Run your own vpn, and only allow access to your services remotely if they are coming through that vpn.
Now you’ve shifted some of the security over to how secure your vpn server’s authentication is.
Run your own vpn, and only allow access to your services remotely if they are coming through that vpn.
Now you’ve shifted some of the security over to how secure your vpn server’s authentication is.