Video Conferencing Security Best Practices

Video conferencing has become a crucial part of how organizations communicate and collaborate in today’s world. However, with the rise in remote work, cybercriminals have been exploiting video conferencing platforms to gain access to sensitive information. It’s essential to implement video conferencing security best practices to keep your organization safe. Here are some best practices to follow:

Use a Secure Video Conferencing Platform
Ensure that you use a secure video conferencing platform that uses end-to-end encryption to protect your data. Platforms such as Zoom, Google Meet, and Microsoft Teams provide robust security features.

Create Strong Passwords
Use strong passwords and avoid sharing them with anyone. Passwords should be a combination of upper and lower case letters, numbers, and special characters.

Enable Waiting Rooms
Enable waiting rooms to avoid unauthorized people from joining your video conference. This feature allows you to vet participants before granting them access to the conference.

Keep Software Updated
Ensure that the video conferencing software is up-to-date with the latest security patches. This helps to protect your organization from known vulnerabilities.

Use Virtual Backgrounds
Encourage participants to use virtual backgrounds that do not reveal sensitive information in the background. This is especially important when conducting video conferences from home.

Educate Participants
Educate all participants on video conferencing security best practices, including the risks associated with sharing sensitive information over video conferences.

Monitor Participants
Designate a moderator to monitor participants and remove anyone who is not authorized to join the conference. This helps to ensure that only authorized individuals are participating.

By following these video conferencing security best practices, you can protect your organization from cyber threats and ensure that your data is secure. Remember to always stay vigilant and update your security measures regularly.

Top 4 Cybersecurity Tips

In today’s digital age, cyber security is a top priority for individuals and businesses alike. The ever-evolving threat landscape can be overwhelming, but by implementing the following top four cyber security tips, you can significantly reduce your risk of being hacked or compromised.

  • Use strong and unique passwords: Using weak passwords or the same password across multiple accounts is a common mistake that can leave you vulnerable to cyber-attacks. Instead, use a combination of upper and lowercase letters, numbers, and symbols. And never reuse the same password across different accounts.
  • Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring you to enter a unique code or use a biometric factor, such as a fingerprint, in addition to your password. This can help prevent unauthorized access to your accounts.
  • Keep your software up to date: Cyber criminals often exploit vulnerabilities in software to gain access to systems. Make sure to keep your operating system, web browsers, and other software up to date to avoid falling prey to such attacks.
  • Be cautious of suspicious emails and links: Phishing emails and malicious links are a common tactic used by cyber criminals to trick individuals into revealing sensitive information or downloading malware. Always double-check the sender’s email address and be wary of unsolicited emails or links.

By following these top four cyber security tips, you can significantly reduce your risk of falling victim to cyber-attacks. Don’t let complacency put you and your sensitive information at risk. Stay vigilant, stay safe.

What is the Right Way to Set Up Two-Factor Authentication?

Two-factor authentication (2FA) is a security measure that requires users to provide two forms of identification before accessing an account. This ensures that even if an attacker gains access to a user’s password, they will still need a second form of authentication to gain access to the account.

To set up 2FA, the first step is to enable it on the account. This can usually be done in the security or settings section of the website or app. Once enabled, the user will be prompted to choose a second form of authentication.

The most common form of 2FA is a text message or phone call with a code that the user must enter to gain access. However, this method is not the most secure, as attackers can intercept the code or steal the user’s phone.

A more secure form of 2FA is to use a dedicated authentication app, such as Google Authenticator or Authy. These apps generate a new code every 30 seconds that the user must enter to gain access.

Another option is to use a physical security key, such as a YubiKey. These devices plug into the user’s computer or phone and provide a secure form of authentication that cannot be intercepted.

It is important to note that while 2FA is an important security measure, it is not foolproof. Attackers can still use phishing or social engineering tactics to gain access to an account, even with 2FA enabled.

To further increase security, users should also ensure that their passwords are strong and unique, and that they do not reuse passwords across multiple accounts.

In summary, to set up 2FA, enable it on the account and choose a secure form of authentication, such as a dedicated authentication app or a physical security key. Remember to also use strong and unique passwords to further enhance security.

Should We be Playing Offense or Defense in Cybersecurity?

When it comes to cybersecurity, there is a longstanding debate: Should we be playing offense or defense? Both strategies have their advantages and disadvantages, but ultimately it comes down to what your goals are and what resources you have available.

Playing defense means focusing on protecting your own network and systems from potential attacks. This involves using firewalls, antivirus software, and other security measures to prevent hackers from accessing your sensitive data. It also means monitoring your network for any signs of unusual activity and responding quickly to any potential threats.

On the other hand, playing offense involves actively seeking out and identifying potential vulnerabilities in other systems. This can be done through techniques such as penetration testing, where ethical hackers attempt to breach a system to identify its weak points. By finding vulnerabilities in other systems, you can gain insight into how attackers might target your own system and take steps to prevent those attacks.

So which approach is better? It really depends on your goals. If your primary concern is protecting your own systems and data, then playing defense is probably the best option. However, if you want to stay ahead of the curve and be proactive in preventing attacks, then playing offense can be a valuable strategy.

Of course, it’s important to remember that playing offense requires a significant amount of resources and expertise. Conducting thorough security assessments and penetration testing can be time-consuming and costly, and may not be feasible for smaller organizations.

At the end of the day, the most effective cybersecurity strategy is one that is tailored to your specific needs and resources. Whether you choose to play offense or defense (or a combination of both), the key is to be vigilant and proactive in identifying and addressing potential threats. By staying ahead of the curve and constantly adapting to new threats, you can ensure that your systems and data remain secure.

Why Business Owners Struggle with Managing IT

Information technology is critical to operations for most companies and has the power to catapult growth when utilized effectively. When things aren’t going well with IT, powerful business tools can quickly become frustrating and expensive roadblocks to achieving business objectives.

Through extensive conversations with many executives about their IT situations, some common themes have emerged. Here is why business owners struggle with managing IT, and what you should do about it.

1) Too Little Time… Too Many Priorities…

Small business owners perform several tasks that can take up time on their daily schedule. As a business owner, you know you have an IT department, but you may not fully understand what it does. You’d like to be more involved, but you’ve got enough on your plate – so you rely on your team to make IT-related decisions. And since you’re not in the trenches, you’re not always sure where your budget is going.

2) IT is FOREVER CHANGING!

Technology is changing at a rapid speed, unlike any other industry. IT specialists have to put a lot of effort into staying updated, which seems to be close to impossible. As mentioned above, being a small business owner, you have a great deal of task on your plate and keeping up with rapid updates isn’t easy. JENLOR’s IT professionals are update to date on the latest technology and could greatly help you and your company out.

What are the benefits of hiring JENLOR for your IT needs:

The right IT investment could increase:

  • Network Uptime
  • Security
  • Staff Productivity
  • Operational Efficiency
  • Profit Margins

Short- and Long-Term Needs of a Business Owner

JENLOR is a partner who can make sense of your IT department. We fill the advisory role through our IT consulting services. We can identify what you have now, what you need, and what it looks like from a budget perspective. We’re not an IT project company – we’re a forward-thinking IT partner that understands the big picture of IT impacts for HR, finances, and basic day-to-day operations.

Partnering to Fill the Gaps in Your IT

JENLOR isn’t a “one-size-fits-all” boxed solution. We determine with our True Network Evaluation what’s working, what isn’t and fill in the gaps. We supplement your current system and make sure all the parts, new and existing work seamlessly.

 

Solve Your IT Issues with a Partner that Fits

Whatever your current situation, JENLOR can help take your IT structure to the next level. So you can take your business there, too! Contact us today to schedule an initial conversation.

 

How End of Life for Windows 7 Could Impact Your Business

Are you currently using Windows 7? Did you know that after January 14, 2020, Microsoft will no longer provide security updates or support for PCs or desktops running Windows 7?

What is End of Life?

End of life is the phrase that Microsoft uses to identify the period when the company will no longer support an operating system or application. This means that on January 14th, 2020, Microsoft will move on from Windows 7 never updating or patching security issues again. This usually means that bots, worms and hackers will try to infiltrate and do as much damage as they can. Windows 7 will be vulnerable in a short period of time.

How many people are still using Windows 7?

You might be surprised to learn that Windows 10 only recently became the most popular Window version in the world at the end of the fourth quarter of 2018, taking the crown from Windows 7. At that time, Windows 10 captured 39% of market share, compared to 37% for Windows 7, according to Net Applications. To put that into perspective, there are more than 1 billion Windows users around the world. We anticipate hundreds of millions of people are going to be affected by this change.

What does this mean for your business?windows 7

JENLOR works directly with businesses to inventory computer work stations in an effort to keep companies safe. Cyber security is something that should be taken seriously and without the proper knowledge and experience, you could be putting your business at risk.

There are two ways JENLOR can help you:

  • Upgrade the operating system to Windows 10.
    • We recommend that if your operating system is under 3 years old, to buy the software and upgrade to Windows 10.
  • Buy a new computer system.
    • If your computers are greater than 3 years old, we recommend your computers be upgraded. Based on your business needs, we can upgrade your computers in waves or all at once.

Contact us today to setup a free consultation to begin to make steps towards a secure computer work station beyond January 14, 2020.