Back to Blog

How to Set Up Remote Access Without Compromising Security

How to Set Up Remote Access Without Compromising Security

Remote working has become a permanent fixture of UK business life. According to the Office for National Statistics, over 44% of workers in the United Kingdom now work from home at least part of the time, and businesses of every size must provide secure remote access to their systems, files, and applications. The challenge is enabling this access without creating security vulnerabilities that cyber criminals can exploit.

This guide walks you through the key technologies and strategies for establishing remote access that is both user-friendly and secure — from VPN solutions and Microsoft Entra ID (formerly Azure Active Directory) to zero trust architectures and endpoint protection. Whether you are a 10-person firm in Bristol or a 500-seat organisation in Leeds, these principles apply. At Cloudswitched, we help UK businesses implement remote access solutions that protect their data without hampering productivity.

44%
Of UK workers now work remotely at least part of the time (ONS 2024)
62%
Of UK data breaches involve compromised remote access credentials (NCSC)
£4,200
Average cost of a cyber breach for a UK small business (DCMS Survey)
99.9%
Of automated credential attacks blocked by multi-factor authentication

Understanding the Remote Access Landscape

Before diving into specific technologies, it is important to understand the different types of remote access and their respective use cases. The right approach depends on your infrastructure, the applications your staff need to reach, and your risk tolerance.

There are several fundamental approaches to providing remote access, each with distinct characteristics. Full tunnel VPN creates a secure, encrypted connection from the user's device to your corporate network, routing all traffic through your infrastructure. Split tunnel VPN does the same but only routes corporate traffic through the tunnel, allowing personal traffic to go directly to the internet. Remote Desktop Protocol (RDP) allows users to connect to and control a specific desktop or server remotely. Virtual Desktop Infrastructure (VDI) provides each user with their own virtual desktop hosted centrally. Cloud-based access eliminates the need for traditional VPN by providing direct access to cloud-hosted applications through identity-based controls.

Each of these methods carries different security implications, and many organisations use a combination depending on the use case. The trend across the UK is firmly towards identity-centric, cloud-based approaches — but VPN remains essential for businesses with significant on-premise infrastructure.

Traditional VPN Approach

Network-level access via encrypted tunnel
Technology maturityEstablished and well understood
Infrastructure fitOn-premise servers and applications
Access scopeBroad network-level access once connected
PerformanceCan be slower — all traffic routes via HQ
Attack surfaceLarger — full network exposure when connected
Client requirementVPN client software needed on each device
Best suited forOrganisations with on-premise infrastructure

Zero Trust / Cloud-Based Approach

Identity-centric access with continuous verification
Technology maturityModern and rapidly evolving
Infrastructure fitCloud services and SaaS applications
Access scopeGranular application-level access only
PerformanceGenerally faster — direct cloud connections
Attack surfaceSmaller — no broad network access granted
Client requirementOften browser-based with no client needed
Best suited forCloud-first organisations using Microsoft 365

VPN Solutions for UK Businesses

Virtual Private Networks remain the most common method of providing remote access, particularly for organisations that still have significant on-premise infrastructure. However, not all VPN solutions are created equal, and choosing the right one matters for both security and user experience.

A site-to-site VPN creates a permanent, encrypted tunnel between two locations — for example, between your main office in London and a branch office in Manchester. This is transparent to users; they simply connect to their local network and can access resources at the remote site as though they were there. Site-to-site VPNs are typically implemented on firewalls or dedicated VPN appliances and use protocols such as IPsec or WireGuard. Cisco Meraki Auto VPN makes this particularly straightforward for organisations using the Meraki ecosystem, establishing tunnels between sites with minimal manual configuration.

A client-to-site VPN is what most people think of when they hear the term VPN. Each user installs a VPN client on their device, which creates an encrypted tunnel back to the corporate network when activated. This gives the remote user access to network resources as though they were physically in the office. Popular enterprise VPN solutions include Cisco AnyConnect, Fortinet FortiClient, Palo Alto GlobalProtect, and the built-in VPN capabilities of firewalls from vendors such as SonicWall and WatchGuard. For smaller organisations, WireGuard offers an excellent open-source alternative that is fast, lightweight, and increasingly well-supported.

VPN Split Tunnelling — Use with Caution

Split tunnelling improves performance by routing only corporate traffic through the VPN, but it also means the user's device is simultaneously connected to both your corporate network and the public internet. If the device is compromised, this creates a bridge that an attacker could use to reach your internal network. If you enable split tunnelling, ensure robust endpoint protection is in place on all devices and consider implementing DNS-based security filtering for direct internet traffic.

Microsoft Always On VPN is an excellent option for organisations running Windows 10 or 11 Enterprise. It replaces the older DirectAccess technology and provides an automatic VPN connection whenever the device detects it is not on the corporate network. Users do not need to manually connect — the VPN establishes itself transparently in the background. This is particularly useful for ensuring that Group Policy updates, security patches, and management tools can always reach the device, regardless of where the user is working.

Microsoft Entra ID and Conditional Access

For organisations using Microsoft 365, Microsoft Entra ID (formerly Azure Active Directory) is the cornerstone of secure remote access. Entra ID provides identity and access management that goes far beyond simple username-and-password authentication. It is the gateway through which all access to Microsoft 365 services — Exchange Online, SharePoint, Teams, OneDrive — is controlled, and it can extend that control to thousands of third-party SaaS applications as well.

Conditional Access is one of the most powerful security tools available to Microsoft 365 administrators. It allows you to create policies that evaluate the context of each sign-in attempt — who is trying to access what, from where, on what device, and at what risk level — and make access decisions accordingly.

Condition Action Example Scenario
Managed device + corporate network Allow access Staff member in the office on their work laptop
Managed device + home network Require MFA Staff member working from home on work laptop
Personal device + any network Require MFA + app restrictions Staff checking email on personal phone
Any device + high-risk location Block access Sign-in from a country with no business presence
Any device + risky sign-in detected Require password reset + MFA Impossible travel — London then Tokyo within an hour

Conditional Access requires Microsoft Entra ID P1 licensing, which is included in Microsoft 365 Business Premium. The more advanced risk-based policies require P2 licensing. For most UK SMEs, Business Premium provides the right balance of cost and capability, bundling Conditional Access with Intune device management, Defender for Business, and Azure Information Protection.

Multi-Factor Authentication

If you take only one action from this entire guide, it should be implementing MFA across all remote access points. Multi-factor authentication is the single most effective defence against credential-based attacks, blocking over 99.9% of automated attacks according to Microsoft. The NCSC strongly recommends MFA for all UK organisations, and it is a mandatory requirement under the Cyber Essentials scheme when accessing cloud services and administrator accounts.

Not all MFA methods provide the same level of security. The NCSC recommends using the strongest method that is practical for your organisation and user base.

FIDO2 Security Keys (e.g. YubiKey)
Highest security — phishing resistant
Microsoft Authenticator (Number Matching)
Very high — resistant to MFA fatigue attacks
Authenticator Apps (TOTP Codes)
High — time-based one-time passwords
Push Notifications (Simple Approve)
Medium — vulnerable to MFA fatigue attacks
SMS One-Time Codes
Low — vulnerable to SIM swapping attacks
Move Away from SMS-Based MFA

The NCSC and Microsoft both recommend retiring SMS-based MFA wherever possible. SMS codes can be intercepted via SIM swapping attacks, SS7 network vulnerabilities, or social engineering of mobile network staff. If you currently rely on SMS codes, plan a migration to authenticator apps or FIDO2 security keys. For high-privilege accounts such as global administrators, FIDO2 keys should be considered the minimum standard.

The Zero Trust Approach

Zero trust is a security model that assumes no user, device, or network should be trusted by default — even if they are inside the corporate network perimeter. Instead, every access request is verified based on multiple signals before being granted. The core principle is straightforward: never trust, always verify.

For remote access, zero trust means moving away from the traditional model of connecting to a VPN and gaining access to everything, towards a model where access is granted to specific applications based on verified identity, device health, location, and risk level. This dramatically reduces the attack surface — even if an attacker compromises a user's credentials, they gain access only to the specific applications that user is authorised for, not the entire network.

Microsoft's zero trust stack integrates several technologies that work together. Microsoft Entra ID provides identity verification and conditional access. Microsoft Intune ensures device compliance and health. Microsoft Defender for Endpoint provides endpoint detection and response. Entra Application Proxy publishes on-premise web applications to remote users without requiring VPN. Microsoft Defender for Cloud Apps provides visibility and control over cloud application usage.

NCSC Zero Trust Guidance

The National Cyber Security Centre has published comprehensive guidance on zero trust architecture for UK organisations. Their key message is that zero trust is a journey, not a destination — you do not need to implement everything at once. Start with identity-based controls such as strong authentication and conditional access, then progressively add device health checks, application-level access controls, and continuous monitoring. Most UK SMEs can achieve meaningful zero trust improvements within their existing Microsoft 365 environment.

Securing Remote Desktop Protocol

RDP is one of the most commonly exploited protocols in cyber attacks. Exposing RDP directly to the internet is equivalent to leaving your front door wide open — automated scanning tools will find it within hours, and brute-force attacks will begin almost immediately. The NCSC explicitly advises against exposing RDP to the internet without additional protective measures.

If your organisation needs to provide RDP access, there are essential steps you must take. Never expose RDP (port 3389) directly to the internet. Instead, require users to connect via VPN first, then use RDP to reach internal resources. Alternatively, deploy a Remote Desktop Gateway, which acts as an intermediary, accepting HTTPS connections from the internet and proxying them to internal RDP servers. Enable Network Level Authentication (NLA), which requires users to authenticate before the RDP session is established. Implement account lockout policies to prevent brute-force attacks. Use strong, unique passwords and require MFA for all RDP connections. Limit RDP access to specific user accounts — not all domain users should have remote desktop access by default.

RDP and Ransomware — A Critical Risk

Exposed RDP endpoints are one of the most common initial access vectors used in ransomware attacks against UK businesses. The NCSC's annual threat reports consistently highlight RDP as a primary entry point. If you must provide RDP access, always place it behind a VPN or Remote Desktop Gateway, enforce MFA, and monitor connection logs for suspicious activity. Automated scanning tools operated by cyber criminals continuously probe the internet for open RDP ports — if yours is exposed, it will be found.

Endpoint Protection for Remote Devices

When devices leave the relative safety of the corporate network, they become more vulnerable to attack. Remote devices may connect to untrusted Wi-Fi networks, be used by family members, or be left unattended in public places. Robust endpoint protection is essential for any organisation enabling remote working.

The following controls should be considered essential for every device used to access corporate resources remotely.

Endpoint Detection and Response (EDR)Critical
Full Disk Encryption (BitLocker / FileVault)Critical
Mobile Device Management (Microsoft Intune)High
Automated Patch ManagementHigh
DNS-Based Security FilteringRecommended
USB and Peripheral ControlsRecommended

Every remote device should have up-to-date endpoint detection and response software, such as Microsoft Defender for Endpoint, CrowdStrike Falcon, or SentinelOne. The device should be encrypted using BitLocker (Windows) or FileVault (macOS) to protect data if the device is lost or stolen. A mobile device management solution such as Microsoft Intune should be deployed to enforce security policies, manage updates, and enable remote wipe if necessary.

Ensure all remote devices are kept up to date with security patches. Microsoft Intune or Windows Update for Business can automate this process, but it is important to monitor compliance and follow up on devices that fall behind. The Cyber Essentials scheme requires critical and high-severity patches to be applied within 14 days of release — a device that has not been patched in months represents a significant liability regardless of what other security measures are in place.

Monitoring and Incident Response

Implementing secure remote access is not a one-time project — it requires ongoing monitoring and the ability to respond quickly when something goes wrong. Your IT team or managed service provider should actively monitor all aspects of remote access, from sign-in activity to device compliance.

Monitoring Area What to Watch Recommended Tool
Sign-in activity Failed logins, unusual locations, impossible travel Entra ID Sign-in Logs
MFA status Users without MFA, registration anomalies Entra ID Authentication Methods
Device compliance Unpatched devices, missing encryption, policy gaps Microsoft Intune
Endpoint threats Malware detections, suspicious processes Defender for Endpoint
VPN connections Unusual connection times, high data transfers Firewall and VPN appliance logs
Cloud app usage Shadow IT, unapproved SaaS applications Defender for Cloud Apps

For smaller organisations without dedicated security teams, a managed detection and response (MDR) service can provide 24/7 monitoring at a fraction of the cost of building an in-house security operations centre. Tools such as Microsoft Sentinel, Entra ID sign-in logs, and Defender for Endpoint provide the telemetry needed to detect and respond to threats in real time.

Remote Access and Cyber Essentials Compliance

If your organisation holds or is pursuing Cyber Essentials certification — which is mandatory for many UK government contracts — your remote access setup must comply with the scheme's five technical controls. This has become particularly important since the scheme was updated to explicitly address remote and hybrid working scenarios.

Remote workers' devices are fully in scope for Cyber Essentials assessment. This means every laptop, desktop, tablet, and smartphone used to access company resources must meet the same security standards as office-based equipment. The device must have up-to-date anti-malware software, be fully patched within 14 days of critical updates, have host-based firewalls enabled, and be configured securely with unnecessary software removed. If employees use personal devices under a BYOD policy, those devices are equally in scope and must meet the same standards.

Home routers used by remote workers to connect to corporate resources are also in scope under the current Cyber Essentials requirements. Organisations must ensure that home routers have their default passwords changed and firmware updated, or alternatively use a VPN solution that creates a secure tunnel regardless of the home network's security posture.

GDPR and Remote Access Compliance

Remote access introduces additional UK GDPR considerations that organisations must address. When staff work from home, personal data may be processed on devices and networks that are outside your direct control. Under the UK GDPR and Data Protection Act 2018, you remain fully responsible for the security of personal data regardless of where it is processed.

You must ensure that data remains encrypted in transit via VPN or TLS, that remote devices meet your data protection standards, that staff understand their responsibilities for protecting data when working remotely, and that you have the ability to remotely wipe corporate data from devices if an employee leaves or a device is compromised. Your remote access policies should be documented in your GDPR records of processing activities, and any data protection impact assessments should be updated to reflect the risks associated with remote working.

ICO Guidance on Remote Working

The Information Commissioner's Office has published specific guidance on data protection and remote working, emphasising that organisations remain responsible for the security of personal data regardless of where it is processed. This includes ensuring home workers have secure environments, encrypted devices, and clear policies on handling sensitive information. Failing to protect personal data accessed remotely could result in ICO enforcement action and fines of up to £17.5 million or 4% of annual global turnover.

Building a Remote Access Policy

A documented remote access policy is essential for any UK organisation that permits staff to work outside the office. This policy should define who is authorised to work remotely and under what conditions, what devices may be used for remote access and the security standards they must meet, which applications and data can be accessed remotely and through which methods, the responsibilities of remote workers regarding physical security and data handling, the process for reporting lost or stolen devices, and the consequences of non-compliance with the policy.

This policy should be reviewed annually, communicated to all staff, and acknowledged by each employee as a condition of remote working. It forms part of your broader information security policy framework and supports both Cyber Essentials compliance and your GDPR accountability obligations.

Common Remote Access Security Mistakes

Based on our experience supporting UK businesses, these are the most common remote access security failures we encounter — and how to avoid them.

Mistake Risk Solution
Exposing RDP to the internet Ransomware, brute-force attacks, data theft Always place RDP behind VPN or Remote Desktop Gateway
No MFA on remote access Credential stuffing, phished passwords used directly Enforce MFA on all remote access points and cloud services
Unmanaged personal devices No visibility, no patching, no encryption Deploy Intune MDM or restrict access to managed devices only
No conditional access policies Stolen credentials work from any location or device Implement Entra ID conditional access with device and location checks
Outdated VPN appliance firmware Known vulnerabilities exploited by attackers Patch VPN appliances within 14 days of critical updates
No monitoring of remote sign-ins Compromised accounts go undetected for weeks Enable Entra ID sign-in monitoring and impossible travel alerts
Shared VPN credentials No accountability, no audit trail, broader compromise Issue unique credentials per user, enforce individual MFA

How Cloudswitched Supports Secure Remote Access

At Cloudswitched, we help UK businesses implement remote access solutions that balance security with usability. Our approach begins with understanding your specific requirements — your infrastructure, your applications, your risk profile, and your users — and designing a solution that fits.

Our services include VPN design and deployment using industry-leading platforms including Cisco Meraki, Fortinet, and Microsoft Always On VPN. We provide Microsoft Entra ID configuration including conditional access policies, MFA rollout, and identity protection. Our team handles endpoint management through Microsoft Intune for device compliance, automated patching, and remote wipe capability. We deliver zero trust implementations that progressively move your organisation towards application-level access controls. And we provide ongoing monitoring and support through our managed security services, giving you visibility and rapid response without the cost of an in-house security team.

24/7
Security monitoring and incident response for remote access infrastructure
Entra ID
Full Microsoft Entra ID and conditional access policy management
CE+
Remote access configurations aligned to Cyber Essentials Plus
UK-Based
London-based team supporting businesses across the United Kingdom

Need Help Securing Remote Access?

We help UK businesses implement secure remote access solutions that protect their data without hampering productivity. From VPN configuration to full zero trust deployments, our team can design and implement the right solution for your organisation.

GET IN TOUCH
Tags:Remote AccessSecurityNetwork Admin
CloudSwitched
CloudSwitched

Centrally located in London, Shoreditch, we offer a range of IT services and solutions to small/medium sized companies.