<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Video Conferencing Zoom Microsoft Teams Security Cyber Security Teleworking Remote Work Archives - CWM Law</title>
	<atom:link href="https://www.cwm-law.com/tag/video-conferencing-zoom-microsoft-teams-security-cyber-security-teleworking-remote-work/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cwm-law.com/tag/video-conferencing-zoom-microsoft-teams-security-cyber-security-teleworking-remote-work/</link>
	<description>Crenshaw, Ware &#38; Martin PLC</description>
	<lastBuildDate>Fri, 24 Apr 2020 19:16:42 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.cwm-law.com/wp-content/uploads/2016/01/cropped-FAV11-32x32.png</url>
	<title>Video Conferencing Zoom Microsoft Teams Security Cyber Security Teleworking Remote Work Archives - CWM Law</title>
	<link>https://www.cwm-law.com/tag/video-conferencing-zoom-microsoft-teams-security-cyber-security-teleworking-remote-work/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Video Conferencing Best Practices</title>
		<link>https://www.cwm-law.com/news/updates/video-conferencing-best-practices/</link>
		
		<dc:creator><![CDATA[Arketa Howard]]></dc:creator>
		<pubDate>Fri, 24 Apr 2020 17:32:48 +0000</pubDate>
				<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Updates]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[remote work]]></category>
		<category><![CDATA[Teleworking]]></category>
		<category><![CDATA[Video Conferencing]]></category>
		<category><![CDATA[Video Conferencing Zoom Microsoft Teams Security Cyber Security Teleworking Remote Work]]></category>
		<category><![CDATA[Zoom]]></category>
		<guid isPermaLink="false">https://www.cwm-law.com/?p=5885</guid>

					<description><![CDATA[<p>With many employees transitioning from the office to teleworking from home, video conferencing has surged in popularity and demand. Wherever your work takes you, consider these best practices to increase the security of your next video conference: Know the Current Vulnerabilities With a quick online search, you can stay abreast of the latest vulnerabilities associated [&#8230;]</p>
<p>The post <a href="https://www.cwm-law.com/news/updates/video-conferencing-best-practices/">Video Conferencing Best Practices</a> appeared first on <a href="https://www.cwm-law.com">CWM Law</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter"><img fetchpriority="high" decoding="async" width="500" height="230" src="https://www.cwm-law.com/wp-content/uploads/2020/04/WEBSITE-COVER2.jpg" alt="" class="wp-image-5928" srcset="https://www.cwm-law.com/wp-content/uploads/2020/04/WEBSITE-COVER2.jpg 500w, https://www.cwm-law.com/wp-content/uploads/2020/04/WEBSITE-COVER2-300x138.jpg 300w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div>



<div class="wp-block-file"><a href="https://www.cwm-law.com/wp-content/uploads/2020/04/COVID-19-Video-Conferencing-Best-Practices.pdf">Video Conferencing Best Practices</a><a href="https://www.cwm-law.com/wp-content/uploads/2020/04/COVID-19-Video-Conferencing-Best-Practices.pdf" class="wp-block-file__button" download>Download</a></div>



<p>With many employees transitioning from the office to teleworking from home, video conferencing has surged in popularity and demand. Wherever your work takes you, consider these best practices to increase the security of your next video conference:</p>



<h5 class="wp-block-heading"><strong>Know the
Current Vulnerabilities</strong></h5>



<p>With a quick online search, you can stay abreast of
the latest vulnerabilities associated with most web conferencing platforms. Following
basic tips from security experts will protect your online meetings from
compromise. </p>



<h5 class="wp-block-heading"><strong>Avoid Unwanted Visitors and Content</strong></h5>



<p>To ensure the content of your video conferencing is shared only with its intended participants:</p>



<ul class="wp-block-list"><li>Do not post meeting links (i.e. Zoom, WebEx, MS
Teams) on public websites or social media.</li><li>Do not use your personal meeting ID for meetings.</li><li>Do not allow participants to share their screen,
or require the host to approve participant desktop sharing. </li><li>Disable file transfers unless you know the files
to be shared and file sharer. </li><li>Enable features that prevent removed
participants from rejoining a meeting. </li><li>Add a passcode to your meetings and only share
that passcode with your attendees. </li><li>Enable features that allow participants to join
and interact before the host enters. </li><li>Restrict meetings to only authenticated users if
feasible. </li><li>Enable “waiting room” features prior to starting
meetings so that you can identify participants before letting everyone in.</li></ul>



<h5 class="wp-block-heading"><strong>Take Advantage of Built-In Security Bells
and Whistles </strong></h5>



<p>Scheduling and configuring the details of
your upcoming video conference is best done within the conferencing platform so
you can take advantage of the built-in security features.</p>



<ul class="wp-block-list"><li>If available, ensure encryption is turned on,
within the software, for each video conference.</li><li>Use a web camera cover so no one else can use
your camera without your knowledge.</li><li>Do not record the video conference unless truly
necessary.</li><li>Use background blur, digital backgrounds, or greenscreen
settings to conceal information about your location.</li><li>Turn off any “attention tracking” features that
track participants during a screenshare. </li><li>Enable muted microphones as default setting.</li></ul>



<h5 class="wp-block-heading"><strong>Your Privacy Matters</strong></h5>



<p>Get rid of the crumbs left behind that
leave evidence of your video conferencing call so you can avoid unwanted
marketing and hackers. </p>



<ul class="wp-block-list"><li>Use a unique email address specifically for
video conferencing.</li><li>Clear cookies and block trackers after every
video call.</li><li>Opt out of all secondary data uses where
possible.</li><li>When there is a privacy issue, leave feedback with
the service about the problem.</li><li>Use other devices for communications during video
conferences.</li><li>Don’t sign into video conferencing platforms
through third parties like Facebook or Google.</li></ul>



<div class="wp-block-media-text alignwide" style="grid-template-columns:30% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="1024" height="1024" src="https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-1024x1024.jpg" alt="" class="wp-image-5835" srcset="https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-1024x1024.jpg 1024w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-150x150.jpg 150w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-300x300.jpg 300w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport-768x768.jpg 768w, https://www.cwm-law.com/wp-content/uploads/2020/04/DariusDavenport.jpg 1875w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure><div class="wp-block-media-text__content">
<p style="font-size:25px"><strong><a href="https://www.cwm-law.com/our-legal-team/darius-k-davenport/">Darius K. Davenport</a></strong></p>



<p><strong>Practice Areas:</strong></p>



<ul class="wp-block-list"><li><a href="https://www.cwm-law.com/practice-areas/cybersecurity-data-privacy/">Cybersecurity and Data Privacy</a>, Practice Group Chair</li><li><a href="https://www.cwm-law.com/practice-areas/government-and-public-sector/">Government and Public Sector</a><em>, Practice Group Chair</em></li><li><a href="https://www.cwm-law.com/practice-areas/admiralty-and-maritime-law/">Admiralty and Maritime Law</a></li><li><a href="https://www.cwm-law.com/practice-areas/employment-law/">Employment Law</a></li><li><a href="https://www.cwm-law.com/practice-areas/government-contracting/">Government Contracting</a></li><li><a href="https://www.cwm-law.com/practice-areas/litigation/">Litigation</a></li><li><a href="https://www.cwm-law.com/practice-areas/railroad-and-transit-law/">Railroad and Transit Law</a></li></ul>



<p>Contact by <a href="mailto:ddavenport@cwm-law.com">email </a>or phone (757) 623-3000.   </p>
</div></div>
<p>The post <a href="https://www.cwm-law.com/news/updates/video-conferencing-best-practices/">Video Conferencing Best Practices</a> appeared first on <a href="https://www.cwm-law.com">CWM Law</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
