Logitech-Banner-for-Blog-KEEP-VIDEO-MEETINGS-SECURE

Work from home hacks to keep video meetings secure

How to protect your video meetings from hackers and pranksters

If you’re new to video conferencing, you’ve probably discovered that it’s a great tool for connecting with others and getting work done, especially when you can’t meet in person. That said, it’s hard to ignore recent stories about meetings getting hacked. And perhaps you’re concerned about it happening to you.

Here’s something to consider: Contrary to popular belief, most “hackers” aren’t terribly sophisticated. The typical hacker, like most criminals, preys on easy targets. That’s good news, because it means that with a few simple steps anyone can prevent hackers and pranksters from spoiling their meeting.

In this article we take a look at steps IT teams and meeting hosts can follow to ensure video conferences are safe and secure.

Tips for Meeting Hosts

In many organizations, IT teams eliminate the guesswork from security by pre-determining settings in your video conferencing software account. If you’re unsure about something, it’s best to start with these internal experts.

Beyond consulting the experts, you’ll want to get familiar with the settings panel in your video conferencing application of choice. Ensure that you are thoughtfully managing the features that IT has made optional, especially as it relates to who can join your meetings and how they are allowed to participate. Different video software applications provide different options for these two areas. We’ll discuss them both generally. Be sure to check your preferred video application to see which options apply to you.

Controlling Who Can Join Your Meeting

In general, video conferencing applications let you as the host decide who can attend your meeting, who can join directly, and who needs to wait in a “virtual waiting room” or “lobby” before they can join.

The least control is to allow anyone with a link to join without restriction. The strictest control is to only allow invited guests to join and to further require the host to approve them to enter. You can achieve the right level of control for your meeting through options such as:

  • Using randomly generated meeting IDs for each meeting you host, rather than your personal meeting room or ID

  • Providing a “lobby” or “waiting room” for attendees until the host has joined the meeting or admitted them in

  • Setting a password to enter the meeting

  • Restricting your meeting to invitees only (the default setting in some video applications)

  • Locking your meeting once it’s begun so no one else can enter

As the meeting host, it’s also good practice to monitor the participant list, ask participants to self-identify, – and remove those you don’t recognize. These extra precautions are especially important for large or public meetings.

Moderating Your Meeting

In addition to managing who can attend your meeting, you will also want to consider:

  • Who is and isn’t allowed to share content

  • Who is able to speak or interrupt

  • Who controls the mute function

  • Who can initiate a meeting recording and who can access the recording afterward

These are important options to prevent your meeting from being hijacked by a prankster.

In smaller or collaborative meetings, it usually makes sense to allow everyone to speak and share content. In larger meetings, however, you’ll often want to restrict these permissions to only the people who are presenting. In this situation, the chat feature available in most video conferencing applications enables non-presenting participants to engage. You may also consider options such as admitting attendees in mute mode and turning off the chat feature.

General Advice for all Meeting Hosts and Participants

In addition to the above recommendations, hosts and participants should follow these best-practices when running or attending video meetings.

  • Use a secure connection. Whenever possible, avoid unsecured networks when connecting to business-related video conferences. Even home Wi-Fi can be targeted by hackers. Connecting through your company’s virtual private network, or setting up your own VPN, can help ensure security.  

  • Keep software up to date. This is such a basic recommendation, and yet it’s surprising how many people fail to update software on their laptops and phones or keep their video conferencing software up to date. (See note above about hackers preying on easy targets!)

Tips for IT Teams

As an IT manager, you need to enable and support end users who have varying degrees of knowledge on the subjects of video conferencing and security. With that in mind, here are two approaches for implementing best practices.

  • Take control upfront. By taking a proactive approach, you can prevent many of the security problems end users encounter. For example, implementing automatic software updates will eliminate most security issues. Also, review your video software’s admin console to determine which security features are critical for users and configure those settings so they can’t be overridden.

  • Educate and even over-communicate to end users. What you can’t control, you may be able to change through education. Step one is providing simple, easy-to-find training that’s actionable for end users. At the same time, it’s often best to over-communicate regarding software training, updates, and security changes. The goal is always to make it as easy as possible for people to understand and adopt security measures.

With everything that’s going on, it’s worth taking a moment to recognize that no one means to be careless about video security and privacy. A little communication and understanding can go a long way. Being proactive about security will keep you or your user community from becoming an easy target for hackers and pranksters.

Logitech-Banner-for-Blog-VIDEO-CONFERENCING-IS-HERE-TO-STAY

Video conference is here to stay. Are you ready?

How it can proactively prepare for the next normal

For the past 10 or so years, there has been a steady increase in video conferencing, as globally distributed companies shifted from in-person meetings and teleconferences to video meetings. But as we have seen, a crisis like the one we’re currently facing can accelerate the adoption of new technology and drive permanent change in behavior. That certainly seems to be the case with video conferencing.       

The question is: Are you ready for it?

For those in IT who are responsible for provisioning and managing video conferencing systems, this moment represents an opportunity to get ahead of the coming wave in video adoption. While people are working from home, IT teams can use this time to focus on the following:

  • Operational readiness
  • New technology requirements and budgets
  • Remote device-management tools
Take care of updates and other operational requirements.

With a majority of the workforce at home, this is a good time to make sure conference room devices and systems are current, including updating software and firmware for your video conferencing devices. Have you enabled new features like auto-framing? Consider making those updates now. You can also use this time to work on provisioning rooms for video conferencing while they are unoccupied. 

This is also a good opportunity  to look at security policies and systems to protect video meetings (and shared content) from intrusion and uninvited guests.

Plan for more video meetings and budget accordingly.

As business users move rapidly from telephone to video and make videoconferencing their preferred mode of communication, they will also request new hardware tools to support their video requirements. This might mean replacing desktop computers with laptops or upgrading laptops to handle compute-intensive video software. You may decide to shorten the refresh cycle on laptops, for example, to meet this need. 

Once users see how unpredictable lighting and noise levels can be in a typical home office, it’s likely they  will also ask for webcams, headsets, and other peripherals to improve the videoconferencing experience for themselves and others.

And of course, changes like these can impact IT budgets. For government agencies and organizations whose fiscal year often begins July 1, this is a good time to look at the IT budget and determine if priorities need to be adjusted before stay-at-home orders are lifted. But every business should consider the implications of the fast-moving wave of video adoption and make sure their budgets reflect this reality.

Consider deploying remote application- and device-management tools.

As the number of conference rooms and devices grows in your organization, it becomes increasingly beneficial to employ a remote device-management tool. These applications allow you to easily provision and manage conference rooms, devices, and software. They enable you to deploy product upgrades and bug fixes to make sure systems and rooms are functioning and up to date. They give you visibility into conference room issues in real time so you can resolve problems before they affect a meeting.

And of course, these tasks can be expedited from a remote location, minimizing site visits.

Just as important, a remote device-management tool can provide valuable insights on metrics such as room utilization. This data can be used to improve meeting scheduling and hardware provisioning. To learn more about Logitech’s remote device-management tool for video conferencing, check out Logitech Sync.

Document your best practices.

A final recommendation is to be sure you are documenting the steps you’re taking to video-enable the business. For many organizations, this move represents an acceleration of existing initiatives. You may need to justify budget requests in light of changing priorities and rapid video adoption. Providing management with visibility into the work you’re doing can support your budget needs.

Adapt to an environment that is both temporary and permanent.

There’s no question that recent global events have accelerated trends in working remotely and working from home. While we recognize that current stay-at-home orders will evolve with the changing environment, we should not expect everything to return to the way it was before. It seems clear there will be less business travel, more video conferences, and more remote work. 

IT managers would be wise to take a proactive approach to this situation and prepare themselves for an even larger wave of video conferencing and video adoption. Doing so can help meet user needs while minimizing support requests and trouble tickets.