It's 3:30 pm on a Friday and Maya needs to wrap up a project before starting her weekend.
She logs into a video call from her home office. Midway through the call, she has to jump in her car to pick up her son from school. Maya logs back into the call from her phone. While parked outside the school entrance, she logs into her email and checks her messages. Then she signs into her corporate VPN to upload a product launch plan filled with company-confidential details.
Maya finishes her workday by logging into her company's cloud project management platform to update the project's status and to see if anyone has commented on her plan.
Without the right safeguards, each of those connections – every login, every touchpoint – could leave Maya and her employer's network, data and apps vulnerable. Securing those communications, which touch multiple backend systems and cloud platforms, would be so much simpler if Maya were always in the office.
Yet the days of working only at company headquarters are over. Maya knows it. Her employer knows it. And perhaps more than anyone, bad actors know it.