{"id":43127,"date":"2020-07-01T13:46:30","date_gmt":"2020-07-01T20:46:30","guid":{"rendered":"\/us\/en\/blog\/?p=43127"},"modified":"2025-03-13T06:26:02","modified_gmt":"2025-03-13T13:26:02","slug":"secure-video-conferencing","status":"publish","type":"post","link":"\/us\/en\/blog\/secure-video-conferencing\/","title":{"rendered":"Secure video conferencing: How to have safe online meetings"},"content":{"rendered":"<p>Updated July 2021<\/p>\n<hr \/>\n<p><i><span style=\"font-weight: 400;\">It\u2019s late, and your phone rings. You grab your cell phone, but realize it\u2019s coming from your computer.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Who could that be?<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">You open your laptop and see a flashing box displaying a name\u2026 YOUR name. But how is that possible? How could I be calling myself? Unless&#8230;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">The call is coming from inside the house!<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ve read articles about popular conferencing software that were discovered to have serious insecurities, heard the stories of grandparents being scammed into sending money to a stranger, or, more recently, saw Twitter profiles of prominent figures getting hacked with promises of Bitcoin donations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What these examples show is that a cyber attack can happen to anyone, anytime, on almost any platform. And when it comes to your business, you never want to open yourself to an attack, especially when you can protect it with something like a secure video conferencing solution.<\/span><\/p>\n<p>Now, we&#8217;ve pretty much made it our life&#8217;s work as a company to build a video conferencing solution that&#8217;s multifunctional, designed for <em>business<\/em> use, and as secure as possible. And today, it&#8217;s more important than ever to share that knowledge. How can you keep your video meetings safe? How do you prevent strangers from randomly entering your meeting?<\/p>\n<p><span style=\"font-weight: 400;\">In this blog, we&#8217;ll tackle that and other things you should know about secure video conferencing too, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"#why\"><span style=\"font-weight: 400;\">Why it\u2019s important to invest in a secure solution<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"#what\"><span style=\"font-weight: 400;\">4 things to look for when assessing your business\u2019 needs<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"#best\"><span style=\"font-weight: 400;\">Best practices to follow to keep your video conferences as secure as possible<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"#whyyou\"><span style=\"font-weight: 400;\">Which video conferencing software is most secure?<\/span><\/a><\/li>\n<\/ul>\n<hr \/>\n<p>Learn more about video conferencing security. Download the free cheat sheet.<\/p>\n<div class=\"download-form-widget standart-download-form\" data-url=\"https:\/\/netstorage.ringcentral.com\/documents\/ringcentral_video_security_whitepaper.pdf\" data-id=\"6a0c4d3aa05ad\" id=\"6a0c4d3aa05ad\">\n\t\t<button tabindex=\"on\"  on=\"tap:6a0c4d3aa05ad.toggleClass(class='open')\" class=\"open-modal-download-action download-form-button\" type=\"submit\">\ud83d\udd12  Download the security guide<\/button><\/p>\n<div class=\"download-form-modal\">\n<div class=\"download-form-modal-body\">\n<div class=\"download-form-modal-content\">\n<div class=\"download-form-modal-title\">Learn more about RingCentral Video's enterprise-grade security features and keep your meetings on lock. <\/div>\n<form class=\"download-form SMB\" method=\"post\">\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Full Name\" aria-required=\"true\" aria-invalid=\"false\" type=\"text\" name=\"fullname\" placeholder=\"Full Name\" data-dl-events-hover=\"true\" data-dl-element=\"text\" data-dl-additional-info=\"download form\">\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Email (please enter a work email address)\" aria-required=\"true\" aria-invalid=\"false\" type=\"email\" autocomplete=\"on\" name=\"email\" placeholder=\"Email (please enter a work email address)\" data-dl-events-hover=\"true\" data-dl-element=\"email\" data-dl-additional-info=\"download form\">\n\t\t\t\t\t\t<\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"popup_form\" value=\"1\">\n\t\t\t\t\t\t<\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"Lead_Entry_Source__c\" value=\"RC Blog\" class=\"download-form-input\"\/>\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<button class=\"download-form-submit\" type=\"submit\" data-dl-element=\"button\" data-no-auto-dl=\"true\" data-dl-additional-info=\"download form\" data-dl-name=\"Get it now\">Get it now<\/button>\n\t\t\t\t\t\t<\/div>\n<\/p><\/form>\n<p> \t\t\t\t\t<button on=\"tap:6a0c4d3aa05ad.toggleClass(class='open')\" role=\"button\" tabindex=\"0\"  class=\"download-form-modal-close\"><\/button>\n\t\t\t\t<\/div>\n<div class=\"download-form-modal-thank\">Enjoy!<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr \/>\n<h2 class=\"heading h2\"><span style=\"font-weight: 400;\"><a id=\"why\"><\/a><br \/>\nWhy is it important to have a secure video conferencing solution?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">We know what you might be thinking\u2014<em>it\u2019s just video conferencing, what could they possibly get from my video?\u00a0<\/em><\/span><\/p>\n<p>But how many times have you shared documents while on a <a href=\"https:\/\/www.ringcentral.com\/video.html\">video conference meeting?<\/a> What about just saying confidential information?<\/p>\n<p><span style=\"font-weight: 400;\">And saying \u201cIt\u2019ll never happen to me,\u201d pretty much guarantees that it <em>will<\/em> happen to you (and someone will be hovering over your shoulder saying, \u201cI told you so&#8221;).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Think of a secure video conferencing solution as having locks on the door to your home. Even if you\u2019ve never had an intruder, does that mean you don\u2019t need locks?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course it doesn\u2019t. It just means you\u2019ve been lucky.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And with your company, not only is it your own information you may be compromising, you&#8217;re also risking every employee and anyone they have on their insurance\u2014like a spouse or child or family member.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On top of that, if someone hacked into your account, they could do irreversible damage that could ruin your business, which is, obviously, terrible for you <\/span><i><span style=\"font-weight: 400;\">and <\/span><\/i><span style=\"font-weight: 400;\">your employees.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yeah, it\u2019s scary, and it sounds over-the-top and ridiculous, but it happens. In fact, <\/span><span style=\"font-weight: 400;\">60% of small businesses that are hacked go bankrupt in six months.<\/span><sup>.1<\/sup><\/p>\n<p><span style=\"font-weight: 400;\">Lastly, you want to keep your business secure to keep your client\u2019s trust. In recent months, you\u2019ve probably had numerous video meetings with your clients. Maybe you talked about financials or budgets, or maybe you talked about upcoming projects that aren\u2019t yet ready for public view.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If this information were to be made public, it could cost the client <\/span><i><span style=\"font-weight: 400;\">a lot<\/span><\/i><span style=\"font-weight: 400;\"> of money\u2014and it would probably cost you the <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/customer-relations\/\" target=\"_blank\" rel=\"noopener noreferrer\">relationship<\/a>, too.\u00a0<\/span><\/p>\n<h2 class=\"heading h2\"><span style=\"font-weight: 400;\"><a id=\"what\"><\/a><br \/>\n4 things to look for in a secure video conferencing software<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">We\u2019re confident you already know there are a lot of options out there for <a href=\"https:\/\/www.ringcentral.com\/small-business\/blog\/best-video-conferencing-for-small-businesses\/\" target=\"_blank\" rel=\"noopener noreferrer\">video conferencing solutions<\/a>. To cut down the list of potentials, we\u2019ve compiled five things to look out for when choosing the best secure video conferencing software:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A video conferencing solution made for businesses (not for calling up your friends or family on the other side of the world)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Software that defaults to enabling security features<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Software that regularly updates<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Options to control your meeting security features<\/span><\/li>\n<\/ol>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">1. A video conferencing solution made for <em>businesses<\/em><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This is, by far, the most important thing to look for in a secure solution. For the people in the back row, <\/span><b>this is the most important thing to look for in a secure solution<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ve probably video chatted many times before\u2014caught up with family, played some virtual board games with friends, got a tarot reading while eating a cinnamon bun\u2014so you know what you want, and you\u2019re pretty much an expert.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Except those video conferencing companies may not have the sophisticated security features that are necessary for running a business.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do you know who <\/span><i><span style=\"font-weight: 400;\">does<\/span><\/i><span style=\"font-weight: 400;\"> have the security features you need? Ring. \ud83d\udc4f Central. \ud83d\udc4f<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We have a global team of cybersecurity experts who are involved in every aspect of the platform, implementing features bound to make your IT team happy:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Secure software development<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Strong access controls<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Resilient services<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Threat detection and mitigation<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Service operations controls<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Customer admin and user controls<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Built-in support for regulatory requirements<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Secure application programming interfaces (APIs)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Pre-built integrations<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Transparency<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">That\u2019s because our product is made for businesses\u2014and specifically designed to maximize your ability to collaborate, streamline processes, and connect with colleagues and customers from all over the world.\u00a0<\/span><\/p>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">2. Software that defaults to enabling security features<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">You definitely want to look for a product that enables all (or, at least, the most important) of its security features. This is because of two reasons: If you don\u2019t know it\u2019s there, how will you know to turn it on? Secondly, if you have to turn everything on manually, the protection is now in all of your employees&#8217; hands\u2014and even though they may mean well, humans can forget or miss things.\u00a0<\/span><\/p>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">3. Software that regularly updates<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">We get full shifty eyes when we see a developer hasn\u2019t updated their product in years. No app, software, or program is perfect, and a company should always be updating their product. If they aren\u2019t, they have either moved on from that product (maybe onto something better) or the company is defunct.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quickly check their update log\u2014how often are they updating? <\/span><i><span style=\"font-weight: 400;\">What<\/span><\/i><span style=\"font-weight: 400;\"> are they updating? It\u2019s also not a bad idea to look at reviews, too. See if anyone comments on their customer support, if their updates are helpful\/hurtful to the product, and if the company responds to reviews.\u00a0<\/span><\/p>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">4. Options to control your meeting security features<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In addition to having control over your app\u2019s overall security features, you want to look for solutions that have options for when you are in an actual meeting.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If someone is there you don\u2019t want to be (or don\u2019t know), you should be able to remove them from the meeting. If you noticed a team member didn\u2019t put a password on a meeting\u2014especially if it\u2019s confidential!\u2014you should be able to implement one even if you weren\u2019t the meeting host.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are plenty of other options, so make sure that whatever you choose gives you an overabundance of control.<\/span><\/p>\n<h2 class=\"heading h2\"><span style=\"font-weight: 400;\"><a id=\"best\"><\/a><br \/>\n5 secure video conferencing best practices for businesses to keep their information locked down<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Okay, you\u2019ve found the software you love, and you\u2019ve gone through all the security features you want, and you feel good about having a safe and secure meeting. Before you sit back and think you are covered, there are very simple practices you can introduce into your process to make your meetings that much more safe:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Password protect your meeting<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t automatically give participants the ability to screen share\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Lock the meetings<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Check the security settings for every meeting<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make a company policy about security<\/span><\/li>\n<\/ul>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">1. Password protect your meeting<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Protect every meeting with a password, every time. Bonus points if there&#8217;s an option to require every user to use a password if they&#8217;re scheduling a meeting. You could just be catching up with Joe from Design to chat about a great new campaign he\u2019s designing, but then he brings up open rates for a previous email, cost-per-click for the most recent ad that launched on Facebook, or he decides he wants to talk to you about a raise (Joe really wants to redo his bathroom, we get it).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You never know what could come up in a meeting, so make sure you&#8217;re always prepared.<\/span><\/p>\n<p>For example, you can launch a video meeting right from RingCentral&#8217;s app\u2014and the password protection feature is turned on by default. (Along with a pretty difficult password that&#8217;s automatically generated!)<\/p>\n<p><a href=\"https:\/\/www.ringcentral.com\/rcapp.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"alignnone wp-image-43128 size-large\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2020\/08\/Scheduling-a-meeting-in-RingCentral-1024x618.png\" alt=\"Scheduling a meeting in RingCentral\" width=\"1024\" height=\"618\" \/><\/a><\/p>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">2. Don\u2019t automatically give participants the ability to screen share<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This is an easy one to overlook, but there have been many instances of hackers getting into a video meeting, taking over the screen, and posting incredibly offensive stuff for all participants to see. Easy way to avoid this is to change the default screen-sharing option to only approved people or no one at all.<\/span><\/p>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">3. Lock your meetings<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Like password protection, you should lock every meeting after everyone you have invited has joined. This will prevent any random people from joining and potentially causing a disruption. Here&#8217;s how it looks in a <a href=\"https:\/\/ringcentral.com\/video\" target=\"_blank\" rel=\"noopener noreferrer\">RingCentral Video<\/a> meeting:<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-43129\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2020\/08\/prevent-new-users-from-joining-1024x457.png\" alt=\"prevent new users from joining\" width=\"1024\" height=\"457\" \/><\/p>\n<p><span style=\"font-weight: 400;\"> If you have larger meetings where you may not know everyone or know how many people are supposed to join, lock the meeting a few minutes after the start time\u2014just make sure you communicate to everyone that you will be locking the meeting, and they won\u2019t be able to join after.<\/span><\/p>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">4. Check the security settings for every meeting<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It\u2019s easy to get into a routine and forget to implement certain security measures, but try to make it a habit that you check and recheck the security settings for every meeting. Your future self will thank you.<\/span><\/p>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">5. Have a company policy about security<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Even if you decide to only let your IT have admin rights and everyone else is a regular user, you should communicate the importance of security. Create a company doc with a security checklist that an employee can reference every time they schedule a meeting, or allow a few senior employees admin rights and make sure at least one is on every meeting to make sure everything is set up correctly.<\/span><\/p>\n<hr \/>\n<p class=\"p1\"><span class=\"s1\">\ud83d\udd79\ufe0f<\/span> Get a hands-on look at how RingCentral works by booking a product tour:<\/p>\n<p class=\"p1\"><button data-href=\"#leadform-popup\" class=\"js-open-popup-activator btn primary\" >Choose a time<\/button><\/p>\n<p>\ud83d\udcb0 You can also <strong><a href=\"http:\/\/www.ringcentral.com\/roi-calculator\" target=\"_blank\" rel=\"noopener noreferrer\">use this calculator<\/a> <\/strong>to see roughly how much your business could save by using RingCentral to support your team&#8217;s communication with each other\u2014and clients.<\/p>\n<hr \/>\n<h2><span style=\"font-weight: 400;\"><a id=\"whyyou\"><\/a><br \/>\nSo&#8230;which video conferencing software is the most secure?\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There are <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/the-best-video-conferencing\/\" target=\"_blank\" rel=\"noopener noreferrer\">lots of options out there for video conferencing<\/a>\u2014many of them advertised as customer-first, always putting privacy and security above all else. Then you read reports of people finding insecurities in the code that allows the app to turn on the camera without informing the user. Or that a company has background access to a user\u2019s data like texts, emails, and photos.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As we mentioned above, our number one tip is to <\/span><b>only look for solutions that are made for businesses<\/b><span style=\"font-weight: 400;\">. Their security and dedication to clients will be miles above any other video conferencing solution because they know the importance of confidentiality for a business.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Still, you have options, which you may see as a benefit or disadvantage, depending on how much effort you want to put into finding the best solution. What we can tell you is why you should consider RingCentral first.<\/span><\/p>\n<h4><b>Why RingCentral should be your go-to video conferencing solution:<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It\u2019s made for small businesses<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It works across operating systems and devices<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">You have access to a customer service team who can answer all your questions<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It\u2019s easy to pick up and use<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">It\u2019s made for small businesses<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Beyond our dedication to privacy and security, we\u2019ve designed RingCentral to be an affordable solution, especially for small businesses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You shouldn\u2019t have to pay an outrageous amount for the best features to make sure your company is safe, secure, and operating efficiently. RingCentral offers various plans with a wide range of features, so you can get exactly what you need at a reasonable price, like unlimited 1:1 meetings, group meetings up to 100 participants, screen and file sharing, team messaging, calendar integrations, and multi-platform syncing\u2014all for a low per user per month fee:<\/span><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=vGSZfDIHmso\">https:\/\/www.youtube.com\/watch?v=vGSZfDIHmso<\/a><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">It works across operating systems and devices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">No matter what device you work from\u2014phone, tablet, laptop, or desktop\u2014whenever you need to hop on calls, schedule meetings, or shoot quick messages out to your team, you can do it all with our easy-to-use and secure mobile and desktop app.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">You have ready access to a customer service team who can answer all your questions<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">We have offices all over the world, in the US, UK, France, China, Philippines, and Australia. Our team is always available, no matter which time zone, to help you out.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our customer service team is with you from the moment you engage with us and on. There are specially dedicated teams at all stages of your onboarding, and you work with an assigned technical account manager and an assigned customer success manager to help you with anything you need (like setting up your security protocols).<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">It\u2019s easy to pick up and use<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Simply, our video conferencing software is intuitive and easy to use. You&#8217;ll be ready to start a meeting in minutes\u2014even if you&#8217;ve never been on a <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/virtual-meetings\/\" target=\"_blank\" rel=\"noopener noreferrer\">virtual meeting<\/a> before in your life. And, best of all, your meetings are safe and secure using RingCentral, so you can focus on running your business and leading your team.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Here\u2019s to safe and secure video conferencing for your business<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">So, now you know all the reasons why you should keep your company protected, and we hope you learned some basic tips for keeping your meetings safe. If you still have questions or want to learn more about what you can do to keep your company secure through video meetings, reach out to us\u2014we\u2019re always happy to help.<\/span><\/p>\n<hr \/>\n<p><sup>1<\/sup>inc.com\/joe-galvin\/60-percent-of-small-businesses-fold-within-6-months-of-a-cyber-attack-heres-how-to-protect-yourself.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated July 2021 It\u2019s late, and your phone rings. You grab your cell phone, but realize it\u2019s coming from your computer. Who could that be? You open your laptop and see a flashing box displaying a name\u2026 YOUR name. But how is that possible? How could I be calling myself? Unless&#8230; The call is coming &#8230;<\/p>\n","protected":false},"author":1046,"featured_media":43090,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17901],"tags":[1548,17507,2770],"class_list":["post-43127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-leadership","tag-ringcentral-video","tag-secure-video-conferencing","tag-video-conferencing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secure video conferencing: How to have safe online meetings | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"Worried about the safety of the data your clients and teammates are sharing. Here are a few tips for keeping your video conferencing secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/secure-video-conferencing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure video conferencing: How to have safe online meetings\" \/>\n<meta property=\"og:description\" content=\"Worried about the safety of the data your clients and teammates are sharing. Here are a few tips for keeping your video conferencing secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/secure-video-conferencing\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-01T20:46:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T13:26:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"930\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zac Zuber-Zander\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zac Zuber-Zander\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/secure-video-conferencing\/\"},\"author\":{\"name\":\"Zac Zuber-Zander\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/2270dec5d27ecfacc0bec8f881be3fa7\"},\"headline\":\"Secure video conferencing: How to have safe online meetings\",\"datePublished\":\"2020-07-01T20:46:30+00:00\",\"dateModified\":\"2025-03-13T13:26:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/secure-video-conferencing\/\"},\"wordCount\":2412,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg\",\"keywords\":[\"RingCentral video\",\"secure video conferencing\",\"video conferencing\"],\"articleSection\":[\"Business &amp; leadership\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/secure-video-conferencing\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/\",\"name\":\"Secure video conferencing: How to have safe online meetings | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg\",\"datePublished\":\"2020-07-01T20:46:30+00:00\",\"dateModified\":\"2025-03-13T13:26:02+00:00\",\"description\":\"Worried about the safety of the data your clients and teammates are sharing. Here are a few tips for keeping your video conferencing secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg\",\"width\":930,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure video conferencing: How to have safe online meetings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/2270dec5d27ecfacc0bec8f881be3fa7\",\"name\":\"Zac Zuber-Zander\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9191f51651dfa5c6b82de171556fbefe9939fc5a7f0e978d834e80472f46658f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9191f51651dfa5c6b82de171556fbefe9939fc5a7f0e978d834e80472f46658f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9191f51651dfa5c6b82de171556fbefe9939fc5a7f0e978d834e80472f46658f?s=96&d=mm&r=g\",\"caption\":\"Zac Zuber-Zander\"},\"description\":\"Zac Zuber-Zander is a writer and editor who loves grammar, punctuation, and learning new ways to be productive while sitting on the couch. He's written for world-renowned architecture firm Pelli Clarke Pelli Architects, marketing agency Digital Surgeons, online review BoatTEST.com, and M&amp;A firm Woodbridge International. He holds an MFA in Creative Writing from Fairfield University.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/zac-zuber-zander-a2847079\/\"],\"url\":\"\/us\/en\/blog\/author\/zac-zuber-zander\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure video conferencing: How to have safe online meetings | RingCentral Blog","description":"Worried about the safety of the data your clients and teammates are sharing. Here are a few tips for keeping your video conferencing secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/secure-video-conferencing\/","og_locale":"en_US","og_type":"article","og_title":"Secure video conferencing: How to have safe online meetings","og_description":"Worried about the safety of the data your clients and teammates are sharing. Here are a few tips for keeping your video conferencing secure.","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/secure-video-conferencing\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2020-07-01T20:46:30+00:00","article_modified_time":"2025-03-13T13:26:02+00:00","og_image":[{"width":930,"height":700,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg","type":"image\/jpeg"}],"author":"Zac Zuber-Zander","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"Zac Zuber-Zander","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#article","isPartOf":{"@id":"\/us\/en\/blog\/secure-video-conferencing\/"},"author":{"name":"Zac Zuber-Zander","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/2270dec5d27ecfacc0bec8f881be3fa7"},"headline":"Secure video conferencing: How to have safe online meetings","datePublished":"2020-07-01T20:46:30+00:00","dateModified":"2025-03-13T13:26:02+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/secure-video-conferencing\/"},"wordCount":2412,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg","keywords":["RingCentral video","secure video conferencing","video conferencing"],"articleSection":["Business &amp; leadership"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/secure-video-conferencing\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/","name":"Secure video conferencing: How to have safe online meetings | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg","datePublished":"2020-07-01T20:46:30+00:00","dateModified":"2025-03-13T13:26:02+00:00","description":"Worried about the safety of the data your clients and teammates are sharing. Here are a few tips for keeping your video conferencing secure.","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg","width":930,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/secure-video-conferencing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Secure video conferencing: How to have safe online meetings"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/2270dec5d27ecfacc0bec8f881be3fa7","name":"Zac Zuber-Zander","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9191f51651dfa5c6b82de171556fbefe9939fc5a7f0e978d834e80472f46658f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9191f51651dfa5c6b82de171556fbefe9939fc5a7f0e978d834e80472f46658f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9191f51651dfa5c6b82de171556fbefe9939fc5a7f0e978d834e80472f46658f?s=96&d=mm&r=g","caption":"Zac Zuber-Zander"},"description":"Zac Zuber-Zander is a writer and editor who loves grammar, punctuation, and learning new ways to be productive while sitting on the couch. He's written for world-renowned architecture firm Pelli Clarke Pelli Architects, marketing agency Digital Surgeons, online review BoatTEST.com, and M&amp;A firm Woodbridge International. He holds an MFA in Creative Writing from Fairfield University.","sameAs":["https:\/\/www.linkedin.com\/in\/zac-zuber-zander-a2847079\/"],"url":"\/us\/en\/blog\/author\/zac-zuber-zander\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/SMB-owner-1.jpg","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/zac-zuber-zander\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9191f51651dfa5c6b82de171556fbefe9939fc5a7f0e978d834e80472f46658f?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">Zac Zuber-Zander<\/span><\/a>","rc_author_full_name":"Zac Zuber-Zander","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2020\/11\/Headshot-of-zac-zuber-zander-scaled.jpg","rc_author_link":"\/us\/en\/blog\/author\/zac-zuber-zander\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/trending\/business-leadership\/amp\">Business &amp; leadership<\/a>","amp_link":"\/us\/en\/blog\/secure-video-conferencing\/amp","excerpt_title":"Secure video conferencing: How to have safe online meetings","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/43127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/1046"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=43127"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/43127\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/43090"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=43127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=43127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=43127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}