Guide

Protect your business online

Remote access security best practice

Remote access is a growing need for many businesses. It allows mobile workers or remote staff to access office systems and processes from remote locations.

As it relies on using the internet to operate, it is essential that your remote access stays secure at all times. Otherwise, your network may become vulnerable and your business data exposed.

The risks to safety of remote access connections include:

  • eavesdropping – as information travels over the public internet
  • unauthorised access

Securing remote access

The following may help secure your remote access:

  • encrypting data to prevent theft
  • using strong firewall and security software
  • using two-tier authentication (eg first with a password and then with a token)
  • restricting access to unauthorised users
  • allowing access to legitimate users but limiting to the minimum services and functions required
  • reviewing server logs to monitor remote access and any unusual activity
  • deleting remote access privileges once they are not needed
  • testing system regularly for vulnerabilities
  • keeping firewall and remote access software patched and up-to-date

You may also choose to restrict the type of data that can be accessed remotely.

Virtual private network (VPN) software will give you a high level of encryption to access your network remotely. Read about VPNs and advanced computer network.