Developing good DR plans

    We develop good DR plans and some of those plans will include a remote recovery site (hot or cold). How do we ensure that the remote site is protected like we would the main location? Discuss the challenges of maintaining information security at a remote recovery location. A substantive post will do at

error: Content is protected !!