"???That way, if a guest wants to access their email or other resources, they can do so without increasing the risk to the company???s IT systems." . . . .