Systems, infrastructure, and sensitive information that were recentl viewed within the secure walls of oneโ€™s office is now being accessed through insecure connections and unsafe laptops from oneโ€™s home.
Today, the reliance on applications such as web proxy, remote conferencing, VPNs, etc. are at an all-time high which is yet another reason for threat actors to work overtime to exploit vulnerabilities.