Systems, infrastructure, and sensitive information that were recentl viewed within the secure walls of oneโs office is now being accessed through insecure connections and unsafe laptops from oneโs home.
Today, the reliance on applications such as web proxy, remote conferencing, VPNs, etc. are at an all-time high which is yet another reason for threat actors to work overtime to exploit vulnerabilities.