7 Ways to Do Security

7 Ways to Do Security

Security of your web conferenceIf security is a priority for your organization, you will want to ensure that your audio and web conferencing services and recordings are not being accessed by unauthorized individuals.   There are several things to keep in mind when thinking about security:

  • Physical Security
  • Network Security and Redundancy
  • Stored Data Security
  • Application Security
  • Role-based
  • Pre-meeting
  • During the meeting

Physical Security

Let’s talk a little bit about physical security, where your conferencing services are being hosted is very important.  Are they hosted in a state-of-the-art, certified data center that is monitored and staffed 24/7/365 with multiple levels of security including video surveillance, software monitoring and alerts?  If not, you probably want to ask your provider what level of security you can expect.

Network Security and Redundancy

Meeting services cross multiple data paths on the Internet, if your service isn’t using encrypted network paths to communicate with the central service, your messages may not be private or keep their integrity as users begin sessions.

Stored Data Security

Once a meeting or presentation has been completed and you recorded it, how do you know it’s not being accessed by unauthorized personnel?  It is critical to understand if the data has any type of encryption scheme so that you can be sure your sensitive data is being protected.

Application Security

There are several levels of application security – basic and secure.  The basic level is the default and states that all meeting participants that have the right meeting start time and proper access code can enter the conference without any additional authentication.  The secure level requires participants to enter an access code and an additional security code which can be changed for each conference if needed.

Role-based

Security measures can also be put in place depending on the role a person is in the meeting.  Chairpersons could have several controls available to them such as they can set access levels, disconnect participants, lock conferences, set view mode and gather registration information.  A Co-presenter should have those same controls.  The participants should only see information presented to them through the web browser and not have the ability to record or share any information.

Pre-meeting and during the meeting

A few other security measures can be put in place pre-meeting and during the meeting.  Pre-meeting a chairperson could require participants to pre-register and/or could set a passcode.  Once the meeting is live, the chairperson should be able to control the participants’ view at all times, disconnect participants as needed or lock down the conference to prevent additional participants from entering, mute/unmute all participants and even place participants into a “Listen Only” mode.

Make sure your provider has the proper security measures in place and if you are not sure, ask them what they are doing to ensure your meetings are safe, that your content is secure, that you don’t have unwanted participants dialing into your meetings and unauthorized personnel downloading your recordings.

To learn more about how to ensure your online meetings and webinars are secure, please read the ReadyTalk Network Security Whitepaper.

 

Share this:

Blog posts by author

Leigh Clancy

Leigh Clancy

Leigh Clancy is a Product Marketing Manager at ReadyTalk. In this role she interfaces with product management, marketing, customers and customer-facing teams extensively to help with targeting, messaging, positioning and product launches. Leigh started her career in marketing over fifteen years ago working for high-tech companies such as Harbinger, Verio, Level 3 Communications, iBAHN and Symplified, where she gained valuable knowledge on how to market very complex, technical products and services to a wide variety of audiences. Outside of work you can find her trying to learn to golf, reading, traveling, hosting backyard movies, camping, tasting wine and spending time with family, friends, and her dog.

Similar Articles:
B2B Webinars Closing Deals I came across this post today on the MarketCapture Blog. Eran points to a positive experience his client had with a webinar. In this case, the webinar helped his client close several deals that had been in limbo for a period of time. He learned, as we know at ReadyTalk, that webinars can be very p...
CloudTalk: Partnerships NOT Ve... Sean Flynn's autumn beard is growing as fast as his wife’s disdain for it. He’s jumped on the Movember men’s health initiative and, frankly, doesn’t give a whisker. The three-year-long ReadyTalker begins and ends each day with a focus on customer connections — before, during, and after every sal...