


{"id":9399,"date":"2022-06-07T16:15:00","date_gmt":"2022-06-07T12:15:00","guid":{"rendered":"https:\/\/krisp.ai\/blog\/?p=9399"},"modified":"2024-07-04T14:52:52","modified_gmt":"2024-07-04T10:52:52","slug":"virtual-meeting-security","status":"publish","type":"post","link":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/","title":{"rendered":"What is Virtual Meeting Security and Why It Should Matter To You"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">With <\/span><a href=\"https:\/\/news.gallup.com\/poll\/355907\/remote-work-persisting-trending-permanent.aspx\"><span style=\"font-weight: 400;\">45%<\/span><\/a><span style=\"font-weight: 400;\"> of Americans working remotely all or part of the time, virtual meetings have become a staple in the workplace. For remote employees, videoconferencing offers a replacement for the typical physical face-to-face interactions of an office, keeping people connected no matter their location.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, the benefits of virtual meetings don\u2019t just apply to remote work. In-person offices are harnessing videoconferencing to connect between distant branches or international clients, saving some companies <\/span><a href=\"https:\/\/www.nytimes.com\/2008\/07\/22\/technology\/22meet.html\"><span style=\"font-weight: 400;\">millions<\/span><\/a><span style=\"font-weight: 400;\"> of dollars in travel expenses and lost work time.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Virtual meetings have been shown to provide a number of advantages\u2013\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Videoconferencing boosts productivity and operational savings. Using virtual meetings, almost <\/span><a href=\"https:\/\/blog.webex.com\/video-conferencing\/18-video-conferencing-statistics-for-2021\/\"><span style=\"font-weight: 400;\">9 out of 10<\/span><\/a><span style=\"font-weight: 400;\"> employees have been able to decrease the time it takes to complete projects.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hybrid employees save companies an average of <\/span><a href=\"https:\/\/globalworkplaceanalytics.com\/telecommuting-statistics\"><span style=\"font-weight: 400;\">$11,000<\/span><\/a><span style=\"font-weight: 400;\"> a year thanks to reduced real estate needs, higher productivity, and lower turnover.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">87% of video conference users have experienced a <\/span><a href=\"https:\/\/www.parmetech.com\/the-business-benefits-of-video-conferencing\/\"><span style=\"font-weight: 400;\">faster decision-making process<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">55% of business professionals believe that companies using videoconferencing are <\/span><a href=\"https:\/\/blog.tmcnet.com\/blog\/rich-tehrani\/wp-content\/uploads\/2019\/09\/2019-Impact-of-Video-Conferencing-Report-Lifesize_FINAL.pdf\"><span style=\"font-weight: 400;\">more collaborative<\/span><\/a><span style=\"font-weight: 400;\">, and 50% believe they are more innovative.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">While videoconferencing increases productivity and efficiency <\/span><i><span style=\"font-weight: 400;\">and<\/span><\/i><span style=\"font-weight: 400;\"> decreases operational costs, there are some risks involved. Gone are the days of phishing emails promising an inheritance from a far-off relative. Online scams are changing with the times, and virtual meetings offer a lucrative target for tech-savvy hackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article will discuss the importance of videoconferencing security as well as best practices you can follow to protect the privacy of your online meetings.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Why Does Virtual Meeting Security Matter?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Virtual meeting security matters because <\/span><i><span style=\"font-weight: 400;\">privacy matters<\/span><\/i><span style=\"font-weight: 400;\">. Not only do you need to protect company knowledge, but your employees and clients have a reasonable expectation that their information will be guarded as well. Maintaining security during video conferencing ensures that only the people you want to involve in a conversation are present. I<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">What Are the Risks Associated With Poor Meeting Security?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Leaving your front door unlocked makes it much easier for someone to enter and cause damage.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The same holds true for your virtual meetings. When there are no safeguards in place to prevent access, it\u2019s much easier for intruders to freely enter your meetings and do as they please.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Intruders may not always be someone seeking to cause harm. It could be as simple as an employee entering a meeting they\u2019re not supposed to attend and hearing confidential information. However, there\u2019s always the chance that someone may try to enter to cause harm\u2013 anyone from a disgruntled ex-employee to a competitor could exploit weaknesses in your security. If they remain for long, they can hear information they\u2019re not supposed to have or even use the chat to send malicious links that, once clicked, will provide access to proprietary information on employees\u2019 computers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At best, poor meeting security could allow someone to hear something they shouldn\u2019t. At worst, it can have financial or legal implications for your company.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Virtual Meeting Security Best Practices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Videoconferencing security isn\u2019t just a concern while your online meetings are taking place. It requires following certain protocols before, during, <\/span><i><span style=\"font-weight: 400;\">and<\/span><\/i><span style=\"font-weight: 400;\"> after each session. Let\u2019s walk through some security practices you can put into place.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Maintain your personal privacy<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Almost all the information available about virtual meeting security is in regards to protecting company information. Are you taking the same steps to protect your personal information?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Maybe you want to maintain a firm boundary between your work and personal life, or you strive for a high level of professionalism. There are a few ways to conceal the sights and sounds that a virtual meeting discloses. First, consider using a virtual background or changing your setting to blur your current background. In addition, you can use <\/span><a href=\"https:\/\/krisp.ai\/\"><span style=\"font-weight: 400;\">Krisp<\/span><\/a><span style=\"font-weight: 400;\"> to filter out background noises. With Krisp, all of the audio processing happens directly on your device, so your meetings never land in a cloud where someone else can access them.<\/span><b><\/b><\/p>\n<p>[demo-new]<\/p>\n<ul>\n<li aria-level=\"1\"><b>Control meeting access<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you\u2019re scheduling a string of online meetings, it\u2019s tempting to use the same link for each one so you don\u2019t have to hop in and out of different calls all day. However, using the same login information again and again can inadvertently lead to someone being in a meeting they\u2019re not supposed to attend. Even though it\u2019s more work for you, use a different link and password for each meeting. Unique login information helps ensure that only intended guests are attending a virtual meeting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can also adjust your setting to enable a waiting room. With this feature, participants log in and then wait individually for the host to begin the meeting. Most video conferencing softwares\u2013 including Zoom, Microsoft Teams, Google Meet, and Webex\u2013 provide the option of a waiting room. Some programs even give the host the option to admit waiting participants one by one or as a group.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Monitor participants<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Although scammers and hackers are constantly coming up with new, enterprising ways to take advantage of gaps in security, it\u2019s still very <\/span><a href=\"https:\/\/www.csis.org\/analysis\/video-conferencing-technology-and-risk\"><span style=\"font-weight: 400;\">difficult<\/span><\/a><span style=\"font-weight: 400;\"> for them to avoid being seen once they join a meeting. Stay aware of exactly who everyone is in attendance with two features: the meeting dashboard and lock.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most videoconferencing software provide a dashboard that lists the name of each participant. Keep an eye on this list as people join the meeting. If a generic username leaves you guessing who someone is, ask them to confirm their identity by quickly turning their camera on. It\u2019s probably an employee joining on an unfamiliar device, but as the saying goes, <\/span><i><span style=\"font-weight: 400;\">better safe than sorry.<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When all of your meeting participants have joined, lock the meeting so that no one else can join, <\/span><i><span style=\"font-weight: 400;\">even if<\/span><\/i><span style=\"font-weight: 400;\"> they have the correct meeting ID and password. With the meeting locked, you can focus your attention on what\u2019s being said instead of who\u2019s still joining. If a meeting participant accidentally logs out (hey\u2013 it happens to the best of us) you\u2019ll need to unlock the meeting to allow them back in.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Manage file sharing<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Employee records are shared during performance reviews. Financial data is presented in quarterly status meetings. Private company information is distributed to governance teams.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Meetings require certain people to access confidential documents and information. It\u2019s important that you have a system in place for how you share confidential materials in preparation for virtual meetings. It could be as simple as ensuring that documents are only accessible to those who need access. If privacy is more of a concern, you can use file-sharing services that require a password for document access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During meetings, limit who can share their screen. Unless you plan on having others share their screen, change the settings to host-only screen sharing. You\u2019ll prevent participants from accidentally publicizing something they shouldn&#8217;t.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Record thoughtfully<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Recording your online meetings is a no-brainer, right? After all, it just takes the click of a button, and it gives you instant access to everything that was said.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the words of mothers everywhere, \u201c<\/span><i><span style=\"font-weight: 400;\">Just because you can, doesn\u2019t mean you should.<\/span><\/i><span style=\"font-weight: 400;\">\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, there <\/span><i><span style=\"font-weight: 400;\">are<\/span><\/i><span style=\"font-weight: 400;\"> a few reasons to record a meeting. If you need to recall what was said word-for-word, a recording is handy. If scheduling conflicts prevent a key team member from attending, a recording is also beneficial. In most cases, however, it\u2019s enough just to take notes during the meeting.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you do record, save the video to your desktop rather than the cloud and change its name from the generic recording name that the software provides. This greatly reduces the risk of others being able to access and share it.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Ensure a secure connection<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/CISA_Guidance_for_Securing_Video_Conferencing_S508C.pdf\"><span style=\"font-weight: 400;\">Cybersecurity and Infrastructure Agency<\/span><\/a><span style=\"font-weight: 400;\"> recommends using a secure internet connection for video conferencing. This can mean avoiding public WiFi options, such as networks available from the local library or coffee shop. Of course, it\u2019s always good practice to use a private device for work, rather than computers available to the public.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For remote workers, it\u2019s important to change the default password for your router and WiFi to a strong password that\u2019s hard to guess. Make sure your router is using WPA2 or WPA3 wireless encryption standards.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Use organization issued devices<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Company-issued devices can be a sticky subject; providing every remote employee with a computer is pricey. At the same time, a security breach will end up costing your company in unexpected ways.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If it\u2019s at all within your budget, equip remote employees with a computer for work. Collaborate with IT to install security measures on each. IT can even configure the computers to provide remote access that allows for easier troubleshooting and ensures the devices are always updated with the latest versions of software.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Establish expectations<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">More than two years into the COVID-19 pandemic, the majority of employees have experience with online meetings. The familiarity of a once uncommon platform may lull individuals into a false sense of security, but maintaining security during your virtual meetings should remain a priority for all.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After considering what security measures you want to implement as standard practice, communicate your expectations by creating a short document to share with others. You could\u2013\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Review it during a company-wide meeting.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Have managers share it during individual department meetings.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create a short recording that explains your security expectations and send it through email.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Email the document to all employees.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Attach it to each meeting invitation.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Online meetings are here to stay. By implementing important security practices, you can be sure that everyone involved has the best experience possible.\u00a0<\/span><\/p>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;add this sentence: Meeting terms glossary serves as a helpful reference tool, especially in today's digital work environment where online meeting security is vital. It provides insights and explanations for the various terms and concepts related to virtual meetings, making it easier for participants to navigate and understand the nuances of meeting security.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:829,&quot;3&quot;:{&quot;1&quot;:0},&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:0}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:0}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:0}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:{&quot;1&quot;:2,&quot;2&quot;:0}},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;11&quot;:4,&quot;12&quot;:0}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0,&quot;2&quot;:{&quot;5&quot;:1}}\uee10{&quot;1&quot;:19}\">If you need explanations for the various terms and concepts related to virtual meetings, consider insightful <a href=\"https:\/\/krisp.ai\/blog\/meetings-glossary\/\">meeting terms glossary<\/a> which serves as a helpful reference tool, especially in today&#8217;s digital work environment where online meeting security is vital. It provides insights to navigate and understand the nuances of meeting security.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With 45% of Americans working remotely all or part of the time, virtual meetings have become a staple in the workplace. For remote employees, videoconferencing offers a replacement for the typical physical face-to-face interactions of an office, keeping people connected no matter their location.\u00a0 However, the benefits of virtual meetings don\u2019t just apply to remote [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":9333,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"two_page_speed":[]},"categories":[314],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v23.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Virtual Meeting Security and Why It Should Matter To You<\/title>\n<meta name=\"description\" content=\"Find out the importance of virtual meeting security as well as best practices you can follow to protect the privacy of your online meetings.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Virtual Meeting Security and Why It Should Matter To You\" \/>\n<meta property=\"og:description\" content=\"Find out the importance of virtual meeting security as well as best practices you can follow to protect the privacy of your online meetings.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Krisp\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/krispHQ\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-07T12:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-04T10:52:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Krisp Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@krispHQ\" \/>\n<meta name=\"twitter:site\" content=\"@krispHQ\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/\"},\"author\":{\"name\":\"Krisp Team\",\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/person\/0496a17834794b226cc0925eabe55a2d\"},\"headline\":\"What is Virtual Meeting Security and Why It Should Matter To You\",\"datePublished\":\"2022-06-07T12:15:00+00:00\",\"dateModified\":\"2024-07-04T10:52:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/\"},\"wordCount\":1642,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/krisp.ai\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png\",\"articleSection\":[\"Meeting Productivity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/\",\"url\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/\",\"name\":\"What is Virtual Meeting Security and Why It Should Matter To You\",\"isPartOf\":{\"@id\":\"https:\/\/krisp.ai\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png\",\"datePublished\":\"2022-06-07T12:15:00+00:00\",\"dateModified\":\"2024-07-04T10:52:52+00:00\",\"description\":\"Find out the importance of virtual meeting security as well as best practices you can follow to protect the privacy of your online meetings.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#primaryimage\",\"url\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png\",\"contentUrl\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png\",\"width\":500,\"height\":350,\"caption\":\"acoustic echo cancellation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/krisp.ai\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Virtual Meeting Security and Why It Should Matter To You\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/krisp.ai\/blog\/#website\",\"url\":\"https:\/\/krisp.ai\/blog\/\",\"name\":\"Krisp\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/krisp.ai\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/krisp.ai\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/krisp.ai\/blog\/#organization\",\"name\":\"Krisp\",\"url\":\"https:\/\/krisp.ai\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2024\/10\/K.png\",\"contentUrl\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2024\/10\/K.png\",\"width\":696,\"height\":696,\"caption\":\"Krisp\"},\"image\":{\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/krispHQ\/\",\"https:\/\/x.com\/krispHQ\",\"https:\/\/www.linkedin.com\/company\/krisphq\/\",\"https:\/\/www.youtube.com\/channel\/UCAMZinJdR9P33fZUNpuxXtg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/person\/0496a17834794b226cc0925eabe55a2d\",\"name\":\"Krisp Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2023\/10\/cropped-Favicon-96x96.png\",\"contentUrl\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2023\/10\/cropped-Favicon-96x96.png\",\"caption\":\"Krisp Team\"},\"description\":\"Here at Krisp, we are passionate about making your life more productive and easy by building noise cancelling app that removes background noise during calls.\",\"url\":\"https:\/\/krisp.ai\/blog\/author\/krisp-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Virtual Meeting Security and Why It Should Matter To You","description":"Find out the importance of virtual meeting security as well as best practices you can follow to protect the privacy of your online meetings.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/","og_locale":"en_US","og_type":"article","og_title":"What is Virtual Meeting Security and Why It Should Matter To You","og_description":"Find out the importance of virtual meeting security as well as best practices you can follow to protect the privacy of your online meetings.\u00a0","og_url":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/","og_site_name":"Krisp","article_publisher":"https:\/\/www.facebook.com\/krispHQ\/","article_published_time":"2022-06-07T12:15:00+00:00","article_modified_time":"2024-07-04T10:52:52+00:00","og_image":[{"width":500,"height":350,"url":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png","type":"image\/png"}],"author":"Krisp Team","twitter_card":"summary_large_image","twitter_creator":"@krispHQ","twitter_site":"@krispHQ","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#article","isPartOf":{"@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/"},"author":{"name":"Krisp Team","@id":"https:\/\/krisp.ai\/blog\/#\/schema\/person\/0496a17834794b226cc0925eabe55a2d"},"headline":"What is Virtual Meeting Security and Why It Should Matter To You","datePublished":"2022-06-07T12:15:00+00:00","dateModified":"2024-07-04T10:52:52+00:00","mainEntityOfPage":{"@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/"},"wordCount":1642,"commentCount":3,"publisher":{"@id":"https:\/\/krisp.ai\/blog\/#organization"},"image":{"@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#primaryimage"},"thumbnailUrl":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png","articleSection":["Meeting Productivity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/","url":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/","name":"What is Virtual Meeting Security and Why It Should Matter To You","isPartOf":{"@id":"https:\/\/krisp.ai\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#primaryimage"},"image":{"@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#primaryimage"},"thumbnailUrl":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png","datePublished":"2022-06-07T12:15:00+00:00","dateModified":"2024-07-04T10:52:52+00:00","description":"Find out the importance of virtual meeting security as well as best practices you can follow to protect the privacy of your online meetings.\u00a0","breadcrumb":{"@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/krisp.ai\/blog\/virtual-meeting-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#primaryimage","url":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png","contentUrl":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2021\/06\/Echo_blog.png","width":500,"height":350,"caption":"acoustic echo cancellation"},{"@type":"BreadcrumbList","@id":"https:\/\/krisp.ai\/blog\/virtual-meeting-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/krisp.ai\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Virtual Meeting Security and Why It Should Matter To You"}]},{"@type":"WebSite","@id":"https:\/\/krisp.ai\/blog\/#website","url":"https:\/\/krisp.ai\/blog\/","name":"Krisp","description":"Blog","publisher":{"@id":"https:\/\/krisp.ai\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/krisp.ai\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/krisp.ai\/blog\/#organization","name":"Krisp","url":"https:\/\/krisp.ai\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/krisp.ai\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2024\/10\/K.png","contentUrl":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2024\/10\/K.png","width":696,"height":696,"caption":"Krisp"},"image":{"@id":"https:\/\/krisp.ai\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/krispHQ\/","https:\/\/x.com\/krispHQ","https:\/\/www.linkedin.com\/company\/krisphq\/","https:\/\/www.youtube.com\/channel\/UCAMZinJdR9P33fZUNpuxXtg"]},{"@type":"Person","@id":"https:\/\/krisp.ai\/blog\/#\/schema\/person\/0496a17834794b226cc0925eabe55a2d","name":"Krisp Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/krisp.ai\/blog\/#\/schema\/person\/image\/","url":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2023\/10\/cropped-Favicon-96x96.png","contentUrl":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2023\/10\/cropped-Favicon-96x96.png","caption":"Krisp Team"},"description":"Here at Krisp, we are passionate about making your life more productive and easy by building noise cancelling app that removes background noise during calls.","url":"https:\/\/krisp.ai\/blog\/author\/krisp-team\/"}]}},"_links":{"self":[{"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/posts\/9399"}],"collection":[{"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/comments?post=9399"}],"version-history":[{"count":3,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/posts\/9399\/revisions"}],"predecessor-version":[{"id":10589,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/posts\/9399\/revisions\/10589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/media\/9333"}],"wp:attachment":[{"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/media?parent=9399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/categories?post=9399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/tags?post=9399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}