* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate/) * [Public Sector](https://www.paloaltonetworks.com.au/blog/category/public-sector/) * The Rush to Video Confere... # The Rush to Video Conferencing -- Are We Failing to Use Good Cyber Hygiene? [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2020%2F04%2Fpolicy-video-conferencing%2F) [](https://twitter.com/share?text=The+Rush+to+Video+Conferencing+%E2%80%93+Are+We+Failing+to+Use+Good+Cyber+Hygiene%3F&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2020%2F04%2Fpolicy-video-conferencing%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2020%2F04%2Fpolicy-video-conferencing%2F&title=The+Rush+to+Video+Conferencing+%E2%80%93+Are+We+Failing+to+Use+Good+Cyber+Hygiene%3F&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/2020/04/policy-video-conferencing/&ts=markdown) \[\](mailto:?subject=The Rush to Video Conferencing – Are We Failing to Use Good Cyber Hygiene?) Link copied By [Greg Day](https://www.paloaltonetworks.com/blog/author/greg-day/?ts=markdown "Posts by Greg Day") Apr 14, 2020 4 minutes [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [remote access](https://www.paloaltonetworks.com/blog/tag/remote-access/?ts=markdown) [video conferencing security](https://www.paloaltonetworks.com/blog/tag/video-conferencing-security/?ts=markdown) Sadly, one of life's proven realities is, when a technology becomes popular adversaries will target it. With so many people switching to video conferencing, it's no surprise that adversaries have started to give it their focus. Indeed, as the [capacity of video conferencing in the cloud is being tested](https://www.theregister.co.uk/2020/03/16/zoom_teams_outage/), reports of misuse have already begun, and this should be a warning flag of more to come. So I come to my second truism, which is that all too often when we are in a rush the basic rules and lessons we've learnt can go out the window. As such, when we are in challenging times or situations, we should try to ensure we still embrace our Security 101 logic. In recent weeks, there has been a spate of domain typosquatting, where adversaries are registering close to genuine domain names and then sending out invites. We have learnt to check the URLs in emails and web domains. We need to do the same for video conferences. Consider asking your IT security team to remind staff of this or including it in your phishing training program for employees, if you have one. What's created more noise in the last week is video conferencing bombing, where third parties look for valid video conference IDs that haven't been secured. News stories tell of third parties taking over sessions to show inappropriate content. But the reality is a third party could just as easily be a silent listener and simply grab valuable business intel either from the conversations or what's being shared onscreen. This is a message not just for businesses to recognise but also society in general. Whether video conferencing is being used simply to catch up with friends or teach children from home, no one wants an uninvited and unpredictable guest on the line. **Some very basic security controls can go a long way.** * Are your staff or the call hosts using passwords to limit who can enter into calls? * Using a unique password for every video conference is an option, but there is a balance between the friction that creates in the user experience, versus the incremental security value. I would suggest that any calls including business-sensitive data use a unique password. Also note that the options may be different in terms of password requirements when simply dialing in for audio versus using a full web connection. * Should your video sessions be enabled to allow them to start before the host joins? For example, some video conferencing vendors offer the option to set waiting rooms. Likewise, you can turn on audio notifications when people join. More simply, you should always check to see who is in the participant list. This is no different to many organizations' physical tailgating policies. **Some other options also worth considering include:** * * Are you allowing any user to screenshare, or is it restricted to the host only? * Are you allowing file transfers between users during a session? * And importantly, if you remove a participant from a video conference, can they rejoin? The above is far from being a complete guide to securing your video conferencing. That is a job for your IT security team to debate and agree with your business teams, ultimately arriving at the right security settings for you. **Here are the key takeaways:** 1. When we rush to respond to a crisis, we're likely to cut corners. Make sure if you can that security isn't in the group of things skipped over. If it is being skipped as you make rapid adjustments, have a plan to go back and reassess soon after. In reality, it's generally useful to reassess the use of new business tools and processes after a short trial period as you gain real world experience of how they work for you. 2. Recognise that adversaries will always flock to commonly used tools and processes, as their scope for success is increased. In recent weeks, the scale of adoption is akin to the total number of new users for 2019, [one video conferencing company CEO suggested](https://www.cnbc.com/2020/02/26/zoom-has-added-more-users-so-far-this-year-than-in-2019-bernstein.html). 3. As my good colleague [John Kindervag](https://www.paloaltonetworks.com/blog/author/john-kindervag/) (the godfather of the Zero Trust Network, as I like to call him) suggests, "Log all traffic." At least then, after the fact, you can go back and understand and learn from what happens. After all, isn't the goal that we learn from our previous mistakes? Read more about [best practices for video conferencing security](https://www.paloaltonetworks.com/blog/2020/04/network-video-conferencing-security/). *** ** * ** *** ## Related Blogs ### [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Vulnerabilities in Conferencing Tools: Much Ado about Something or Nothing?](https://www.paloaltonetworks.com.au/blog/2020/05/network-vulnerabilities-in-conferencing-tools/) ### [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future/?ts=markdown) [#### Best Practices for Video Conferencing Security](https://www.paloaltonetworks.com.au/blog/2020/04/network-video-conferencing-security/) ### [Education](https://www.paloaltonetworks.com/blog/category/education/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Online Learning: Security and Connectivity for Teachers and Students](https://www.paloaltonetworks.com.au/blog/2020/06/network-online-learning/) ### [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### How Palo Alto Networks and Okta Are Helping Enable Secure Remote Work](https://www.paloaltonetworks.com.au/blog/2020/06/network-okta/) ### [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Power the New Normal with Prisma Access: Delivering Next-Gen Cybersecurity](https://www.paloaltonetworks.com.au/blog/2020/05/network-remote-work/) ### [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Working from Home During COVID-19: Secure Access for Remote Workers](https://www.paloaltonetworks.com.au/blog/2020/04/network-secure-access/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language