* Monday - Friday 9am to 6pm* Phone:207-744-0800
Please enter the code provided by your support specialist. If using Internet Explorer please hit "Run" to run the application. If using Chrome please click on the "Download App" then save.A box should appear at the bottom of your screen. Click on the arrow and select "Open"(User account control may pop up asking if you want to allow the application to make changes to your PC) Select Yes to any pop ups and you should be connected. We will then ask if it is ok for us to connect to you. If you are uncomfortable at any time you can close out of the session simply by clicking on the X in the top right corner.
Question: Is it safe to allow remote control of my computer?
Answer: Only allow somebody you know to remote into your computer. There are a lot of scams out there with people pretending to be from Microsoft or some other company telling you they have been "Notified" that your computer is infected with a virus or some other issue. They will tell you they can fix it for you and ask to remote in. At that point they have access to do anything they want to your computer including infect it, steal your data, or install malicious applications used for identity theft.
Question: How are you different from other remote support company’s?
Answer: By having our own in-house remote support solution that is secure, and independent of any remote servers, you can trust that your remote traffic is only travelling through our own dedicated server. This makes our self-hosted solution suitable for HIPPA and PCI compliance.
Question: Can anyone else see the remote session?
Answer: Our Relay service is responsible for handling traffic to and from the remote server. All traffic is automatically encrypted with AES-256 block encryption and RSA provided by the Microsoft RSA/Schannel Cryptographic Provider. These particular implementations of the AES-256 and RSA algorithms have been designated as FIPS compliant for out remote servers on Windows. For more information, see Microsoft's documentation on FIPS 140 Validation.
FIPS Compliance. The Federal Information Processing Standard 140-1 (FIPS 140-1) and its successor FIPS 140-2 are United States Government standards that provide a benchmark for implementing cryptographic software.