{"id":4549,"date":"2016-05-16T11:22:01","date_gmt":"2016-05-16T17:22:01","guid":{"rendered":"https:\/\/www.meetingone.eu\/eu-nl\/?p=4549"},"modified":"2018-12-06T09:08:13","modified_gmt":"2018-12-06T16:08:13","slug":"5-factors-of-audio-conferencing-security","status":"publish","type":"post","link":"https:\/\/www.meetingone.com\/eu-nl\/blog\/5-factors-of-audio-conferencing-security\/","title":{"rendered":"5 Factors of Audio Conferencing Security to Evaluate"},"content":{"rendered":"<h4 style=\"text-align: center;\"><\/h4>\n<h4 style=\"text-align: center;\"><span style=\"color: #bb2025;\">What concerns you most about your conference calls?\u00a0 Call quality and reliability?\u00a0 The success of your meetings?\u00a0 What about having someone snoop on your call?\u00a0<\/span><\/h4>\n<p><span style=\"color: #000000;\">Maybe audio conferencing security isn\u2019t the first thing you worry about \u2013 and that\u2019s fair.\u00a0 Between all the phishing scams, malware nuisances, and potential Denial-of-Service attacks, your IT department and business are already up against mounting security threats.\u00a0 Nonetheless, the risk of someone hacking your conference calls is no less of a danger, and it has become a more significant problem in recent years.<\/span><\/p>\n<p><span style=\"color: #000000;\">Over the past two and a half decades, audio conferencing has changed significantly.\u00a0 The primary change has revolved around the development of software that utilizes web-based protocols and applications to better control and carry audio conference calls.\u00a0 (Your friends here at MeetingOne were some of the<\/span> <strong><span style=\"color: #bb2025;\"><a style=\"color: #bb2025;\" href=\"https:\/\/www.meetingone.com\/eu-nl\/ons-verhaal\/\" target=\"_blank\">pioneers in this field<\/a><\/span><\/strong> <span style=\"color: #000000;\">of &#8220;internet-enhanced conferencing&#8221;!)<\/span><\/p>\n<p><span style=\"color: #000000;\">Yet, when programmers began designing and building software that used facets of the internet to enhance conference calls, audio conferences became increasingly vulnerable to criminals such as hackers, script kiddies, and web snoopers.\u00a0 Although audio conferencing has been greatly improved by these upgrades, it is critical you know what audio conferencing security features your provider offers.<\/span><\/p>\n<h5 style=\"text-align: center;\"><span style=\"color: #ff6600;\">To help you make the best assessment of your overall teleconferencing security, we\u2019re following up our previous blog, \u201c<strong><span style=\"color: #bb2025;\"><a style=\"color: #bb2025;\" href=\"https:\/\/www.meetingone.com\/blog\/6-factors-of-web-conferencing-security-2\/\" target=\"_blank\">6 Factors of Web Conferencing Security You Need to Consider<\/a><\/span><\/strong>,\u201d with a discussion on audio conferencing security.\u00a0<\/span><\/h5>\n<h2><span style=\"color: #bb2025;\">Threats to Your Audio Conferencing Security<\/span><\/h2>\n<p><span style=\"color: #ff6600;\"><strong>Call Snooping:<\/strong>\u00a0<\/span> <span style=\"color: #000000;\">As with web conferencing, the last thing you want is some random outsider listening in on your conference calls.<\/span>\u00a0 <img decoding=\"async\" loading=\"lazy\" class=\"alignright wp-image-5891\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/05\/Security-blog-images-Many-threats-300x300.png\" alt=\"There are many threats to audio conferencing security\" width=\"300\" height=\"300\" \/><span style=\"color: #000000;\">In Healthcare, snooping can lead to compliance issues with HIPAA, as the confidentiality of your patients\u2019 protected information can be compromised.\u00a0<\/span> <span style=\"color: #000000;\">Fail to comply with HIPAA, and you could be slapped with a huge fine.\u00a0 For a legal firm, if someone intrudes upon your call, they could potentially damage your case and reputation \u2013 oh, and you could get sued!<\/span><\/p>\n<hr \/>\n<p><span style=\"color: #ff6600;\"><strong>Internal Leaks:<\/strong><\/span> <span style=\"color: #000000;\">When it comes to information security, internal leaks represent one of the most prevalent issues and threats.\u00a0 Despite everyone&#8217;s best efforts to encourage comfortable and open work environments, the occasional disgruntled employee is liable to leak information about valuable business assets, acquired during a conference call.<\/span><br \/>\n<span style=\"color: #000000;\">That said, not every leak is the result of ill intentions.\u00a0 Sometimes, all it takes is a careless employee, who was not supposed to be on a call, to confide a vital trade-secret to the wrong person, and your business could suffer a crippled reputation and incur financial damages.<\/span><\/p>\n<p><span style=\"color: #000000;\">There\u2019s a lot you are up against, so let\u2019s get you up to speed on audio security musts.\u00a0 When it comes to knowing the necessary features of audio conferencing security, there are 5 factors we feel you should be evaluating.<\/span><\/p>\n<h2><span style=\"color: #bb2025;\">Audio Conferencing Security: 5 Critical Factors<\/span><\/h2>\n<h3><span style=\"color: #ff6600;\">Factor #1: Securing Access<\/span><\/h3>\n<p><span style=\"color: #000000;\">In the new era of audio conferencing, internet enhancement helps make for more productive meetings, through the use of features that manage group interactions.\u00a0 These same components can double as security elements, particularly when you are <strong>Securing Access to a conference room<\/strong>.\u00a0 Two examples of securing access are setting Conference Parameters and utilizing Access Mode Features.<\/span><\/p>\n<ul>\n<li><span style=\"color: #bb2025;\">Conference Parameters:<\/span> <span style=\"color: #000000;\">Conference parameters are broad configurations made to a conference room before the actual event.\u00a0 Establishing parameters, such as maximum numbers of participants, sub-conference rooms, and inactive time, help you keep track of participant movement.\u00a0 Parameters can also be extended to setting In-Call Default features, such as conference locks, which bar entrance to the conference once the meeting has begun.<\/span><\/li>\n<li><span style=\"color: #bb2025;\">Access Modes: <\/span><span style=\"color: #000000;\">Access modes can be defined as the features regulating access into a conference room. Similar to airport security (minus the uncomfortable pat-downs), a basic access mode is Screening, where a Host can let in participants one-by-one.\u00a0 Or a host can simply leave the conference room locked, accessible to a participant only when they are dialed-out to by that host. \u00a0(See &#8220;Factor 4: In-Conference Features&#8221; for more on \u201cdialing-out.\u201d)<\/span><\/li>\n<\/ul>\n<p><strong>Securing the access features of a conference room is a critical starting place for all audio conferencing security.<\/strong><\/p>\n<hr \/>\n<h3><span style=\"color: #bb2025;\"><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/05\/Security-Comic-audio.png\" rel=\"attachment wp-att-5892\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft wp-image-5892 size-large\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/05\/Security-Comic-audio-333x1024.png\" alt=\"Audio Conferencing Security\" width=\"333\" height=\"1024\" \/><\/a>Factor #2: Defining Audio Roles &amp; Privileges<\/span><\/h3>\n<p><span style=\"color: #000000;\">Determining how individuals gain access to your conference rooms is of the utmost importance.\u00a0 To ensure individuals have the appropriate access to your conferences, you need an audio conferencing platform that makes user authentication a major aspect for conference access.\u00a0 Many of the better platforms offer <strong>Contact List or Directory features, which can be used to assign the roles and privileges that will define one\u2019s access to audio conference rooms.<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"color: #ff6600;\">Contact List or Directory:<\/span>\u00a0To define audio roles and privileges, many a<span style=\"color: #000000;\">udio conferencing platforms use a virtual Contact List or Directory feature. \u00a0These features serve two functions: on one side, they act as a virtual repository for your contacts; on the other, they are essential for defining an individual&#8217;s access to your room.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\"><br \/>\nBetter Contact List or Directory features allow you to create unique identifiers for participants that pre-approve how they can interact in your audio conference rooms.\u00a0 In doing so, you can keep your employee, Joe Shmoe, out of conferences he\u2019s not supposed to attend.<\/span><\/p>\n<p><span style=\"color: #000000;\">Make sure to discuss with your audio provider what features they have for defining roles and privileges, and how to access these options.\u00a0 Defining the roles and privileges for your conferences is often the best way to prevent snooping.<\/span><\/p>\n<hr \/>\n<h3><span style=\"color: #ff6600;\">Factor #3: PINs &amp; Conference Codes<\/span><\/h3>\n<p><span style=\"color: #000000;\">There\u2019s an unfortunate but very real fact: anyone can get a conference phone number.\u00a0 With the right tools and software, that individual can then sneak into your conference calls.\u00a0 <strong>To prevent these potential break-ins, it is important your audio conferencing platform offers Personal Identification Numbers (PINs) and Conference Codes<\/strong> as standard features.<\/span><\/p>\n<ul>\n<li><span style=\"color: #bb2025;\">Personal Identification Numbers (PINs) for Host:<\/span> <span style=\"color: #000000;\">As the title suggests, a Personal Identification Number is a unique identifier provided to a host alone.\u00a0 Functioning as the key to unlocking audio conference rooms, PINs assure only hosts have access to and management of their rooms.<\/span><\/li>\n<li><span style=\"color: #bb2025;\">Conference Codes for Participants:<\/span> <span style=\"color: #000000;\">Designated by the host of a conference room, a conference code is a set of numbers that provides the participants a unique entrance passcode to the respective audio conference room. These codes can also be individualized, providing each participant a personalized key to enter a conference room.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Providing conference codes <\/span>is<span style=\"color: #000000;\"> likely the most important step in preparing the security of an audio conference.<strong>\u00a0<\/strong> Using codes helps limit two potential threats: outside conference hackers, and unwanted internal leaks.<\/span><\/p>\n<hr \/>\n<h3><span style=\"color: #bb2025;\">Factor #4: In-Conference Features<\/span><\/h3>\n<p><span style=\"color: #000000;\">To this point, we\u2019ve focused on the security options you should have available for managing the configuration of your audio conferences.\u00a0 <strong>But what are the features you need to keep an audio conference secure once it has begun?<\/strong>\u00a0 Here are a few beneficial components:<\/span><\/p>\n<ul>\n<li><span style=\"color: #ff6600;\">Host Dial-Out:<\/span> <span style=\"color: #000000;\">Perhaps you are wary that conference codes won&#8217;t suffice, and you\u2019d rather completely control attendee admittance yourself. Very wise.\u00a0 With a Host Dial-out feature, you (the host) can select and contact whom will enter your conference room, and when.<\/span><\/li>\n<li><span style=\"color: #ff6600;\">Roll-Call:<\/span> <span style=\"color: #000000;\">Even if you are already leveraging access modes like Screening, you may still want to double check on who has entered. To do so, utilize a conference \u201cRoll-Call.\u201d\u00a0 A roll-call feature will require attendees to record their name before <\/span>entering<span style=\"color: #000000;\">.\u00a0 As attendees enter, their names will then be listed aloud.\u00a0 If \u201cJim Beam\u201d is announced, and there\u2019s no Mr. Beam in your workplace, you may want to dump them from the call (more on disconnecting participants below).\u00a0 Roll-calls can also be recorded, which provides you the option to review the names of participants after the conference.<\/span><\/li>\n<li><span style=\"color: #ff6600;\">Muting:<\/span> <span style=\"color: #000000;\">Muting is pretty self-explanatory, but it has significant ramifications. Imagine a situation where a team member of yours is rattling off a little too much information.\u00a0 Rather than let them continue, you can mute their phone.\u00a0 In doing so, you can avoid a leak of valuable information.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Although you can mute everyone with phone key prompts, selecting and muting a single person requires an online audio-visual interface.\u00a0 Make sure your audio provider offers such software.\u00a0 (One of the industry\u2019s first online audio-visual interfaces was MeetingOne\u2019s<\/span> <span style=\"color: #bb2025;\"><strong><a style=\"color: #bb2025;\" href=\"https:\/\/www.meetingone.com\/eu-nl\/audioone\/clickmeet\/\" target=\"_blank\">Click&amp;Meet<\/a><\/strong><\/span>.\u00a0 <span style=\"color: #000000;\">We weren\u2019t kidding about being pioneers.)<\/span><\/p>\n<ul>\n<li><span style=\"color: #ff6600;\">Impromptu \u201cApparte\u201d:<\/span> <span style=\"color: #000000;\">French for, \u201cUh oh, Joe Schmoe isn\u2019t supposed to hear this \u2013 move him out quick!\u201d <\/span>an apparte<span style=\"color: #000000;\"> feature is a virtual space where you can place people who have been whisked away from the main conference room,\u00a0spur of the moment (thus the \u201cimpromptu\u201d aspect). Typically, you would isolate a participant in this way if they were not privy to confidential information during a conference.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">As an example, Click&amp;Meet\u2019s Sub-Conference Rooms feature functions for impromptu <\/span>apparte<span style=\"color: #000000;\"> when individuals are selected by a host and moved into a different room.<\/span><\/p>\n<ul>\n<li><span style=\"color: #ff6600;\">Disconnection: <\/span><span style=\"color: #000000;\">To manage any instance in which you feel an unwanted guest has intruded upon your call, you need a disconnection feature. Although most audio conferencing platforms offer easy means to disconnect everyone from a call, only a system with an online audio-visual interface has the functionality to disengage particular attendees.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\"><strong>These five features, among others, help you remove those unwanted participants or the cunning perpetrators who may sneak past the first, second, and third walls of protection.<\/strong><\/span><\/p>\n<hr \/>\n<h3><span style=\"color: #ff6600;\">Factor #5: Recordings<\/span><\/h3>\n<p><span style=\"color: #000000;\">Can\u2019t remember all that was discussed in your last conference call?\u00a0 With the right audio conferencing provider, call recordings can be easily placed at your disposal.\u00a0 Many businesses share their recordings with absent employees, trainees, and partners, so they can be aware of what was discussed during the event.\u00a0 In a more recent development, doctors have been recording sessions with patients, so their conversations can be later accessed by either party.\u00a0 The benefits of recordings are endless.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Regardless of how you use audio conference call recordings, it is imperative to have them well secured.\u00a0<\/strong> In 2012, the \u201chacktivist group\u201d (i.e. a group of hackers whose activity is aimed at promoting a social or political cause) Anonymous hacked into an FBI conference call recording then placed it on the internet for all to hear.\u00a0 Ironically, or not, the FBI\u2019s conversation was regarding how they were going to handle cyber threats \u2013 particularly those of hacktivists.<\/span><\/p>\n<p><span style=\"color: #000000;\">Minimally, you need to make sure any recordings your audio provider stores for you are protected while at rest, or in transit, using encryption combinations.\u00a0 <strong>The best methods layer symmetric and asymmetric encryptions.<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">With symmetric encryption, a single code is used to encrypt the data of a recording by your audio provider; then that same key is used to decipher the coded data by you.\u00a0 That code word, or \u201ckey\u201d, is a secret, shared only with your provider and you for access to a recording.<\/span><\/p>\n<p><span style=\"color: #000000;\">Asymmetric encryption employs keys in a slightly different manner.\u00a0 With asymmetric encryption, you take advantage of two keys: one public, one private.\u00a0 Being public, one key is shared between anyone who might need it.\u00a0 The private key is yours alone.\u00a0 Having the public key, your audio provider can send you a recording to a \u201clock box.\u201d\u00a0 At rest in the \u201clock box,\u201d you alone can access the recording with your private key.\u00a0 It\u2019s one way in, one way out.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Overall, bundling symmetric and asymmetric methods of encryption layers the protection of your recording &#8211; a must for audio conferencing security.<\/strong><\/span><\/p>\n<hr \/>\n<h3><span style=\"color: #bb2025;\">Conclusion<\/span><\/h3>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-5890 alignright\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/05\/Security-blog-images-Featured-audio-image-300x300.png\" alt=\"Audio Conferencing Security\" width=\"250\" height=\"250\" \/><span style=\"color: #000000;\">Getting the most out of audio conferencing technology comes when you have the assurance of safety and security.\u00a0 When you can worry less about managing external threats and internal leaks, it gives you the opportunity to focus on the success of your presentations and conferences.<\/span><\/p>\n<p><span style=\"color: #000000;\">Assessing the security features your audio conferencing provider offers, is critical.\u00a0 If they haven\u2019t addressed many of the above factors, all of the benefits of internet-enhanced conferencing can be undermined by the aforementioned security threats.<\/span><\/p>\n<p><span style=\"color: #000000;\">Over the last few decades, MeetingOne has invested a considerable amount of time and energy into refining its audio conferencing security.\u00a0 This investment in audio security technologies and methodologies will always be principal to our business.\u00a0We love sharing our expertise<\/span>; <strong><span style=\"color: #bb2025;\"><a style=\"color: #bb2025;\" href=\"mailto:sales@meetingone.com\" target=\"_blank\">ask how<\/a><\/span><\/strong> <span style=\"color: #000000;\">we can help ensure your audio conferencing security is up to industry standards!<\/span><\/p>\n<p><a href=\"mailto:sales@meetingone.com\" target=\"_blank\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-5719 size-medium\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2016\/04\/Learn-More-Yellow-Button-2016-300x77.png\" alt=\"Learn More about conferencing security with MeetingOne\" width=\"300\" height=\"77\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What concerns you most about your conference calls?\u00a0 Call quality and reliability?\u00a0 The success of your meetings?\u00a0 What about having someone snoop on your call?\u00a0 Maybe audio conferencing security isn\u2019t the first thing you worry about \u2013 and that\u2019s fair.\u00a0 Between all the phishing scams, malware nuisances, and potential Denial-of-Service attacks, your IT department and [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":4550,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,2,3],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Factors of Audio Conferencing Security to Evaluate - MeetingOne Dutch<\/title>\n<meta name=\"description\" content=\"When it comes to ensuring your business&#039; safety, there are six factors of audio conferencing security you need to be aware of.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Factors of Audio Conferencing Security to Evaluate - MeetingOne Dutch\" \/>\n<meta property=\"og:description\" content=\"When it comes to ensuring your business&#039; safety, there are six factors of audio conferencing security you need to be aware of.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/\" \/>\n<meta property=\"og:site_name\" content=\"MeetingOne Dutch\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MeetingOne\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-16T17:22:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-06T16:08:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.meetingone.com\/eu-nl\/wp-content\/uploads\/sites\/8\/2016\/05\/Security-blog-images-Featured-audio-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Joel Byerly\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@meetingone\" \/>\n<meta name=\"twitter:site\" content=\"@meetingone\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joel Byerly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/blog\/5-factors-of-audio-conferencing-security\/\",\"url\":\"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/\",\"name\":\"5 Factors of Audio Conferencing Security to Evaluate - MeetingOne Dutch\",\"isPartOf\":{\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#website\"},\"datePublished\":\"2016-05-16T17:22:01+00:00\",\"dateModified\":\"2018-12-06T16:08:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5\"},\"description\":\"When it comes to ensuring your business' safety, there are six factors of audio conferencing security you need to be aware of.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.meetingone.com\/eu-nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Factors of Audio Conferencing Security to Evaluate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#website\",\"url\":\"https:\/\/www.meetingone.com\/eu-nl\/\",\"name\":\"MeetingOne Dutch\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.meetingone.com\/eu-nl\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5\",\"name\":\"Joel Byerly\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g\",\"caption\":\"Joel Byerly\"},\"url\":\"https:\/\/www.meetingone.com\/eu-nl\/blog\/author\/jbyerly\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Factors of Audio Conferencing Security to Evaluate - MeetingOne Dutch","description":"When it comes to ensuring your business' safety, there are six factors of audio conferencing security you need to be aware of.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/","og_locale":"en_US","og_type":"article","og_title":"5 Factors of Audio Conferencing Security to Evaluate - MeetingOne Dutch","og_description":"When it comes to ensuring your business' safety, there are six factors of audio conferencing security you need to be aware of.","og_url":"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/","og_site_name":"MeetingOne Dutch","article_publisher":"https:\/\/www.facebook.com\/MeetingOne","article_published_time":"2016-05-16T17:22:01+00:00","article_modified_time":"2018-12-06T16:08:13+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/www.meetingone.com\/eu-nl\/wp-content\/uploads\/sites\/8\/2016\/05\/Security-blog-images-Featured-audio-image.png","type":"image\/png"}],"author":"Joel Byerly","twitter_card":"summary_large_image","twitter_creator":"@meetingone","twitter_site":"@meetingone","twitter_misc":{"Written by":"Joel Byerly","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.meetingone.com\/eu-nl\/blog\/5-factors-of-audio-conferencing-security\/","url":"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/","name":"5 Factors of Audio Conferencing Security to Evaluate - MeetingOne Dutch","isPartOf":{"@id":"https:\/\/www.meetingone.com\/eu-nl\/#website"},"datePublished":"2016-05-16T17:22:01+00:00","dateModified":"2018-12-06T16:08:13+00:00","author":{"@id":"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5"},"description":"When it comes to ensuring your business' safety, there are six factors of audio conferencing security you need to be aware of.","breadcrumb":{"@id":"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.meetingone.com\/eu-nl\/"},{"@type":"ListItem","position":2,"name":"5 Factors of Audio Conferencing Security to Evaluate"}]},{"@type":"WebSite","@id":"https:\/\/www.meetingone.com\/eu-nl\/#website","url":"https:\/\/www.meetingone.com\/eu-nl\/","name":"MeetingOne Dutch","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.meetingone.com\/eu-nl\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5","name":"Joel Byerly","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g","caption":"Joel Byerly"},"url":"https:\/\/www.meetingone.com\/eu-nl\/blog\/author\/jbyerly\/"}]}},"_links":{"self":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts\/4549"}],"collection":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/comments?post=4549"}],"version-history":[{"count":2,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts\/4549\/revisions"}],"predecessor-version":[{"id":6039,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts\/4549\/revisions\/6039"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/media\/4550"}],"wp:attachment":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/media?parent=4549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/categories?post=4549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/tags?post=4549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}