How Data Innovators Lead Data Transformation Forward

How Data Innovators Lead Data Transformation Forward

Data transformation is currently upon us, and we can’t deny the fact that the future we talked about is now here. The world is finally progressing towards a more mature period of digital competence, and data innovators sit at the center of it all. Data-driven
The Difference between Data Scientists, Data Engineers, Statisticians, and Software Engineers

The Difference between Data Scientists, Data Engineers, Statisticians, and Software Engineers

Data Scientists, Data Engineers, Statisticians, and Software Engineers Finding out the difference between data scientists, data engineers, software engineers, and statisticians can be confusing and complicated. While all of them are linked to data in a way, there is an underlying difference between the work

CONTRIBUTORS

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a ...
Is Machine Learning The Future? Making Your Data Scientists Obsolete

Is Machine Learning The Future? Making Your Data Scientists Obsolete

Is Machine Learning The Future? In a recent study, almost all the businesses surveyed stated that big data analytics were ...
Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of ...

RECENT NEWS

Batteryless smart devices closer to reality

Batteryless smart devices closer to reality

Researchers at the University of Waterloo have taken a huge step towards making smart devices that do not use batteries ...
Oracle Cloud Unveils New HPC Offerings to Support Mission Critical Workloads

Oracle Cloud Unveils New HPC Offerings to Support Mission Critical Workloads

Oracle Cloud Unveils New HPC Offering Oracle now provides a complete set of solutions for any high performance computing workload, ...
Capgemini in Gartner Magic Quadrant

Capgemini in Gartner Magic Quadrant

Paris, November 9, 2018 – Capgemini, today announced that Capgemini (Prosodie) has been positioned as a Leader by Gartner in its ...
Pressure grows on Zuckerberg to attend Facebook committee hearing

Pressure grows on Zuckerberg to attend Facebook committee hearing

Australia, Argentina and Ireland join UK and Canada in urging Facebook CEO to give evidence to parliaments Parliamentary committees from ...
Alibaba's on-demand online services unit valued at $30 billion: sources

Alibaba’s on-demand online services unit valued at $30 billion: sources

HONG KONG (Reuters) - Alibaba Group’s newly formed on-demand online services unit has rocketed in value to as much as ...
conferencing cybersecurity

Is Your Conferencing System a Cybersecurity Weak Link?

Video Conferencing Vulnerabilities

At home and in the office, the Internet of Things (IoT) has brought us new heights of connectivity and convenience. Yet recent years show that the connected devices that have opened up new doors for us have also exposed us to new vulnerabilities.

A cloud of insecurity seems to be looming over the new age of efficiency that connected devices have created. When not properly secured, connected devices can be a weak link when it comes to cybersecurity, leaving devices and the data on them at risk. We have seen the real-world risks associated with IoT devices in action last year, when the Mirai botnet hijacked more than a million devices to interrupt major websites. But that is not the only threat at hand. In the workplace, the security of these devices should be of utmost importance, especially considering what is at stake. In the hands of the wrong people, access to these devices can grant intruders the ability to spy on employees or steal corporate information.

Conferencing Systems

Conferencing systems — a camera, phone and codec — are among several devices that can help create a connected enterprise, increasing collaboration for the end users and improving ease of administration for the IT department. But the rise of remote working and global collaboration means that confidential corporate conversations are no longer protected by four walls; instead, they’re taking place across phone lines, network cables and video streams that span cities, countries and continents.

Protect Your Small Business

Intruders who manage to access a single conferencing system are suddenly granted an entry point to the entire network. They could monitor any communication coming in and going out of the device, and even snoop around other unprotected devices on the network. And unfortunately, these conversations can easily include a wealth of confidential and sensitive corporate information (just think about the content that is shared in an investors’ meeting).

The most common problem with these devices is access from the management console. You would be surprised to learn how many IT administrators leave the default passwords in place — a security gap that can allow someone access to your network and devices and the ability to modify or manipulate them. As a best practice, IoT devices should be treated like any other IT asset and secured accordingly. Authentication mechanisms that go beyond traditional password security should be mandatory.

Keep in mind that your conferencing devices are not the only security gaps. Cloud collaboration services — which are dominating the video collaboration space today and are frequently paired with conferencing devices — come with their own security concerns. Many service providers offer encryption of communication but do not do so by default. Instead, encryption is offered as a feature that customers would need to turn on — something that not everyone will realistically do.

Conferencing Security Challenges

These security challenges may seem daunting, but they do not have to halt your collaboration efforts.

Here are three best practices that can help prevent your conferencing system and service from becoming a cybersecurity weak link:

  1. Confirm and enforce encryption. Without encryption, your communication is subject to surveillance at any network level. Check with your service provider to ensure that encryption is turned on for all communications. Additionally, confirm if the provider is able to monitor your communications. Some vendors do this for support purposes, but it compromises your business’s privacy.
  2. Implement a strict password policy. Remember to use strong and complex passwords. When available, opt for multi-factor authentication. Take a look at the National Institute of Standards and Technology’s latest guidelines for effective password practices that do not put a heavy burden on users.
  3. Treat your conferencing devices as if they were servers. If you have to expose your devices to the public internet, take adequate precaution to limit damage if an intruder manages to gain access to the device. Quarantine non-compliant devices in a sandbox to protect the rest of your IT ecosystem, and be sure to keep all systems patched against known vulnerabilities.

Your network — and by extension, your business — is only as secure as the devices connected to it. Be proactive about vetting the security of your conferencing and collaboration devices and services to ensure that your business’s productivity boosts do not come at the cost of your privacy or security.

By Bobby Beckmann, CTO, Lifesize

Bobby Beckmann

As Lifesize CTO, Bobby leads a multinational team of engineers and developers to deliver continued innovation, scalability and reliability to the Lifesize cloud-based software service, HD camera and phone systems. With more than 20 years of experience, Beckmann helps Lifesize build on its reputation for innovations, recent momentum and usher in the next chapter of the company’s innovation.

Bobby joined Lifesize in 2015 and first served as vice president of service software where he played a pivotal role in developing the cloud-based software application and addressing the needs of the modern meeting environment. Prior to Lifesize, he served as CTO and vice president of engineering at Bloomfire, where he managed worldwide software engineering and product development efforts. Beckmann also previously held engineering leadership positions at OneID, Inc. and Optaros.

View Website

Cloud Community Supporters

(ISC)²
Cisco
SAP
CA Technologies
Dropbox

Cloud community support comes from (paid) sponsorship or (no cost) collaborative network partnership initiatives.