Mobile devices and cloud-based applications have expanded the attack surface and attacker access points across the network. How can you implement a layered approach to cybersecurity?