With remote workflows now commonplace, how can post-production security evolve to protect your networks and media from threats?