Cibersecurity Newsletter
APRIL 2020

intro

Learn how to use Communication / Video tools correctly

check

The coronavirus pandemic has transformed how many organizations operate daily and led to the swift adoption of alternative communication tools, namely videoconference tools.

check

These tools are no longer used only occasionally and are now work tools that are constantly used by millions of workers.

check

As always, when there’s a change, new risks appear that must be managed and mitigated properly:

1. Select proper tools

check

Try to take advantage of tools that use point-to-point encryption with proper keys, therefore preventing that any third party accesses your content

check

Prefer tools that allow for centralized management of platform parameters that can be applied to all users

check

Pay special attention to authentication configuration parameters, always prioritizing multi-factor authentication forms

check

Don't trust tools that request access to your contacts or system parameters that are not required for them to function

check

Make sure that you update the software so that you can take advantage of the latest functionality and security fixes

2. Use tools properly

check

Avoid using private rooms always with the same identification and set up specific rooms for each meeting with random identifiers

check

Only allow authenticated users to attend meetings

check

Define a password for the session, preventing other participants from attending unexpectedly

check

Do not allow users to enter the room when the host is not present, therefore filtering who joins the meeting

check

Lock your meetings when all participants are present, preventing new people from joining the meeting

check

Turn off all features that allow file sharing, whenever file sharing is not required

check

Turn off attendance from phone, whenever phones are not required for participants to attend the meeting

3. Ensure privacy

check

Make your communications in visually neutral locations, avoiding sharing unnecessary information about your location

check

Prioritize alternative, more direct and secure means to share sensitive information, such as access passwords

check

Don't make your communications from public places or any place where third parties can access, both auditorily or visually, to your meeting content

check

Attend and share always knowing that it's possible that another participant takes a screenshot or photo of the content on the screen

Archive

2024

2023

2022

2021

2020

2019

Subscribe our newsletter.


Cookie Consent X

Devoteam Cyber Trust S.A. uses cookies for analytical and more personalized information presentation purposes, based on your browsing habits and profile. For more detailed information, see our Cookie Policy.