Remote Work
How small businesses can get remote-work IT right
Remote and hybrid work are the new normal. Here's what good remote-work IT looks like for a small business — identity, access, devices, data, and the habits that make it work.
By Greg Douglas Published 8 min read
Updated
For most small businesses, remote and hybrid work aren’t a pivot anymore — they’re just work. The question isn’t “should we support people working from anywhere?” It’s “how do we make the technology quietly good, so the business doesn’t lose a step?”
That’s a different kind of question. And the answer isn’t buying one big product. It’s a short list of decisions — about identity, access, devices, data, and a few cultural habits — that together make distributed work feel as solid as working from an office did.
This guide is written for the owner or operations lead. It’s based on current guidance from NIST SP 800-46 (Guide to Enterprise Telework, Remote Access, and BYOD Security) and CISA’s telework resources, plus what we see working in practice.
Start with identity, not devices
The instinct when someone goes remote is to reach for the device — issue a laptop, set up a VPN. That’s the old model. It still has a place, but it’s no longer the foundation.
The foundation is identity — who is this person, how do they prove it, and what are they allowed to reach? Once identity is the gatekeeper, the device question becomes much smaller. A person with a verified identity on a well-managed device can work from anywhere. A stolen laptop with no identity controls is just a stolen laptop.
Practical implications:
- Your Microsoft 365 or Google Workspace tenant is now doing the work a VPN used to do. Treat the admin portal as security-critical.
- Single sign-on (SSO) across your core business apps is no longer a nice-to-have. It’s how you make security enforceable without making work painful.
- Multi-factor authentication — especially phishing-resistant forms like passkeys — becomes the most consequential control you operate. We covered the full picture in our password management deep-dive.
If identity is solid, everything else gets easier. If it isn’t, nothing else quite works.
Access: three things that matter
The old remote-work model ran on VPNs — “dial in, and you’re inside the office network.” That model is still valid, but it’s no longer the best fit for most small businesses, because the “office network” has largely moved to SaaS apps that are accessible directly.
The access model we see working for small businesses centers on three things:
- MFA on everything that touches business data. Email, file storage, CRM, accounting, banking, admin portals, the password manager itself. Microsoft has repeatedly reported MFA blocks more than 99% of automated account-compromise attacks. There’s no legitimate reason to skip it on a remote-first business.
- No direct internet exposure of admin interfaces. RDP (Remote Desktop), VPN appliances, or NAS management portals reachable from the public internet are consistently one of the top entry paths for ransomware — a pattern CISA’s #StopRansomware guidance calls out repeatedly. If you’re running any of these, put them behind a zero-trust access layer (Cloudflare Access, Tailscale, Twingate) or a modern VPN with MFA. The era of “RDP straight from the internet” is over.
- Conditional access policies. Modern business subscriptions let you say things like “allow sign-ins from the US only; require MFA from new locations; block legacy authentication protocols entirely.” These used to be enterprise features. They’re now part of Microsoft 365 Business Premium and Google Workspace Enterprise plans. Turn them on.
The goal isn’t maximum friction. It’s making the right thing — signing in from a trusted device with verified identity — be the easy path, and the wrong thing be actually hard.
Devices: managed or BYOD, pick on purpose
Every remote business is running one of three models, whether intentionally or by accident:
- Company-issued, company-managed — laptops you bought, enrolled in Intune or Jamf (Apple) or a similar mobile device management (MDM) tool, and keep current
- BYOD with MDM — people bring their own device, but it’s enrolled in your management so you can enforce basic security (disk encryption, screen lock, OS up-to-date) and remote-wipe business data if needed
- BYOD with no visibility — people use whatever they have, you hope for the best
The third model is common and understandable — it’s free — but it removes nearly every meaningful control from your hands. If a laptop running three OS versions behind is accessing customer data over unmanaged email, your security program is largely aspirational.
Our practical advice for small businesses:
- For the handful of roles with privileged access (owner, finance, IT), use company-issued managed devices. No exceptions.
- For everyone else, either issue managed devices or adopt a lightweight MDM for BYOD (Intune Essentials, Jamf Now, Kandji) that enforces minimum hygiene without being heavy-handed.
- Make the choice on purpose, and document it. “We chose BYOD with MDM because X” is a defensible position; “we never decided” is not.
Data: plan for the mistakes that will happen
The central data question in remote work isn’t “how do we prevent all mistakes?” — it’s “what happens when someone leaves a laptop in a coffee shop, or loses a phone on a plane?”
- Encryption at rest on every device. BitLocker on Windows, FileVault on macOS, device encryption on iOS/Android. Not optional — verifiable via your MDM.
- Cloud-first file storage (SharePoint/OneDrive, Google Drive, Dropbox Business) — so that no critical data lives only on a local hard drive. When a device is lost, the data isn’t.
- Sharing controls you’ve actually configured. Default link-sharing settings matter a lot. “Anyone with the link” should be deliberate, not accidental.
- External sharing labels or data-loss-prevention rules on anything genuinely sensitive — customer PII, financials, trade secrets. These are simpler to configure than they used to be.
- Backups that include cloud data. Microsoft 365 and Google Workspace are reliable, but they’re not a backup — they have limited version history and can’t protect you from accidental-deletion-then-permanently-lost. Third-party backup for cloud data (Dropsuite, SkyKick, Afi, etc.) fills that gap.
Collaboration tools are only half the story
Zoom, Slack, Microsoft Teams, Google Meet — the tooling is largely a commodity now, and most of it works. The harder work is the culture around the tools.
A few patterns we see distinguishing remote-strong small businesses from remote-struggling ones:
- Default to async when possible. Slack/Teams threads beat meetings for anything that doesn’t require real-time thinking. Write more, meet less.
- Meeting hygiene matters more remotely. Cameras on for real discussions; clear agenda; someone owns note-taking; decisions captured somewhere searchable.
- Visible work. When nobody’s walking past your desk, your work needs to be legible in the systems: tickets updated, project boards current, decisions written down.
- Onboarding takes deliberate effort. A new hire can’t absorb culture by osmosis in a remote business. That means structured first-week plans, buddy pairings, intentional coffee chats. The businesses that skip this tend to see early attrition.
These aren’t technology decisions; they’re operating decisions. But they rise or fall on whether your identity, access, and device choices support or fight them.
Onboarding and offboarding when nobody’s in the office
Physical access used to do a lot of work here — badges, keys, clearing out a desk. With distributed teams, that work moves entirely to the digital side, and it’s easy to miss steps.
Onboarding checklist (do these before day one):
- Create the identity (SSO / M365 / Workspace) with the right group memberships
- Ship or enroll the device, with encryption and MDM already in place
- Enroll in the password manager, with appropriate vault access
- Enable MFA on first login (not “eventually”)
- Set up access to the core apps — and only those — they need for their role
- Schedule the real-world onboarding rhythms (buddy, week-one plan, first-month check-ins)
Offboarding checklist (do these the day access ends):
- Disable the identity in SSO — not delete, disable (preserves records, revokes access)
- Revoke active sessions across email, collaboration, and admin tools
- Transfer ownership of files, mailboxes, and password-manager vaults
- Rotate any shared credentials or API keys the person had access to
- Retrieve or remote-wipe the device
- Disable any physical access that remained (office door codes, cloud storage keys, etc.)
The offboarding checklist, consistently applied, closes one of the most common small-business security gaps we see.
Security basics don’t change because of location
Everything that’s true about small-business cybersecurity in general is still true when people work remotely — the location just raises the stakes on some parts.
If you haven’t yet mapped out the foundational cybersecurity picture, our cornerstone guide — where small businesses should actually start with cybersecurity — covers the five controls that cover most of the risk. Our companion piece on ransomware protection is especially relevant for distributed businesses, since exposed remote-access services are a major ransomware entry path. And if you want to be ready for the day something goes wrong, our free one-page incident response plan template is designed to keep a small business functional through a bad day — wherever the team happens to be working from.
The short version
Good remote-work IT for a small business isn’t a product. It’s a set of decisions, made on purpose, about identity, access, devices, data, and the culture that ties them together. The technology to do all of it is within reach for a business of any size. What separates businesses that thrive remotely from the ones that limp along is whether those decisions were made deliberately — or whether they accumulated by accident.
If that sounds like work you’d rather not do alone, a free discovery call is the best way to talk through your specific situation. If remote-work IT is already largely sorted at your business, great — go build what you’re building. If it isn’t, that’s fixable, and the foundation is more approachable than most vendors want you to believe.
Keep reading
-
AI
AI for small business: where it actually helps (and where it doesn't yet)
AI for small businesses in 2026 — what's producing real results today, what isn't ready for business-critical work yet, and the practical starting points worth your attention.
-
CRM
How small businesses choose a CRM that actually gets used
Most small businesses buy a CRM and quietly stop using it. Here's how to pick one that fits your business, build the adoption habits that stick, and get real revenue results from it.
-
Marketing Automation
Marketing automation for small businesses: honest tier sizing
Most small businesses get pitched Enterprise marketing automation when they need a $30-a-month tool. Here's how to size marketing automation to where your business actually is.