Experts share six secure remote access best practices for the protection of cyber-physical systems; visibility is the linchpin.