Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Standardizing video conferencing security guidelines should be a top government priority

By George Waller
video-conference-freepik006785.jpg
November 24, 2021

With more individuals working remotely over the past two years, the world has seen a rise in collaborative technologies, with meetings taking place via Zoom, Microsoft Teams and other platforms. But this trend has coincided with too many reports of lewd meeting interruptions and negative “Zoom Bombing” incidents, reaching a point where politicians have had to actually address these types of issues head-on. 


Earlier this year, the government issued an executive order to bolster cyber defense and implement a zero trust approach, making it clear that the U.S. is looking much more closely at cybersecurity as a top national priority. But the world is changing fast, and when it comes to collaborative communication tools, organizations are still susceptible to the security flaws of the many widely used platforms. Now, many security industry experts are increasing their focus on addressing any and all of these potential vulnerabilities to ensure that proprietary data is protected by the most enhanced methods of technology. 


With a global cultural shift towards a hybrid remote work dynamic, governments must continue to adapt to these new realities heading into next year. Agencies and public officials must be able to have extreme confidence in the security of the virtual meeting platforms they’re using to ensure critical information and sensitive discussions aren’t breached. 


Developing new recommendations and guidelines


Early on during the pandemic, federal officials saw a worrying trend in the rise in “video conferencing hijacking events,” which impacted schools, the financial industry, healthcare and other areas. This string of incidents led to the Department of Homeland Security issuing a direct warning to businesses and putting out an initial set of guidelines and best practices to help users understand the threat of cyberattacks and prevent hackers from getting into a meeting. 


These early guidelines were a positive start but needed to go further in establishing robust meeting policies. Ideally, every video conferencing organizer should be able to classify the type of meeting to be able to determine whom to invite and control the access to information. This will allow government organizations to grant acceptable privileges to their teams, so they run the meeting in a secure way. It is now practical to secure video conferencing and protect all parties involved, even if malware or spyware has crept onto an individual’s computer or an organization’s network. With breaches and virtual meeting interruptions becoming more common, there is no excuse for government agencies to overlook this area of cybersecurity. 


How platforms can bulk up on security


While the majority of competing video conferencing services have made attempts to improve security measures, many industries, including healthcare and finance, remain skeptical about the strength of security and the ability of video conferencing platforms to protect sensitive information and conversations. Users should always be cautious about sharing passwords, ID numbers, IP addresses, company data, trade secrets and other proprietary data with these services until there are major improvements. 


Reliance on video conferencing platforms continues to grow, and now other governments from around the world are expressing their own privacy concerns. The U.S. must continue to push collaborative technology compliance best practices while offering guidance on new tools and solutions that can shut down threat vectors. At the very least, these platforms should look to implement out-of-band authentication tools, keystroke protection for proprietary meeting authorization, as well as complicated password systems. 


Hackers have become adept at infiltrating these platforms, so it is imperative that organizations, CISOs and CTOs proactively secure alternatives, keeping in mind that they must ensure reliability, performance excellence and an easy-to-use system. 

While almost every video conferencing platform states that it offers some level of security, there are key differentiators that make a platform stand out for its protection value, including:


Encrypted Audio and Video: This might seem like a no-brainer, but without this key feature, a hacker could easily hijack audio & video streams as they travel across the internet. With fully encrypted audio and video, your data is protected while in transit. 


Camera, Microphone and Audio Lockdown: Locking down your camera, microphone and audio speakers from eavesdropping spyware needs to be a top priority for any organization when it comes to protecting classified, restricted, high-risk & moderate risk data; all of which are governed by compliance regulators. 


Meeting Authentication: Aside from providing the option to require a password, most platforms fall short with respect to authentication. Proper authentication is quite literally the first line of defense, and it should be taken most seriously. Without it, it is near impossible to identify meeting attendees as whom they claim to be. 


Other key security features should include endpoint protection, anti-keystroke logging, clipboard protection, biometrics and anti-screen capture. 


Mitigating cyber threats and security risks going forward 

The video conferencing market is seeing stellar growth, meaning cyber-attacks and disruptive virtual meeting incidents will only become more frequent. It is crucial for government organizations to build off of the early guidelines for virtual meeting security and take a closer look at their conferencing tools to ensure total organizational safety.


The new realities of communicating in the remote work environment have led to a whole new set of challenges. Ransomware and critical infrastructure attacks have garnered much of the attention, but digital communication technologies are still being overlooked, and meeting breaches will continue to occur until things get resolved. Moving forward, initiatives related to protecting users on virtual meeting tools should be at the forefront of every government’s cybersecurity agenda. 

KEYWORDS: authentication cyber security encryption video conferencing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

George Waller is EVP and co-founder of StrikeForce Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • 5 mins with Howlett

    5 minutes with Tony Howlett - Vendor risk management needs to be a top security priority in 2021 and beyond

    See More
  • physical-security-cyber-fp1170x658v40.jpg

    Why cybersecurity should be your physical security priority

    See More
  • Voting2

    Election Security Is Top Priority for U.S. Government, Officials Say

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing