Why Enterprises Are Shifting To Data-Centric Security To Safeguard Remote Access