Staying Secure in Virtual Meetings

Security has been a big challenge for video hosting companies. But there are some simple things you can do, to keep everyone’s information safe and secure.

 

General security

Do’s

  • Connect using a trusted network and internet connection or use your organization’s Virtual Private Network (VPN) if it is available.
  • If you must enable remote access to your desktop, call a known credible technical support person or organization for advice
  • Turn on encryption
  • Post clear privacy policies and procedures.

Don’ts

  • Avoid using public wifi
  • Don’t leave your camera & microphone on when not in use. Turn them off or cover them.

If you are presenting

Do’s

  • Make certain there are no open windows or sessions that display sensitive information
  • To avoid eavesdropping, unmute your microphone only when you begin your presentation and mute it after any Q&A. 

Don’ts

  • Don’t display sensitive information.
  • Don’t leave your microphone on after you are don’t speaking and answering questions

 

If you are hosting

  Do’s

  • Use a password to access the meeting
  • Enable wait rooms
  • Have a separate screen, window or computer for a dash board to monitor the attendee’s activities
  • Learn how to mute a speaker, it may become necessary.
  • Consider if it is appropriate to mute attendees microphone and video by default when they join

Don’ts

  • Don’t use the same password for different organizations or uses
  • Avoid allowing people to join the meeting directly without putting them in a waiting room.

 

If dealing with sensitive information, consider:

Do’s

  • Use a wired trusted network and internet connection
  • Use new passwords and consider multi-factor authentication
  • Verify that recording the meeting is allowed and where the recording will reside
  • Disable “Join Before Host” so no one can join before the host
  • Disable file transfer
  • Disable “allow removed participants to rejoin” settings so that any participants that are evicted can’t reenter the meeting
  • Make certain there are no open windows or sessions that display sensitive information
  • Verify all the attendees so no unknown or unauthorized attends the meeting
  • Encrypt recordings and delete them from the recording device once the files have been moved, verified & secured 

Don’ts

  • Don’t use public wifi
  • Don’t connect to the meeting in a public place where someone can’t ease-drop on the event.
  • Don’t use simple passwords or reuse them.
  • Don’t assume recording the meeting is allowed.
  • Don’t leave any sensitive meeting documents, presentation files or recordings in public folders.

 

If dealing with HIGHLY sensitive information, consider:

Do’s

  • Preload meeting content and software on devices provided by and secured by your organization.
  • Have someone assigned to monitor the dashboard, chat and attendees.
  • Delete all meeting artifacts including any video recordings, poll results, and chat history.

Don’ts

  • Avoid conversing with others that should not be privy to this information while the meeting in ongoing.
  • Only allow hosts to share their screens.

Cyber security is a huge concern but luckily, there are several agencies and organizations that offer guidance to help you eliminate the guess work:

 

Technology

Routers – Update router firmware, turn on WPA-2 encryption or higher, turn on firewalls