How to Use Video Conference Software Securely

Description

This article provides you details of how you can securely use your video conference software. This information applies to both WebEx and Zoom.

As a host, you are the final decision maker concerning your meeting's security settings. Always remember that you control nearly every aspect of the meeting.

Follow best practices when scheduling, during, and after the meeting, based on your needs for keeping meetings and information security.

  • Always download your video conferencing software from its original website and not from links returned by browser search results.
  • Be wary of meeting invitations that you did not anticipate. Spammers are using fake meeting invitations to steal passwords and install malware.
  • Do not share your Audio PIN with anyone.
  • Provide meeting passwords only to users who need them.
  • Never share sensitive information in your meeting until you are certain who is in attendance.

Procedures

Schedule a Meeting
During the Meeting
After the Meeting

 

If you have any further questions, email servicedesk@qatar.tamu.edu or call us at (974) 4423-0009. 

Print Article

Related Articles (3)

Signing In to TAMU Zoom
Zoom Videoconferencing User Guide
Zoom: Frequently Asked Questions (FAQs)

Related Services / Offerings (1)

Video conferencing support to enable sharing, collaboration and group presentations