The Importance of Secure Video Conferencing in your Business

Share on facebook
Share on twitter
Share on linkedin
Share on pocket
Secure video conferencing

With the surge in video conferencing popularity due to the Coronavirus COVID-19 pandemic, it’s critical that Australian businesses implement secure video conferencing tools and practices to protect your important data from security breaches.

Given remote teams are struggling with maintaining effective communication and frustrating VPN access, it’s not surprising that the use of free or cheap video conferencing products like Zoom, has exploded in recent weeks. Optus chief executive Kelly Bayer Rosmarin has cited a thousandfold increase in usage of the Zoom app on Optus’ network alone.

zoom security flaw
Zoom security flaws have come to light in recent weeks. Photo courtesy of Zoom.

However, security issues and data privacy problems with cheap and free video conferencing tools have come to light in recent weeks. Video conferencing are high profile targets, and by mixing unsecured networks and subpar video conferencing security practices, you’re opening yourself and your business up to big vulnerabilities.

In late March 2020, security concerns were revealed over the potential for the Windows version of Zoom to leak credentials, an issue that Zoom has now acknowledged.

The Australian Signals Directorate has issued a stark warning to businesses over the use of insecure video conferencing applications.

A primary concern of the Australian Cyber Security Centre, is whether video conference traffic is headed offshore where it could be intercepted and harvested by foreign spy services and hostile actors.

The head of the ACSC, Abigail Bradshaw, said it was “critical that organisations correctly configure their selected service to maximise the security of conversations and data.”

There’s also a warning on conference call squatting, where unknown users might join early or not hang up after prior calls, a routine collision point in what used to be shared work space meeting rooms.

Why It’s Important To Prioritise Video Conferencing Security

1. The Cost of Cyber Crime

The cost of cyber crime to your business is much more than just reputational damage. Cyber crime is estimate to cost Australian businesses over $29 billion dollars per year, with an average cost of $273,000 for an individual business.

2. Information Sensitivity

The theft of business information could also leak trade secrets, patent or product details and personnel records, which can have serious legal ramifications in the wrong hands. Indeed, in February 2018 Australia introduced Data Breach Notification Legislation requiring businesses to protect data that they collect and store.

3. Brand Trust

Even if your company hasn’t experienced a cyber crime, if your brand is associated with a video conferencing platform – or any other technical platform – that is associated with security breaches and vulnerabilities, it can potentially damage your reputation and perhaps reluctance in your partners’ and clients’ desire to work with you.

With so many Australian employees working remotely and accessing video conferencing tools, it’s more important than ever that Australian businesses implement secure video conferencing tools and practices to protect important data from security breaches.

We also recommend reading our guide: How To Implement Secure Video Conferencing in your business.

Contact Surety IT for expert advice on business video conferencing security, cyber security and IT support.

More reading to help protect your business from cyber crime:

About the author:

Geoff Stewart

Geoff Stewart

Geoff Stewart is a highly experienced and skilled IT Challenger at Surety IT. His knowledge is based on years of industry experience having created customised, stable, well performing systems both for multi-national companies in the UK and Australia and Surety IT customers.

Surety IT’s mission is to address and overcome the 4 biggest problems businesses have with their IT systems and support which are: poorly performing systems, unreliable systems, unresponsive IT support and poor IT related advice.

We’ve developed a proprietary process that allows us to do that by: thoroughly understanding your business requirements, gaining an in-depth knowledge of your IT systems, identifying mission critical technology issues vital to your business performance and ensuring our ‘Solution Path’ process is specifically designed and tailored for you with value based solutions and support.

Give us a call or send us a message on our contact page to find out more about how we go about achieving these outcomes.

Scroll to Top