Category Archives: Remote PC Software

ISACA Now – The #QuantumComputing Threat: Risks and Responses

The Quantum Computing Threat: Risks and Responses

Editor’s note: The ISACA China Hong Kong Chapter hosted a recent webinar on the topic “Quantum Threat: Risks and Response.” The event, moderated by Michael Yung, strategic advisor, Google Cloud, featured panelists Andrew Cheung, president/CEO, 01 Communique Laboratory Inc., Samuel Sinn, partner, digital transformation advisory services, PwC China and Hong Kong, William Gee, advisor, innovation and digitalisation, PwC China and Hong Kong, and Welland Chu, alliance director, Thales. The webinar included more than 130 online and onsite participants from a variety of backgrounds, including government officials, regulators, large corporates, and more. Below is a summary of the insights shared from the panel:

Michael: Quantum computing promises to change the world through many groundbreaking applications. At the same time when the world is already grappling with cybersecurity issues daily, such as data breaches, ransomware and more, will the arrival of quantum computers make matters worse?

With the focus on the quantum threat, our expert panel will share with us their views as well as how we shall respond to this threat. We will discuss the following topics:

  • What is quantum computing?
  • Implications to today’s cybersecurity practices and why these matter?
  • Who is most at risk and how can we implement Post-Quantum Cryptography (PQC) in the real world?
  • What can corporate leaders do today to mitigate the risks and what solutions are available now?

What is quantum computing?

Samuel: Classical computers are fundamentally based on the on/off states of switches called bits, while quantum computing is based on the nature of quantum entanglement and superposition. In simple terms, quantum computers allow on/off at the same time so that it is behaving like having millions of classical computers working in parallel to collectively solve the same problem.

Alongside any huge breakthrough in technology brings new risk: Quantum computing, with its unique powers, will render today’s encryption technologies obsolete. Since these encryption technologies formed the security bedrock of all digital activities today, our day-to-day functions such as financial transactions, money transfers, data protection, etc., would be impacted.

There is no 100 percent secure encryption in the world; we consider an encryption algorithm “safe” if the time required to break it is longer than the average lifespan of a human. With quantum computing, many of the encryption algorithms we rely on today would become unsafe overnight.

Andrew: Today’s encryption is based on prime number factorization, which is easy one way but extremely difficult in reverse.  It just takes milliseconds to multiply two very large 250-digit prime numbers to give a very large semi-prime number, but it will take over 150 years to do the reverse to brute force all the combinations. In the last 40-plus years, the strategy to keep ahead of advances in computation power is simply to extend the key size. The emergence of quantum computing made this approach ineffective: regardless of the key size, quantum computers can reduce the time to crack certain encryption algorithms from hundreds of years to merely seconds.

Implications and why we should care now

Welland: In 2019 Google reported that its 53-qubit Sycamore processor had completed in 3.3 minutes a task that would have taken a traditional supercomputer at least 2.5 days. In 2021, IBM announced Eagle, a 127 qubits processor, and that by 2023 a quantum processor with >1,000 qubits would be available. Major technology providers like Microsoft and Amazon have also started to offer quantum computers and simulators on their cloud services platforms. The global enterprise quantum computing market is estimated to grow at a CAGR >33%, reflecting the resources that are being directed into this field.

William: The race to “quantum supremacy” will significantly compress the development timeframe of quantum computers, and the availability of quantum computing capability in the cloud will not only further advance developments but also mean that bad actors could also easily access this technology. While there is still debate over when “Q-Day” will arrive, this is becoming less relevant when increasingly hackers adopt a “grab and wait” strategy by simply stealing the data first and decrypting once they can get hold of the cracking tools.

Who is most at risk and how we should implement PQC?

William: Asymmetric cryptographic systems are most at risk, implying that today’s public key infrastructure that form the basis of almost all of our security infrastructure would be compromised. That being said, the level of risk may be different depending on the data to be protected – for instance, a life insurance policy that will be valid for many years to come; a smart city that is built for our next generation. Similarly, the financial system, both centralized and decentralized, may have different vulnerabilities. For this reason, post-quantum security should be addressed as part of an organization’s overall cybersecurity strategy. It is of such importance that both the C-suite and the board should pay attention.

While blockchain-based infrastructures are still considered safe, being largely hash-based, transactions are digitally signed using traditional encryption technologies such as elliptic curve and therefore could be quantum-vulnerable at the end points. Blockchain with quantum-safe features will no doubt gain more traction as NFTs, metaverse and crypto-assets continue to mature.

Finally, the unique features of quantum computers is such that one would not use these for tasks such as word processing, thus implying that classical computers and quantum computers will likely co-exist for some time, making it even more important for everyone to address this quantum threat.

Welland: Companies and experts in the cybersecurity space have joined forces to combat this imminent threat. One aspect to note is the time needed to standardize cryptography in a global context: many of our audience may still remember the duration and effort taken to migrate 3DES to AES two decades ago!

It may be decades before the community replaces most of the vulnerable public-key systems currently in use today with new post-quantum cryptography. In the cybersecurity world, we should establish a robust set of preventive controls from enhancing awareness to taking a range of precautionary, detective and corrective measures so as to minimize the impact of the quantum threat.

What can be done today and what solutions are available?
Andrew: Many international organizations such as The National Institute of Standards and Technology (NIST); European Telecommunication Standards Institute (ETSI); PQCrypto; SAFEcrypto; and CREST Crypto-Math have been taking actions to find and recommend the next generation of cryptographic systems that are safe against quantum computers.

NIST started in 2016 with five categories of technology and a total of 82 candidates. Earlier in July, NIST announced the first four candidate algorithms that have been selected for standardization and four additional algorithms will continue into the next round. The final announcement of NIST PQC standard will likely to be in 2024.

It is important to note that the single most important factor on the robustness of an encryption method is how long it has been time-tested without a cracking theory because all encryption algorithms are safe until such a cracking theory is discovered.

Given the pace of technological advancement, going forward, “crypto-agility” – the ability of an organization to change cryptographic algorithms quickly to adapt to evolving security landscape – will be critical. A handful of forward-thinking companies have been taking meaningful actions by creating the API and solutions based on the remaining candidates of NIST.  This means, on day 0 when NIST announces the final recommendations, there will be a solution that companies can use the next day, rather than having to wait another few years for the tools to be developed.

Final thoughts

Andrew: There are quantum-resistant solutions available today that comply with industry standards such as PKCS#11, OpenSSL, but are not yet openly endorsed. This is still way better than standing naked in front of the quantum threat.

Samuel: Business leaders should address the quantum threat at the earliest opportunity. Rapid transition to new information security technologies are unrealistic as much of our infrastructure and network systems today are interconnected, often on a global level. Responding to the quantum threat will require significant infrastructural, cultural and procedural change, as well as funding on a scale that has not seen since the Y2K threat.

Welland: Stay agile and be flexible. Ensuring adequate protection for the future while complying with today’s standard is crucial for any business to keep up with compliance and regulatory requirements. There is a need to deploy applications and network equipment that are able to accommodate both pre-quantum and post-quantum cryptography at the same time, with the ability to switch swiftly to a different algorithm as the need arises.

William: Know your data and information assets that you need to protect, and take a risk-based approach to achieve a balance between cost and security. Plan ahead while remaining flexible as preparations need to be highly responsive and dynamic given the pace of technological advancement.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#BNBChain Halted After Suspected $536M Hack

A wallet worth over $536 million started acting erratically, prompting the #BNBChain to halt completely!

BNB Chain has been halted after a large BNB holder started displaying erratic on-chain behaviour, suggesting a hack. The erratic nature of the wallet’s on-chain activity suggests it may have been compromised. Stablecoin issuer #Tether has also already stepped in to blacklist the address, preventing it from sending USDT to new wallets.

While the hackers were able to get away with roughly $100 million, the potential amount could have been as much as $570 million.

Patrick Hillmann, chief communications officer at crypto exchange Binance, commented that BNB validators noticed some strange activity taking place on BSC Token Hub, one of the platform’s bridges ,and came to the conclusion the bridge was being utilized to mint additional BNB tokens. He compared the exploit to a group of thieves breaking into the U.S. Federal Reserve, printing their own money and then walking away with it. “What we’re seeing here is that as we see more of these attacks on bridges, the communities that rally around these blockchains are getting much better at shutting them down quickly, updating their systems and being able to prevent a worst case scenario from happening,” Hillmann said.

This hack has a strong smell of a quantum hack although no one can say for sure. This is because the cause of the hack was most likely that the private key of a huge account was compromised. This is exactly the weakest link of crypto facing quantum.

“While it is unknown about what exactly is the cause, this must be some how related to the private key being compromised whether it is bug in the wallet or a reverse engineering of the public key via quantum computer. It is now crystal clear what would happen when a private key is compromised by a quantum hack” said Andrew Cheung, President, 01 Communique.

Quantum-resistant encryption research is a hot topic because it is felt that quantum computers are almost certain to become prevalent and sufficiently powerful to crack existing encryption algorithms. It is therefore prudent to prepare crypto that can survive future attacks, so that data encrypted today remains safe tomorrow, and digital communications can remain secure.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

You Can Stop #Ransomware Attacks Today. So Why Wait?

Disruptive ransomware attacks are on the rise.

Just in the last few years, we witnessed the LinkedIn data breach, the JBS attack, the SolarWinds hack, the Kaseya ransomware attack and many more. It is evident that making cybersecurity front and center is critical. Industry experts are expecting the global cybersecurity market to surpass USD $400 billion in 2028. All these signal that not only business leaders but ordinary people using the internet should not wait for a bad incident to occur before making a move.

In June 2021, LinkedIn data was compromised. The records of 700 million clients are now for sale on the dark web. This happened in the blink of an eye but what is worse is the ripple effect for users that used important passwords for LinkedIn. Even if their passwords were not breached, there is still valuable data that can be used for identity theft and phishing attempts. Hackers are constantly phishing for data, sending out millions of fake security alerts and bank alerts email everyday. If they can provide some “legitimate” information (from the breached data) on their phishing email, they will look more convincing and recipients are more prompted to click on the malicious links.

Think about this – LinkedIn, JBS, Colonial Pipeline and all other multi-billion-dollar corporations have unlimited resources to safeguard their data but still got hacked, what are the chances that smaller companies can secure their data? The answer is, you have good chances if you secure you email communications.

Most ransomware attacks come from phishing emails. You click on just one malicious link and you risk having your private information breached, email message content and attachment being intercepted and altered, and suffering financial and creditability damages. Therefore, you should secure your emails today. IronCAP X™ is THE SOLUTION TO STOP PHISHING!

IronCAP X™ is easy to install, a is user-friendly and a cost-effective solution. Its quantum safe, end-to-end email encryption eliminates the intermediary server, and its digital signature feature authenticates a legitimate sender from a malicious one. IronCAP X™ will be your armor to eliminate ransomware attacks. An ounce of prevention (IronCAP X™) is worth a pound of cure (data loss). The choice is yours!

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Combat #Ransomware Attacks with #IronCAP

Don’t be left out in the cold – Combat Ransomware Attacks with IronCAP!

Cyber extortions are crippling critical infrastructures, healthcare systems, government agencies and businesses around the world. In 2021 alone we saw some large-scale scum hacks and ransomware attacks. In early May Colonial Pipeline paid $5 million to the DarkSide ransomware gang and in June, the meat processor JBS paid $11 million to the Russia-based REvil gang. Hackers are using simple phishing tools, making you believe it is a legitimate email, to gain access to your sensitive information.

Top US officials have recently ranked ransomware attack as a national security threat. According to The New York Times, President Biden put this issue at the top of his agenda for his June meeting with Russia’s president, Vladimir Putin, and had given him forceful warnings for his inaction against those ransomware operators tied to Russia.  President Biden had also requested his lawmakers to work on several bills that would, among other things, require a wide range of companies including critical infrastructure operators to report attacks to the government.

The F.B.I. Internet Crime Report for 2020 listed 2,474 cyberattacks in the United States, with losses totaling more than $29.1 million. The reality is probably of a much greater magnitude. The German data-crunching firm Statista has estimated that there were 304 million cyberattacks worldwide in 2020, a 62% increase over 2019.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#IronCAP Completes PoC #QuantumSafe #Blockchain

All the technical objectives necessary to integrate IronCAP™ into the Solana blockchain have been achieved!

Not just by providing a quantum-safe blockchain that supports smart contracts, but also retaining Solana’s ultra-fast throughput. “The technology we developed for this project is independent of the type of blockchain that is in use and as such it can be applied to not only the Solana blockchain but also other public blockchains such as Bitcoin, Ethereum, as well as most private business blockchains. The method of integration is unique and; therefore, we plan to file a patent application along with our partner, Talent Summit who has accepted and paid for the delivery of the Proof of Concept (“PoC”).  Our next step will be to create and demonstrate a quantum-safe wallet while Talent Summit will plan for commercial development and launching of QNT – Quantum Native Token,” said Andrew Cheung, President and CEO of 01 Communique.

As previously announced, the Company was commissioned to develop the World’s First Quantum-Safe Blockchain designed for Tokens, NFTs, Smart Contracts for the Metaverse, De-centralized Finance (DeFi). It is expected that this quantum-safe blockchain will be resilient against cyber-attacks, including attacks from Quantum Computers.

“Unfortunately, virtually all blockchains in the world today are vulnerable to quantum computer attacks.  Since blockchain data is meant to be “forever” it is imperative that it is quantum-safe.  This PoC achievement is a very significant milestone and demonstrates our IronCAP™ technology can transform existing blockchains into a quantum-safe version that can be incorporated in Tokens, NFTs, Smart Contracts for Metaverse, DeFi, and more”, said Andrew Cheung.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

#Crypto is under attack and it’s losing the battle against #hackers

If you own a crypto wallet, then you could be in big trouble!

Nearly 8,000 digital wallets have recently been drained of just over $5.2 million in digital coins including ’s sol token and (USDC), according to blockchain analytics firm Elliptic. The Twitter account Solana Status confirmed the attack, noting that approximately 7,767 wallets have been affected by the exploit. Elliptic’s estimate is slightly higher at 7,936 wallets.

Phantom said on Twitter that it’s investigating the “reported vulnerability in the solana ecosystem” and doesn’t believe it’s a Phantom-specific issue. Blockchain audit firm OtterSec tweeted that the hack has affected multiple wallets “across a wide variety of platforms.”

Quantum-resistant encryption research is a hot topic because it is felt that quantum computers are almost certain to become prevalent and sufficiently powerful to crack existing encryption algorithms. It is therefore prudent to prepare crypto that can survive future attacks, so that data encrypted today remains safe tomorrow, and digital communications can remain secure.

Due to the uncertain and potentially long time frames, and all of the more immediate threats that businesses are dealing with on a daily basis — there’s “always that risk” that some businesses will just ignore the issue, said Boaz Gelbord, chief security officer at Akamai Technologies.

You need to act now!

We at IronCAP™ have been trying to educate businesses and individuals that Q-day (the day the first quantum hack is publicly recognized) is around the corner and everybody needs to gear up. Nation states and governments are already at it, how about you? To learn more, visit www.ironcap.ca.

IronCAP™ is our latest innovation for the post-quantum cybersecurity. This patent-protected, post-quantum cryptographic system is based on the Goppa Code-based cryptographic technology. It has embedded our proprietary subclass of (L, G) making it not only more secured but also has faster cryptographic operations (key generation, encryption, decryption) than the traditional Goppa Code-based technology (McEliece). We are offering a live demonstration for the general public to try and experience the strength of IronCAP™ post-quantum encryption easily. To learn more, visit www.ironcap.ca.

Can Remote Access Benefit Your Business?

Remote desktop is one revolutionary service which has changed the whole computing industry. It allows users to access their computers anywhere and anytime through the internet. This has facilitated companies to enhance the productivity of their work force dramatically.

Which issues should managers consider when implementing this technology for their business?
1. Technology Issues:
Sometimes, there are several security and firewall configurations required to give access to employees working from home. Then there is the cost of VPNs which can get high depending on the number of remote workers. With I’m InTouch, there are no hardware compatibility issues or gateway/firewall settings that need special configuration. Simply install it on the employees’ host PCs and all they need is a browser to access our simple web interface. And with our 3 layers of authentication and encryption standards, security is not an issue. Also there is a huge cost saving when using I’m InTouch versus a VPN, again saving the business money.

2. Business Issues:
The more employees a business has, the larger the office space it requires. By having them work from home, the office space does not need to be as large and money can be saved. Moreover, I’m InTouch allows employees to remain productive while travelling. It avoids confidential or sensitive data to be taken out of the company since there is no need to copy data onto a laptop or USB drive anymore. Employees can access any file, any data on their office PCs anytime. Everything remains in the office premises. Data loss when your laptop is being stolen will no longer happen.

 
In summary, when looking at the high costs of having remote workers with VPN connections, I’m InTouch makes much more sense to a business. It really saves a lot of hassles and money for your business when implementing a remote workforce.

More Than a Tool for Technical Support

Imagine having a single tool for your business that can handle your Technical Support, your Pre-Sales, and your General Customer Service enquiries. I’m OnCall is a very cost-effective tool that lets your business provide a centralized access point on its web site for customers to get help. It will ease tracking and communication between different departments and clients. Its newly implemented “Live Chat” and “Queuing” features will give customers a pathway to communicate with your company other than the phone.

Live Chat

The Live Chat feature of I’m OnCall can essentially eliminate your customer service phone lines. Customers can submit live chat requests by clicking the Live-Chat button on your web site which is embedded with an URL given by I’m OnCall.  Your agents simply pick up requests and perform real-time live chat with the customers via the Internet.  Customers may leave call-back requests if the queue is busy.

Queue Management

You can customize up to 3 URLs to embed into your web site to provide Live-Chat support to your customers.  For example, you may create a “Live-Chat (Pre-sales)” button, a “Live-Chat (After-sales)” button and a “Customer Service” button.  Each button embeds a different URL.  Different Live-Chat buttons will submit live-chat requests to a different queue.  You can assign different Agents to service different queues which is similar to how you would direct calls to different departments in a traditional phone support system.

Each queue can be configured differently to allow customers to submit a Live-Chat request to a particular Agent ID# (similar to entering an extension # in a traditional phone support system) or just submit a request for the next available Agent without specifying any Agent ID#.  (Please refer to the “Users Tab” section for details about configuring the Chat ID# for the Agents.)

You can configure the Greeting Message, the Disabled Message, and the Office-closed Message for each Live-Chat queue.  The Office-closed Message will be shown according to the Office Hour Settings.  You can also enter your greeting messages manually.

As you can see, I’m OnCall is a tool that not just works for Technical Support.  It is useful for other departments which need to deal with customers as well.  Keeping everything centralized will streamline your staff management, improve overall productivity and help you to provide good customer service.

Wakeup-on-LAN for Your Windows Can Save Energy and PC life

Having a server at home is a great luxury. However having a computer running 24×7 is an extreme waste of energy. Turning it on and off manually is not very appealing too. Luckily we don’t need to do either any more. Your Windows PC can easily be configured to be shut down when not in use and with I’m InTouch, it can be woke up remotely upon access.

For companies that are environmental conscious, I’m InTouch’s Wakeup-on-LAN function will provide a great means to reduce energy usage.

How does the Remote Wake-Up feature work?

If you attempt to remotely access your computer which has been powered off, I’m InTouch will notify another I’m InTouch computer on your local network to send a wake-up signal to turn on your computer.  In order for remote wake-up to work, at least one computer on your network must be on and designated as the wake-up proxy in I’m InTouch to send the wake-up signal to other computers.

What are the requirements for Remote Wake-Up?

• A minimum of 2 PCs on the same wired network with the I’m InTouch client software installed. At least one PC must be designated as the Wake-Up Proxy and be powered on to wake up other computers on the network.

• The computer you want to wake-up must have a BIOS and a network card that support Wake-Up-On-LAN. This feature must also be enabled in both the BIOS and the network card properties in Windows.

• The administrator must enable the Remote Wake-Up function in the user settings page of the I’m InTouch computer you wish to power on and assign a Wake-Up password.

How do I enable Remote Wake-Up in my I’m InTouch administrator account?

1. Login to your administrator account from www.imintouch.com.

2. From the List of Computers page, check those computers of which Remote Wake-Up properties you wish to change and click the User settings/Activate link.

3. On the User Settings page, ensure that the Remote Wakeup feature has been enabled for each computer. We also recommend enabling the Remote Wake-Up Proxy option so that any computer on the same network can act as the proxy to wake up other computers. Remember, at least one computer has to have the Wake-Up Proxy enabled and be turned on in order for other computers to be remotely powered on.

Using our patented I’m InTouch Remote Wake up technology will ensure continuous compliance with your green IT policies, and take advantage of the cost savings in power management.

I’m InTouch Helps You Support Remote Workers

Do you have workers who travel frequently or often work away from the office setting? Given the proper resources, a computer, an Internet connection and access to the company’s internal network, more and more people are opting to work from home or other remote locations. All these remote workforce puts forward increasing challenges to your IT Service desktop support them.

Make Services Available 24/7

The more scattered your workforce becomes; the more crucial it is to provide services around the clock. With the I’m InTouch service, your remote staff would have 24/7 access to their host systems in the office. And with our patented technology, there is no need for costly VPNs to be configured and maintained.

Security Measures

Traveling workers also pose greater security threats, because their devices are constantly at risk of being lost, stolen, or broken. If they use I’m InTouch to remotely work on their office PC’s, all data remains secure on your office premise. They don’t need to duplicate files and data onto their laptops. So there is no worry about confidential information being leaked if their laptop/mobile devices are lost or stolen.  This along with the 256-bit SSL Data Encryption, Dual Login Passwords and other security measures, I’m InTouch provides you with a safe and secure remote access solution.

Managing remote employees has its challenges but with the I’m InTouch service, businesses can provide a tool that supports their remote workforce easily and efficiently.