Blog 22-01-2021

How to have safe & secure meetings in the new normal

Bye bye hackers!

By: Willem Jan van der Meer and Bob Eilander

We all remember the scammer nanas. Yes, they were hilarious. But unfortunately, the message they delivered in the ‘Get Safe Online’ campaign is still as relevant today, as it was in 2017. And it is not just your grandfather who gets hacked for money via WhatsApp, or who enters his password via a false link. Hackers are getting smarter and are also targeting you. Or rather: the company information that they can obtain through you. Now that everyone is working from home because of the pandemic, the number of attacks is growing quickly.

But don’t be mistaken, the danger of hackers was already lurking even before COVID-19 chained us to the kitchen table. Right at the office. From your laptop to the meeting room. And that will only increase in the coming years, when remote working has become the new normal. In this blog, Willem Jan van der Meer and Bob Eilander of CTOUCH tell you how to work and meet as safely as possible.

The role of human error in cybersecurity

Did you know that 90% of all data breaches are caused by human error? And not by hackers or cybercriminals (which is what many people think!). Working from home is particularly risky because we use our own laptops or phones rather than devices configured by the IT department. Or because we let housemates use those devices or have not secured our own WiFi properly. At the office, it often goes wrong in the meeting room. How often have you stared at the - sensitive - notes from the previous meeting on the whiteboard? Or had to log a colleague out on a touchscreen?

Cybersecurity is becoming increasingly important

One of the few benefits of the pandemic? The topic of data security and cybersecurity is finally 'hot' within companies. We are very happy about that at CTOUCH. Regarding the topic of ‘safe meetings’, even before COVID we were of the opinion that meetings can and should be made more secure. Too often we see that cybersecurity focuses on the risks of BYOD and that IT managers overlook the risk of data breaches in meeting rooms. And believe us, that risk is just as high. How embarrassing is it when your management team forgets to erase a plan for redundancies on a digital screen, and the next user sees it?

'How often have you stared at the - sensitive - notes
from the previous meeting on the whiteboard?’

Did you know ...

Almost half (46%) of global businesses have encountered at least one cybersecurity scare since shifting to a remote working model during the COVID-19 lockdown? 51% feel that their staff is not proficient or properly trained in the cyber risks associated with long-term remote working (Barracuda Networks).

40% of companies have not increased their security protocols despite the significant change in the way employees connect to corporate systems and the addition of new productivity applications (Cyberark).

Safe meetings? We are here to save the day

At CTOUCH, we focus on creating safe and secure meetings. Both online and offline. For many companies, the focus is now on a safe home working environment, which is understandable. But it is also important to think about how you handle your company information post-COVID. The pandemic has opened the eyes of many companies and IT managers on this issue. In the new normal, there will be a lot of remote working as well as office work. And this mix of interactive collaboration requires smart solutions to secure your data.

Whether you are working remotely, joining meetings remotely or working at the office, cybersecurity is always a question of the right software and the right hardware. But there is also the human factor. So, it is important to keep the users in mind when designing the right software and hardware. And to look at how they can work, collaborate and meet as safely as possible when using our products.

'In the new normal, there will be a lot of remote working as well as
office work and that mix of interactive collaboration
requires smart solutions to secure your data.’

Minimise the human factor in cybersecurity

When using an interactive whiteboard during a scrum session, it is important that the content can be sent thgrough encrypted files afterwards and that files are not stored locally. The right hardware and software helps employees to securely handle their created content and business information. IT managers, directors and whiteboard users don't have to worry about it.

As we already said: the human factor is often the most critical factor in cybersecurity. At CTOUCH, we think about these issues daily. For instance, one operating system is safer than another. On some systems, you can, for example, install apps that want to store data. Also, open-source solutions are easy to manipulate with a USB stick. This is not desirable in any company. If you use such a system for your touchscreen, the IT department must keep this in mind, and build in extra security measures as a precaution.

That is why the CTOUCH Canvas has no operating system. So as a user, in a moment of thoughtlessness, you can't even make the mistake of storing sensitive information. Or installing an unapproved app, or - perish the thought and knock on wood - a keylogger. Viruses are no match either, as they simply can’t take hold. Additional security is provided by the ability to lock data ports, work without a network and use PINs and fingerprint scans to gain access or lock a screen.

‘The human factor is often the most critical factor in cybersecurity.’

Security by design: let's do this!

Working anywhere, anytime and in a more flexible way. It is an increasing trend that our development team has been taking into account already for a few years now. And the subject of security is high on the agenda. At CTOUCH we therefore speak of 'security by design'. From the first screw to the touchscreen and the software: security and user-friendliness come first.

We love lists: 6 tips for working safely

Is a touchscreen completely without risks? Nope. We come back to the human factor. At CTOUCH, we try to cover almost anything, but when you go to the toilet and leave a screen unattended without locking it, you still run the risk of your plans being seen by someone for whom they are not intended.

Do you use touchscreens and digital whiteboards in your company? Or do you regularly attend remote meetings? Then these are the steps you can take to make it even safer:

  1. It starts with awareness among users. In short: have your IT manager make a how-to video, give a short workshop and write down work instructions for your employees. Cybersecurity stands or falls with how colleagues deal with devices. So, lock that screen when you go to get coffee.
  2. Does your touchscreen have an operating system? Then have your IT department lock the USB ports so no one can insert a USB stick unauthorized.
  3. Avoid unsafe browsers that are not up-to-date. Also, never use a browser on a shared device to log in to anything or gain access to personal or company documents.
  4. Never use free WiFi access points to check up on personal or company data. Need to check something when you're on the road? Then use your 4G or 5G hotspot.
  5. Always secure your home WiFi with WPA2 personal or Enterprise.
  6. Is no one joining the meeting remotely? Use the touchscreen as a standalone digital whiteboard and end the video call.

Working safely all the way to the conference room: we've got your back

Do you want to work more safely? Then make sure you take our tips into account. Next step is using software and hardware that have been developed with cybersecurity in mind and are 'foolproof' - reducing the risk of errors.

Wondering how we can guarantee a safe and secure meeting environment in your company? Willem Jan, Bob or one of our other experts will be happy to help. Time for a revolution in safe and secure meetings!

Let's do this!

Providing a safe & secure environment

At CTOUCH we want our customers to be safe in our hands. Our digital world demands that products are connected and interoperable with other systems. This requires that products have digital safety barriers that are frequently updated to provide that safe and secure environment. Our products are designed to minimise the risks of unwanted access, today and in the future.

Security is one of the four core values of the CTOUCH Circle. These four values (safety & security, customer engagement, future-readiness and sustainability) form our DNA and are therefore inextricably linked to everything we do. All of our solutions and services stem from these values and, as we believe, will help us in moving to a better future.

Join the CTOUCH Circle!

Suscripción al boletín de noticias

¿Desea recibir las noticias y actualizaciones más recientes?

No, gracias