In these trying times of catastrophic business disruptions, IT teams around the world have heroically implemented remote access for millions of displaced employees. But the rules of engagement continue to change as workers’ personal and corporate devices intermingle, introducing an exponentially larger attack surface. Have you developed a long-term strategy for secure remote access?