Currently we are being forced to work from home and talk to our loved ones online. Consequently, online meetings have become an important part of our day to day lives.  Seeing as they have proven to be an efficient way of staying connected then they have come to stay. The issue that arises with this new development is: what about our security and our privacy in their use?

As the popularity of online meetings has increased, so has the possibility of attacks and security breaches. In order to prevent these and ensure that you have safe conversations and meetings, this article will outline some security tips. 

First of all, the installer should always be downloaded from the official website. Moreover, you should always confirm, by clicking on the padlock next to the URL in the browser, that the connection is secure and that you have not been redirected to an unofficial website or that it has not been manipulated from the server to our browser. 

Likewise, in Zoom, you can enter into a conversation via a web browser, this would be one of the safest ways of using the application since the entire connection will be made via the browser and there is no need to install any software. However, as mentioned before, you must make sure that your connection is encrypted by checking the padlock.

Following this, once you are using the application, you must be careful with conversations started by people that you do not know.  In addition, you must immediately reject any shared file that could be sent to you by someone unknown, since any file, even an image, could bring include a malicious code that could be executed once it is opened. Also in recent attacks, it has been confirmed that there are GIF files that can also provide an attack vector.

Finally, you must take into account that not only the data you are dealing with in the application can be susceptible to theft, an attack can also create a back door to access the computer and all the data and files it contains.

To avoid losing all your information if you were to be victims of an attack, you must always have an external element that is not connected to the network, such as an external hard disk, where you can make backups and clone files. This way, if you loose all of your information, you can recover it at all times. 

Likewise, you should ignore and delete all emails or messages that you may receive with suspicious links to meetings on these platforms, since they may hide a redirection to another malicious place.

With this article we want to raise awareness of the importance of using video conferencing tools responsibly. 

We would now like to try out a real-life scenario: we have received an email with the following content, would you treat it as if it were a real meeting? Remember that even real emails from people in the department may appear in the "sender" space even if the email itself is a fake.