Page 48 - ADE_Stakeholder Guide_Sea Teach (1)
P. 48
ADE
2020-1-TR01-KA226-VET-098418
have established best-practice behaviors, tools alone won't keep cyber threats for video
conferencing software off the shore.
- Be on the lookout for unknown phone numbers: If any attendee dials from the
unknown number, ask to confirm the identity. If the intruder refuses to do so, remove
them from the call. Check whether your conferencing application requires passwords
when dialing in. Avoid publicly sharing full meeting links. When receiving a meeting
invitation, verify that it's from a known, trusted sender. Once everyone has joined,
lock the meeting to keep out unknown attendees.
- Establish notifications when meetings are forwarded: Set alerts so you know when
meeting invites are forwarded over email to others. Check any secondary invitees are
legitimate. If necessary, schedule another meeting with new details.
- Limit file sharing in the chat: Restrict file sharing in the message column of a video
conference so that any unknown attendees cannot receive and open private documents
or send malware disguised as an attachment to others of the call.
- Choose a business or enterprise plan: Your employees need efficient communication
tools. Consider paying for an enterprise license that gives greater control over
employee use and ensures access to additional features that meet your privacy needs.
Source: https://www.softermii.com/blog/how-to-eliminate-cyber-threats-for-your-
video-conferencing-and-chatting-system
SOURCED FROM ADOBE STOCK 27
48

