Call: +44 203 4755 466

       +44 207 2036 709

Client Portal Remote Support Foxcomm IT Solutions, IT Support London


image for remote support security and ssl encryption 4576841640.gif 4570486248_154x67.png 4576149653_90x93.png 4576149652_90x75.jpg 4576149655_115x63.jpg 4591741955_176x68.png 4561212347.gif

Frequently Asked Questions?


1. Is it easy to use


Yes.  Once you’ve allowed us access to your computer you don’t need to do anything.  One of our specialist IT support staff will investigate the issue, just as if he was sitting at your desk. If our support team don’t require any additional information; you can carry on with any other non-computer-based tasks.


2. How long does remote IT support take?


Typically, a support query will take 20-30 minutes but of course there are exceptions which take longer.  Our IT support team will always try to fix the problem as soon as possible. If it can’t be resolved remotely we will send an engineer to deal with it on site


3. Remote Support, is it secure?


Yes. There is a secure, 128-bit encrypted, connection between the support engineer’s computer and your computer that prevents anyone else from getting access or seeing what’s happening on your computer. Once our technician has ended the session (logged out of your computer) he will not be able be to reconnect to your computer until you request another remote support session.


4. Can you control my computer without my knowledge?


No, we are not able to access your computer remotely until you have responded on your computer to a request for remote it support.  Similarly, once we have closed remote access to your computer, we will not be able to access it again until you have again requested and confirmed remote access.

Why IT Support from Foxcomm?


Our affordable, flexible IT support service can be tailored to meet the specific needs of your business, and to wrap it up, we are simply one of the best in business!

imac remote support

Foxcomm Industry-standard (SSL) security technologies are used to protect data transfer; RSA 1024 Bit Public / Private Key Exchange is used to negotiate symmetrical AES 256 Bit end-to-end encryption; end-user applications are digitally signed by means of a VeriSign certificate.

Security Statement