In general, you should not have any open ports on the front of your router/firewall unless you're hosting a service...
(e.g. a Web site) on your local network that requires public access. Most small/home office routers come with a default policy that is configured to allow any outbound traffic and deny all inbound traffic. This is the desired policy, and I'd strongly recommend that you stick with it.
You mentioned a future requirement for remote desktop connections. If you do expose a remote management port, you should ensure that it's using a strongly encrypted connection or is tunneled through a virtual private network (VPN). If at all possible, you should also limit access to specific IP addresses, ones from which you expect inbound connections.
Dig Deeper on VPN security
Related Q&A from Mike Chapple
It's not possible to eradicate the risk of DoS attacks, but there are steps infosec pros can take to reduce their impact. Mike Chapple shares ... Continue Reading
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ... Continue Reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.