video conferencing - oswald companies...video conferencing essential risk management tools companies...
TRANSCRIPT
Video ConferencingEssential Risk Management Tools
Companies are staying connected with clients
and employees with video conferencing.
WAR DIALING
This tactic is used to discover passwords
to meetings. Hackers will automatically
scan and dial an extensive list of phone
numbers to illegally gain access.
VIDEO CONFERENCE HIJACKING
Also referred to as “bombing” is occurring
and is an emerging exposure. The incidents
are pervasive to the extent the FBI has
developed a response.
Sources
https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-of-teleconferencing-and-online-classroom-hijacking-during-covid-19-pandemic
https://krebsonsecurity.com/2020/04/war-dialing-tool-exposes-zooms-password-problems/
https://www.computerworld.com/article/3535924/do-s-and-don-ts-of-videoconferencing-security.html
https://blog.paloaltonetworks.com/2020/04/network-video-conferencing-security/ https://blog.zoom.us/wordpress/2020/03/20/keep-uninvited-guests-out-of-your-zoom-event/
Upgrade from the consumer-grade software to the professional/enterprise use versions as they typically have more security options and settings.
Eight things to consider when setting up your video conference call
Confirm your video conference software is up to date with the latest official version to ensure the most recent security upgrades.
Review the default security settings and update as needed.
Use the waiting room feature and admit only participants who you know.
Require a password to help keep uninvited guests from joining your meeting. Use best practices when selecting passwords.
Confirm meeting links are from known and trusted sender; be cautious of phishing attempts.
Verify the identity of meeting attendees before admitting them to the video conference.
Educate employees on hosting meetings and establish security policies and protocols.
Video Conferencing Security Concerns
It’s an effective way to remain connected while
complying with social distancing and supporting
business operations and day to day activities.
Unfortunately and coincidingly, there are concerns over
privacy and security. The way we communicate and interact has
changed drastically in a short period of time and cyber criminals around
the globe are actively trying to find ways to illegally monetize and profit from this shift.
1
2
3
4
5
6
7
8