Page 47 - ADE_Stakeholder Guide_Sea Teach (1)
P. 47

ADE
                                            2020-1-TR01-KA226-VET-098418






               As also many stakeholders from the tourism industry are incresingly using video conference
               for interviews and also for internal online training, it is importantfor them to be aware of the

               security risks and put adequate measures for secure video conference into place.


               Measures recommended by experts such as Softermi are to


                   -  Require a password to join: Requesting a password for a meeting from attendees to

                      prevent  uninvited  visitors  from  joining.  It's  good  practice  to  include  a  multi-factor

                      authentication  feature  to  ensure  additional  security  and  verify  that  only  authorized
                      members participate in a meeting.

                   -  Conduct regular software updates: Security patches guarantee that the software you're
                      using has the most recent updates. Make sure you're downloading an official release of

                      the software to prevent installing dangerous malware instead.

                   -  Do not neglect the privacy policy: Carefully  read the tool's privacy policy to know
                      how it treats user data. Be sure to check how long the data is stored, if it's stored at all.

                      It  would  be  best  to  choose  vendors  who  don't  store  meeting  recordings  on  their
                      servers. Also, appoint a person in charge of storing and keeping meeting data at your

                      company.
                   -  Control  Attendees:  Keep  track  of  who  joins  the  meeting.  You  need  to  be  able  to

                      identify all guests. It's useful when a video conferencing software has a notification

                      system when a new person joins a meeting.
                   -  Establish waiting rooms: Instead of letting participants join a meeting directly, make

                      the  host  of  the  conference  control  access.  When  the  waiting  room  feature  is
                      implemented, the host receives a notification that someone wants to join the meeting.

                      The responsible person can then determine whether it is acceptable for the guest to

                      participate.
                   -  Encrypt  Meeting  Recordings:  End-to-end  encryption  is  critical  when  discussing

                      sensitive corporate information.  Password-protected encryption  will make your data
                      inaccessible when received by third parties. On the other hand, when data transmission

                      is not encrypted, a hacker can obtain and read data easily.

                   -  Build  a  corporate  video  conferencing  culture:  Regardless  of  the  choice  of  video
                      conferencing providers and security measures built into them, if your employees don't





                                                            47
   42   43   44   45   46   47   48   49   50