New Security Threats Due to Influx of Remote Workers

Many organizations have turned to remote meeting applications to communicate and remain productive. Although there are many applications available—Zoom, Ring Central, GoToMeeting—each has its unique security concerns. Throughout 2020, the security flaws of multiple remote meeting applications have become major news stories, and some sectors have decided to ban certain products due to reports that scheduled meetings and meeting information are being intercepted and shared outside of the organization.


If your organization is using a remote meeting application, Flycast Partners recommends implementing a standardized security review matching the strength of your internal security policies. To ensure organizations maintain quality security measures, eliminate unauthorized access, and provide the necessary governance and compliance, these security requirements must include an in-depth review process equal to those enacted when operating all software applications.


Why though? Is it because the remote meeting applications are not performing securely? We would say no. It is a training issue.


From experience, research, and listening to our customers, Flycast Partners has concluded that every organization needs clear methods protecting your data from the vulnerabilities of these remote meeting applications before and after the invites are sent.


To minimize your security concerns before, during, and after meetings, we have created a checklist of fundamental tips to follow when utilizing remote meeting applications.


Research and preparation:

  • Vet the software to ensure it meets your organizational needs

  • Train meeting organizers how to operate the application effectively

  • Develop protocols for resolving the unexpected

  • Practice resolving abnormalities and unexpected events quickly and reliably

  • Configure what actions users can perform during meetings


Apply the proper controls:

  • Keep software updated

  • Share invites only through secure methods

  • Password protect the invite

  • Generate a new meeting ID for every meeting

  • Use unique meeting numbers

  • Have the capabilities to restrict a user’s microphone and camera


Always have a Plan B:

  • Have the capabilities to remove a user from the meeting immediately

  • Provide the option to trigger a new meeting if the meeting gets out of control


These essential security measures ensure safer experiences when using remote meeting applications.

By Dean Pierce | September 15th, 2020 | 0 Comments

Follow us on Twitter