Learn to Differentiate Between Sanctioned and Malicious Computer Remote Access

At times IT Department support specialists will remote into HCPSS computers assigned to staff to help resolve an issue. It is important for staff to be able to identify sanctioned remote support access sessions and malicious attempts to gain entry into your system to steal data, spread malware/ransomware, or other nefarious activities.

! Call to Action:
Review the resources for Remote Support Access Information on the Technology Resources Canvas community to:

  • Learn about approved remote access methods that correspond with your computer type to view and understand the ways IT staff legitimately remote into those computer types.
  • Review how remote access scams work to learn how malicious individuals attempt to convince victims to allow them access to their computer.


! Important: HCPSS IT staff only initiate remote support access sessions after end-users report an issue with their assigned device. If you receive an unexpected call or email requesting remote access or a pop-up browser window asking you to call a number do not follow the directions provided.

If you suspect an email to be fraudulent, do not proceed with the directions provided in the email. Employees are encouraged to forward any suspected phishing emails to abuse@hcpss.org, and then delete the email. If assistance is still needed, contact the Technology Support at TechSupport@hcpss.org.