flagged
Remote Working10 February 2025 · 6 min read

Secure Remote Access: How to Connect to Work Systems Safely

Remote access to business systems is convenient — but if not secured properly, it's also a major vulnerability. Here's how to do it safely.


Being able to access your business systems from anywhere is one of the great advantages of modern technology. You can check a file on your office server from home, log into your accounting software from a client's site, or update a spreadsheet from your phone. It's genuinely useful.

It's also one of the most exploited vulnerabilities in Australian small businesses. Attackers actively scan the internet for exposed remote access tools, and when they find one that's poorly configured, they get in — often without being noticed for weeks or months.

Understanding how to enable remote access securely doesn't require a degree in IT. It does require knowing which tools are safe, which aren't, and what settings matter.

The Problem With Exposed Remote Access

Every day, automated scanning tools crawl the internet looking for common remote access ports and services. When they find an exposed Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC) server, they attempt to log in using stolen credential lists and brute-force password attacks. This is not a targeted attack against your specific business — it's automated, industrial, and constant.

The ASD's Annual Cyber Threat Report has repeatedly flagged exposed remote access services as one of the primary ways attackers gain initial access to Australian business networks. Small businesses are particularly affected because they often set up remote access quickly and without security guidance.

Remote Desktop Protocol (RDP): Use With Extreme Caution

RDP is Microsoft's built-in tool for remotely controlling a Windows computer. It's powerful and widely used — and widely attacked. If you have RDP enabled and exposed directly to the internet, you are at serious risk.

If you must use RDP:

  • Never expose it directly to the internet. Always place it behind a VPN — users must connect to the VPN first, then use RDP.
  • Change the default RDP port (3389) — this won't stop a determined attacker but reduces automated scanning hits.
  • Enable Network Level Authentication (NLA)
  • Use strong, unique passwords on all accounts that can use RDP
  • Enable MFA on the VPN
  • Restrict which accounts are allowed to use RDP

VPNs: The Gold Standard for Small Business Remote Access

A VPN (Virtual Private Network) creates an encrypted tunnel from the remote worker's device into your business network. Rather than exposing your internal systems directly to the internet, the VPN acts as a secure gateway. Only authenticated users with the right credentials (and ideally MFA) can get through.

For small businesses, options include:

  • Business VPN solutions built into platforms you may already use, such as Microsoft Azure VPN Gateway or the VPN included with Cisco Meraki networking equipment
  • Standalone business VPN products like NordLayer, Perimeter 81, or Cloudflare Access
  • Open-source solutions like WireGuard or OpenVPN for those with some technical capability

Whatever VPN you use, always enable multi-factor authentication (MFA) on login. A VPN with only a password is significantly weaker than one with MFA enabled.

Cloud-Based Remote Access: A Simpler Alternative

For many small businesses, moving away from on-premise servers entirely is the simplest and most secure path. If your files, email, and applications live in the cloud (Microsoft 365, Google Workspace, Xero, etc.), your staff can access them securely from anywhere through a web browser — with MFA enabled.

This eliminates the need for complex VPN or RDP setups and puts security management in the hands of enterprise-grade providers. If you're still running an on-premise file server that remote staff need to access, it's worth asking whether migrating those files to a cloud storage platform like SharePoint or OneDrive would simplify things.

Zero Trust: The Modern Approach

Traditional network security assumed that everything inside the network perimeter was safe. Zero trust flips this: it assumes that no device, user, or application should be trusted by default, regardless of where they are. Every access request must be verified.

In practice, zero trust for small businesses means:

  • Requiring MFA for every user on every application
  • Granting users access only to the specific systems and data they need (least privilege)
  • Regularly reviewing and revoking access for people who've left or changed roles
  • Using conditional access policies (available in Microsoft 365 and Google Workspace) that block login from unusual locations or devices

You don't need to implement a formal zero trust architecture to benefit from these principles. Start with MFA and least-privilege access, and build from there.

Remote Access Tools to Be Cautious About

Tools like TeamViewer, AnyDesk, and similar remote support applications are legitimate and useful — but they're also frequently abused in scams. Tech support scammers often pressure business owners into installing these tools to "fix" a non-existent problem, then use the access to steal data or install ransomware.

Best practices for remote support tools:

  • Only install them when you need them — remove or disable when not in use
  • Never allow access to someone who contacted you unsolicited
  • Use session logging so you have a record of what was accessed
  • Keep software updated and use strong authentication

Key Takeaways

  • Exposed remote access tools (especially RDP) are among the most commonly exploited vulnerabilities in Australian small businesses.
  • Never expose RDP or similar tools directly to the internet — always place them behind a VPN with MFA.
  • Cloud-based tools (Microsoft 365, Google Workspace) with MFA enabled often offer the simplest and most secure remote access path for small teams.
  • Zero trust principles — verify every access request, grant least-privilege access — are practical and achievable for small businesses.
  • Be cautious with remote support tools like TeamViewer; only use them when needed and never grant access to unsolicited callers.

Not sure whether your remote access setup is secure? Get a free cyber risk assessment at flagged.com.au — designed for Australian small businesses and takes under 10 minutes.

Tags

remote accessVPNRDPzero trustsmall businessAustralia