Remote access
This happens when someone uses a dedicated program to access a computer from a remote location. This is a norm for people who travel a lot and need access to their company’s network. But cybercriminals can also use remote access to control a computer they’ve previously hacked into.