{"id":5771,"date":"2018-01-24T10:27:56","date_gmt":"2018-01-24T17:27:56","guid":{"rendered":"https:\/\/www.meetingone.eu\/eu-nl\/?p=5771"},"modified":"2018-12-05T12:50:18","modified_gmt":"2018-12-05T19:50:18","slug":"what-makes-audioone-conference-calling-different-security","status":"publish","type":"post","link":"https:\/\/www.meetingone.com\/eu-nl\/blog\/what-makes-audioone-conference-calling-different-security\/","title":{"rendered":"What Makes AudioOne Conference Calling Different? Security"},"content":{"rendered":"<p><b>What\u00a0is the main reason enterprise companies\u00a0prefer\u00a0phone line conference calling over internet\u00a0connections? Reliability.<\/b><\/p>\n<p>With a different infrastructure, phone lines aren\u2019t susceptible to the same outages as the internet, often making traditional conferencing much more desirable than VoIP.<\/p>\n<p><span style=\"color: #bb2025;\"><strong>What people don\u2019t realize is that conference calls also can offer greater security.<\/strong>\u00a0<\/span>In a world constantly threatened by hackers and call snoopers, organizations around the globe need to feel confident in their conference call security.<\/p>\n<hr \/>\n<p>Whether you\u2019re discussing quarterly revenue figures during an executive meeting or\u00a0sharing results from recent medical research trials,\u00a0<strong>making sure your information isn\u2019t compromised by some call snooper &#8211; or accidentally leaked &#8211; is essential<\/strong>.\u00a0 (Learn more about the threats to your calls in this<span style=\"color: #bb2025;\"><strong>\u00a0<a style=\"color: #bb2025;\" href=\"https:\/\/www.meetingone.com\/blog\/5-factors-of-audio-conferencing-security\/\">blog<\/a><\/strong><\/span>.)<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Featured-Image.png\" rel=\"attachment wp-att-12206\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12206\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Featured-Image.png\" alt=\"AudioOne conference call security\" width=\"500\" height=\"400\" \/><\/a><\/p>\n<p><span style=\"color: #f68920;\"><strong>That\u2019s why MeetingOne\u00a0continues to prioritized secure conference calling while other audio conferencing providers are rolling back protection to cut their costs.<\/strong>\u00a0<\/span>Some providers are even\u00a0sacrificing security to meet the demand to make calls easier to access!<\/p>\n<p><strong>At MeetingOne, we\u00a0believe in providing\u00a0top-notch security\u00a0while maintaining\u00a0quick call access at\u00a0competitive prices.<\/strong><\/p>\n<p><span style=\"color: #bb2025;\"><strong><span style=\"color: #bb2025;\"><a style=\"color: #bb2025;\" href=\"https:\/\/www.meetingone.com\/eu-nl\/audioone\/\">AudioOne<\/a><\/span>,\u00a0<\/strong><\/span>MeetingOne&#8217;s premier conference calling service, has a diverse set of security features critical to our customers.\u00a0 We help clients across industries remain compliant with local and federal laws when sharing sensitive information during conference calls.\u00a0 A research agency that&#8217;s part of the US government, for example, couldn&#8217;t operate as efficiently without MeetingOne&#8217;s conference call security.<\/p>\n<p><span style=\"color: #f68920;\"><strong>In this blog, we\u2019ll share one of the most important factors that\u00a0differentiates\u00a0MeetingOne from other providers: Security.<\/strong><\/span><\/p>\n<hr \/>\n<h2><span style=\"color: #bb2025;\">4 Aspects of\u00a0AudioOne\u2019s\u00a0Conference Call Security<\/span><\/h2>\n<p>AudioOne is loaded with tiers of security features intended to help protect your calls. And many of these features work in \u201cthe background.\u201d\u00a0 Contrary to expectations, easy access to calls is entirely possible even with strong security measures in place!<\/p>\n<p>These\u00a0features are set up in two of our MeetingOne platforms: Our\u00a0<span style=\"color: #bb2025;\"><strong><a style=\"color: #bb2025;\" href=\"https:\/\/www.meetingone.com\/eu-nl\/audioone\/oai\/\">Online Account Management<\/a>\u00a0<\/strong><\/span>(OAM) portal, and our call interface,\u00a0<strong><span style=\"color: #bb2025;\"><a style=\"color: #bb2025;\" href=\"https:\/\/www.meetingone.com\/eu-nl\/audioone\/clickmeet\/\">Click&amp;Meet<\/a><\/span><\/strong>.\u00a0 OAM provides users access to all things relevant to their calls. Click&amp;Meet is an intuitive computer interface that lets you manage your calls with your mouse.\u00a0\u00a0We&#8217;ll dig into each platform at later points in the blog.<\/p>\n<p><strong>Let&#8217;s explore four factors that define AudioOne&#8217;s conference call security:\u00a0<span style=\"color: #bb2025;\"><a style=\"color: #bb2025;\" href=\"#Admin\">Administrative Controls<\/a><\/span>,\u00a0<span style=\"color: #f68920;\"><a style=\"color: #f68920;\" href=\"#Access\">Access Features<\/a><\/span>,\u00a0<span style=\"color: #225d71;\"><a style=\"color: #225d71;\" href=\"#Click&amp;Meet\">Click&amp;Meet<\/a><\/span>\u00a0&amp;\u00a0<span style=\"color: #e6c43c;\"><a style=\"color: #e6c43c;\" href=\"#Recordings\">Recordings<\/a><\/span>.\u00a0<\/strong>(Click on the topic that most interests you!)<\/p>\n<p id=\"Admin\"><span style=\"color: #ffffff;\">.<\/span><\/p>\n<hr \/>\n<h3><span style=\"color: #f68920;\">#1. Administrative Controls in OAM<\/span><\/h3>\n<p><a href=\"https:\/\/www.meetingone.com\/eu-nl\/audioone\/oai\/\"><span style=\"color: #bb2025;\"><strong>OAM<\/strong>\u00a0(or Online Account Management)<\/span><\/a>\u00a0is\u00a0a portal where users have access to\u00a0call\u00a0reports and recordings, contact info and security features. There are two tiers of security settings that are\u00a0dependent on a user\u2019s role within OAM.<\/p>\n<p>Most AudioOne users are Room Hosts in OAM, and they have specific options for securing their audio rooms.\u00a0 The other category is Account Administrator, and these users can manage room settings for all Room Hosts across a company.<\/p>\n<p>Let&#8217;s dig into both!<\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Room Hosts<\/span><\/h4>\n<p>Room Hosts have an array of &#8220;In Call&#8221; settings they can manage.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/In-Call-features.png\" rel=\"attachment wp-att-12208\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12208\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/In-Call-features.png\" alt=\"audioone conference call security\" width=\"600\" height=\"501\" \/><\/a><\/p>\n<p>Many are essential for conferencing call security,\u00a0including the following examples.<\/p>\n<p><strong><span style=\"color: #bb2025;\">Access Mode<\/span><\/strong><\/p>\n<p>Participant access to conference calls can be\u00a0preset\u00a0in OAM for users&#8217; audio rooms.\u00a0\u00a0The settings are easy to adjust.\u00a0 By simply selecting a drop-down menu, you can choose between several access options: Open, Locked, Code, IAC, Code_IAC or Screened.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Access-Modes-new.png\" rel=\"attachment wp-att-12192\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12192\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Access-Modes-new.png\" alt=\"conference call security\" width=\"700\" height=\"271\" \/><\/a><\/p>\n<p>These options give users various levels of security strength.\u00a0 Obviously, an\u00a0<span style=\"color: #6ac8dc;\"><strong>Open<\/strong><\/span>\u00a0audio room is accessible to anyone, and once\u00a0<span style=\"color: #6ac8dc;\"><strong>Locked<\/strong><\/span>, entrance is prohibited.<\/p>\n<p>Using a\u00a0<span style=\"color: #6ac8dc;\"><strong>&#8220;Code&#8221; (Access Code)<\/strong><\/span>\u00a0gives you an opportunity to secure the room with one password everyone has to use.\u00a0\u00a0<strong>This is an ideal option for one-off events.\u00a0<\/strong>\u00a0If you need to host an emergency call, for example, you can require everyone to use a code you create on the spot.\u00a0 \u00a0People without that code simply won&#8217;t be able to get in; thus avoiding unwanted listeners.<\/p>\n<p><span style=\"color: #6ac8dc;\"><strong>Individual Access Codes (&#8220;IAC&#8221;)<\/strong><\/span>, on the other hand, allow access to those participants with\u00a0a unique\u00a0code per individual.\u00a0\u00a0<strong>It&#8217;s great for identifying participants attending recurring events open to larger numbers of people within your organization.<\/strong>\u00a0 Our conferencing bridge recognizes all the IACs your company has stored, so it makes it easy to identify people within your company and allow them access to\u00a0these calls, without accidentally exposing yourself to call snoopers.<\/p>\n<p>Using\u00a0<span style=\"color: #6ac8dc;\"><strong>&#8220;Code_IAC&#8221;<\/strong><\/span>\u00a0is a great way to layer security with both IACs and Access Codes.<\/p>\n<p>And\u00a0<strong><span style=\"color: #6ac8dc;\">&#8220;Screened&#8221;<\/span><\/strong>\u00a0automatically sends attendees to the Waiting Lounge, where the Host may\u00a0allow them into the main call one-by-one.\u00a0 Great for small calls with a dozen participants or fewer.\u00a0 Not ideal for\u00a0conferences with hundreds or thousands of callers. \ud83d\ude09<\/p>\n<p>(<strong>We will look further into all of these Access Modes later in the blog.)<\/strong><\/p>\n<hr \/>\n<p><span style=\"color: #bb2025;\"><strong>Participant Info\u00a0<\/strong><\/span><\/p>\n<p>OAM allows you to add contacts and their information to a Directory within the system.\u00a0 When creating new contacts, Room Hosts are prompted to\u00a0set up Individual Access Codes.\u00a0 This ensures a baseline level of security.<\/p>\n<p>The opportunities to increase security go further, though.\u00a0 Worried an individual may be &#8220;too eager&#8221; when participating and reveal something confidential?\u00a0 Check the\u00a0<strong>&#8220;Muted&#8221;<\/strong>\u00a0checkbox &#8211; and they will be muted when joining the call\u00a0<em>by default<\/em>.<\/p>\n<p>Want them to be able to access certain calls but not others?\u00a0 Select or deselect the\u00a0<strong>&#8220;Access Authorized&#8221;<\/strong>\u00a0checkbox prior to a call.\u00a0 If not selected, a caller can&#8217;t accidentally stumble into a call they weren&#8217;t invited to attend.\u00a0 The last thing you want is someone without the right clearance being privy to an important call.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Participant-Info.png\" rel=\"attachment wp-att-12211\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12211\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Participant-Info.png\" alt=\"conference call security\" width=\"400\" height=\"184\" \/><\/a><\/p>\n<p>Establishing these security measures early is simple and effective.<\/p>\n<hr \/>\n<p><span style=\"color: #bb2025;\"><strong>Roll-Call\u00a0<\/strong><\/span><\/p>\n<p>Many features in OAM serve dual purposes.\u00a0 Take the option to require a Roll-Call.\u00a0 It serves the simple\u00a0job of announcing attendees as they join the conference call.\u00a0 We&#8217;ve all been on those calls where people join but don&#8217;t inform the rest of us they are present.\u00a0 Roll-Call eliminates that annoyance!<\/p>\n<p><strong>Being announced during the call also functions as a security measure.\u00a0<\/strong>\u00a0With each person naming themselves, Room Hosts can feel more confident they know who is joining.\u00a0 If you hear a name that doesn&#8217;t sound familiar, you can take steps to determine who they are &#8211; friend or foe.<\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Account Administrators<\/span><\/h4>\n<p>Administrators can set general room settings for all AudioOne users in their account. Many of the features they adjust factor into room security.\u00a0 All you have to do to setup company wide room settings is select the\u00a0<strong>&#8220;Rooms&#8221;<\/strong>\u00a0tab and toggle the &#8220;Default Settings.&#8221;\u00a0\u00a0<strong>Defining these settings is a great way to increase security without impacting ease-of-access to calls.<\/strong><\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Controls.png\" rel=\"attachment wp-att-12174\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12174\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Controls.png\" alt=\"AudioOne Security features\" width=\"711\" height=\"428\" \/><\/a><\/p>\n<p>Here are a few examples of settings you can employ to bolster your conference call security.<\/p>\n<p><span style=\"color: #bb2025;\"><strong>Maximum Participants<\/strong><\/span><\/p>\n<p>In OAM, Account Administrators can predetermine the max number of participants in rooms across the organization.\u00a0 The research organization we mentioned in the intro is a prime example of a group that could benefit from this feature.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-02.png\" rel=\"attachment wp-att-12177\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12177\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-02.png\" alt=\"AudioOne conference call security\" width=\"600\" height=\"49\" \/><\/a><\/p>\n<p>They mainly hold calls that consist of 12 or fewer participants.\u00a0 These calls facilitate conversations between doctors and researchers about the latest medical findings.\u00a0 Because these calls are extremely confidential, they have to eliminate all possibilities of unwanted participants.<\/p>\n<p>By keeping the room number low, they could limit the number of people who enter.\u00a0\u00a0When that maximum number of participants show up, no one else can get in.<\/p>\n<h5>(Of course, setting the maximum number is dependent on your organization&#8217;s needs.\u00a0 Don&#8217;t think that because you set a max means you you&#8217;re stuck there.\u00a0 We&#8217;re flexible at MeetingOne, and we can take steps to help you increase room capacity as needed!)<\/h5>\n<hr \/>\n<p><span style=\"color: #bb2025;\"><strong>Subconferences<\/strong><\/span><\/p>\n<p>While sub-conference rooms are terrific for holding breakout sessions and huddles, having too many can become a security issue.\u00a0 With AudioOne, your audio room has up to 20 sub-conference rooms to distribute call participants into as needed.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-03.png\" rel=\"attachment wp-att-12178\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12178\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-03.png\" alt=\"AudioOne conference call security\" width=\"600\" height=\"49\" \/><\/a><\/p>\n<p>We would encourage you to use as many as needed, but we recognize that having too many can make it hard to keep track of participants.\u00a0 So, if you feel you need to better be able to monitor small group discussions for security reasons, you can limit the number of rooms available.<\/p>\n<hr \/>\n<p><span style=\"color: #bb2025;\"><strong>IAC Attempts<\/strong><\/span><\/p>\n<p>Limiting IAC attempts is one of the best conference call security features I think we offer.\u00a0 Admins can set the number of times someone can unsuccessfully use an IAC to join a call.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-04.png\" rel=\"attachment wp-att-12179\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12179\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-04.png\" alt=\"AudioOne conference call security\" width=\"600\" height=\"49\" \/><\/a><\/p>\n<p>Why is this valuable?\u00a0 Let&#8217;s say\u00a0you set the number\u00a0at\u00a03 attempts.\u00a0 Occasionally, an employee may accidentally input their code wrong.\u00a0 3 attempts\u00a0gives\u00a0them a mulligan (or two).\u00a0 If someone can&#8217;t get it in 3 attempts, though, there&#8217;s the possibility they shouldn&#8217;t actually have access to the call at all.<\/p>\n<p>Maybe it&#8217;s a snooper just testing numbers, hoping to get lucky.\u00a0 You wouldn&#8217;t want them to have an unlimited number of tries to sneak in.\u00a0 And if it turns out it was an employee with ten thumbs, AudioOne gives you other ways to ensure you get them on the call. You can also choose to be notified if one of your callers is having difficulties getting in, and assist them as needed.<\/p>\n<hr \/>\n<p><span style=\"color: #bb2025;\"><strong>Waiting Time\u00a0<\/strong><\/span><\/p>\n<p>AudioOne gives you the option to set a cut off mark for how long someone can spend trying to get\u00a0into\u00a0a call.\u00a0 Once they&#8217;ve dialed in, the timer starts.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-05.png\" rel=\"attachment wp-att-12180\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12180\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-05.png\" alt=\"AudioOne conference call security\" width=\"600\" height=\"49\" \/><\/a><\/p>\n<p>As with the IAC Attempts option, this tool is desirable for eliminating snoops who may be loitering in the Waiting Lounge, trying to break into the audio room.<\/p>\n<p>Let&#8217;s consider this in real-life terms.\u00a0 How long does it take to input a Code?\u00a0 A minute?\u00a0 Two if you mess up?\u00a0 So, if someone&#8217;s just sitting in the waiting lounge for 10-15 minutes, either they are very confused about how to get it, or they potentially shouldn&#8217;t be on the call.<\/p>\n<hr \/>\n<p><span style=\"color: #bb2025;\"><strong>Maximum Duration<\/strong><\/span><\/p>\n<p>While Maximum Duration really is a cost-saving feature (helping you avoid racking up too many minutes), it could be repurposed as a security tool.\u00a0 The longer a conference goes, the more exposure it has to call snoopers, in theory.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-06.png\" rel=\"attachment wp-att-12181\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12181\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-06.png\" alt=\"AudioOne conference call security\" width=\"600\" height=\"49\" \/><\/a><\/p>\n<p>Setting a Maximum Duration limits that window.\u00a0 Smaller window, lower susceptibility to unwanted\u00a0visitors.\u00a0 (Zero is the default setting.)<\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-01.png\" rel=\"attachment wp-att-12176\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12176\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Admin-Room-Settings-01.png\" alt=\"AudioOne conference call security\" width=\"600\" height=\"226\" \/><\/a><\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Multiple Audio Rooms<\/span><\/h4>\n<p>AudioOne users can create multiple audio rooms in OAM to facilitate their conference calls. Depending on your needs, individual rooms could be formatted with more security features and others with fewer.<\/p>\n<p>The value of this functionality is apparent.\u00a0 Some calls\u00a0may require rigid security so the wrong folks can&#8217;t join.\u00a0 Others may be more lax, with a large audience that needs easy access.<\/p>\n<p>One of our healthcare clients operates in a way similar to this.\u00a0 They hold &#8220;All Hands&#8221; calls every two weeks with an average of 1,000 participants.\u00a0 It&#8217;s important that joining the call is straightforward for attendees.\u00a0 They also hold weekly internal calls consisting of 100-200 callers.\u00a0 While still large, these calls may require more security to ensure\u00a0HIPPA compliance.<\/p>\n<hr \/>\n<p id=\"Access\">.<\/p>\n<h3><span style=\"color: #f68920;\">#2.\u00a0Access Features<\/span><\/h3>\n<p>Access is everything when it comes to conference call security. We mentioned a few examples above.\u00a0\u00a0We go into greater detail here.<\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Host Dial-Out\u00a0<\/span><\/h4>\n<p>What&#8217;s the simplest access combination you can use to secure your conference calls?\u00a0\u00a0<strong>Host dial-out + a locked audio room.<\/strong><\/p>\n<p>It works like this.\u00a0 You set your\u00a0<span style=\"color: #6ac8dc;\"><strong>Access Mode<\/strong><\/span>\u00a0to\u00a0<strong>&#8220;Locked&#8221;<\/strong>\u00a0in OAM.\u00a0 Then, you jump into Click&amp;Meet.\u00a0 You then start your conference call.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Locked-Access-Mode.png\" rel=\"attachment wp-att-12194\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12194\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Locked-Access-Mode.png\" alt=\"secure conference call\" width=\"583\" height=\"63\" \/><\/a><\/p>\n<p>Using your directory feature &#8211; preloaded with contacts you added in OAM &#8211; you can select users and dial-out to them.\u00a0 AudioOne will then call those users.\u00a0\u00a0No one gets in without your directly contacting them.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Dialout-Image-new.png\" rel=\"attachment wp-att-12193\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12193\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Dialout-Image-new.png\" alt=\"conference call security\" width=\"560\" height=\"473\" \/><\/a><\/p>\n<p><strong>This method eliminates the need for access codes, but it does put the onus on you to make sure the right people are contacted.\u00a0\u00a0<\/strong><\/p>\n<p>That said, MeetingOne still gives you the option to require callers to input IACs when dialed out to &#8211; if that need arises.\u00a0 All you have to do is change &#8220;Enable IAC on Dialout&#8221; from the default &#8220;No&#8221; to &#8220;Yes.&#8221;\u00a0 Doubling down on security is always a safe bet!<\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">IACs\u00a0<\/span><\/h4>\n<p><strong>Individual Access Codes (IACs) are at the heart of the AudioOne Security system!\u00a0\u00a0<\/strong>(And AudioOne&#8217;s identification processes, in general!\u00a0 OAM uses IACs to automatically identify callers as they connect with our conference call bridge.)<\/p>\n<p>As the name suggests, IACs are codes given to individual participants when they are created as a contact in OAM or Click&amp;Meet.\u00a0 (The two platforms are interconnected.\u00a0 Create a contact in the directory of either, and it will be available in both.)\u00a0 Each code is unique to that contact.\u00a0 The codes will automatically generate in OAM and Click&amp;Meet if you do not add one when creating a contact.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/IAC_participant-info-2.png\" rel=\"attachment wp-att-12190\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12190\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/IAC_participant-info-2.png\" alt=\"conference call securiity\" width=\"542\" height=\"271\" \/><\/a><\/p>\n<p>For security purposes, IACs are highly desirable.\u00a0 If you set your audio room&#8217;s Access Mode to &#8220;IAC&#8221; (as mentioned above), callers must enter their particular code to join the call. You&#8217;ll know everyone who joins because their information will automatically be populated.<\/p>\n<p>IACs can also be reported on after your call has concluded within OAM. Thanks to these individualized codes, you can get the full list of identified callers, no matter what phone number they choose to use to dial in with that day.<\/p>\n<p>As a sub-category of access codes, IACs have an obvious value for conference call security.\u00a0 But given our IACs are part of the identification process, too, you&#8217;re doubling down on security in one fell swoop.\u00a0 Not only is it harder to get in, everyone joining will be named and recognizable in Click&amp;Meet (more below).\u00a0 If someone appears who shouldn&#8217;t be on the call, you can disconnect them with two clicks of the mouse.<\/p>\n<p><strong>IACs are a terrific tool!<\/strong><\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Access Codes<\/span><\/h4>\n<p>As mentioned above,\u00a0Access Codes provide an\u00a0alternative for your conference call security.\u00a0\u00a0Let&#8217;s think of IACs as the default, and Access Codes as a second option.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Code-Access.png\" rel=\"attachment wp-att-12189\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12189\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Code-Access.png\" alt=\"conference call security\" width=\"599\" height=\"100\" \/><\/a><\/p>\n<p>IACs are ideal for recurring conference calls with a defined set of participants.\u00a0 Each time they jump on the call, they use the same code.<\/p>\n<p>But sometimes you must facilitate one-off calls with users from around the country (or globe).\u00a0 Conference Codes may prove a better option.\u00a0 You can set the\u00a0<strong><span style=\"color: #6ac8dc;\">Access Mode<\/span><\/strong>\u00a0to\u00a0<strong>&#8220;Code&#8221;<\/strong>\u00a0and define a new code for that event, then you quickly inform callers of the code.\u00a0 This ensures your call will be secured by a unique code for that one event.\u00a0 (You will have to reset the Access Mode after the call to IAC.)<\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Layering Access Codes\u00a0<\/span><\/h4>\n<p><strong>The greater your conference call security needs are, the more you&#8217;ll benefit from layered access codes<\/strong>.<\/p>\n<p>Layering codes in OAM\u00a0is\u00a0very simple.\u00a0 You first select the\u00a0<strong><span style=\"color: #6ac8dc;\">Access\u00a0Mode<\/span><\/strong>\u00a0option\u00a0<strong>&#8220;Code_IAC&#8221;<\/strong>\u00a0in Settings.\u00a0 Then you input a Code.\u00a0 Now, all participants must enter both the conference code AND their IAC to join the call.\u00a0 And you &#8211; as the Host &#8211; are completely in control of what that conference code is.<\/p>\n<p>The value is apparent.\u00a0 By requiring two codes, you&#8217;re filtering out possible snoops and employees who may join.\u00a0 You can be confident that those on the call, were intended to be there.<\/p>\n<hr \/>\n<p id=\"Click&amp;Meet\">.<\/p>\n<h3><span style=\"color: #f68920;\">#3. Click&amp;Meet Call Interface<\/span><\/h3>\n<p>The final line of call security we offer comes in an unusual form: Our conference call visual management interface \u2013\u00a0<a href=\"https:\/\/www.meetingone.com\/eu-nl\/audioone\/clickmeet\/\"><span style=\"color: #bb2025;\"><strong>Click&amp;Meet.<\/strong><\/span><\/a>\u00a0 It&#8217;s another great example of a tool playing multiple roles.<\/p>\n<p>Click&amp;Meet was intended help Hosts manage large numbers of conference call participants from their computer.\u00a0 But Click&amp;Meet also gives you the ability to screen participants as they come, isolate suspicious callers, or boot individuals who shouldn\u2019t be in attendance.\u00a0 Using Click&amp;Meet can be a boon to your conference call security.<\/p>\n<h4><span style=\"color: #225d71;\">Participant Control \u2013 Avatars\u00a0<\/span><\/h4>\n<p>Call interfaces are awesome because they provide hosts a simple visual representation for callers: Avatars!<\/p>\n<p>Avatars serve security purposes because they give hosts the option to select and mute, move or disconnect disruptive or unwanted callers.\u00a0 If I feel a caller is sharing inappropriate information, I can right-click and mute them within Click&amp;Meet.\u00a0 Maybe they shouldn&#8217;t be in attendance.\u00a0\u00a0Same\u00a0process to disconnect them.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Participant-Controls.png\" rel=\"attachment wp-att-12195\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12195\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Participant-Controls.png\" alt=\"conference call security\" width=\"538\" height=\"522\" \/><\/a><\/p>\n<p>Being able to deal with one caller at a time is a huge benefit for Hosts using Click&amp;Meet.\u00a0 It&#8217;s a fast, efficient way to deal with troublesome individuals.<\/p>\n<h5>(Callers with their name circled in\u00a0<span style=\"color: #a3cd3a;\">GREEN<\/span>\u00a0are speaking; callers circled in\u00a0<span style=\"color: #bb2025;\">RED<\/span>\u00a0are muted; callers not speaking are\u00a0<span style=\"color: #a9bfc4;\">GREY<\/span>.)<\/h5>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Host Corner \u2013 Screening\u00a0<\/span><\/h4>\n<p>The Host Corner is a space apart from the main conference room where a host can talk to participants.\u00a0 Conversations held in the host corner won&#8217;t be heard in the main conference room.<\/p>\n<p><strong>Many of our customers use the Host Corner to screen incoming callers.\u00a0<\/strong>\u00a0Some hosts use it as an opportunity to greet participants.\u00a0 Some use the Host Corner to talk with Speakers before a call.\u00a0 Others still use it for security purposes &#8211; to filter out callers who shouldn&#8217;t be in attendance.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Host-Corner.png\" rel=\"attachment wp-att-12199\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12199\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Host-Corner.png\" alt=\"secure conference calling\" width=\"335\" height=\"261\" \/><\/a><\/p>\n<p><strong>Using the host corner is a simple way to\u00a0up security without making participant access more difficult.<\/strong>\u00a0 Callers that appear to be struggling to enter the room from the waiting lounge can easily be selected by hosts and brought into the Host Corner.\u00a0 There, they can be vetted and approved or denied.\u00a0\u00a0<strong>Simple and effective.<\/strong><\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Muting\u00a0<\/span><\/h4>\n<p><strong>Believe it or not, the greatest threat to conference call security and the compromise of information isn&#8217;t your everyday hacker.\u00a0 It&#8217;s your everyday blabbermouth.<\/strong><\/p>\n<p>It&#8217;s true.\u00a0 Internal leaks\u00a0are almost impossible to predict, and they can be the result of ignorance, rather than ill-intentions.<\/p>\n<p>If you have a Joe Schmoe on your call\u00a0who&#8217;s bringing up sensitive\u00a0information that maybe he shouldn&#8217;t, with Click&amp;Meet you can quickly mute him.\u00a0 And you can mute him without silencing your entire call audience.\u00a0 That&#8217;s a huge plus!<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Mute-Participant.png\" rel=\"attachment wp-att-12197\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12197\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Mute-Participant.png\" alt=\"conference call security\" width=\"440\" height=\"496\" \/><\/a><\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Disconnection<\/span><\/h4>\n<p>If you found out you had someone snooping on your call, what is the first thing you would want to do?\u00a0 Jot down what information you can get &#8211; likely name and number.\u00a0 Right after that, I would want to drop them from the call.<\/p>\n<p>The challenge with disconnection is that some providers don&#8217;t make it is easy to drop just one caller.\u00a0 With Click&amp;Meet, all you have to do is select their avatar, right-click, and disconnect.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Disconnect-Participant.png\" rel=\"attachment wp-att-12198\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12198\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Disconnect-Participant.png\" alt=\"conference call security\" width=\"440\" height=\"496\" \/><\/a><\/p>\n<p><strong>Disconnecting individual callers shouldn&#8217;t be a hassle.\u00a0 If your call provider only gives you the nuclear option &#8211; Disconnect All\/End Conference &#8211; it may be time to move on from them.<\/strong><\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Wait\u00a0Alert Delay<\/span><\/h4>\n<p>We already spoke to setting a maximum Waiting Time in an above section.\u00a0 The Wait Alert Delay in Click&amp;Meet is an ideal, repurposable tool for monitoring suspicious callers.<\/p>\n<p><strong>While it&#8217;s actually intended to help Hosts identify callers who may be struggling to enter, the Wait Alert Delay is also a handy security feature.\u00a0<\/strong>\u00a0You set the Delay for a certain number of seconds.\u00a0 Once a caller\u00a0hits that number, their Avatar is flagged in the Waiting Lounge.<\/p>\n<p>This gives the host a cue that person may be having troubles entering.\u00a0 With a simple click,\u00a0hosts can move\u00a0a person into the Click&amp;Meet Host Corner, as discussed above.<\/p>\n<p>Most callers that get flagged are folks merely having trouble getting in.\u00a0 But on the off-chance it&#8217;s not,\u00a0<strong>it&#8217;s great for a host to be able to sequester a suspicious caller, identify them, and then drop them from the call if needed.<\/strong><\/p>\n<hr \/>\n<p><span style=\"color: #bb2025;\"><strong>Admin Tip:<\/strong><\/span>\u00a0Set your Wait Time Delay to correspond with your Wait Time limit.\u00a0 If you expect people to be able to\u00a0enter within two minutes of dialing in, set the Delay to 120 seconds. Then set your Wait Time to give them a minute or two more.<\/p>\n<p><a href=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Wait-Time.png\" rel=\"attachment wp-att-12196\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12196\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2018\/01\/Wait-Time.png\" alt=\"secure conference calls\" width=\"536\" height=\"63\" \/><\/a><\/p>\n<p>You&#8217;ll get the notice they are struggling to enter.\u00a0 If it&#8217;s not a number you recognize, you can leave them in the cold until they are booted thanks to the Wait Time limit.<\/p>\n<hr \/>\n<h3><span style=\"color: #f68920;\">#4.\u00a0Recordings<\/span><\/h3>\n<p>Conference call security doesn&#8217;t end with the call.\u00a0 Many organizations we work with have very specific needs surrounding their call recordings.<\/p>\n<p>While it&#8217;s not often considered, protecting call recordings is an integral part of conference call security.\u00a0 Here are the ways we provide for our customers.<\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Ability to Record<\/span><\/h4>\n<p>The research agency we earlier referred to is an excellent example of an organization with specific recording needs.\u00a0 Given their discussions entail confidential information, they are not allowed to record their conference calls.<\/p>\n<p>Of course, AudioOne provides users a straightforward option for recording calls.\u00a0 By simply selecting the record icon in Click&amp;Meet &#8211; or using a dial pad command (51#) &#8211; the content of your calls will be recorded and saved.\u00a0 Or,\u00a0you just don&#8217;t.<\/p>\n<p>For this particular company, we had to go even further.\u00a0 They needed their own instance of Click&amp;Meet to be &#8216;locked-in.&#8217;\u00a0\u00a0<strong>This required us to custom develop a room with the recording feature completely &#8220;turned off&#8221; &#8211; which we were happy to accommodate!<\/strong><\/p>\n<hr \/>\n<h4><span style=\"color: #225d71;\">Recording Storage and Transmission<\/span><\/h4>\n<p>The more significant issue with recordings tends to be their storage and transmission.\u00a0 Were a recording to be snapped up by a hacker while still in the hands of an audio conferencing provider, there would be hell to pay.<\/p>\n<p>MeetingOne doesn&#8217;t mess around with call recordings.\u00a0 Whether in storage or transmission, we encrypt all recordings with\u00a0AES-256\u00a0bit &#8211; among the top ciphers.\u00a0 AES has high enough &#8220;computational complexity&#8221;\u00a0to be used by the US government to protect classified information.<\/p>\n<p>We didn&#8217;t stop there.\u00a0 MeetingOne employs combinations of symmetric and asymmetric encryption to bundle recordings in layers of security.\u00a0 Symmetric and asymmetric encryption basically means your calls are &#8220;stored&#8221; in a &#8220;lockbox.&#8221; We place the recording in the box, and then you access it from your side.\u00a0 One way in, one way out.<\/p>\n<p><strong>Call recordings are super safe with MeetingOne &#8211; you can be sure of that.\u00a0\u00a0<\/strong><\/p>\n<h6>(Note: Call Recordings are deleted after 30 days.)<\/h6>\n<hr \/>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><span style=\"color: #bb2025;\">Conclusion<\/span><\/h2>\n<p>While it&#8217;s hard to dispute that reliability will remain the primary reason organizations use PSTN providers, conference call security is\u00a0one aspect that should be considered just as valuable.\u00a0\u00a0Hackers and call snoopers aren&#8217;t going to just give up and stealing information.\u00a0 That&#8217;s why MeetingOne believes in having the best conference call security in the industry!<\/p>\n<p style=\"text-align: center;\"><strong><span style=\"color: #225d71;\">If you hold confidential calls and need a secure audio conferencing option, MeetingOne is built to serve your organization.<\/span><\/strong><\/p>\n<p style=\"text-align: center;\">All of the features mentioned\u00a0come\u00a0with every AudioOne account!\u00a0 You get layered conference call security at a reasonable cost no matter how big or small your company is!<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #f68920;\"><a href=\"https:\/\/www.meetingone.com\/eu-nl\/audioone\/\"><span style=\"color: #bb2025;\">Learn more about AudioOne,<\/span><\/a>\u00a0or if you\u2019re interested in trying out the platform, start a 30-day FREE trial now!\u00a0\u00a0<\/span><\/h3>\n<p><a href=\"https:\/\/www.meetingone.com\/eu-nl\/probeer-het-gratis-uit\/audioone-audioconferencing-proef\/\" rel=\"attachment wp-att-9453\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-9453 size-medium\" src=\"https:\/\/www.meetingone.com\/wp-content\/uploads\/2017\/03\/Trial-AudioOne-01-300x44.png\" alt=\"trial the best in audio conferencing!\" width=\"300\" height=\"44\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What\u00a0is the main reason enterprise companies\u00a0prefer\u00a0phone line conference calling over internet\u00a0connections? Reliability. With a different infrastructure, phone lines aren\u2019t susceptible to the same outages as the internet, often making traditional conferencing much more desirable than VoIP. What people don\u2019t realize is that conference calls also can offer greater security.\u00a0In a world constantly threatened by hackers [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":5772,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7,2],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Makes AudioOne Conference Calling Different? Security - MeetingOne Dutch<\/title>\n<meta name=\"description\" content=\"What makes AudioOne conference calling from MeetingOne different?\u00a0 We prioritize conference call security while other providers cut back - read more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Makes AudioOne Conference Calling Different? Security - MeetingOne Dutch\" \/>\n<meta property=\"og:description\" content=\"What makes AudioOne conference calling from MeetingOne different?\u00a0 We prioritize conference call security while other providers cut back - read more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/\" \/>\n<meta property=\"og:site_name\" content=\"MeetingOne Dutch\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MeetingOne\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-24T17:27:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-05T19:50:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.meetingone.com\/eu-nl\/wp-content\/uploads\/sites\/8\/2018\/01\/Featured-Image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Joel Byerly\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@meetingone\" \/>\n<meta name=\"twitter:site\" content=\"@meetingone\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joel Byerly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/blog\/what-makes-audioone-conference-calling-different-security\/\",\"url\":\"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/\",\"name\":\"What Makes AudioOne Conference Calling Different? Security - MeetingOne Dutch\",\"isPartOf\":{\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#website\"},\"datePublished\":\"2018-01-24T17:27:56+00:00\",\"dateModified\":\"2018-12-05T19:50:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5\"},\"description\":\"What makes AudioOne conference calling from MeetingOne different?\u00a0 We prioritize conference call security while other providers cut back - read more!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.meetingone.com\/eu-nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Makes AudioOne Conference Calling Different? Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#website\",\"url\":\"https:\/\/www.meetingone.com\/eu-nl\/\",\"name\":\"MeetingOne Dutch\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.meetingone.com\/eu-nl\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5\",\"name\":\"Joel Byerly\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g\",\"caption\":\"Joel Byerly\"},\"url\":\"https:\/\/www.meetingone.com\/eu-nl\/blog\/author\/jbyerly\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Makes AudioOne Conference Calling Different? Security - MeetingOne Dutch","description":"What makes AudioOne conference calling from MeetingOne different?\u00a0 We prioritize conference call security while other providers cut back - read more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/","og_locale":"en_US","og_type":"article","og_title":"What Makes AudioOne Conference Calling Different? Security - MeetingOne Dutch","og_description":"What makes AudioOne conference calling from MeetingOne different?\u00a0 We prioritize conference call security while other providers cut back - read more!","og_url":"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/","og_site_name":"MeetingOne Dutch","article_publisher":"https:\/\/www.facebook.com\/MeetingOne","article_published_time":"2018-01-24T17:27:56+00:00","article_modified_time":"2018-12-05T19:50:18+00:00","og_image":[{"width":500,"height":400,"url":"https:\/\/www.meetingone.com\/eu-nl\/wp-content\/uploads\/sites\/8\/2018\/01\/Featured-Image.png","type":"image\/png"}],"author":"Joel Byerly","twitter_card":"summary_large_image","twitter_creator":"@meetingone","twitter_site":"@meetingone","twitter_misc":{"Written by":"Joel Byerly","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.meetingone.com\/eu-nl\/blog\/what-makes-audioone-conference-calling-different-security\/","url":"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/","name":"What Makes AudioOne Conference Calling Different? Security - MeetingOne Dutch","isPartOf":{"@id":"https:\/\/www.meetingone.com\/eu-nl\/#website"},"datePublished":"2018-01-24T17:27:56+00:00","dateModified":"2018-12-05T19:50:18+00:00","author":{"@id":"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5"},"description":"What makes AudioOne conference calling from MeetingOne different?\u00a0 We prioritize conference call security while other providers cut back - read more!","breadcrumb":{"@id":"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.meetingone.com\/blog\/what-makes-audioone-conference-calling-different-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.meetingone.com\/eu-nl\/"},{"@type":"ListItem","position":2,"name":"What Makes AudioOne Conference Calling Different? Security"}]},{"@type":"WebSite","@id":"https:\/\/www.meetingone.com\/eu-nl\/#website","url":"https:\/\/www.meetingone.com\/eu-nl\/","name":"MeetingOne Dutch","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.meetingone.com\/eu-nl\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/1698bd0181e28dafb0e40c821a7294a5","name":"Joel Byerly","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.meetingone.com\/eu-nl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/55c3a9055e36836063ce90b8ee8c3e0a?s=96&d=mm&r=g","caption":"Joel Byerly"},"url":"https:\/\/www.meetingone.com\/eu-nl\/blog\/author\/jbyerly\/"}]}},"_links":{"self":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts\/5771"}],"collection":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/comments?post=5771"}],"version-history":[{"count":3,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts\/5771\/revisions"}],"predecessor-version":[{"id":5977,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/posts\/5771\/revisions\/5977"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/media\/5772"}],"wp:attachment":[{"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/media?parent=5771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/categories?post=5771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.meetingone.com\/eu-nl\/wp-json\/wp\/v2\/tags?post=5771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}