{"id":109206,"date":"2020-04-14T06:00:28","date_gmt":"2020-04-14T13:00:28","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=109206"},"modified":"2020-05-06T18:33:06","modified_gmt":"2020-05-07T01:33:06","slug":"policy-video-conferencing","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/04\/policy-video-conferencing\/","title":{"rendered":"The Rush to Video Conferencing \u2013 Are We Failing to Use Good Cyber Hygiene?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Sadly, one of life\u2019s proven realities is, when a technology becomes popular adversaries will target it. With so many people switching to video conferencing, it\u2019s no surprise that adversaries have started to give it their focus. Indeed, as the <\/span><a href=\"https:\/\/www.theregister.co.uk\/2020\/03\/16\/zoom_teams_outage\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">capacity of video conferencing in the cloud is being tested<\/span><\/a><span style=\"font-weight: 400;\">, reports of misuse have already begun, and this should be a warning flag of more to come.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So I come to my second truism, which is that all too often when we are in a rush the basic rules and lessons we\u2019ve learnt can go out the window. As such, when we are in challenging times or situations, we should try to ensure we still embrace our Security 101 logic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In recent weeks, there has been a spate of domain typosquatting, where adversaries are registering close to genuine domain names and then sending out invites. We have learnt to check the URLs in emails and web domains. We need to do the same for video conferences. Consider asking your IT security team to remind staff of this or including it in your phishing training program for employees, if you have one.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What's created more noise in the last week is video conferencing bombing, where third parties look for valid video conference IDs that haven\u2019t been secured. News stories tell of third parties taking over sessions to show inappropriate content. But the reality is a third party could just as easily be a silent listener and simply grab valuable business intel either from the conversations or what's being shared onscreen.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is a message not just for businesses to recognise but also society in general. Whether video conferencing is being used simply to catch up with friends or teach children from home, no one wants an uninvited and unpredictable guest on the line.<\/span><\/p>\n<p><b>Some very basic security controls can go a long way.<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Are your staff or the call hosts using passwords to limit who can enter into calls?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Using a unique password for every video conference is an option, but there is a balance between the friction that creates in the user experience, versus the incremental security value. I would suggest that any calls including business-sensitive data use a unique password. Also note that the options may be different in terms of password requirements when simply dialing in for audio versus using a full web connection.\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Should your video sessions be enabled to allow them to start before the host joins? For example, some video conferencing vendors offer the option to set waiting rooms. Likewise, you can turn on audio notifications when people join. More simply, you should always check to see who is in the participant list. This is no different to many organizations\u2019 physical tailgating policies.<\/span><\/li>\n<\/ul>\n<p><strong>Some other options also worth considering include:<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Are you allowing any user to screenshare, or is it restricted to the host only?\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Are you allowing file transfers between users during a session?\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">And importantly, if you remove a participant from a video conference, can they rejoin?<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The above is far from being a complete guide to securing your video conferencing. That is a job for your IT security team to debate and agree with your business teams, ultimately arriving at the right security settings for you.<\/span><\/p>\n<p><strong>Here are the key takeaways:<\/strong><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">When we rush to respond to a crisis, we\u2019re likely to cut corners. Make sure if you can that security isn\u2019t in the group of things skipped over. If it is being skipped as you make rapid adjustments, have a plan to go back and reassess soon after. In reality, it's generally useful to reassess the use of new business tools and processes after a short trial period as you gain real world experience of how they work for you.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Recognise that adversaries will always flock to commonly used tools and processes, as their scope for success is increased. In recent weeks, the scale of adoption is akin to the total number of new users for 2019, <\/span><a href=\"https:\/\/www.cnbc.com\/2020\/02\/26\/zoom-has-added-more-users-so-far-this-year-than-in-2019-bernstein.html\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">one video conferencing company CEO suggested<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">As my good colleague <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/john-kindervag\/\"><span style=\"font-weight: 400;\">John Kindervag<\/span><\/a><span style=\"font-weight: 400;\"> (the godfather of the Zero Trust Network, as I like to call him) suggests, \u201cLog all traffic.\u201d At least then, after the fact, you can go back and understand and learn from what happens. After all, isn\u2019t the goal that we learn from our previous mistakes?<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Read more about <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/network-video-conferencing-security\/\"><span style=\"font-weight: 400;\">best practices for video conferencing security<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adversaries flock to commonly used tools and processes, and we need to apply Security 101 habits to increasingly popular video conferencing tools.<\/p>\n","protected":false},"author":150,"featured_media":107533,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6769,6768,6765],"tags":[102,7099],"coauthors":[1466],"class_list":["post-109206","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-public-sector","category-secure-the-cloud","category-secure-the-enterprise","tag-remote-access","tag-video-conferencing-security"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/03\/IMG_2011.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/150"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=109206"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109206\/revisions"}],"predecessor-version":[{"id":109211,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109206\/revisions\/109211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/107533"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=109206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=109206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=109206"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=109206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}