We develop good DR plans and some of those plans will include a remote recovery site (hot or cold). How do we ensure that the remote site is protected like we would the main location? Discuss the challenges of maintaining information security at a remote recovery location.