Securing Video Conferences
Zoombombing can threaten the safety of your virtual meetings. Password-sharing can threaten your income. Hacking isn’t good for anybody.
We looked at some popular video calling platforms to evaluate their security protocols and payment portals.
By far the most popular platform due to its ease of use and free option. Recently Zoom added encryption and password requirements. It is best not to publicize a Zoom meeting via social media or e-blasts. Send invitations to individual email addresses. Zoom has a waiting room to minimize password-sharing.
GoToWebinar’s platform has a registration protocol with an optional payment portal. Prior to the event, GoToWebinar sends you the list of registrants and you approve them. If another person tries to use an attendee’s password, they are sent to registration and asked to pay. GoToWebinar starts at $99 per month for 250 attendees. The live-stream we produced at Impact Hub last year used their sister company GoToMeeting that has a less stringent registration protocol. https://www.gotomeeting.com/webinar
According to Skype, “All Skype-to-Skype voice, video, file transfers and instant messages are encrypted. This protects you from potential eavesdropping by malicious users. If you make a call from Skype to mobile and landline phones, the part of your call that takes place over the PSTN (the ordinary phone network) is not encrypted.”
Multi-factor authentication requires users to provide additional forms of verification to prove their identity, helping protect their accounts from attacks that take advantage of weak or stolen passwords. Encryption is performed during transit as well as at rest at Microsoft data centers.
According to Google, “data is encrypted in transit by default between the client and Google for video meetings on a web browser, on the Android and iOS apps, and in meeting rooms with Google meeting room hardware.”
According to Cisco’s Webex, they “take proactive measures to provide the highest level of security, based on a secure by design product development methodology and use of various security frameworks. ” they say that they “provide multiple levels of security for tasks that range from scheduling meetings to authenticating participants to sharing documents.”
Cleeng is a service to sell your content, whether it is a live stream of a conference or downloads of videos. “Pay per view” is one way to make sure your customers can securely participate, while eliminating the freeloaders. https://cleeng.com/live-streaming-ppv
Sport leagues, concert and conference organisers as well as other leading brands use Cleeng to sell their premium content, live streams and videos.