Is Your Conferencing System a Cybersecurity Weak Link?

Video Conferencing Vulnerabilities

At home and in the office, the Internet of Things (IoT) has brought us new heights of connectivity and convenience. Yet recent years show that the connected devices that have opened up new doors for us have also exposed us to new vulnerabilities.

A cloud of insecurity seems to be looming over the new age of efficiency that connected devices have created. When not properly secured, connected devices can be a weak link when it comes to cybersecurity, leaving devices and the data on them at risk. We have seen the real-world risks associated with IoT devices in action last year, when the Mirai botnet hijacked more than a million devices to interrupt major websites. But that is not the only threat at hand. In the Workplace, the security of these devices should be of utmost importance, especially considering what is at stake. In the hands of the wrong people, access to these devices can grant intruders the ability to spy on employees or steal corporate information.

Conferencing Systems

Conferencing systems — a camera, phone and codec — are among several devices that can help create a connected enterprise, increasing collaboration for the end users and improving ease of administration for the IT department. But the rise of remote working and global collaboration means that confidential corporate conversations are no longer protected by four walls; instead, they’re taking place across phone lines, network cables and video streams that span cities, countries and continents.

Protect Your Small Business

Intruders who manage to access a single conferencing system are suddenly granted an entry point to the entire network. They could monitor any communication coming in and going out of the device, and even snoop around other unprotected devices on the network. And unfortunately, these conversations can easily include a wealth of confidential and sensitive corporate information (just think about the content that is shared in an investors’ meeting).

The most common problem with these devices is access from the management console. You would be surprised to learn how many IT administrators leave the default passwords in place — a security gap that can allow someone access to your network and devices and the ability to modify or manipulate them. As a best practice, IoT devices should be treated like any other IT asset and secured accordingly. Authentication mechanisms that go beyond traditional password security should be mandatory.

Keep in mind that your conferencing devices are not the only security gaps. Cloud collaboration services — which are dominating the video collaboration space today and are frequently paired with conferencing devices — come with their own security concerns. Many service providers offer encryption of communication but do not do so by default. Instead, encryption is offered as a feature that customers would need to turn on — something that not everyone will realistically do.

Conferencing Security Challenges

These security challenges may seem daunting, but they do not have to halt your collaboration efforts.

Here are three best practices that can help prevent your conferencing system and service from becoming a cybersecurity weak link:

  1. Confirm and enforce encryption. Without encryption, your communication is subject to surveillance at any network level. Check with your service provider to ensure that encryption is turned on for all communications. Additionally, confirm if the provider is able to monitor your communications. Some vendors do this for support purposes, but it compromises your business’s privacy.
  2. Implement a strict password policy. Remember to use strong and complex passwords. When available, opt for multi-factor authentication. Take a look at the National Institute of Standards and Technology’s latest guidelines for effective password practices that do not put a heavy burden on users.
  3. Treat your conferencing devices as if they were servers. If you have to expose your devices to the public internet, take adequate precaution to limit damage if an intruder manages to gain access to the device. Quarantine non-compliant devices in a sandbox to protect the rest of your IT ecosystem, and be sure to keep all systems patched against known Vulnerabilities.

Your network — and by extension, your business — is only as secure as the devices connected to it. Be proactive about vetting the security of your conferencing and collaboration devices and services to ensure that your business’s productivity boosts do not come at the cost of your privacy or security.

By Bobby Beckmann, CTO, Lifesize

Darach Beirne

Raising the Bar for Business Communications with Deep Customization of WebRTC

Business Communications and WebRTC By Darach Beirne, Vice President of Customer Success at Flowroute, now part of Intrado, and Julien Chavanton, Voice Platform Architecture Lead ...
Wasabi

Episode 3: The Bottomless Cloud – An Interview with David Friend of Wasabi

Why data is not “the new oil” and why “cloud” means more than we think. In his new book, author David Friend refers to the ...
Juan Pablo Perez Etchegoyen

69% of Enterprises are Moving Mission-Critical Information to the Cloud

Why Security matters According to a research study by the Cloud Security Alliance (CSA), 69% of enterprises are moving mission-critical information to the cloud. These ...
Aruna Headshot

66% Say They’d Switch Vendors in Order to Get an Intelligent Online Meeting Solution

People are getting frustrated with online and video meetings. In fact, according to a recent survey, 85% say they are challenged with these types of ...
Or Lenchner

Destination IPPN: why the travel sector must harness a global IP proxy network

Destination IPPN While massive growth in the travel sector has been predicted, the digital environment has also massively upped competition amongst service providers, keen to ...
Marty

How cloud technologies improve innovation in the healthcare industry?

How cloud technologies improve innovation in the healthcare industry? The uptake of VPS hosting in the cloud within the heavily regulated healthcare industry has until ...
The Backup.png