GoTo Customer Support Embark: GoTo Admin Training Embark: GoTo User Training Provide Feedback

Looking at the Average Remote Access Tool

Before we explore different attacks and how to mitigate them, let's first review how an average remote access tool works -- note, this is not how Rescue works, but if you've used another tool in the past, this might be familiar. 


Picture this Scenario:

You need support, you download a free remote access tool. You get a user ID and a password (either random or set) - you share these credentials with another user, and they get in, or you enable unattended access and use them yourself from another device to get access. ​ 


There are several ways a malicious actor can take advantage of this process. With Rescue, we've changed the process and added industry leading features to fight fraud.  In this course, we'll cover four  kinds of attacks and how  you can use Rescue to keep you, your employees, and your customers safe. ​