![]() ![]() As a minimum precaution we recommend using a One-Time Meeting ID. Be extra vigilant about this if your meeting involves children. There are many examples where attendees have shared unsavoury content in ‘all-welcome’ events. Be careful about sharing your Meeting ID - Though you may want to recruit as many people as possible to your meeting or live event, exposing your Meeting ID on social media, websites or other public forums can attract the wrong kinds of attendees. As such, we recently released the “ Eight Best Practices for Safe Video Conferencing” guidelines designed to ensure the safety and security of organizations and their people-many of whom may still be adjusting to the new work from home norm:ġ. They’re in place to help you improve your product and get ahead of the next potential threat.īut beyond that, vendors have a responsibility to educate customers on the security threats that face our digital workplace today and share best practices for how to avoid them. These protocols have been time-tested for security to ensure they’re less prone to hacking. This requires adhering to open source principles-including various encryption standards-to guarantee you’re not cutting corners on security and privacy. We also recently hosted a webinar to further explain BlueJeans’ approach to security and privacy and preview some of our upcoming innovations that will continue to make BlueJeans an exceptionally secure video conferencing platform.Īs the webinar highlights, in order to have a secure SaaS product, one must develop a culture of putting security and privacy first from the start. To address this issue head on, we released a formal statement on BlueJeans’ security practices from our CTO, Alagu Periyannan, outlining the steps we take to secure customer and user data here at BlueJeans and reaffirming our commitment to innovating responsibly and communicating transparently. ![]() ![]() The increased market demand and attention on video conferencing and collaboration technologies due to the pandemic has created a lot of concern regarding the security and user privacy of these tools. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |