Learn how to use Communication / Video tools correctly
The coronavirus pandemic has transformed how many organizations operate daily and led to the swift adoption of alternative communication tools, namely video conference tools.
These tools are no longer used only occasionally and are now work tools that are constantly used by millions of workers.
As always, when there’s a change, new risks appear that must be managed and mitigated properly:
1. Select proper tools
Try to take advantage of tools that use point-to-point encryption with proper keys, therefore preventing that any third party accesses your content
Prefer tools that allow for centralized management of platform parameters that can be applied to all users
Pay special attention to authentication configuration parameters, always prioritizing multi-factor authentication forms
Don’t trust tools that request access to your contacts or system parameters that are not required for them to function
Make sure that you update the software so that you can take advantage of the latest functionality and security fixes
2. Use tools properly
Avoid using private rooms always with the same identification and set up specific rooms for each meeting with random identifiers
Only allow authenticated users to attend meetings
Define a password for the session, preventing other participants from attending unexpectedly
Do not allow users to enter the room when the host is not present, therefore filtering who joins the meeting
Lock your meetings when all participants are present, preventing new people from joining the meeting
Turn off all features that allow file sharing, whenever file sharing is not required
Turn off attendance from phone, whenever phones are not required for participants to attend the meeting
3. Ensure privacy
Make your communications in visually neutral locations, avoiding sharing unnecessary information about your location
Prioritize alternative, more direct and secure means to share sensitive information, such as access passwords
Don’t make your communications from public places or any place where third parties can access, both auditorily or visually, to your meeting content
Attend and share always knowing that it’s possible that another participant takes a screenshot or photo of the content on the screen