{"id":4539,"date":"2016-04-12T09:51:11","date_gmt":"2016-04-12T15:51:11","guid":{"rendered":"https:\/\/www.meetingone.eu\/eu-nl\/?p=4539"},"modified":"2018-12-06T09:09:46","modified_gmt":"2018-12-06T16:09:46","slug":"6-factors-of-web-conferencing-security-2","status":"publish","type":"post","link":"https:\/\/www.meetingone.com\/eu-nl\/blog\/6-factors-of-web-conferencing-security-2\/","title":{"rendered":"6 Factors of Web Conferencing Security You Need to Consider"},"content":{"rendered":"<h5 style=\"text-align: center;\"><\/h5>\n<h3 style=\"text-align: center;\"><span style=\"color: #bb2025;\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright wp-image-5681\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/04\/Featured-Security-image-300x300.png\" alt=\"Web Conferencing Security\" width=\"350\" height=\"350\" \/>What features do you look for in a web conferencing platform? \u00a0<\/span><\/h3>\n<p><span style=\"color: #000000;\">Most of us first look at conferencing tools, like chat features, screen and document sharing options, editable meeting spaces, and so on.\u00a0 Then we move on to the real meat \u2013 platform components: reporting and analytics options, the ease of access for participants, branding and customization opportunities, etcetera, etcetera.\u00a0 That\u2019s all very important, but what if the most vital aspect of web conferencing is what you can\u2019t see?<\/span><\/p>\n<h4 style=\"text-align: center;\"><span style=\"color: #ff6600;\">I&#8217;m talking about web conferencing security.\u00a0<\/span><\/h4>\n<p><span style=\"color: #000000;\">If you aren\u2019t making security a focal point of your appraisal, you may be putting yourself, and your business, at risk.\u00a0 Web conferencing platforms are susceptible to several major security threats, such as:<\/span><\/p>\n<ul>\n<li>\n<h5><strong><span style=\"color: #bb2025;\">Snooping:<\/span><\/strong> If not properly secured, an outside party can listen in on your online meetings and exploit your business\u2019 information.<\/h5>\n<\/li>\n<li>\n<h5><strong><span style=\"color: #bb2025;\">Compromise of sensitive information:<\/span> <\/strong>Personal information shared over web conferences is vulnerable to internal and external leaks or theft. The consequences of an information compromise can have serious legal ramifications, including imprisonment.<\/h5>\n<\/li>\n<li>\n<h5><strong><span style=\"color: #bb2025;\">Denial-of-Service attacks:<\/span> <\/strong>Through Denial-of-Service attacks, external threats can prevent you from accessing important online events that require your attendance.<\/h5>\n<\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">There have also been Federal legislations that require personal information be secured.\u00a0 Some of these legislations have been specific to industries of the private sector, as with the Healthcare and the Financial industries, while other laws pertain to how the government operates.\u00a0 Consider the following:<\/span><\/p>\n<ul>\n<li>\n<h5>If you\u2019re in healthcare, I\u2019m sure you\u2019re well aware that the <span style=\"color: #ff6600;\">Health Insurance Portability and Accountability Act (HIPAA)<\/span> makes it criminal to not appropriately secure patient information.<\/h5>\n<\/li>\n<li>\n<h5>In the financial sector, the <span style=\"color: #ff6600;\">Gramm-Leach-Billey Act (GLBA)<\/span> requires businesses to be transparent about the protection they are providing consumers. Violation of the GLBA can lead to severe fines and potential prison time.<\/h5>\n<\/li>\n<li>\n<h5>For most of you in the Federal government\u2026well, the restrictions are tight \u2013 you can only work with web conferencing vendors who have been granted <span style=\"color: #ff6600;\">FedRAMP Agency Authorization<\/span> (more on this below).<\/h5>\n<\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Even if you work at a law firm or for a management consultant group, you may be at risk.\u00a0 Any time you share strictly confidential information through web conferencing platforms (like during your annual business reviews), security is a necessity.<\/span><\/p>\n<p><span style=\"color: #000000;\">Below, we\u2019ve outlined six factors you need to consider when evaluating web conferencing security.<\/span><\/p>\n<hr \/>\n<h2><span style=\"color: #bb2025;\">Web Conferencing Security: 6 Crucial Factors<\/span><\/h2>\n<h3><span style=\"color: #ff6600;\">Factor #1: FedRAMP Compliance<\/span><\/h3>\n<p><span style=\"color: #000000;\">If you want to know what makes a web conferencing platform secure, you need to learn about the<\/span> <strong><span style=\"color: #bb2025;\"><a style=\"color: #bb2025;\" href=\"https:\/\/www.fedramp.gov\/about-us\/about\/\" target=\"_blank\">Federal Risk and Authorization Management Program<\/a><\/span><\/strong> <span style=\"color: #000000;\">(FedRAMP). \u00a0Although FedRAMP is specifically related to government security requirements, a web conferencing platform compliant with those national standards will indeed meet your business security needs.<\/span><\/p>\n<p><span style=\"color: #000000;\">To ensure that Federal proprietary information is secured over cloud systems, such as web conferencing platforms, the U.S. government determined it was necessary to establish standards of regulation with FedRAMP.<\/span><\/p>\n<hr \/>\n<p><span style=\"color: #000000;\">These standards can be far-reaching<\/span>.\u00a0 <strong>Here\u2019s a quick run-down on what you need to know about FedRAMP<\/strong>:<\/p>\n<ul>\n<li>\n<h5>FedRAMP standards are in accordance with\u00a0those outlined by the Federal Information Security Management Act (FISMA), and meet the baseline security controls set out by the National Institute of Standards and Technology (NIST) in their special publication 800-53.<\/h5>\n<\/li>\n<li>\n<h5>As defined by the NIST, security controls are the safeguards and countermeasures used by a particular information system to protect confidential and integral parts of that system.<\/h5>\n<\/li>\n<li>\n<h5>In all, there are 18 \u201cfamilies\u201d of security controls that range from system configuration management to physical and environmental protection. Within each family, there are numerous sub-categories with hundreds of specific security controls.<\/h5>\n<\/li>\n<li>\n<h5>If your web conferencing platform is FedRAMP compliant, it will hold the \u201cAgency FedRAMP Authorization\u201d title.<\/h5>\n<\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Is your web conferencing platform FedRAMP compliant?\u00a0 If not, you should evaluate how extensive your web conferencing security features are.<\/span><\/p>\n<p><span style=\"color: #000000;\">To give you a few suggestions of what to consider,<\/span> <strong>here are a few examples of the layers of security that factor into FedRAMP compliance.<\/strong><\/p>\n<hr \/>\n<h3><span style=\"color: #ff6600;\">Factor #2: Gated Access<\/span><\/h3>\n<p><span style=\"color: #000000;\">Strong security begins with the configuration of gated access.\u00a0 Gated access refers to the many security options that manage entrance to and usage of virtual rooms housed within a web conferencing platform.\u00a0 To give you some ideas of how it can work, we\u2019ve chosen a select few examples:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\"><strong>Atypical\u00a0<\/strong><span style=\"line-height: 1.5;\"><strong>usage:<\/strong> Restrictions that can be set to limit the hours a virtual room can be accessed. Through tightening hours of usage, you can minimize the time in which vulnerable information can be viewed and tampered.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Remote or wireless access:<\/strong> Certain parameters allow you to monitor remote users, and relay only encrypted information to protect from unwanted hands.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">To further limit the availability of access, gates such as session locks and credential termination help manage who enters your virtual rooms:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\"><strong>Session locks:<\/strong> Used at the beginning of a sensitive online event, a host can restrict access to late-coming users. Locks also help avoid unwanted visitors peeping in on your conversations.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Credential termination:<\/strong> When a member leaves the hosted space, the credentials they used initially will no longer work.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">All of the above options are ideal for preventing the threats mentioned earlier.\u00a0 Making sure your platform has the appropriate gates is the best means to prevent Denial-of-Service attacks.<\/span><\/p>\n<hr \/>\n<h3><span style=\"color: #ff6600;\"><strong><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/04\/Security-Comic.png\" target=\"_blank\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft wp-image-5669\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/04\/Security-Comic.png\" alt=\"Do you know the most important factors of web conferencing security?\" width=\"290\" height=\"691\" \/><\/a><\/strong>Factor #3: Define Roles and Privileges<\/span><\/h3>\n<p><span style=\"color: #000000;\">A comprehensive security system allows account administrators to define the roles and privileges of your employees. \u00a0These determinations will, in turn, establish the conditions by which a user can interact with a group or virtual room.\u00a0 You can define these privileges with <strong>role-based access controls (RBAC)<\/strong> and <strong>dynamic privilege management<\/strong>:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\"><strong>Role-Based Access Controls<\/strong>: When used in large online event settings, <strong>RBACs allow you to filter which individuals enter what virtual rooms<\/strong>. As an example, you may have an employee who needs to share information, but their presence is not required in the larger meeting.\u00a0 You could set their RBACs so they can only enter a sub-conference room, where someone else with greater privilege could meet them, get <\/span>the run-down,<span style=\"color: #000000;\"> and return to the larger meeting. \u00a0(No dark alleyways and manila envelopes required.) \u00a0Using RBACs in this way helps you avoid internal leaks of sensitive info.<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"color: #000000;\"><strong>Dynamic privilege management<\/strong>: Through dynamic privilege management<strong>, you allow a user to retain their virtual identity while their access privileges are amended<\/strong>. In a similar scenario to the above, a user could have their privileges upgraded for a one-time event, then demoted at the event\u2019s conclusion.\u00a0 All the while, their virtual identity remains intact.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">When it comes to ensuring valuable information isn\u2019t falling into the wrong hands, you need security features that allow account administrators to easily define roles and privileges.\u00a0 RBACs and dynamic privilege management represent great options for managing the privileges of your users during your online events.<\/span><\/p>\n<hr \/>\n<h3><\/h3>\n<h3><span style=\"color: #ff6600;\">Factor #4: Individual Access Codes<\/span><\/h3>\n<p><span style=\"color: #000000;\">Individual access codes (IAC) allow businesses a way to pair a person with unique authenticators that will customize their privileges.\u00a0 Also, with these codes, your employees will have the means to access online events.<\/span><\/p>\n<p><span style=\"color: #000000;\">IACs are, basically, your employees\u2019 web conferencing fingerprints.\u00a0 <\/span>In the same way<span style=\"color: #000000;\"> a fingerprint scanner grants you access to a secured room, an IAC opens the door to a virtual space.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>To get an idea of the value of IACs, let\u2019s play out a worst case scenario<\/strong>: information that was not intended to be shared, has been leaked by an employee.\u00a0 You\u2019re freaking out because numerous employees interacted with the room. \u00a0But who was the actual culprit?\u00a0 Functioning like a fingerprint, an IAC leaves a trace of the offender\u2019s presence.\u00a0 A good security system can generate a report that indicates who accessed a virtual space and when.\u00a0 With that report in hand, the responsible party can be pinned down, and the leak plugged.<\/span><\/p>\n<p><span style=\"color: #000000;\">The above three factors reflect critical layers for web conferencing security.\u00a0 Although still immediately relevant to and important for <\/span>web<span style=\"color: #000000;\"> conferencing, these final two factors also pertain to the security measures taken by <em>web conferencing providers<\/em>.<\/span><\/p>\n<hr \/>\n<h3><span style=\"color: #ff6600;\">Factor #5: Recording Encryption<\/span><\/h3>\n<p><span style=\"color: #000000;\">Just because an online event concludes without issue, doesn\u2019t mean you\u2019re in the clear yet.\u00a0 Most web conferencing platforms allow you to record the online events, which is great because recordings can be shared with individuals who were unable to attend.\u00a0 But these recordings may leave you susceptible to information compromise.<\/span><\/p>\n<p><span style=\"color: #000000;\">What happens to the information in the recording when your web conferencing provider stores it for it to you?\u00a0 If not encrypted, these recordings can prove a significant vulnerability. \u00a0The standard for securing the recordings requires the AES 256-bit encryption. \u00a0A good web conferencing provider will encrypt the recording while in their storage, and in transmission to you.<\/span><\/p>\n<p><span style=\"color: #000000;\">Let\u2019s replay the above \u201cworst case scenario\u201d, only this time, someone\u2019s hacked into a recording loaded with sensitive information.\u00a0 <strong>If the recording were encrypted, any employee who interacts with the encryption will create a clue your web conferencing provider can follow<\/strong> (in the form of an access record).\u00a0 Pair your findings with IAC fingerprints, and you\u2019ll have your perpetrator.<\/span><\/p>\n<hr \/>\n<h3><span style=\"color: #bb2025;\"><strong><img decoding=\"async\" loading=\"lazy\" class=\"alignright wp-image-5682\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/04\/top-secret-security-image-300x300.png\" alt=\"Web Conferencing Security\" width=\"320\" height=\"320\" \/><\/strong><span style=\"color: #ff6600;\">Factor #6: External Hosting Options<\/span><\/span><\/h3>\n<p><span style=\"color: #000000;\">If you need to go above and beyond the typical security controls because your information has a virtual \u201cburn after reading\u201d stamp on it, you should look into external hosting options.\u00a0 External hosting is a service some web conferencing providers may offer \u2013 to manage the \u201cclassified\u201d information of your online events.<\/span><\/p>\n<p><span style=\"color: #000000;\">An external host can provide you several services.\u00a0 To begin with, they can monitor and manage content that is uploaded. \u00a0Depending upon your needs, these uploads can later be purged to minimize exposure.\u00a0 If the information is very delicate, the content can be destroyed upon the event\u2019s closure. \u00a0The benefits of monitoring limit the potential harm of compromised information.<\/span><\/p>\n<p><span style=\"color: #000000;\">An external host can also create a metadata backup of the online event. \u00a0Such a backup provides you a means to retain some information related to the event, but nothing that will leave you exposed.\u00a0 Be aware that not all web conferencing providers facilitate external hosting.<\/span><\/p>\n<hr \/>\n<h2><span style=\"color: #bb2025;\">Conclusion<\/span><\/h2>\n<p><span style=\"color: #000000;\">What good is a web conferencing platform that allows you to share valuable information if it doesn\u2019t have the security measures to ensure the info will remain protected?<\/span><\/p>\n<p><span style=\"color: #000000;\">If you can find a web conferencing platform whose features meet FedRAMP compliance, you\u2019ve probably found a winner.\u00a0 Couple that platform with a provider who offers external hosting options, and you can feel confident they truly are covering all your web conferencing security needs.<\/span><\/p>\n<h4 style=\"text-align: center;\"><span style=\"color: #bb2025;\">At MeetingOne, we would be more than happy to discuss your security needs.\u00a0<\/span><\/h4>\n<p><a href=\"https:\/\/www.meetingone.com\/eu-nl\/contact\/\" target=\"_blank\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-5719\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/04\/Learn-More-Yellow-Button-2016.png\" alt=\"Learn more about web conferencing - and web conferencing security!\" width=\"250\" height=\"64\" \/><\/a><\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>What features do you look for in a web conferencing platform? \u00a0 Most of us first look at conferencing tools, like chat features, screen and document sharing options, editable meeting spaces, and so on.\u00a0 Then we move on to the real meat \u2013 platform components: reporting and analytics options, the ease of access for participants, [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":4540,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,3,4],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 Factors of Web Conferencing Security You Need to Consider - MeetingOne Dutch<\/title>\n<meta name=\"description\" content=\"When evaluating web conferencing security, there a are 6 factors you need to consider. \u00a0Having the best in web conferencing security is no small thing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Factors of Web Conferencing Security You Need to Consider - MeetingOne Dutch\" \/>\n<meta property=\"og:description\" content=\"When evaluating web conferencing security, there a are 6 factors you need to consider. \u00a0Having the best in web conferencing security is no small thing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/\" \/>\n<meta property=\"og:site_name\" content=\"MeetingOne Dutch\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MeetingOne\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-12T15:51:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-06T16:09:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.meetingone.com\/eu-nl\/wp-content\/uploads\/sites\/8\/2016\/04\/Featured-Security-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Joel Byerly\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@meetingone\" \/>\n<meta name=\"twitter:site\" content=\"@meetingone\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joel Byerly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/blog\/6-factors-of-web-conferencing-security-2\/\",\"url\":\"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/\",\"name\":\"6 Factors of Web Conferencing Security You Need to Consider - MeetingOne Dutch\",\"isPartOf\":{\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#website\"},\"datePublished\":\"2016-04-12T15:51:11+00:00\",\"dateModified\":\"2018-12-06T16:09:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5\"},\"description\":\"When evaluating web conferencing security, there a are 6 factors you need to consider. \u00a0Having the best in web conferencing security is no small thing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.meetingone.com\/eu-nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Factors of Web Conferencing Security You Need to Consider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#website\",\"url\":\"https:\/\/www.meetingone.com\/eu-nl\/\",\"name\":\"MeetingOne Dutch\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.meetingone.com\/eu-nl\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5\",\"name\":\"Joel Byerly\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g\",\"caption\":\"Joel Byerly\"},\"url\":\"https:\/\/www.meetingone.com\/eu-nl\/blog\/author\/jbyerly\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Factors of Web Conferencing Security You Need to Consider - MeetingOne Dutch","description":"When evaluating web conferencing security, there a are 6 factors you need to consider. \u00a0Having the best in web conferencing security is no small thing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/","og_locale":"en_US","og_type":"article","og_title":"6 Factors of Web Conferencing Security You Need to Consider - MeetingOne Dutch","og_description":"When evaluating web conferencing security, there a are 6 factors you need to consider. \u00a0Having the best in web conferencing security is no small thing.","og_url":"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/","og_site_name":"MeetingOne Dutch","article_publisher":"https:\/\/www.facebook.com\/MeetingOne","article_published_time":"2016-04-12T15:51:11+00:00","article_modified_time":"2018-12-06T16:09:46+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/www.meetingone.com\/eu-nl\/wp-content\/uploads\/sites\/8\/2016\/04\/Featured-Security-image.png","type":"image\/png"}],"author":"Joel Byerly","twitter_card":"summary_large_image","twitter_creator":"@meetingone","twitter_site":"@meetingone","twitter_misc":{"Written by":"Joel Byerly","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.meetingone.com\/eu-nl\/blog\/6-factors-of-web-conferencing-security-2\/","url":"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/","name":"6 Factors of Web Conferencing Security You Need to Consider - MeetingOne Dutch","isPartOf":{"@id":"https:\/\/www.meetingone.com\/eu-nl\/#website"},"datePublished":"2016-04-12T15:51:11+00:00","dateModified":"2018-12-06T16:09:46+00:00","author":{"@id":"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5"},"description":"When evaluating web conferencing security, there a are 6 factors you need to consider. \u00a0Having the best in web conferencing security is no small thing.","breadcrumb":{"@id":"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.meetingone.com\/eu-nl\/"},{"@type":"ListItem","position":2,"name":"6 Factors of Web Conferencing Security You Need to Consider"}]},{"@type":"WebSite","@id":"https:\/\/www.meetingone.com\/eu-nl\/#website","url":"https:\/\/www.meetingone.com\/eu-nl\/","name":"MeetingOne Dutch","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.meetingone.com\/eu-nl\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5","name":"Joel Byerly","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g","caption":"Joel Byerly"},"url":"https:\/\/www.meetingone.com\/eu-nl\/blog\/author\/jbyerly\/"}]}},"_links":{"self":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts\/4539"}],"collection":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/comments?post=4539"}],"version-history":[{"count":2,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts\/4539\/revisions"}],"predecessor-version":[{"id":6040,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts\/4539\/revisions\/6040"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/media\/4540"}],"wp:attachment":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/media?parent=4539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/categories?post=4539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/tags?post=4539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}