Learn how to use Communication / Video tools correctly |
- The coronavirus pandemic has transformed how many organizations operate daily and led to the swift adoption of alternative communication tools, namely video conference tools.
- These tools are no longer used only occasionally and are now work tools that are constantly used by millions of workers.
- As always, when there’s a change, new risks appear that must be managed and mitigated properly:
1. Select proper tools |
- Try to take advantage of tools that use point-to-point encryption with proper keys, therefore preventing that any third party accesses your content
- Prefer tools that allow for centralized management of platform parameters that can be applied to all users
- Pay special attention to authentication configuration parameters, always prioritizing multi-factor authentication forms
- Don’t trust tools that request access to your contacts or system parameters that are not required for them to function
- Make sure that you update the software so that you can take advantage of the latest functionality and security fixes
2. Use tools properly |
- Avoid using private rooms always with the same identification and set up specific rooms for each meeting with random identifiers
- Only allow authenticated users to attend meetings
- Define a password for the session, preventing other participants from attending unexpectedly
- Do not allow users to enter the room when the host is not present, therefore filtering who joins the meeting
- Lock your meetings when all participants are present, preventing new people from joining the meeting
- Turn off all features that allow file sharing, whenever file sharing is not required
- Turn off attendance from phone, whenever phones are not required for participants to attend the meeting
3. Ensure privacy |
- Make your communications in visually neutral locations, avoiding sharing unnecessary information about your location
- Prioritize alternative, more direct and secure means to share sensitive information, such as access passwords
- Don’t make your communications from public places or any place where third parties can access, both auditorily or visually, to your meeting content
- Attend and share always knowing that it’s possible that another participant takes a screenshot or photo of the content on the screen
Ready to start your cybersecurity journey?
Don’t leave security to chance! Contact our experts today for a personalised consultation.