Systems, infrastructure, and sensitive information that were recentl viewed within the secure walls of oneโ€™s office is now being accessed through insecure connections and unsafe laptops from oneโ€™s home.