What IT security lessons can teenagers teach the enterprise?

(Source:IT PRO-)
It’s all tied into the whole Bring Your Own Device (BYOD) problem, of course, and how to control what data is allowed where, who can access it and when.