Staying current: Companies need to ensure that both their video conferencing software and the systems on which it runs are not out of date.In ’s “5 Steps for Secure Video Conferencing,” tech writer Sara Moseley adds these considerations: If someone appears on the list who was not invited or isn’t even an employee, the meeting was compromised. Hosts can also view lists of actual attendees to check against a list of invited attendees. Managing both engagement and attendees: Video conference hosts should enable settings that allow them to see whether attendees have the video software running in the foreground (as the primary window) or behind other programs.Also, whenever file transfers are necessary, file types can be restricted on most platforms, blocking the transfer of executable files (.exe) or other file types that can quickly deliver malware or viruses. In such cases, the host must enable encryption before setting a meeting. Software generally doesn’t enable encryption by default. Securing communication: Video conferencing hosts can enforce encrypted file transfers and data traffic during each call. Controlling access: Video conferencing hosts can control access to the conference by creating user groups, limiting attendance by domain (e.g., only those with a company email address), setting a meeting password and holding attendees in a virtual “waiting room” to approve each one individually.Securing video conferencing software and web services requires several relatively easy-to-implement steps, according to the blog article, “Work from Home: Videoconferencing with Security in Mind.” Key considerations for video conferencing security include: Hacked video conferencing meetings can lead to anything from industrial espionage to “Zoombombing,” a prank whereby a hacker or other unauthorized user suddenly opens an inappropriate video in a group conference Once hackers gain access to video chat software, they can listen to and view everything that is happening during the conference, including confidential client information, technical data, trade secrets, shared screens, login credentials and personal information. Steps to Securing Video Conferencing SoftwareĪs with most types of connected software and web-based tools, video conferencing programs can be accessed by anonymous hackers and other malicious actors through a variety of exploits and security flaws. The pandemic, however, has turned cyber security professionals’ attention toward fixing previously overlooked security issues with working remotely. By accessing Zoom conferences, malicious actors can obtain a wealth of sensitive and confidential information damaging to companies, clients and employees alike. The hacking incident at Zoom highlights the importance of cyber security in business, specifically video conferencing security. In his Forbes article, “500,000 Hacked Zoom Accounts Given Away for Free on the dark web,” senior contributor Lee Mathews writes that stolen credentials included client info, personal meeting URLs and Zoom host keys. And the tech company Zoom was and still is among the most popular of these services.Īround the beginning of April 2020, the cyber security firm Cyble discovered that more than half a million valid Zoom account credentials were being sold cheap or offered for free on the dark web. Video conferencing web-based tech companies suddenly found their services in high demand as teams of employees met online to discuss their daily business. During the early days of the COVID-19 pandemic quarantine, many businesses shifted the bulk of their operations from in-house workplaces to online distributed workforces.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |