Here’s how to manage your remote worker’s device security