Adopt a zero-trust security model

It’s far, far better to be too suspicious than too lax when it comes to your security, especially when using company devices on personal networks while working remotely. A combination of a zero-trust approach (which flags anything not explicitly known not to be a threat) with a robust IT support system (to swiftly give and maintain authorization for new approved connections) is the best way to reduce threats.