to execute their intentions. This could be the reason that caused the US Department of Defense not to notice the 14,000 handsets used without appropriate authorization in the military. If the military faces such challenges with mobile devices, the private sector faces an even greater challenge. Mobile applications, also known as apps, have been used to access and record personal information fed and stored in these mobile devices such as passwords and personal identification numbers, PINs which are relayed to cybercriminals.