środa, 10 listopada 2010

Conference Call Security

Each company deals with security or at least should be. This applies in particular to the use of the Internet. Protection of networks, computers, e-mail and software applications of the ever-present threat of virus and worm infection is part of doing business in a connected world.

And of course it goes without saying that physical security, such as locks, access codes and security badges are standard operating procedures to all organisations that are seriously.

The passage of the Sarbanes-Oxley Act of 2002 has created this security and control procedures is a requirement for anyone doing business. However, an area where many organizations let their guard down for the security of the conference call.

Would you let your main competitor sit in on a new meeting of the product strategy? This can easily happen if an unscrupulous competitor the access code and call number on one of your conference calls. Industrial espionage is not just a theme in old Saturday morning cartoons.

Even political campaigns are not safe for such interception. Just think Watergate.In a competitive world where a large amount of money and power is at stake, anything goes!

Fortunately, many conference call services offer at least a basic level of security.Let's take a closer look at these security features start with audio conference calls. The conference call security features of audio conference calls are for the most part on video, and Web conference calls.Because Web and video conferencing are also exchange of both data and voice they have additional security requirements, which we will separately look.

Audio conference call security:

* Use the access code assigned to your conference call at the time the reservation is made. This will prevent callers without the correct password to be admitted to the call.

* Protection of the password and other account information that is associated with the conversation. This means limit who receives the data. Also get in the habit of shredding documents that contain this information.

* Be sure to input and outputs shades to notify you when a participant joins or leaves the conversation.

* Require that participants identify yourself when you commit the conference call and also roll before the Conference.

* Lock the conference call, so that no one else can participate in the once started.

* Disconnect all the lines in the call at the end of the call to make sure that there are no side discussions are not at the end of the Conference.

* Get in the habit of changing the call-in numbers and passcodes on a regular basis

Web and video conference call security:

In addition to the same security features as in an audio conference call, make sure that your web and video conferences with the following security features of the conference call:

* End-to-end encryption of the datalink. most use Secure Sockets Layer (SSL) and 128-bit AES encryption to protect your stream against snoopers.

* Secure control over parts of the desktop when you share your keyboard and mouse during cooperation.

Using the security features built into most conference call solutions and practicing a number of basic security precautions you can take your meetings and important information from competitors and hackers.

Brak komentarzy:

Prześlij komentarz