How to Use Video Conference Software Securely

Summary

How to Use Video Conference Software Securely

Body

Description

This article provides you details of how you can securely use your video conference software. This information applies to both WebEx and Zoom.

As a host, you are the final decision maker concerning your meeting's security settings. Always remember that you control nearly every aspect of the meeting.

Follow best practices when scheduling, during, and after the meeting, based on your needs for keeping meetings and information security.

  • Always download your video conferencing software from its original website and not from links returned by browser search results.
  • Be wary of meeting invitations that you did not anticipate. Spammers are using fake meeting invitations to steal passwords and install malware.
  • Do not share your Audio PIN with anyone.
  • Provide meeting passwords only to users who need them.
  • Never share sensitive information in your meeting until you are certain who is in attendance.

Procedures

Schedule a Meeting
During the Meeting
After the Meeting

 

If you have any further questions, email servicedesk@qatar.tamu.edu or call us at (974) 4423-0009. 

Details

Details

Article ID: 972
Created
Tue 11/26/24 3:09 PM
Modified
Sun 2/16/25 7:01 AM

Related Articles

Related Articles (3)

Signing In to TAMU Zoom
Zoom Videoconferencing User Guide
Zoom: Frequently Asked Questions (FAQs)

Related Services / Offerings

Related Services / Offerings (1)

Video conferencing support to enable sharing, collaboration and group presentations