Skip to content

Attempting a ‘Remote In’

Welcome to our third email in our series of keeping your personal and business data secure. This is the last post in this current series, but keep your eye out for more cybersecurity best practices in the future- there’s always more to share and learn!

Unwanted ‘remoting in’

The term ‘remoting in’, or ‘take control’, or similar iterations stands for when a technician accesses your computer remotely, using a piece of software that allows the connection. Terrapin Networks customers all have this software installed on their laptop and desktop computers, and it’s what our dispatch team is referring to when we ask if the tech can “connect”.

 Unless specifically ok’d by us (very unlikely and always circumstantial) there is never a reason to let anyone besides Terrapin Networks remote into your computer. 

When Terrapin remote accesses your computer you will be notified beforehand through a phone call or email. This is a protection mechanism so that you know that it’s us remoting in.

When we remote into your computer, you’ll usually see this image in the lower right-hand side. It tells you the name of the tech remoted in.

Please note: It’s common for techs to close this window so we can have more mobility in the taskbar, so if by chance you don’t see a name, it doesn’t mean that we aren’t the ones remoted in. If in doubt? Feel free to call us up at 231-941-2100 and we can confirm to you who’s accessing your computer and why.

If you ever notice your mouse moving, windows opening and closing, or anything else that might be seen as suspicious behavior on your computer, call us right away. Occasionally, a tech will access your machine after hours to perform routine checks, but if you haven’t been notified ahead of time that one of our team members is accessing your computer, it’s always important to check. If there is someone who has unauthorized access to your workstation, we’ll be able to access it immediately to assess the situation.


That’s it for our final part of this three-part series Cybersecurity in Your Business. Did we miss anything? Do you have a question? Leave a comment below, or send us a direct message at helpdesk@terrapin.tech. You can also check out Part One, Avoiding Scam Phone Calls and Part Two, Securing Your Inbox.

Back To Top