Summary
Under a Zero Trust security model, every user, device and network are assumed to be hostile until they can be validated and are continuously authenticated to prevent a security lapse. Remote workers can apply the Zero Trust concept of assuming everything is a potential attack or avenue to compromise until they can verify that it is not. This white paper serves as a starting point for remote workers to take some simple steps to improve their security posture when working remotely.