Only allow somebody you know to remote into your computer. There are a lot of scams out there with people pretending to be from Microsoft or some other company telling you they have been "Notified" that your computer is infected with a virus or some other issue. They will tell you they can fix it for you and ask to remote in. At that point they have access to do anything they want to your computer including infect it, steal your data, or install malicious applications used for identity theft.
By having our own in-house remote support solution that is secure, and independent of any remote servers, you can trust that your remote traffic is only travelling through our own dedicated server. This makes our self-hosted solution suitable for HIPPA and PCI compliance.
Our Relay service is responsible for handling traffic to and from the remote server. All traffic is automatically encrypted with AES-256 block encryption and RSA provided by the Microsoft RSA/Schannel Cryptographic Provider. These particular implementations of the AES-256 and RSA algorithms have been designated as FIPS compliant for out remote servers on Windows. For more information, see Microsoft's documentation on FIPS 140 Validation. FIPS Compliance. The Federal Information Processing Standard 140-1 (FIPS 140-1) and its successor FIPS 140-2 are United States Government standards that provide a benchmark for implementing cryptographic software.