Contact Us

12 Things to Consider Before your next Conference Call

12 Things to Consider Before your next Conference Call

It's not quite business as usual

I recently participated in an information-sharing webinar not too dissimilar to your typical conference call, and like so many of you I experienced some glitches.

Handover of screen control to and from the host and between panelists did not go very smoothly, as each panelist and possible participants were able to share their screen. As we discussed the webinar and the eventual successful delivery of the content, we brushed the issues aside as just technology issues!

It was not until a few days later in a discussion with a friend, fellow information security colleague, who relayed his own experience with a remote conference tool, that we decided to provide some guidance. The issue he experienced was that while his friend hosted a “private meeting” via Zoom, an uninvited guest jumped in and hijacked the meeting. This act is referred to as Zoom-Bombing and the hijacker referred to as a Zoom-Bomber.

This piqued my curiosity and upon reading other articles I did a few basic checks to see if this was the case with my last webinar. I revisited a few previous invitations I had received and lo and behold I was still able to access a previously concluded meeting by utilizing the meeting link that was shared.

This article is not meant to be a step-by-step guide for configuring Zoom or any other meeting/conferencing utility, but to provide a few tips (that can also be found on Zoom’s and Checkpoint’s blog site) that can assist in reducing your risk exposure as the usage of these types of tools/utilities increases.

  1. Decide which application is right for you: ensure that the tool or version is fit for purpose. Consideration must be given to the privacy and security requirement of your event.

  2. Download the application only from the official site: other downloads may contain malware.

  3. If already installed, ensure that you have the latest version, check for updates and fixes prior to each use.

  4. Take the application for a test run to familiarize yourself with the features.

  5. Generate a unique meeting ID, using a personal meeting ID suggests that it is meant to be a continuous or recurring meeting and anyone who stores that ID may be able to join a future meeting at any time.

  6. Enable the waiting room feature: Participants will have to wait until the host grants access; this however, may not be practical for large meetings.

  7. Use meeting passwords: Ensure that you do not share the link as generated as it will contain the password. If you share the meeting URL ensure that everything after the meeting ID is omitted.

  8. Use a virtual background.

  9. Disable file-sharing unless it is required.

  10. Manage screen sharing; as a host you can determine who can share their screen.

  11. You have the option to lock the meeting.

  12. Determine who can record the meeting.

Let me reiterate, ensure that your application is downloaded from the official site as other downloads could be laced with malware. According to "HackerNews" there has been an increase in the amount of domain registrations seeking to mimic the official Zoom domain and others like it. This may trick users to visit a malicious site or download malicious software. Expect more issues and vulnerabilities to come to the fore as the use of Zoom and other collaboration tools become more prevalent.

As we all face this crisis together let us protect each other from harm by practicing good hygiene whether in the physical or cyber world.

Bolstering Cybersecurity Through Digital Transformation

Cyber Security......

Much like the ancient Greeks employed security strategies to protect their territories and interests, modern organizations must embrace cybersecurity strategies, enhanced by digital transformation, to safeguard their most valuable asset—data.

Fighting Ransomware: The Missing Pieces of the Puzzle

Cyber Security......

Ransomware is a serious threat, but it's one that businesses can combat effectively with the proper preparation.

Leveraging Cyber Threat Intelligence to Keep Your Organisation Safe

Cyber Security......

When a cyberattack occurs, speed and accuracy in response are crucial. CTI plays a vital role in enhancing incident response by providing insights into the tactics, techniques, and procedures (TTPs) attackers use.

Smart Cyber Safe Strategies for Individuals and Businesses

Cyber Security......

Security issues addressed at testing or after deployment has 15X more vulnerabilities and risk to an organization.

Safeguarding Bermuda: An Overview of the Cybersecurity Act 2024

Cyber Security......

Implementing the Cybersecurity Act 2024 is a significant step towards safeguarding critical infrastructure and ensuring robust data protection. Ensure you identify all of your assets, the essential items, and even the people you need to protect.

4 Pillars of a Good Cloud Migration Plan

Cyber Security......

Cloud migration is the process of moving data, applications, and other business operations to a cloud-based environment.

More Resources

How can we help you?

c