Remote Access & Connection

Your tools, your systems, your phones — all managed from our side. Here's exactly how we plug in.

Connected
on day one.
Securely.

Every business is set up differently. Some run entirely in the cloud. Others have on-site servers, shared drives, and desk phones. NCM admin.online works with what you already have — no need to change your infrastructure or IT setup to get started.

3Connection paths
48hrTypical setup time
100%Your systems, your data
YOUR BUSINESS NCM ADMIN CALL FORWARD VPN TUNNEL CLOUD ACCESS
How we connect

Three paths in.
All of them secure.

Your business might use one of these, or a combination. We'll work out the right setup after your discovery call — there's no one-size-fits-all, and no complicated IT project required.

01 📞
Call Forwarding
Phones & Communication

Your existing business number stays yours. Calls are routed to us based on rules you define — overflow, all calls, after-hours, or a custom schedule. Clients always reach a live, professional person.

  • Simultaneous ring — your phone rings first, we catch it if unanswered after X rings
  • Full forward — all calls route directly to NCM during agreed hours
  • Overflow only — we answer when your line is busy or unavailable
  • After-hours — calls forward to us outside your business hours automatically
  • Works with landlines, VoIP (RingCentral, Vonage, 8x8), and mobile numbers
  • No hardware changes needed — typically set up in under 30 minutes
02 🔒
VPN / Remote Access
On-Premise & Hybrid Systems

If your files, software, or systems live on a local server or internal network, we connect through a secure, encrypted VPN — either set up by your IT team or configured by us with your approval.

  • Your IT team provisions a VPN user account for NCM — standard practice, minimal overhead
  • If you don't have an IT department, we can help set up a site-to-site or client VPN (OpenVPN, WireGuard, or similar) on your router or server
  • Access is scoped to only the folders, drives, and applications you approve — nothing more
  • Works with Windows Server shares, NAS devices, practice management software, and most business applications
  • All sessions are logged, encrypted end-to-end, and disconnected when work is complete
  • Two-factor authentication on every login as standard
03 ☁️
Cloud User Access
Cloud-First Businesses

If your business runs on cloud tools — Google Workspace, Microsoft 365, a cloud CRM, or accounting software — getting started is as simple as adding NCM as a user with appropriate permissions.

  • Added as a named user to your Google Workspace or Microsoft 365 tenant with a role-appropriate licence
  • Invited as a team member to your CRM (HubSpot, Zoho, Salesforce, etc.) with defined access levels
  • Added to project management tools (Asana, Trello, Monday, ClickUp) as a collaborator
  • Shared access to cloud drives (Google Drive, OneDrive, Dropbox) with specific folder permissions
  • Connected to scheduling tools (Calendly, Acuity, Google Calendar) for live booking management
  • Access is reviewed and revoked instantly when the engagement ends — no residual risk
Call forwarding — in detail

Your number.
Our answer.

The most common question we get is: "How does call forwarding actually work?" Here's the exact flow — from the moment a client dials your number to the moment the call is resolved.

1
Client dials your number

Your existing business number — the one on your website, cards, and Google listing — rings as normal. Nothing changes for the caller.

2
Your phone rings first (if set to simultaneous ring)

If you're available and want to take certain calls yourself, your phone rings at the same time as ours. You pick up — we stand down. Simple.

Optional — some clients forward all calls directly to NCM during business hours.

3
If unanswered after agreed rings — call routes to NCM

After 3–5 rings with no answer, the call seamlessly forwards to our line. The caller hears a brief ring, not a dropped call or hold music.

4
We answer with your business name

"Good morning, [Your Business Name], this is [NCM]. How can I help you today?" — professional, warm, and exactly on brand.

5
Call handled, logged, and followed up

Enquiry captured, appointment booked, or message taken — all logged in your system. You receive a summary within minutes, or at end of day.

Urgent matters escalated to you immediately via text or your preferred channel.

6
After-hours? Voicemail transcribed and actioned

Calls outside your covered hours go to a professional voicemail. Messages are transcribed overnight and actioned first thing the next morning.

CLIENT 289-426-XXXX Your business number Your phone (rings first) no answer → NCM Line Answered live CALL HANDLED Booked / message taken Logged in your system Summary sent to you YOU NOTIFIED Text / email summary Urgent: immediate alert
Remote access — by setup type

Built around
your systems.

No two businesses are built the same. You might be cloud-native, hybrid, or running a mix of local software and shared servers. This table shows how NCM admin.online connects to each setup — and what's involved for you.

In every case, you stay in full control. Access is scoped, documented, and revocable at any time.

Setup type
How we connect
Best for
Cloud-first
Easiest setup
How we connect You add NCM as a named user in your existing cloud platforms — Google Workspace, Microsoft 365, your CRM, project tools, or accounting software. We log in with our own credentials. No IT involvement required. Setup typically takes under an hour.
Best for Businesses running Gmail, Google Drive, HubSpot, QuickBooks Online, Xero, Trello, Asana, Calendly, or any other cloud-based platform. The majority of small and medium businesses fall here.
IT-managed VPN
Your IT sets it up
How we connect Your IT department creates a VPN user account for NCM with defined access permissions — the same way they'd onboard any remote employee. We connect via the VPN client, authenticate with two-factor, and access only the agreed systems.
Best for Businesses with an existing IT department or managed service provider, internal servers, Windows domain environments, on-premise CRMs, practice management systems, or industry-specific software not available in the cloud.
We build the VPN
No IT dept needed
How we connect If you don't have an IT department, we can help configure a secure VPN on your existing router or a small dedicated device (using OpenVPN or WireGuard). This creates an encrypted tunnel directly to your network. We guide you through the one-time setup — no technical knowledge needed on your end.
Best for Owner-operated businesses or small teams who run some local software (QuickBooks Desktop, Sage, proprietary systems) but don't have a dedicated IT person. Common in trades, healthcare, legal, and retail businesses.
Remote desktop
Legacy & specialist apps
How we connect For software that can only run on a specific machine — or where a full VPN isn't practical — we can connect via secure remote desktop tools (Windows Remote Desktop, TeamViewer Business, or AnyDesk). Access is password-protected, session-logged, and limited to agreed times.
Best for Businesses with older or specialised software tied to a single workstation — proprietary industry tools, or where the owner has one main office computer we need to access occasionally.
Shared credentials
Simple & lightweight
How we connect For tools that don't offer individual logins, you'll share a password with us directly. You stay in control — if you ever need to cut off access, simply change the password.
Best for Social media accounts (Instagram), website builders (WordPress, Squarespace), email marketing tools (Mailchimp), and booking or scheduling platforms.
Security & trust

Your data stays
yours.

We treat your business information with the same care and discretion we'd expect for our own. Here's what that looks like in practice.

🔐
Scoped access only

We access only what's needed for agreed tasks — specific folders, tools, and calendars. No blanket admin access, ever.

🕐
Session logging

Remote sessions are time-logged and documented. You can request an activity summary at any time.

🔄
Instant revocation

When an engagement ends, all access is removed immediately. No residual access, no loose ends.

🛡️
Encrypted connections

All remote work is conducted over encrypted connections. We never access your systems over public or unsecured Wi-Fi.

Getting started

From first call to
fully connected.

The setup process is designed to be light on your time. Most businesses are up and running within 48 hours of agreeing to work together.

1
Discovery call

30 minutes. We learn how your business is structured, what tools you use, how your phones work, and what admin is currently taking up your time.

~30 minutes of your time

2
Access plan

We document exactly which systems NCM needs access to, the appropriate connection method for each, and what permissions are required. You approve it before anything is set up.

Delivered within 24 hours

3
Setup & test

Call forwarding configured. Cloud access granted. VPN connected if needed. We test every access point together to confirm everything works correctly before going live.

Typically 1–3 hours total

4
Live & running

From day one, calls are answered, tasks are handled, and your systems are actively managed. Weekly check-ins keep us aligned and let us adjust anything as your needs evolve.

Ongoing from day one

Why remote works

Presence without
the overhead.

The idea of a remote assistant having full access to your business systems can feel unfamiliar at first — but it's the same model used by accounting firms, legal support teams, IT providers, and marketing agencies every day. The technology is mature, the security practices are well-established, and the efficiency gains are significant.

What makes remote admin work isn't just the tools — it's the structure. Every access point is documented, every task is logged, and communication is proactive. You're never left wondering what's happening on your behalf.

Whether you're a sole trader with a Gmail account and a mobile number, or a growing team with a server room and a VoIP system, the connection method adapts to you. The result is the same: your admin is handled, your clients are looked after, and your time is yours again.

No desk, no equipment, no onboarding overhead — we start productive from day one
Access is tailored to tasks — you're never giving away more than what's needed
Scales up and down without the complexity of hiring or letting someone go
Every access point is documented and reversible — full control remains with you
Same professionalism and discretion as an in-house team member — without the fixed costs
Common questions

Things people ask
before getting started.

Do I need to change my phone number or phone system?

No. Your existing number and phone system stay exactly as they are. Call forwarding is configured on top of what you already have — a simple change in your phone settings or VoIP dashboard. Callers always dial your number.

What if I don't have an IT department or technical support?

That's very common. Most of our clients are small businesses without dedicated IT. For cloud tools, you just add us as a user — no technical knowledge needed. For VPN or remote desktop setups, we walk you through each step. It's simpler than you'd expect.

Can I limit what systems NCM has access to?

Absolutely — and we insist on it. Before any access is granted, we document exactly which systems and folders are needed. You approve the list. Access is scoped to only those areas. We never request broader access than the tasks require.

What happens to access if we stop working together?

All access is removed immediately when an engagement ends. Cloud user accounts are deleted or deactivated, VPN credentials are revoked, call forwarding is turned off, and any shared passwords are changed. No loose ends, no residual risk.

Is my business data safe when accessed remotely?

Yes. All remote work happens over encrypted connections.

How long does the setup take?

Most businesses are fully connected within 48 hours of agreeing to work together. Cloud-only setups can be live in under an hour. VPN configurations typically take a half-day, including testing. We won't go live until everything is confirmed working correctly.

Do you work with industry-specific software?

In most cases, yes. If your software can be accessed remotely — via VPN, remote desktop, or a web browser — we can work with it. This includes practice management systems, industry CRMs, and desktop accounting packages. We'll confirm compatibility during the discovery call.

What if I only need help with one thing — like just the phones?

That's completely fine. Some clients start with call handling only and expand over time. Others need a specific access setup for a particular project. We work with your scope, not a minimum package. Start where the pain is biggest.

See what we handle day to day

Calls. Calendar. Email.
Spreadsheets. Data entry.

Now you know how we connect — see exactly what NCM admin.online takes off your plate every single day.

See how it works →
Let's get you connected

Not sure which setup
fits your business?

We Flow, You Grow.

That's exactly what the discovery call is for. Tell us how your business runs and we'll map out the simplest, most secure way to get NCM admin.online working inside it — usually within 48 hours.

Call 289-426-5240 Send a message instead

289-426-5240  ·  Available Mon–Fri, 9am–5pm EST