Greg,
It depends on which remote access program you use. Just to test, download vnc (google realVNC, it's free). Do the standard setup. Forward or map a port from your router to the port that VNC uses, which I think is 5900. So if you can map a port, map, say 25999 (a random high-numbered port) from the outside to port 5900 on your home machine. Be sure to set up a vnc password, *and* make sure your firewall allows this port's traffic. You will have to make a special port exception in Windows firewall if you use windows firewall.
Then at work, install vnc, and then use the VNC viewer icon, and type in your *router* ip address--ie, the WAN ip address--followed by a :25999, ie, 64.25.141.109:2599
Now your work vnc viewer goes to the router ip via port 25999, which maps to 5900 on your home machine which is your vnc port (you can also change your vnc port if you like), and you're in.
This is still somewhat risky. While using a higher port reduces sniffing risks--as a lot of sniffers hit all ip addresses but only look for the first 1024 ports or so and don't bother wasting time sniffing all 65000 or so ports--this port is still sniffable. And if a hacker sees it listening, and then suspects it's wanting a vnc password, they could hit it with a brute force dictionary and get in. However, this would be time consuming and what would they hope to gain--you're not Citibank or the US Defense Dept.
So you're generally safe in knowing that anyone who's such a loser that would spend the time trying to hack all 65000 ports of any ip address out there must be living a life so densely filled with horrid misery that the minor hassle you have after being hacked is nothing compared with the brain-scraping hell of just one minute in the existence of this type of person.
--Jim