- Disable remote access from the Internet, or turn it on only when necessary.
- Only use remote management applications that offer strong security controls.
- Use the most current version of a remote access product or service.
- Always change the system (or manufacturer) default passwords.
- Restrict remote access credentials only to third parties who need access.
- Enable data encryption and logging features.
- Implement a hardware-based firewall with advance security features.