That's where the zerotrust approach comes in. You must question any request for access to data or an application – regardless of where it is from …

This article was originally published here