Remote Monitoring: Proactive Cyber Security Strategies