Protecting Sensitive Data During Remote Collaboration Share Secure-file-sharing Data-encryption Two-factor-authentication Virtual-private-networks-(VPNs) Remote-access-controls Password-management-tools Endpoint-protection Secure-video-conferencing Security-awareness-training Cloud-data-storage