Your Company Secrets, Now in High-Def

by | Feb 23, 2012 | Security

conference_securityABusinesses are constantly looking for exploitable holes in their security systems to protect themselves from hackers. But while your focus may currently be on the security of your employees’ laptops and smartphones, it appears that the very heart of your corporation could have been left wide open.

Boston based Rapid7 is a security company that specializes in finding holes in computer systems, and earlier this year their chief security officer, HD Moore, found a way to remotely spy on top firms’ conference rooms across the nation.

Moore wrote a program that scans the Internet for unsecured videoconferencing systems, and found that by simply calling in, his researchers could not only see and hear inside boardrooms, but they could also move the camera and utilize its zoom. In less than two hours, they had gained access to 5,000 video conference systems.

Information at Risk

If a hacker can access your boardroom through your videoconferencing equipment; your company is left extremely vulnerable. Private conversations, trade secrets and privileged financial information are all up for grabs. By operating the camera using mouse gestures, a hacker could see who is present at your boardroom meetings. Silence will afford anonymity no longer.

Once in, a hacker could also see who’s on your speed-dial and connect to any boardroom on your list, negating security measures that your colleagues or customers may have put in place.

Protect Company Information

While time and money have been put into ensuring your videoconferencing equipment’s visual and audio clarity, it’s time to make security your number one priority. If you are still using unsecured systems set up outside firewalls, it’s time to evaluate the system and look at alternatives.

In addition, systems that include a feature that automatically accepts inbound calls so users do not have to press an “accept” button every time someone dials in are adding to your security risk. Anyone can dial in and look around a room, and the only sign of their presence is a tiny light on a console unit.

There are trade-offs with every connection you make from your business to the outside world. Make sure that you are aware of the risks and taking the security steps that are right for your company. Call us if you would like to make your boardroom more secure.

Published with permission from Source.

Related Posts

What is a Network Security Assessment?

What is a Network Security Assessment?

A network security assessment is a vital process that reveals the secrets of evaluating and strengthening your network defenses. In today's interconnected world, where cyber threats lurk around every corner, understanding the concept and purpose of a network security...

Preventing Phishing Attacks with Managed IT Services

Preventing Phishing Attacks with Managed IT Services

Phishing attacks have risen recently as many businesses store sensitive data online. Studies show that three billion phishing emails get sent daily. One of the best ways of preventing phishing attacks is by investing in managed IT services, and you’ll see how....

Cybersecurity Best Practices of 2022

Cybersecurity Best Practices of 2022

Cybersecurity threats are becoming increasingly popular as businesses digitalize their operations, calling for cybersecurity best practices. According to Identity Theft Resource Center’s data breach report, data breaches increased from 1,108 in 2020 to 1,603 data...


Give us a call and discover how great local IT services and computer support can be!