Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesLogical SecurityCybersecurity News

Staying Protected While Connected – Video Conferencing Best Practices for Businesses and Consumers

By Rebecca Herold
video conference
April 24, 2020

The COVID-19 (coronavirus) pandemic has drastically altered today’s working environment with a seemingly ever-increasing number of workers being forced to telecommute while organizations are quickly digitalizing their processes and capabilities to ensure continuity.

Notably, there’s been a massive surge in video conferencing over the past several weeks – it’s a great tool for friends and family to stay connected, for students to continue classes online, and for workers to ensure productivity throughout the workday.

As with all digital and online tools, there are inherent security risks associated with utilizing video conferencing platforms – some concrete steps that consumers and organizations alike can take now to improve security include:

  • Making sure physical environments where participants will be video conferencing from have been secured in advance. Specifically, it’s important to remember to remove sensitive information, in any form, from viewable locations, such as on computer screens, whiteboards, etc.
  • Ensuring that all “smart” – Internet of Things (IoT) – listening devices, such as digital assistants, in the vicinity of where work is being performed are turned off and completely shut down.
  • Securing the network through which the video conference will occur. You should require ID and password authentication to get onto the wireless network and use the strongest level of encryption for Wi-Fi traffic so that those with access to any part of the transmission pathway will not be able to inject themselves into the communication. You should also keep wireless networks, as well as remote and online meeting tools, patched and updated – it’s important to do this as soon as possible after new code is released.
  • Using end-to-end encryption. Not just in regard to transmission of the meeting that is going on through the Internet, but also encryption at your device. If encryption isn’t utilized, then others who have access to your device will still be able to see, and possibly access, your meeting through your own device.
  • Making sure to follow your business information security and privacy policies if using a video conferencing tool for business meetings. Each organization should have a policy and procedure indicating the acceptable video conferencing tools that are approved to use for business purposes. For those that do not have such policies and procedures in place, many may be currently working to implement them.

Additionally, consumers that are utilizing video conferencing as a means of staying connected with friends and family should:

  • Set a unique meeting ID and a strong password to get into a virtual get-together – this is simple, but extremely important.
  • Refrain from putting your attending information online. Not even within a social media direct messaging communication. Most apps ask to have access to your contacts and your messages, which could enable them to gain access to your meeting. Limit the people who know the meeting information to only those you want to attend. Use individual email addresses or send the meeting info in a text message to ensure that no uninvited guests join your conference.
  • Limit the amount of people who can share their screen or files. In many conferencing platforms this can be accomplished by changing screensharing to “Host Only.” This will help prevent unauthorized attendees from “bombing” your meeting with unwanted images and videos.
  • Do not post photos of your video meeting. Not only is this a privacy issue with many video meeting tools, but you will likely also be publishing the associated meeting ID if you aren’t careful. This can then lead to uninvited people joining your meeting and sharing unwanted audio, video, photos, or malicious files.
  • Lock your video meeting after everyone has arrived. This will keep hackers and other types of interlopers from coming into your meeting without your knowledge.
  • Never keep the video conferencing tool left on and open to seeing and hearing in your house when you are not actually meeting. This allows not only sights and sounds to be recorded, but also, depending upon the configuration of the tool, creates a pathway into your wireless network.

Every type of technology has potential security challenges that consumers and business must be aware of – video conferencing is just one of many.

However, the above recommended practices outlines some key ways that consumers and organizations can more securely leverage video conferencing platforms for work and leisure alike.

KEYWORDS: conference coronavirus cyber security video monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rebecca herold headshot

Rebecca Herold is an IEEE Member, CEO of Privacy & Security Brainiacs SaaS Services and The Privacy Professor Consultancy. She is an entrepreneur, author & was an Adjunct Professor for the Norwich University Master of Science in Information Security & Assurance Program for 9 years where she also created program curriculum. Herold led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has a B.S. in Math & Computer Science & an M.A. in Computer Science & Education. Image courtesy of Herold 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Waller

    5 minutes with George Waller - Best practices when using video conferencing platforms

    See More
  • rain against glass with storm clouds

    Best practices for protecting businesses against extreme weather

    See More
  • cyber remote work

    Connected and protected: Identity management for enterprises in an era of zero trust

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing