• Latest
  • Trending
10 Essential Cybersecurity and Privacy Features Needed in Video Conferencing

10 Essential Cybersecurity and Privacy Features Needed in Video Conferencing

November 24, 2021
Qualcomm Announces Snapdragon 8+ Gen 1 and Snapdragon 7 Gen 1

Qualcomm Announces Snapdragon 8+ Gen 1 and Snapdragon 7 Gen 1

May 20, 2022
HP’s premium laptop revamp: more OLED displays, 12th-gen Intel CPUs

HP’s premium laptop revamp: more OLED displays, 12th-gen Intel CPUs

May 20, 2022
Android 13 beta will test out-of-the-box support for most braille displays

Android 13 beta will test out-of-the-box support for most braille displays

May 20, 2022
WhatsApp to Launch Cloud-Based Tools, Premium Features for Businesses

WhatsApp to Launch Cloud-Based Tools, Premium Features for Businesses

May 20, 2022
Huawei and SolarEdge Sign a Global Patent License Agreement

Huawei and SolarEdge Sign a Global Patent License Agreement

May 20, 2022
Dijbouti Telecom Welcomes the Landing of 2Africa Submarine Cable

Dijbouti Telecom Welcomes the Landing of 2Africa Submarine Cable

May 20, 2022
Ghana Smart Africa Digital Academy launches its national digital academy

Ghana Smart Africa Digital Academy launches its national digital academy

May 20, 2022
Ghana’s Rural Telecom Facilities to be Upgraded to 4G

Ghana’s Rural Telecom Facilities to be Upgraded to 4G

May 20, 2022
Silicon Power Announces UD90 PCIe 4.0 SSD

Silicon Power Announces UD90 PCIe 4.0 SSD

May 20, 2022
ZADAK Announces TWSG4S PCIe Gen4 x4 SSD

ZADAK Announces TWSG4S PCIe Gen4 x4 SSD

May 20, 2022
Samsung Sampling 512GB CXL Memory Module

Samsung Sampling 512GB CXL Memory Module

May 20, 2022
IBM Elastic Storage System 3500

IBM Elastic Storage System 3500

May 20, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Sunday, 22 May, 2022
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

10 Essential Cybersecurity and Privacy Features Needed in Video Conferencing

by ITECHNEWS
November 24, 2021
in Opinion
0 0
0
10 Essential Cybersecurity and Privacy Features Needed in Video Conferencing

Video conferencing has become a core technology component for keeping operations moving forward in today’s business world. However, that growth has also led to privacy and security concerns, raising questions about these platforms and their ability to protect users while keeping sensitive information and data completely secure. Of note, Zoom’s platform usage jumped significantly post-COVID, yet one unfortunate byproduct of this dramatic increase was the exposure of several security flaws.

It is clear there are vulnerabilities to video conferencing that make cybersecurity protocols vital to the experience. Other popular platforms like Microsoft Teams and GoToMeeting have also noticed their share of privacy and security issues like those mentioned above.

YOU MAY ALSO LIKE

How to Think about Threat Detection in the Cloud

The Current Status and the Future of the .Net Framework

With a hybrid of in-office and remote work seemingly here to stay, there is an added emphasis for businesses and the public sector to ensure that their virtual collaboration tools provide adequate privacy and security. If these widely used platforms are not able to address these key security concerns, they will continue to be easy targets for hackers with nefarious intent looking to compromise personal data.

Government Warnings

The U.S. has started encouraging businesses and government agencies to be more aware of inherent cyber risks in today’s environment. This is especially true of the country’s economy and infrastructure, and healthcare facilities. The recent Executive Order on Improving the Nation’s Cybersecurity, focusing on a zero-trust model for managing access and authenticating users, is a  step in the right direction after a string of government warnings harkening back to last spring.

In March of 2020, The FBI’s Boston office issued a warning about video conference and online classroom hijacking where they recommended exercising “due diligence and caution in your cybersecurity efforts.” New York’s attorney general sent a letter to Zoom outlining concerns about the company’s security measures to detect hackers and handle increased traffic on its network.

While the company responded to these issues by implementing a range of security improvements, including end-to-end encryption, the consensus is that these baseline security features should have been in place from the start. Even after new features were put in place, senators continued to question federal agencies’ safety while using the service openly. 

Must-Have Video Conferencing Security Features

When choosing a video conferencing platform for your organization, it is imperative that cybersecurity is a top priority. While almost every platform offers some level of security these days, the key is finding the right mix of features that will ensure the highest levels of protection. Here are some recommendations for “must-have” cybersecurity features that will keep organizations and their communications safe:

  • Encrypted audio and video: This might seem like a no-brainer, but it wasn’t until recently that Zoom started to do this. Without this key feature, anyone can eavesdrop on a conversation and see what’s on the camera unbeknownst to the user.  With fully encrypted audio and video, on the off chance a cyber-attacker can break through this line of defense, there is not much they can hijack that is worth any value because what is being spoken and seen is entirely encrypted.
  • Meeting authentication: Besides providing the option to require a password, most platforms fall short concerning authentication. Proper authentication is quite literally the first line of defense, and it should be taken most seriously. Without it, it is near impossible to identify meeting attendees as who they claim to be. Additional video conferencing features should include:
  • One-time passcodes (OTP): Users are sent a unique code to access the meeting that can only be used once.
  • Two-factor (2FA) and multi-factor authentication (MFA): This requires the user to provide two or more verification factors to gain access to a meeting. 2FA and MFA are commonly used in conjunction with an OTP as an additional verification factor.
  • Out-of-band authentication (OOBA): This is a type of 2FA that requires a secondary verification method through a separate communication channel. For example, one channel could be the user’s internet connection on their computer, while the other could be their wireless network connection on their mobile device. OOBA is regarded as the most secure method of authentication.
  • Biometrics: This entails a unique physiological or behavioral trait captured to confirm the individual’s identity, such as their fingerprint, facial recognition or a retina scan.
  • Endpoint protection: This feature protects endpoints from a new type of spyware that can steal a video conference’s audio & video portion. 
  • Anti-keystroke logging: This prevents undetected keyloggers from capturing any keystrokes typed on a computer or mobile device keyboard.
  • Anti–screen capture: This is a feature that eliminates the risk of unauthorized screenshots from taking place.
  • Clipboard protection: This feature prevents copied clipboard data from being stolen by malware.

Protecting Data and Sensitive Conversations Should be the Leading Priority

The video conferencing market is seeing stellar growth heading into 2022 as the business world continues to face uncertainty around the future of in-office work. As cyber-attacks and disruptive virtual meeting incidents become more common, it is imperative for organizations, regardless of size and in both the public and private sectors, to take a closer look at their communications tools to ensure total organizational safety and security. This entails going beyond just training and vigilance, so companies can feel confident that they can meet the numerous cyber-related threats and challenges that lie ahead.

George Waller EVP and Co-Founder of StrikeForce Technologies | infosecurity-magazine.com

ShareTweetShare

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe

Search

No Result
View All Result

Recent News

Qualcomm Announces Snapdragon 8+ Gen 1 and Snapdragon 7 Gen 1

Qualcomm Announces Snapdragon 8+ Gen 1 and Snapdragon 7 Gen 1

May 20, 2022
HP’s premium laptop revamp: more OLED displays, 12th-gen Intel CPUs

HP’s premium laptop revamp: more OLED displays, 12th-gen Intel CPUs

May 20, 2022
Android 13 beta will test out-of-the-box support for most braille displays

Android 13 beta will test out-of-the-box support for most braille displays

May 20, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Qualcomm Announces Snapdragon 8+ Gen 1 and Snapdragon 7 Gen 1

Qualcomm Announces Snapdragon 8+ Gen 1 and Snapdragon 7 Gen 1

May 20, 2022
HP’s premium laptop revamp: more OLED displays, 12th-gen Intel CPUs

HP’s premium laptop revamp: more OLED displays, 12th-gen Intel CPUs

May 20, 2022

Recent News

  • Qualcomm Announces Snapdragon 8+ Gen 1 and Snapdragon 7 Gen 1 May 20, 2022
  • HP’s premium laptop revamp: more OLED displays, 12th-gen Intel CPUs May 20, 2022
  • Android 13 beta will test out-of-the-box support for most braille displays May 20, 2022
  • WhatsApp to Launch Cloud-Based Tools, Premium Features for Businesses May 20, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version