Why Applying Zero Trust Within Endpoints Means Greater Security with Less Effort