One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1929528
Date de publication 2020-09-21 06:00:00 (vue: 2020-09-21 07:05:46)
Titre Cyber safety tips for virtual events
Texte This blog was written by an independent guest blogger. viirtual meetings Since the start of the Covid-19 pandemic, the use of video chat software like Zoom has increased to 300 million meetings held per day. Unfortunately, hackers have taken to crashing private meetings and flooding them with objectionable content — a phenomenon known as Zoombombing. If you’re planning a virtual event, it’s important to pay attention to potential security issues and follow safety tips to keep the experience as safe and secure as possible for everyone involved. Control event access In order to hold a secure online event, you must first know exactly who’ll be attending. You’ll then have an easier job of preventing, spotting, and ejecting unwanted attendees. A virtual event platform with integrated event registration provides an easy way to set up and host a virtual event while controlling approved participants and limiting the risk of hijacking. Establishing a registration page allows you to collect contact information while simultaneously generating awareness for your virtual event. Once an attendee registers, you can then share the event link with them. Never share even links publicly on social media or other advertisements as you may attract unwanted guests. Set a password or similar authentication requirement to allow attendees to join the event. You can also prevent access to the event after a specific time to keep out unwanted users (however, be sure to let your attendees know about this time well in advance). Prioritize network security Network security ensures your corporate network is protected against unauthorized intrusions. While endpoint security protects individual devices, network security works alongside it to protect any interaction between those devices regardless of location. Good network security is therefore essential for virtual events, which typically include attendees from multiple locations all over the country and potentially the globe. In particular, a network-based firewall lets you protect your network with ultra-secure inbound and outbound internet access via security gateways. Useful features like security management reporting tools allow you to easily assess your bandwidth usage, configure firewall security services, and take care of security-related compliance issues. Security tips for participants Roughly 90% of data breaches are the result of human error, so it’s important to let your attendees know about cyber safety best practices. Before the event, send out an email to participants outlining important security tips they can take. Most importantly, they should use a private wifi network — not a public one as these aren’t secure and vulnerable to hackers. Attendees should also have updated antivirus software installed to prevent, detect, and remove malicious viruses and software. During the virtual event, they should also be careful not to accept unexpected chat requests from users with fake or suspicious profiles — especial
Envoyé Oui
Condensat about accept access advance advertisements after against alert all allow allows alongside also antivirus any approved aren’t ask assess attendee attendees attending attention attract authentication awareness bandwidth based before best between blog blogger breaches are business can care careful chat collect compliance configure contact content control controlling corporate country covid crashing cyber data day details detect devices does during easier easily easy ejecting email endpoint ensure ensures error especially essential establishing even event events everyone exactly experience fake features firewall first flooding follow from gateways globe good guest guests hackers has have held hijacking hold host however human immediately implementing important importantly inbound include increased independent individual information installed integrated interaction internet intrusions involved issues it’s job join keep know known let lets like limiting link with links location locations malicious management may media meeting meetings million most multiple must network never not objectionable occur once one online order other out outbound outlining over page pandemic participants particular password pay per personal phenomenon platform possible potential potentially practices prevent preventing prioritize priority private profiles protect protected protects provides public publicly regardless registers registration related remove reporting requests requirement result risk roughly 90 runs safe safely safety secure security send services set share should similar simultaneously generating since situation smoothly social software specific spotting start sure suspicious take taken them then then share therefore these those time tips to 300 tools top typically ultra unauthorized unexpected unfortunately unwanted updated usage use useful users video virtual viruses vulnerable way well which who’ll wifi will works written you’ll you’re planning your zoom zoombombing
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: