09 Apr 2020
Internet connectivity has brought lots of convenience towards people. For instance, the video-teleconferencing (VTC) application enables most of the company to carry out their daily activities as usual during the movement control order (MCO) period. Many organizations and individuals are increasingly dependent on VTC platforms, such as Zoom and Microsoft Teams, to stay connected during this period.
Yet also, because of spike internet usage, hackers are causing user’s security breaches by using their computer skills to get user’s information and encrypted data, These hackers are searching loopholes to capitalise on the spike of Internet usage. They tried to act like a real organization, to draw an individual into giving sensitive information such as passwords, banking and credit cards details and personal recognizable data
There are several ways to prevent:
Ensure that your VTC and security software was in the latest version
Update the software to its latest version, as the applications was now be enhanced according to security reports as evaluated by security practitioners
Only download software from its official website or app store.
Pay attention on any suspicious activity on your account
Always remember to logout from the application when you finish the meeting.
Never make meetings or public.
Require a meeting password or use the waiting room feature and control the admittance of guests.
Do not share or publish the conference ID and URL to any public group or social media.
Directly send the link to specific people that you wanted to invite.
Do not expose any personal confidential data during meeting
Avoid discussing any confidential information to prevent leakage.
Enable non-recordable videos and audios, and limit file sharing.
For additional references, the following websites also provide detailed guidelines on Online Video Tele-conferencing:
In general, we advise all users and administrators of Online Video Tele-conferencing to follow latest security announcements by the vendor and adhere to security policies, according to best practices, to determine applicable updates.