When employees have the opportunity to work remotely or in a hybrid arrangement, they take it. As a result, endpoints such as laptops, phones, and other devices, can be located from anywhere in the world as potential points of enterprise vulnerability. Oftentimes, device security standards are not up to date. And as organizations increasingly…