Contact Us

12 Things to Consider Before your next Conference Call

12 Things to Consider Before your next Conference Call

It's not quite business as usual

I recently participated in an information-sharing webinar not too dissimilar to your typical conference call, and like so many of you I experienced some glitches.

Handover of screen control to and from the host and between panelists did not go very smoothly, as each panelist and possible participants were able to share their screen. As we discussed the webinar and the eventual successful delivery of the content, we brushed the issues aside as just technology issues!

It was not until a few days later in a discussion with a friend, fellow information security colleague, who relayed his own experience with a remote conference tool, that we decided to provide some guidance. The issue he experienced was that while his friend hosted a “private meeting” via Zoom, an uninvited guest jumped in and hijacked the meeting. This act is referred to as Zoom-Bombing and the hijacker referred to as a Zoom-Bomber.

This piqued my curiosity and upon reading other articles I did a few basic checks to see if this was the case with my last webinar. I revisited a few previous invitations I had received and lo and behold I was still able to access a previously concluded meeting by utilizing the meeting link that was shared.

This article is not meant to be a step-by-step guide for configuring Zoom or any other meeting/conferencing utility, but to provide a few tips (that can also be found on Zoom’s and Checkpoint’s blog site) that can assist in reducing your risk exposure as the usage of these types of tools/utilities increases.

  1. Decide which application is right for you: ensure that the tool or version is fit for purpose. Consideration must be given to the privacy and security requirement of your event.

  2. Download the application only from the official site: other downloads may contain malware.

  3. If already installed, ensure that you have the latest version, check for updates and fixes prior to each use.

  4. Take the application for a test run to familiarize yourself with the features.

  5. Generate a unique meeting ID, using a personal meeting ID suggests that it is meant to be a continuous or recurring meeting and anyone who stores that ID may be able to join a future meeting at any time.

  6. Enable the waiting room feature: Participants will have to wait until the host grants access; this however, may not be practical for large meetings.

  7. Use meeting passwords: Ensure that you do not share the link as generated as it will contain the password. If you share the meeting URL ensure that everything after the meeting ID is omitted.

  8. Use a virtual background.

  9. Disable file-sharing unless it is required.

  10. Manage screen sharing; as a host you can determine who can share their screen.

  11. You have the option to lock the meeting.

  12. Determine who can record the meeting.

Let me reiterate, ensure that your application is downloaded from the official site as other downloads could be laced with malware. According to "HackerNews" there has been an increase in the amount of domain registrations seeking to mimic the official Zoom domain and others like it. This may trick users to visit a malicious site or download malicious software. Expect more issues and vulnerabilities to come to the fore as the use of Zoom and other collaboration tools become more prevalent.

As we all face this crisis together let us protect each other from harm by practicing good hygiene whether in the physical or cyber world.

4 Pillars of a Good Cloud Migration Plan

Cyber Security......

Cloud migration is the process of moving data, applications, and other business operations to a cloud-based environment.

5 Ways to Stay Cyber Safe in the Telecommunications Industry

Cyber Security......

With the increasing dependence on Information and Communication Technology (ICT) systems, cyber security has become a top concern for businesses.

Protecting Your Data: The Importance of Information Security in ICT Ecosystems

Cyber Security......

Cloud migration is the process of moving data, applications, and other business operations to a cloud-based environment.

EVERYTHING YOU NEED TO KNOW ABOUT INTERNAL THREATS

Cyber Security......

Cloud migration is the process of moving data, applications, and other business operations to a cloud-based environment.

EVERYTHING YOU NEED TO KNOW ABOUT EXTERNAL THREATS

Cyber Security......

Cloud migration is the process of moving data, applications, and other business operations to a cloud-based environment.

10 Cyber Security Tips to Protect Your Organization

Cyber Security......

While the COVID-19 pandemic has impacted the way the majority of us work and live our lives, cyber attackers have not taken a break.

More Resources

How can we help you?

c