When hackers exploit unsecured video conferences 

When hackers exploit unsecured video conferences - Image by Alexandra_Koch on Pixabay

Share post

German companies and municipalities risk enormous damage from cyber attacks in the near future. Highly secure video conferences, certified by the BSI, are one aspect that can ward off hacker attacks. Many video platforms have security gaps and make companies vulnerable. 

The economy currently lacks more than 100.000 specialists for cybersecurity - a need that cannot be met in the foreseeable future. The good news is that companies cannot only increase the security of their IT infrastructure by hiring cybersecurity experts. When securing your own video conferences, for example, it already helps to switch to highly secure software to make life difficult for criminals.

Unprotected video conferences are gateways

Unsecured online meetings are a frequent gateway for hackers into the data systems of companies and municipalities. Various risks such as data theft, hacking and industrial espionage lurk in online meetings. Espionage alone causes damage to the German economy running into the billions every year. Hackers not only steal information about the manufacture of products, but also private phone numbers or addresses, which threatens the security of individuals and opens up opportunities for identity fraud within the company.

To protect against such gaps, it helps to carefully examine the platform used for video conferencing in the company. An important security feature, for example, is that participants in online meetings can be granted minimal rights, while the organizers of the meetings are given extensive rights - such as granting sharing rights to other participants or removing participants from the video conference. As a result, hackers who click into online conferences have less room for maneuver.

End-to-end encryption increases protection

It is also essential for highly secure video conferences that the platform offers real end-to-end encryption. This should be certified by an authority such as the Federal Office for Security (BSI). Such encryption is characterized by the fact that not only the communication streams from client to server, but also those from client to client are encrypted. This closes the gateways for attackers. At Tixeo, for example, encryption keys are created with the conference and exchanged exclusively between the participants. As a result, hackers cannot decrypt the communication stream to steal passwords or personal information.

This is particularly important for municipalities and authorities because they store large amounts of sensitive personal data. Municipalities, of all people, find it very difficult to attract cybersecurity experts due to their limited resources and tariff limits. Secure technological tools such as video conferencing with end-to-end encryption can at least help to close some of the IT gaps and thus bring great benefits to municipalities. In addition, European software solutions do not have a built-in backdoor like those of the American manufacturers.

More at Tixeo.com

 


About Tixeo

Tixeo is the leading European company for secure video collaboration. Tixeo is the only video conferencing technology certified by ANSSI (French National Agency for Computer and Network Security) according to CSPN for its end-to-end encryption. This certification is recognized by the Federal Office for Information Security (BSI).


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more