Watch this video on YouTube
Tom, a cybersecurity analyst, is working for a company that has recently switched to remote work. Employees need a secure way to access the company's internal resources from their homes. What should Tom recommend?