How zero trust architectures can fortify Australia’s cyber landscape Remote access technology creates risks and can exacerbate existing vulnerabilities.