I've been dealing with some interesting user reports lately. We're using several remote access tools like WebEx, ControlUp, and TeamViewer for screen sharing and IT support. However, I recently had two users claim that someone was controlling their computers. For one user, it was hard to tell if anything unusual was happening because they had admin rights and we ended up wiping the machine. The other situation seemed more like a weird glitch, and our logs didn't show any actual remote sessions. Once users believe they're being hacked, it's tough to convince them otherwise. I'm looking for tips on how to manage these concerns:
- Do you focus on just one remote tool or keep multiple options?
- What strategies do you use to reassure users that no one is connected to their system?
- Are there any policies, indicators, or logs that help minimize these false alarms?
- And have you noticed if hardware issues often cause these kinds of reports rather than real security concerns?
4 Answers
This sounds all too familiar! I've had a user insist someone was controlling their computer, and after checking everything, it turned out to be her leaning on the keyboard. Once, a user had a massive folder on top of a Bluetooth keyboard that interfered with it. It always leads back to hardware or user error rather than real hacking. I've been in IT for 18 years, and actual unauthorized remote access is super rare.
You know, to manage users' fears, a solid remote access setup is key. We use one main tool and have logs to track who’s accessing what. Plus, we block any unapproved remote access tools at the firewall to keep things secure. It’s good to have users consent to remote access, too, so they know what’s happening.
From my experience, when users claim someone’s controlling their devices, it's often just minor glitches. For instance, if the laptop is closed and docked, I've seen electrical interference lead to strange behavior like odd mouse movements. It really helps to ask them detailed questions and get them to describe exactly what they’re seeing. That usually clears up a misunderstanding.
It’s tough to prove a negative. If you have logging tools set up and nothing shows anyone got in, that should suffice. But if it’s a recurring issue, I recommend wiping the computer or getting HR involved to discuss it with the user. Once you establish a clear protocol, it should be easier.

Related Questions
Can't Load PhpMyadmin On After Server Update
Redirect www to non-www in Apache Conf
How To Check If Your SSL Cert Is SHA 1
Windows TrackPad Gestures