Page 47 - ADE_Stakeholder Guide_Sea Teach (1)
P. 47
ADE
2020-1-TR01-KA226-VET-098418
As also many stakeholders from the tourism industry are incresingly using video conference
for interviews and also for internal online training, it is importantfor them to be aware of the
security risks and put adequate measures for secure video conference into place.
Measures recommended by experts such as Softermi are to
- Require a password to join: Requesting a password for a meeting from attendees to
prevent uninvited visitors from joining. It's good practice to include a multi-factor
authentication feature to ensure additional security and verify that only authorized
members participate in a meeting.
- Conduct regular software updates: Security patches guarantee that the software you're
using has the most recent updates. Make sure you're downloading an official release of
the software to prevent installing dangerous malware instead.
- Do not neglect the privacy policy: Carefully read the tool's privacy policy to know
how it treats user data. Be sure to check how long the data is stored, if it's stored at all.
It would be best to choose vendors who don't store meeting recordings on their
servers. Also, appoint a person in charge of storing and keeping meeting data at your
company.
- Control Attendees: Keep track of who joins the meeting. You need to be able to
identify all guests. It's useful when a video conferencing software has a notification
system when a new person joins a meeting.
- Establish waiting rooms: Instead of letting participants join a meeting directly, make
the host of the conference control access. When the waiting room feature is
implemented, the host receives a notification that someone wants to join the meeting.
The responsible person can then determine whether it is acceptable for the guest to
participate.
- Encrypt Meeting Recordings: End-to-end encryption is critical when discussing
sensitive corporate information. Password-protected encryption will make your data
inaccessible when received by third parties. On the other hand, when data transmission
is not encrypted, a hacker can obtain and read data easily.
- Build a corporate video conferencing culture: Regardless of the choice of video
conferencing providers and security measures built into them, if your employees don't
47

