{"id":40066,"date":"2020-04-30T00:00:00","date_gmt":"2020-04-30T00:00:00","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/"},"modified":"2024-07-25T00:33:41","modified_gmt":"2024-07-25T07:33:41","slug":"6-security-questions-to-ask-when-choosing-a-video-conferencing-provider","status":"publish","type":"post","link":"\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/","title":{"rendered":"6 security questions to ask when choosing a video conferencing provider"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">With virtually every business shifting to remote work almost overnight, the popularity of video meetings has exploded. Not only have companies had to shift all their face-to-face discussions online, but video meetings have also surged as employees suddenly discovered the need to feel connected in ways that phone calls and text messages simply can\u2019t provide (virtual happy hour, anyone?).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, that kind of rapid popularity often brings with it a spotlight. Given that many online meetings involve confidential information, it\u2019s natural that companies want to ensure that their meetings remain secure from unwanted participants and unwanted activity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately, options exist to combat security threats. Many of these options center on two key themes: finding a video meeting solution with the <a href=\"https:\/\/www.ringcentral.com\/trust-center\/security-operations.html\">security features<\/a> necessary to safely moderate meetings, and using best practices for hosting and conducting meetings. Let\u2019s take a closer look at a few important questions to ask yourself to ensure that your company keeps its video conferences secure.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">1. How do you prevent unwanted attendees in video meetings?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Given the confidential nature of many business meetings, it\u2019s important to ensure that unwanted guests can\u2019t attend video discussions. Fortunately, there are ways for you to protect your meetings from unwanted visitors:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use a password for your video conference, which remains the single most effective way to prevent intruders. Be sure your video conferencing solution includes the ability to create passwords for your meetings. Unless you specifically want your meeting to work otherwise, make passwords mandatory for all attendees.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Only send meeting links to people you want to attend the meeting and do not publish meeting links on social media.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Some meeting solutions offer an option to allow participants to join the meeting before the host. Use this option cautiously.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Lock meetings after all participants have arrived.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">After attendees have joined, take a minute to verify your participants on the call. To be safe, if you don\u2019t recognize a name or a caller ID, just ask.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">2. What are your provider\u2019s data encryption standards?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Overall, be sure you\u2019ve carefully examined your provider\u2019s data encryption standards. In particular, look at how their solution encrypts data both in transit and at rest. For data in transit, key protocols include Transit Layer Security (TLS), Session Initiation Protocol (SIP) over TLS, Secure Real-Time Transit Protocol (SRTP), and WebRTC (Real-Time Communications). For data at rest, look for Advanced Encryption Standard (AES) with 256-bit keys.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">3. Has your video meeting solution been audited for security?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Third-party audits are an indication of a company\u2019s security maturity, their commitment to verifying their security controls, and their transparency with customers. There are several third-party audits to look for when evaluating video meeting solutions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">SOC2 and SOC3: These validate that service operations controls regarding security, availability, and confidentiality are operating effectively.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">HIPAA, FINRA, and HITRUST: Highly regulated industries, such as healthcare and finance, have specific regulatory requirements when it comes to security. HIPAA, FINRA, and HITRUST audits help customers understand how their provider addresses these requirements. These types of audits are a good indication that a provider understands customer needs in these specific areas.\u00a0<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">4. How is your provider handling its cloud security?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cloud security refers to how your provider protects its cloud infrastructure, back-end communications platform, service environments, and service operations. Transparency from your provider is a must. Key components of a strong cloud security posture include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Multi-layered security that consists of border defenses, multi-factor access controls, cloud security infrastructure, host-level defenses, security telemetry, and monitoring\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Operational security practices that your provider audits regularly\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Dedicated security personnel. Does the provider have dedicated teams for a variety of security roles, such as security infrastructure, application security, security data analytics, and detection and response?\u00a0<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">5. How are security measures built into your video meeting solution?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In addition to the security of its cloud infrastructure, providers need to build strong security measures into their applications, as well. Here\u2019s what to look for:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Internal and external expertise<\/b><span style=\"font-weight: 400;\">: Your provider should have strong internal <\/span><i><span style=\"font-weight: 400;\">and<\/span><\/i><span style=\"font-weight: 400;\"> external expertise evaluating each release of its product, with testing that uses both automated and manual methods.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Secure software development practices<\/b><span style=\"font-weight: 400;\">: A strong provider will use multiple secure software development practices throughout different phases of software development.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/securelayer7.net\/security\/application-penetration-testing\"><b>Penetration testing<\/b><\/a><span style=\"font-weight: 400;\">: External perspectives by qualified testing firms are an important product security testing activity.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">6. What is your provider\u2019s security culture?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">More than any of the specific technologies and processes described above, the mark of a secure software provider is best reflected in how embedded security is in the culture of the company. That can be a difficult attribute to measure, but consider these elements:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How long has your provider been building secure cloud products? More experience often leads to better results.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ask your provider point-blank to describe their security philosophy, then listen for how passionately the company describes its approach to the following:<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Transparency<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Embedding security principles into product development activities, infrastructure, and service operations<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Engaging with independent third-party experts to test security measures and recommend best practices<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/netstorage.ringcentral.com\/documents\/cloud_communications_security.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">RingCentral\u2019s vision of security<\/span><\/a><span style=\"font-weight: 400;\"> emphasizes the importance of both internal and external perspectives. We undergo frequent and proactive testing, assessments, and third-party security audits throughout the year to give our customers assurance that controls are operating effectively for various environments.<\/span><\/p>\n<p><a href=\"https:\/\/www.ringcentral.com\/video.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">RingCentral Video<\/span><\/a><span style=\"font-weight: 400;\">, our video conferencing solution, is built with security in mind, leveraging open standards such as WebRTC and supporting meeting attendance without the need to install any software. You can learn more about RingCentral Video by checking out our video below. <\/span><a href=\"https:\/\/www.ringcentral.com\/video#demo\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Click here to get a demo today<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><iframe sandbox=\"allow-scripts allow-same-origin allow-presentation\" title=\"Introducing RingCentral Video\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/r09vPFM0RVM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen sandbox=\"allow-same-origin allow-scripts allow-presentation\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With virtually every business shifting to remote work almost overnight, the popularity of video meetings has exploded. Not only have companies had to shift all their face-to-face discussions online, but video meetings have also surged as employees suddenly discovered the need to feel connected in ways that phone calls and text messages simply can\u2019t provide &#8230;<\/p>\n","protected":false},"author":29,"featured_media":40067,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23732],"tags":[17587,17588,17589,17590,1639,17591,17488],"class_list":["post-40066","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-ringcentral-cloud-security","tag-ringcentral-encryption","tag-ringcentral-hipaa","tag-ringcentral-meetings-security","tag-ringcentral-security","tag-ringcentral-video-compliance","tag-video-conferencing-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>6 security questions to ask when choosing a video conferencing provider | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"With virtually every business shifting to remote work almost overnight, the popularity of video meetings has exploded. Not only have companies had to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 security questions to ask when choosing a video conferencing provider\" \/>\n<meta property=\"og:description\" content=\"With virtually every business shifting to remote work almost overnight, the popularity of video meetings has exploded. Not only have companies had to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-30T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-25T07:33:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1050\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"RingCentral Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/\"},\"author\":{\"name\":\"RingCentral Team\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\"},\"headline\":\"6 security questions to ask when choosing a video conferencing provider\",\"datePublished\":\"2020-04-30T00:00:00+00:00\",\"dateModified\":\"2024-07-25T07:33:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/\"},\"wordCount\":945,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg\",\"keywords\":[\"ringcentral cloud security\",\"ringcentral encryption\",\"ringcentral HIPAA\",\"ringcentral meetings security\",\"RingCentral security\",\"ringcentral video compliance\",\"video conferencing security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/\",\"name\":\"6 security questions to ask when choosing a video conferencing provider | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg\",\"datePublished\":\"2020-04-30T00:00:00+00:00\",\"dateModified\":\"2024-07-25T07:33:41+00:00\",\"description\":\"With virtually every business shifting to remote work almost overnight, the popularity of video meetings has exploded. Not only have companies had to\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg\",\"width\":1050,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 security questions to ask when choosing a video conferencing provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\",\"name\":\"RingCentral Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"caption\":\"RingCentral Team\"},\"sameAs\":[\"https:\/\/www.ringcentral.com\"],\"url\":\"\/us\/en\/blog\/author\/ringcentral-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"6 security questions to ask when choosing a video conferencing provider | RingCentral Blog","description":"With virtually every business shifting to remote work almost overnight, the popularity of video meetings has exploded. Not only have companies had to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/","og_locale":"en_US","og_type":"article","og_title":"6 security questions to ask when choosing a video conferencing provider","og_description":"With virtually every business shifting to remote work almost overnight, the popularity of video meetings has exploded. Not only have companies had to","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2020-04-30T00:00:00+00:00","article_modified_time":"2024-07-25T07:33:41+00:00","og_image":[{"width":1050,"height":360,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg","type":"image\/jpeg"}],"author":"RingCentral Team","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#article","isPartOf":{"@id":"\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/"},"author":{"name":"RingCentral Team","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358"},"headline":"6 security questions to ask when choosing a video conferencing provider","datePublished":"2020-04-30T00:00:00+00:00","dateModified":"2024-07-25T07:33:41+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/"},"wordCount":945,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg","keywords":["ringcentral cloud security","ringcentral encryption","ringcentral HIPAA","ringcentral meetings security","RingCentral security","ringcentral video compliance","video conferencing security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/","name":"6 security questions to ask when choosing a video conferencing provider | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg","datePublished":"2020-04-30T00:00:00+00:00","dateModified":"2024-07-25T07:33:41+00:00","description":"With virtually every business shifting to remote work almost overnight, the popularity of video meetings has exploded. Not only have companies had to","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg","width":1050,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"6 security questions to ask when choosing a video conferencing provider"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","caption":"RingCentral Team"},"sameAs":["https:\/\/www.ringcentral.com"],"url":"\/us\/en\/blog\/author\/ringcentral-team\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/cyber-security-concept-encryption-picture-id1132912672.jpg","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/ringcentral-team\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">RingCentral Team<\/span><\/a>","rc_author_full_name":"RingCentral Team","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/ringcentral-logo-new.png","rc_author_link":"\/us\/en\/blog\/author\/ringcentral-team\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/security\/amp\">Security<\/a>","amp_link":"\/us\/en\/blog\/6-security-questions-to-ask-when-choosing-a-video-conferencing-provider\/amp","excerpt_title":"6 security questions to ask when choosing a video confere...","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/40066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=40066"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/40066\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/40067"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=40066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=40066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=40066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}