Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with George Waller - Best practices when using video conferencing platforms

By Maria Henriquez
5 mins with Waller
March 15, 2021

Video conferencing platforms have become an essential communication tool over the past year. In addition to increasing team collaboration, video conferencing can help prevent miscommunication among teams, increase engagement, and allow for face-to-face communication to help build relationships among teams, particularly for remote teams. Though the benefits are many, there are growing concerns about the security shortcomings of video conferencing, according to George Waller, EVP and Co-Founder of StrikeForce Technologies. To get more insight on this topic, we spoke to Waller about key challenges with securing video conferencing platforms, as well as why these services are so susceptible to hacking. 

 

Security: What is your background and current role with Strikeforce?

Waller: I would consider myself both an entrepreneur and a technologist at heart, and have spent the majority of my decades long career working in the tech industry building computer systems. My passion is in developing market-changing software and platforms that helps keep users and their systems secure. Currently I am EVP and co-founder of StrikeForce Technologies, a cybersecurity tech company that helps organizations and businesses prevent damaging data breaches and instances of cyber theft. Millions of users worldwide have downloaded our software, and our company played a pivotal role in pioneering the creation of two of the most widely used cyber security technologies: “Out of Band” authentication and keystroke encryption. 

Today, our technologies are widely used in the marketplace across sectors like banking, healthcare, education, manufacturing and government. We are now taking all of our cybersecurity solutions and security expertise into the growing video conferencing space. 

 

Security: Let’s discuss the rise of video conferencing during the pandemic. Are there privacy and cybersecurity vulnerabilities with video conferencing services? 

Waller: When COVID-19 hit, the business world had to quickly pivot into a new remote work paradigm. Many started heavily relying on platforms like Zoom, MS Teams, WebEx and others to help solve this immediate problem. But this increase in video conferencing meetings has also paved the pathway to the rise in cyberattacks and cases of ‘zoom bombing’ that are making headlines daily. It’s reached a point to where even the U.S. government has issued warnings to the public about the potential cyber dangers of video conferencing, telling people to be cautious of suspicious activity from cybercriminals looking to breach these platforms and do some serious damage. 

Existing conferencing solutions have proven time and time again to be vulnerable in protecting users during their video sessions, it seems that every one of the existing video conferencing platforms are fighting for the spot of least secure platform. This is because the companies that built these systems are video conferencing companies, not, cybersecurity companies. They built systems with one simple goal, to allow people to see & hear each other. Because of that, these systems are seriously flawed. If you have a dam that keeps cracking and springing leaks, the problem is not the leaks, the problem is the dam. You can’t just stick a cyber band-aid on a system and expect it to be secure if it wasn’t designed with cybersecurity as a core tenet. 

 

Security: Will privacy and cyber issues increase as video conferencing platforms become more prominent tools in our lives?

Waller: A mixture of remote work and the physical workplace will likely be a permanent fixture, and since none of the existing video conferencing platforms were not designed to protect the user, or their data, privacy and data breaches will continue to rise. Hackers follow the money trail, and since hacking has become so lucrative, those existing fatally flawed systems are just a breach waiting to happen. The reality is, there are numerous attack vectors and daily vulnerabilities i.e. a zero-day, that are designed to easily bypass our existing anti-virus software and compromise our devices. In addition to the data loss, breaches spell disaster for heavily regulated and compliant industries in the form of massive fines. As a result of these vulnerabilities, we are now seeing a hard shift in government organizations and enterprises to look for cyber-secure video conferencing platforms. 

 

Security: How can video conferencing vendors build platforms with security and privacy as the leading priority?

Waller: The first item that vendors need to understand is about security layering, you can’t lock your front door and leave your windows wide open and think you're safe, it doesn’t work like that. 

Almost every vendor on the market (other than us) requires you to download desktop client software, while convenient, it is a very bad idea from a security perspective. The reason being is that the desktop client can easily be exploited by hackers to steal your video stream, your microphone stream, and your audio-out stream. Additionally, that desktop client can be used to capture your keystrokes, clipboard and take unwanted screen shots. 

Once their exploitable desktop client is removed from play, vendors need to implement best-practice security guideline recommendations. But even those aren’t strong enough to thwart some of today's sophisticated attacks. You cannot design a secure system without having strong two-factor Out-of-Band authentication, you also need to layer in the concept of an authorized user, and you need the ability to authenticate corporate users with fingerprint and/or facial recognition. 

Desktop protection, it’s so important! You cannot just rely on anti-virus software to keep you safe. When choosing a video conferencing vendor you need to make sure that the vendor can protect the following, your camera, microphone, audio-out speakers, your keyboard, clipboard and from unwanted screen shots. The vendor's solution should also protect you when you're using other video conferencing solutions and it should protect your computer's keyboard and clipboard all the time, not just when you’re on a video conference.

 

Security: What are some general video meeting security best practices for business and consumers?

Waller: As for best practices when using video conferencing tools, first and foremost if you don’t feel secure, don’t share any information that may put you at risk - whether that’s intellectual property, PII, or heck, even pictures of your kids, if you wouldn’t walk around in public showing that type of information, it’s not safe to broadcast over video either. On top of that, it’s the little things that can make a big difference. Always password protect your meetings, never use a personal event link for a public facing meeting, and ensure your service provider encrypts all audio and video transmission - just following these simple tips can help mitigate some of the many attack tools that hackers have at their disposal.

KEYWORDS: cyber security remote workers risk management video conferencing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video conference

    Staying Protected While Connected – Video Conferencing Best Practices for Businesses and Consumers

    See More
  • 5 mins with Borromeo

    5 minutes with Michael Borromeo – Cybersecurity best practices with a hybrid workforce

    See More
  • 5 mins with jorge rey

    5 minutes with Jorge Rey - Top remote cybersecurity best practices

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • November 17, 2025

    SECURITY 500 Conference

    This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing