Windstream Enterprise (WE) takes the security of our network and customer data very seriously. With the rapid shift to remote workers and telepresence, our businesses, healthcare providers, educational systems and government entities now rely even more on OfficeSuite HD Meeting® for business continuity. We want to educate our customers on the steps we have taken to protect their networks, as well as additional tools available for their use.
The OfficeSuite HD Meeting solution comes with built-in security at both the platform and web services levels to protect your meeting environment. OfficeSuite HD Meeting web services reside in redundant Amazon Web Services (AWS) environments to isolate your data from other computing resources. Additionally, WE privacy policies protect data that traverses the cloud through multiple mechanisms, including AES-256 encryption and private MPLS network connections to AWS. Windstream Enterprise also provides a full suite of security tools that can be configured at the customer level to enable compliance and create secure meeting environments.
Primary security components in OfficeSuite HD Meeting
OfficeSuite HD Meeting comes with built-in security at both the platform and web services levels to protect your meetings.
Important tips to prevent meeting bombing
While there have been no reports of any OfficeSuite HD Meeting break-ins, here are some best practices that hosts can use to prevent unwanted meeting guests:
- Set “Meeting Password” when scheduling meetings
- Disable “Join Before Host” so attendees can’t enter the meeting before the host
- Enable “Co-Host” so you can assign others to help moderate
- Disable “File Transfer” and use a cloud sharing platform such as OneDrive or Dropbox
- Disable “Allow Removed Participants to Rejoin” so booted attendees can’t sneak back in
- Enable “Waiting Room” to see who is trying to enter; the host can control entrance
- “Lock Meeting” so no other attendees can join
- Use a randomized meeting ID and only share details with attendees
Windstream Enterprise will continue to focus on monitoring for new security threats and respond swiftly to mitigate these threats if they arise.
About the AuthorFollow on Twitter Follow on Linkedin More Content by Scott Yelton