3 Best Practices for Secure Video Conferencing

Happy relaxed young woman sitting in her kitchen with a laptop in front of her stretching her arms above her head and looking out of the window with a smileIn the wake of COVID-19, many organizations were forced into a work-from-home model. Video conferencing solutions became the glue to help keep organizations connected to one another. Sometimes, when forced to acted quickly, we may forget about security best practices. Below is my reminder for best practices for secure video conferencing.
Use Passwords to Limit Access to Calls This is important, as you don’t want someone to join the call who isn’t invited. “Video conferencing bombing” has become big news lately. Video Conference bombing occurs when third parties look for valid video conference IDs that haven’t been secured; most of the news lately tell of third parties taking over sessions to show inappropriate content, but the reality is a third party could just as easily be listening to grab valuable business intel either from the conversations or what’s being shared onscreen. Use Waiting Room Features Some conferencing tools have a waiting room feature, which ensures that participants cannot enter the meeting until the host arrives and invites them in. It is always a good practice for hosts of video conferences to know who has joined the call to ensure they were on the invite list. If they are not on the list, the host has the option to remove them from the meeting. Control Screen Shares Most conferencing tools also have the ability to allow the host to control the screen sharing.  Going back to the issue of “bombing” it can help prevent someone from sharing explicit material during your meeting. In addition to providing an extra layer of secure, it’s just a good meeting practice to have the host control who can screen share.  The host can then allow the participant to share their screen at the appropriate time. If the new reality of remote work during COVID-19 has you worried about secure video conferencing, or anything cyber security related, please contact Uzado. We’re here to help!

Leave a Comment

Your email address will not be published. Required fields are marked *