![]() This goes for large groups of 25+ as well, as no video conferencing system out there gives users a meaningful visual display for large groups (so many small boxes…), and your chances of unwanted visitors increases dramatically with large conference numbers. What to do? Educate yourself, make sure you’re applying the right technology for the purpose, and take advantage of the tools available.įirst: Does this really need to be a video conference call? If you’re not sharing desktop visuals, and all participants already know each other, a simple audio conference call may suffice. Yikes, these are interesting times, indeed. Just recently a Zoom court hearing for the 17 year old allegedly behind the mass hack of the Twitter platform was interrupted by loud music and, eventually, a pornographic video that resulted in the judge shutting down the whole proceeding. It seems like there may be more terms on the horizon, as disruptive callers take over public conferences, hackers pirate users’ video cams, steal login credentials for other services, or inject trojan horse malware onto laptops, and unwary workers inadvertently share private information via screen sharing (or thinking the camera was off!). The unfortunately common intrusions into Zoom meetings, where unwanted guests disrupt the proceedings, often sharing vulgar audio and video, has resulted in a new addition to the lexicon: Zoombombing. ![]() With the intense proliferation of video conference calls this spring and summer for work, pleasure, and checking in on family and friends, it has come as a bit of a surprise for many to discover that these platforms aren’t always as secure and private as we would hope.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |