|
|
Try to take advantage of tools that use point-to-point encryption with proper keys, therefore preventing that any third party accesses your content
|
|
Prefer tools that allow for centralized management of platform parameters that can be applied to all users
|
|
Pay special attention to authentication configuration parameters, always prioritizing multi-factor authentication forms
|
|
Don't trust tools that request access to your contacts or system parameters that are not required for them to function
|
|
Make sure that you update the software so that you can take advantage of the latest functionality and security fixes
|
|
|
|
Avoid using private rooms always with the same identification and set up specific rooms for each meeting with random identifiers
|
|
Only allow authenticated users to attend meetings
|
|
Define a password for the session, preventing other participants from attending unexpectedly
|
|
Do not allow users to enter the room when the host is not present, therefore filtering who joins the meeting
|
|
Lock your meetings when all participants are present, preventing new people from joining the meeting
|
|
Turn off all features that allow file sharing, whenever file sharing is not required
|
|
Turn off attendance from phone, whenever phones are not required for participants to attend the meeting
|
|
|
|
Make your communications in visually neutral locations, avoiding sharing unnecessary information about your location
|
|
Prioritize alternative, more direct and secure means to share sensitive information, such as access passwords
|
|
Don't make your communications from public places or any place where third parties can access, both auditorily or visually, to your meeting content
|
|
Attend and share always knowing that it's possible that another participant takes a screenshot or photo of the content on the screen
|
|
|
|
|