What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)