In this remote work era we\u2019re living in, there are scammers who unfortunately use the remote tools we rely on maliciously. As IT departments support their organizations virtually, some of the biggest challenges they face involve security.\nIT teams must eliminate any potential opportunities for scammers to take malicious action against their remote users. For this reason it\u2019s essential that any IT remote support solution offers multiple layers of security.\nHere are some important ways to protect your business and end users from nefarious activity.\nBranding that End Users Can Trust\nTrust is an important aspect of security, which is why seemingly small features like the ability to add branding to make the product your own can be impactful.\nInstead of sending end users to an obscure support portal that may seem sketchy, adding your branding with your logo adds an extra layer of trust. This way people know they\u2019re in the right place to get help. In some cases, you have full control over the applet. You can customize the name and add your logo to the one-time executable that\u2019s downloaded after the employee enters the PIN code, so they can be confident they are getting support from the right people. End users see your branding and know that\u2019s where they\u2019re supposed to be.\nSelf-hosted PIN Page\nIf you don\u2019t want to direct your employees or customers to the solution provider\u2019s external\u00a0webpage,\u00a0look for\u00a0the option to embed that form on your website, with the ability\u00a0to\u00a0customize it with your company name and branding.\u00a0Again, users know they\u2019re in the right place.\n LogMeIn\nExample of a public-facing, self-hosted PIN page.\nOn top of that, consider adding a few extra security layers:\n\nCompany PIN Code Validation\n\nThis means only PINs generated from your own support account will be accepted. If someone malicious tries to trick your employee or customer into a support session on your webpage, their PIN code won\u2019t work.\nYou can take that one step further and lock your PIN codes so they are only accepted on one site. If a user accidentally goes to the solution provider\u2019s URL or another site, your PIN code won\u2019t work. Users will be redirected to the correct page for valid support.\n\nDomain Validation\n\nThis feature prevents HTML scraping. Let\u2019s say a scammer wanted to try steal the HTML on your custom PIN page to set up a \u201cdummy\u201d page. With domain validation, the PIN entry\/channel form HTML snippet will be validated against the domain(s) entered within the admin center. The company PIN codes and\/or channel entry form will not be accepted or function on that malicious actor\u2019s page. This provides a layer of protection against phishing attempts that try and obtain information about your users without interacting with them directly.\nIP Restrictions\nWhen your technicians are remote,\u00a0as many are right now,\u00a0you want to ensure they\u2019re adhering to company policies and accessing your tools where they should be accessing them, whether\u00a0that\u2019s\u00a0on your VPN or\u00a0from\u00a0other company-designated equipment.\n LogMeIn\nExample of an IP Restriction error message.\nAs an admin, you should be able to set IP restrictions for your technicians so that they can only log into the technician console from within your network or from an approved list of IP ranges. If they try to log in from a different device or network, they\u2019ll be locked out.\nFurther Restrictions\nAdditional measures take IP restrictions a step further to restrict access to only users in your company.\nLook for the ability to provide your solution with a list of your IP ranges. The solution will check the IP when the session starts, and if the PIN code entered didn\u2019t come from within the IP range in your account, the session won\u2019t start. Employees won\u2019t be able to receive support from any other account than your own.\n LogMeIn\nExample of a Restricted Access message when the user\u2019s IP is outside the specified range.\n\u00a0\nThis is probably the most restrictive layer, but in the kind of world we\u2019re in, it is an important layer that a lot of companies are turning to.\nThriving in a remote world requires taking a good hard look at your systems and processes. Your remote support solution is an important part of your IT toolkit. Be sure that it helps lock out malicious activity and keep your organization safe on multiple levels.