Textbook : Introduction to Computer Networks and Cybersecurity
Most teleworkers use remote access technologies to interface with an organizations non-public computing resources. Identify the security risks to the organization that accompany this remote access.
What steps can an organization take to protect against risks from remote access. List two security risks and mitigations.