{"id":2615,"date":"2021-01-11T22:04:36","date_gmt":"2021-01-11T19:04:36","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=2615"},"modified":"2021-01-15T20:48:13","modified_gmt":"2021-01-15T17:48:13","slug":"how-to-hold-secure-virtual-meetings","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/","title":{"rendered":"How to Hold Secure Virtual Meetings"},"content":{"rendered":"\n<p>The COVID-19 pandemic has accelerated the use of virtual meetings by remote workers. Unfortunately, an increase in virtual meetings also increases an organization\u2019s security risks. Virtual meetings can be prone to unauthorized eavesdropping, corporate espionage, real-time harassment, and even sabotage and data theft.&nbsp;<\/p>\n\n\n\n<p>We propose 10 steps to ensure the security of your virtual meetings.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69da19ee1a310\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69da19ee1a310\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#10_Steps_to_Ensure_the_Security_of_Your_Online_Meetings\" title=\"10 Steps to Ensure the Security of Your Online Meetings\">10 Steps to Ensure the Security of Your Online Meetings<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#1_Tell_attendees_what_to_do\" title=\"1. Tell attendees what to do\">1. Tell attendees what to do<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#2_Test_everything_prior_to_the_meeting\" title=\"2. Test everything prior to the meeting\">2. Test everything prior to the meeting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#3_Establish_ground_rules_for_participants\" title=\"3. Establish ground rules&nbsp;for participants\">3. Establish ground rules&nbsp;for participants<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#4_Confirm_all_attendees\" title=\"4. Confirm all attendees\">4. Confirm all attendees<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#5_Follow_your_company%E2%80%99s_security_policies\" title=\"5. Follow your company&#8217;s security policies\">5. Follow your company&#8217;s security policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#6_Create_specific_rooms\" title=\"6. Create specific rooms&nbsp;\">6. Create specific rooms&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#7_Don%E2%80%99t_record_the_meeting\" title=\"7. Don\u2019t record the meeting&nbsp;\">7. Don\u2019t record the meeting&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#8_Disable_all_unnecessary_features\" title=\"8. Disable all unnecessary features\">8. Disable all unnecessary features<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#9_Limit_who_can_share_their_screens\" title=\"9. Limit who can share their screens\">9. Limit who can share their screens<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#10_Choose_the_right_virtual_meeting_platform\" title=\"10. Choose the right virtual meeting platform\">10. Choose the right virtual meeting platform<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#Select_MailSafi_Enterprise_for_Safe_and_Secure_Virtual_Meetings\" title=\"Select MailSafi Enterprise for Safe and Secure Virtual Meetings\">Select MailSafi Enterprise for Safe and Secure Virtual Meetings<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"10_Steps_to_Ensure_the_Security_of_Your_Online_Meetings\"><\/span><strong>10 Steps to Ensure the Security of Your Online Meetings<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Before the COVID-19 pandemic, about <a href=\"https:\/\/www.westuc.com\/en-us\/blog\/conferencing-collaboration\/top-pains-and-potential-video-conferencing\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\"><strong>54% of the workforce<\/strong><\/span><\/a>&nbsp;regularly participated in video conferences. However, with the crisis forcing more people to work from home, that number has increased significantly. Here are 10 practices you can apply to ensure the security of these meetings in your organization.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Tell_attendees_what_to_do\"><\/span><strong>1. Tell attendees what to do<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Don&#8217;t assume attendees know what to do. Many users are new to the experience of virtual meetings or video conferencing. For this reason, they may not know how to participate in a secure manner. Consider providing all potential participants a checklist in advance regarding equipment needed, how to prepare for a meeting, how to log on securely, and how to behave during meetings.&nbsp;<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Test_everything_prior_to_the_meeting\"><\/span><strong>2. Test everything prior to the meeting<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Over half of all teams&nbsp;<a href=\"https:\/\/www.owllabs.com\/blog\/video-conferencing-statistics\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">waste 10 minutes or more<\/span><\/strong><\/a>&nbsp;on meeting setup. All participants should test their equipment, including internet connection, to make sure it works properly before the meeting starts.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Establish_ground_rules_for_participants\"><\/span><strong>3. Establish ground rules&nbsp;for participants<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Also, the meeting convener or team should set ground rules to help the meeting run efficiently and keep all participants focused on the issues at hand. Such rules may include things such as:<\/p>\n\n\n\n<ul><li>No answering calls and no making phone calls<\/li><li>Raise your hand to request permission to speak<\/li><li>No multi-tasking with other apps,<\/li><li>No checking emails or texts,<\/li><li>Employing the mute button when one is not speaking.<\/li><li>Keep videos on (perhaps useful for school-going children)<\/li><\/ul>\n\n\n\n<p>The ground rules should be shared prior to the start of the virtual meetings, and if necessary also mentioned at the beginning of meetings.<\/p>\n\n\n\n<p>For business meetings, circulating an agenda beforehand is also recommended. This will allow attendees to prepare and assemble any materials they may need for the meeting, as well as help the meeting stay on track. Studies show that following a prepared agenda can&nbsp;<a href=\"https:\/\/highfive.com\/blog\/10-video-conferencing-statistics\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">reduce the length of meetings<\/span><\/strong><\/a>&nbsp;by as much as 80%.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Confirm_all_attendees\"><\/span><strong>4. Confirm all attendees<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Make sure that only invited attendees are included in your meetings. Before the meeting starts, ask all new attendees to announce themselves. The meeting convener or chosen assistant should also use the service\u2019s dashboard to monitor attendees \u2013 and interrogate all unexpected participants.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Follow_your_company%E2%80%99s_security_policies\"><\/span><strong>5. Follow your company&#8217;s security policies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Meeting leaders should ensure that all of the host organization\u2019s security policies are strictly adhered to during the virtual meeting.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Create_specific_rooms\"><\/span><strong>6. Create specific rooms&nbsp;<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Whether you have recurring or one-time meetings, creating specific rooms for each can be helpful so that you already have the right participants added to each of the necessary rooms. This is enables time saving and, again, is great when it comes to ensuring the right people are included in each conversation and can also make collaboration seamless.&nbsp;<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Don%E2%80%99t_record_the_meeting\"><\/span><strong>7. Don\u2019t record the meeting&nbsp;<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Virtual meetings should literally be \u201clive\u201d events \u2013 which means they shouldn\u2019t be recorded unless absolutely necessary for future reference. If you do record a meeting, make sure that the video or link to the video is kept securely to avoid the meeting proceedings leaking to outsiders.&nbsp;<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"8_Disable_all_unnecessary_features\"><\/span><strong>8. Disable all unnecessary features<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Today\u2019s virtual meetings include video conferencing, file sharing, screen sharing, instant messaging, and more. While all of these features are nice, their use tends to introduce additional security concerns to the meetings. Evaluate which features your team really needs and consider disabling those that are of lesser value.<\/p>\n\n\n\n<p>For instance, for educational institutions, the meeting leader may want to disable group instant messaging to ensure students are paying attention during the session.&nbsp;<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"9_Limit_who_can_share_their_screens\"><\/span><strong>9. Limit who can share their screens<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>It can be embarrassing when participants accidentally share what is on their screens during a group meeting. Limit who can share what to minimize unexpected surprises \u2013 including the inadvertent sharing of sensitive information that may be on their screens.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"10_Choose_the_right_virtual_meeting_platform\"><\/span><strong>10. Choose the right virtual meeting platform<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>The most important thing you can do to ensure maximum security is to choose a secure meeting platform. Look for a platform, such as&nbsp;MailSafi <em>Talk<\/em> that not only offers all of the collaborative features you need, but also uses end-to-end encryption to ensure that hackers and cybercriminals can\u2019t access meeting communications, files, and other data. MailSafi Talk is included in our<strong><span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span><\/strong><a href=\"https:\/\/www.mailsafi.com\/email-hosting#hosting-price\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">MailSafi Enterprise<\/span><\/strong> <\/a>email hosting package. It allows users to have video or audio calls\/conferencing, share files, and collaborate. It also supports instant messaging.&nbsp;<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"Select_MailSafi_Enterprise_for_Safe_and_Secure_Virtual_Meetings\"><\/span><strong>Select MailSafi Enterprise for Safe and Secure Virtual Meetings<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\">MailSafi Enterprise is a robust and secure platform for virtual meetings and online communication. It includes end-to-end encryption for all sharing and communication. MailSafi Enterprise is quickly becoming the secure virtual meeting platform of choice \u2013 for organizations of all types.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/www.mailsafi.com\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Get in touch<\/span><\/strong><\/a> to learn how MailSafi can help you collaborate securely and seamlessly or <a href=\"https:\/\/www.mailsafi.com\/get-quote\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">request for a quote<\/span><\/strong><\/a>.<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_2615\" class=\"pvc_stats all  \" data-element-id=\"2615\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>The COVID-19 pandemic has accelerated the use of virtual meetings by remote workers. Unfortunately, an increase in virtual meetings also increases an organization\u2019s security risks. Virtual meetings can be prone to unauthorized eavesdropping, corporate espionage, real-time harassment, and even sabotage and data theft.&nbsp; We propose 10 steps to ensure the security of your virtual meetings. [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2615\" class=\"pvc_stats all  \" data-element-id=\"2615\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":2619,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[222],"tags":[103,253,143,257,256,255,254],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Virtual Meetings: 10 Tips for How to Make them Secure: MailSafi<\/title>\n<meta name=\"description\" content=\"Virtual meetings are prone to eavesdropping, corporate espionage, harassment, sabotage, or data theft. Here are 10 practices to safeguard your meetings.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Virtual Meetings: 10 Tips for How to Make them Secure: MailSafi\" \/>\n<meta property=\"og:description\" content=\"Virtual meetings are prone to eavesdropping, corporate espionage, harassment, sabotage, or data theft. Here are 10 practices to safeguard your meetings.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-11T19:04:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-15T17:48:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"How to Hold Secure Virtual Meetings\",\"datePublished\":\"2021-01-11T19:04:36+00:00\",\"dateModified\":\"2021-01-15T17:48:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/\"},\"wordCount\":860,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg\",\"keywords\":[\"business communication\",\"collaboration\",\"collaboration tools\",\"internet security\",\"online security\",\"video conferencing for business\",\"virtual meetings\"],\"articleSection\":[\"Digital Collaboration\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/\",\"name\":\"Virtual Meetings: 10 Tips for How to Make them Secure: MailSafi\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg\",\"datePublished\":\"2021-01-11T19:04:36+00:00\",\"dateModified\":\"2021-01-15T17:48:13+00:00\",\"description\":\"Virtual meetings are prone to eavesdropping, corporate espionage, harassment, sabotage, or data theft. Here are 10 practices to safeguard your meetings.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg\",\"width\":612,\"height\":340,\"caption\":\"Securing virtual meetings\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Hold Secure Virtual Meetings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Virtual Meetings: 10 Tips for How to Make them Secure: MailSafi","description":"Virtual meetings are prone to eavesdropping, corporate espionage, harassment, sabotage, or data theft. Here are 10 practices to safeguard your meetings.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/","og_locale":"en_US","og_type":"article","og_title":"Virtual Meetings: 10 Tips for How to Make them Secure: MailSafi","og_description":"Virtual meetings are prone to eavesdropping, corporate espionage, harassment, sabotage, or data theft. Here are 10 practices to safeguard your meetings.","og_url":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2021-01-11T19:04:36+00:00","article_modified_time":"2021-01-15T17:48:13+00:00","og_image":[{"width":612,"height":340,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg","type":"image\/jpeg"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/"},"author":{"name":"the_leaders","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"How to Hold Secure Virtual Meetings","datePublished":"2021-01-11T19:04:36+00:00","dateModified":"2021-01-15T17:48:13+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/"},"wordCount":860,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg","keywords":["business communication","collaboration","collaboration tools","internet security","online security","video conferencing for business","virtual meetings"],"articleSection":["Digital Collaboration"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/","url":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/","name":"Virtual Meetings: 10 Tips for How to Make them Secure: MailSafi","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg","datePublished":"2021-01-11T19:04:36+00:00","dateModified":"2021-01-15T17:48:13+00:00","description":"Virtual meetings are prone to eavesdropping, corporate espionage, harassment, sabotage, or data theft. Here are 10 practices to safeguard your meetings.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2021\/01\/virtual-meetings.jpg","width":612,"height":340,"caption":"Securing virtual meetings"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/how-to-hold-secure-virtual-meetings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Hold Secure Virtual Meetings"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2615"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=2615"}],"version-history":[{"count":7,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2615\/revisions"}],"predecessor-version":[{"id":2668,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2615\/revisions\/2668"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/2619"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=2615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=2615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=2615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}