Problem
Your memo should address security practices which remote workers should be required to follow and technologies which they should use to protect the integrity of information and systems which they access remotely. These practices could include: using anti-virus applications, virtual private networks, restrictions on applications downloaded to mobile devices, use of mobile device management apps, remote wipe for lost devices, etc. Use information and security control families from previous weeks as well as those listed in this readings. You may also research best practices from Internet sources.