BlogYour source for insights and information about Streamlined Communications.
ARTICLES - 19/11/2016 TAGS: Technology Comment(s) 0
Video conferencing offers significant benefits to businesses, making operations more efficient, increasing levels of collaboration, and saving money. With the benefits of unified communication solutions like this, however, come new – and often substantial – risks.
The primary risk is commercially sensitive information getting into the hands of the wrong people. This could be people within your organisation getting information they should not have, or individuals outside your business.
When people think about risk related to technology they usually think about hackers. This is an issue that must be considered, with measures put in place to mitigate the potential for attack, but it is not the only risk associated with IT. Many IT security breaches, in fact, are the result of actions of employees rather than external attackers using a screen and keyboard.
Businesses therefore face both technical and human risks when using video conferencing. In addition, breaches can be accidental or deliberate. You have to cover all eventualities to ensure your video conferencing is secure.
What Is The Scale?
The unfortunate reality is that both video conferencing technology, and the way we use it, is inherently insecure. This includes the streaming protocols that currently exist, as well as the actual video and audio capturing equipment installed in your offices. In addition, policies and procedures, or lack of them, has an impact.
The underlying network your video conferencing solution is built on is therefore crucial to ensuring it is secure, as is Skype for Business integration and integration with other platforms. Improving your internal rules and policies is also essential.
Improving Security – Technology
The video conferencing solution that you use must have enterprise levels of security in place that strengthens the technology as much as possible. Two absolutely crucial elements are:
Another critical element of the technical security puzzle is ensuring the system is updated with new codecs, software enhancements, security patches, and more. You should exercise caution with upgrades though, as sometimes they are fake and are used by hackers to plant malicious code. It is best that updates are processed by those with in-depth knowledge of the system, such as your unified communications solution provider.
Improving Security – Processes
The internal policies, rules and processes of your organisation are critical to the security of video conferencing too. You can have the best technical security that money can buy but it is worthless if a member of your team inadvertently (or deliberately) gives a passcode for a virtual meeting to someone who should not have access.
The things you should think about include:
Remember also that the host of each meeting is a crucial person as the meeting cannot start until they join. You can use this as another layer of security – by making senior personnel hosts. In addition, one final security measure you can implement is turning off video conferencing equipment when it is not in use, and using lens caps.
Ensuring you use a video conferencing solution from a reputable solution provider that takes security seriously, while ensuring you have sufficient internal policies in place, will overcome the risks that video conferencing presents.
The Jamvee video conferencing product from Tata Communications is a good example of a solution that takes security issues seriously. In addition to facilitating the above it also deploys robust security at its data centres and physical network.
If you would like to have your current system evaluated to see where security and performance improvements can be made, contact a member of the Streamlined Communications team today.[osd_social_media_sharing]
Make your selections, then click the "filter" button below.