During the coronavirus pandemic, online meetings become more important and popular for us to keep connecting with people and maintaining our works. However, new attacks targeting online meetings and users also increase rapidly, so it is recommended to follow below DO and DON’T list to protect your data from cybersecurity threats.
For Meeting Host
√ Do use the latest version of the software
Always use the latest version to update fixes for those exploited vulnerabilities.
√ Do protect your meetings with Password
Set a password mandatory for your meetings to protect against uninvited participants and to secure all the information related to the meeting.
√ Do use waiting room features
Put participants in a separate virtual room before the meeting and allow the host to admit only people who are supposed to be in the room.
× Don’t share links to meetings or classrooms via social media
Invite attendees from within the video conferencing software or CUHK O365 email, and tell them to not share the links.
× Don’t allow participants to screen share by default
Your software should offer settings that allow hosts to manage the screen sharing. Once a meeting has begun, the host can allow specific participants to share when appropriate.
√ Do verify participants
Check the attendee list during the online meeting. Reject those uninvited participants to prevent intruders able to get in or becomes unruly.
√ Do lock a meeting
Do lock meeting once all the participants have joined the call. However, if a valid participant drops out, be sure to unlock the meeting to let them back in and then re-lock it after they return.
× Don’t record meetings unless you need to
If you do record a meeting, make sure all participants know they are being recorded (the software should indicate this, but it’s good practice to tell them too) and give the recording a unique name when you save it.
For General User
√ Do Use the Latest Version of the software
Always use the latest version to update fixes for those exploited vulnerabilities.
√ Do Verify Meeting Invitation and Meeting Links
Verify the meeting invitation is sent from known and trust sender. Check the meeting links by mouse-over the link instead of clicking on it. Beware of malicious links with suspicious extension, e.g. “.exe”, since it may contains malicious malware.
√ Do Review Your Security Settings
Review and enable appropriate security and privacy settings of your computer and software to prevent attackers from exploiting known vulnerabilities. Please follow the Guidelines for security configuring your computers.
√ Do Keep your Privacy
Make sure you are not accidentally sharing anything confidential on your laptop or in your background. Make use of virtual backgrounds helps.
√ Do Report Suspicious Activities
Report any suspicious activity to the meeting host or ITSC for assistant if necessary.
This website uses Cookies, including Cookies from Google Analytics, to ensure you get the best browsing experience. If you “Continue” to use this site, you consent to the use of Cookies. Read more about Cookies
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.