Which two options are business-use trends that have surfaced in the last five years, prompting a need for nontraditional security methods? (Choose two.)
A. Substantial number of remote employees
B. Third-party applications
C. Partial URL and application blocking
D. BYOD
E. Wi-Fi connections
F. Web and email attacks