We often find ourselves logging onto client systems and researching a question or resolving an issue as if we were physically on site.  We do this in full view of our customers.  This is important as it is their data and their business we are looking at and, possibly, changing.  We want our customers to watch, so they are fully aware of what was done.

We have deliberately chosen remote connection technology which requires client transparency and, indeed, approval of our connection to their business – every time.  This is vitally important to us and to our clients.

We hear stories of businesses finding system settings or data changed without their knowledge or approval.  We don’t do this.  We can’t do this with how our systems are setup.  This provides our customers with certainty and comfort.

The risk of an easy and or open connection is that it could be abused by the IT company.  They could log in and damage the business in some way without leaving a trail.  They could, for example, cause problems which force the user to call the IT company’s help desk, thereby generating reliance on and revenue for them.  This is one of the risks of unsecure remote connections.

Businesses need to ensure that their IT infrastructure is secure, especially if their relationship with those who established or controlled their IT platform is not as strong as it once was.