With remote users suddenly left to their own devices (literally), they may find themselves without the proper security options including: - proper firewalls - enhanced security applications - network monitoring - ongoing security awareness training Your business data...