A majority of organizations globally are implementing Zero Trust architecture/strategies. The model assumes there is no implicit trust granted to assets or user accounts based solely on their physical location. This is a response to an increase in work from home, remote users and bring your own device (BYOD) being more widely adopted.
While this strategy may improve some aspects of an organizations security posture it is important to keep it’s limitations in mind also. This is just one piece of mature cyber security model and while it may be helpful for mitigating some threats there are others that would not be addressed. For example, if an account for a remote user is compromised the threat actor would conceivably have access to all the resources associated with that account if other measures are not in place, such as flagging successful logins that require impossible travel or originate from unapproved geolocations.
More info below!