The cloud-based service uses third-party hardware and software and service is provided to end users under a contract or partnership agreement. Many free services contain advertisements or transfer personal information for sale to third parties. Many video conferencing and video lecture solutions are still under development and often contain security flaws. Software is being developed, but older versions may contain dangerous security issues that have been exploited by malicious people. Counterfeit software packages based on a number of well-known software programs, which contain malware added by criminals in addition to the original software, have become widespread on the Internet. Security recommendations: - if your scheduled video meeting or video lecture contains sensitive information that should cause significant harm to the public, review the cloud-based service agreement or collaboration agreement and assess the potential risks, if in doubt, seek advice from IT helpdesk
- if possible, organize your video meetings and lectures in private mode
- for example, restrict access to a meeting or lecture to persons with a University of Tartu username, do not allow strangers to join the meeting
- do not distribute web links to your private meetings or lectures through social media channels, use only the university’s e-mail and internal web channels to disseminate such information
- if the meeting is with a wider audience, check who can join the meeting and who has the right to present or share screen
- find out how you can remove strangers or mistakenly connected parties from the meeting. If necessary, seek help from user manuals or call IT helpdesk
- make sure you always use the latest version of the video conferencing software
- install the software only from the official channel (through the manufacturer's website or through the operating system's application store), if in doubt about the authenticity of the software, contact IT helpdesk
- if you have any information security problems or questions, contact IT helpdesk immediately
- document the incident as accurately as possible, the time of its occurrence and, if possible, take a screenshot of the program’s screen
|