Putting privacy and security at the heart of digital meetings

video call

Amit Walia, CRO at Compodium, looks at the security risks of business video conferencing.

The changes businesses have made to ensure business continuity during the COVID-19 pandemic mean that distributed, remote workforces are now commonplace in every country around the world.  While remote – or certainly flexible – working was already gaining popularity, in most industries the pandemic has catapulted organisations years forward in terms of both working practices and technology.  Video conferencing is now ubiquitous.  Indeed, the ability to communicate with customers, colleagues, clients – even patients – using video conferencing platforms offered many organisations a practical lifeline in 2020.

Authenticity in an era of digital meetings


The year has been a turning point for video conferencing.  No longer an occasional tool or ‘nice to have’ – video conferencing platforms are now a staple component of most organisations’ wider IT toolset.  This shift has seen a new take on authenticity – how to be (or at least appear) authentic in a business video meeting.  What to wear (hint: ditch the stripes), how you should think about lighting, what background to choose – all questions most people had not considered in a previous era of occasional video calls.  Indeed, with limited research on the subject, Harvard Business Review set out to answer these questions once and for all in March 2020 with its own research.

However, while the right lighting, shirt pattern and background colour may help someone seem more authentic on a video call – how can you be sure that the person you are talking to is indeed who they say they are?  For many businesses now using video conferencing as a primary communication tool, meetings can contain commercially sensitive, confidential and at times even regulated information – from personally identifiable information (PII) to payment card industry (PCI) regulated data.  Whether it’s a new client, customer, or a first-time meeting with a partner or other third-party organisation, the ability to guarantee you are discussing the right information with the right person over video is now paramount.

This question might seem odd – after all, how often would you ask someone for ID if you meet them in person?  However, outside of the confines of virtual communication, impersonation becomes far harder.  People are indeed asked to verify their identity regularly – for example when entering an office building – and the nature of in-person meetings means there are many more safeguards in place against sensitive data loss.    

Privacy and security built-in


The question of digital authentication is part of the wider security concerns brought to light in the rapid and widespread adoption of video conferencing.  Controversies over encryption levels and the practice of “Zoombombing” – where strangers intrude on others’ meetings – have been some of the most widely reported this year.  Intruders have been known to listen in on video calls without anyone knowing they’re there.  Others have completely disrupted meetings in ways that threaten the business in its entirety, integrity as well as confidential information.  A prime example in one high-profile case saw pranksters intruding on a court hearing of a man accused of July’s Twitter hack

As the conversation around the wider security of video meetings has grown louder, Zoom announced it would backtrack on previous refusals to provide end-to-end encryption to free users of the service.  This was a major victory for the activists and civil liberties organisations campaigning for privacy and digital protection – data transmission is one of the most vulnerable areas of video communication.  Ensuring a comprehensive level of security for those taking part in digital conversations is now vital.  During a video conversation, data travels over multiple networks – both public and private – and end-to-end encryption is the foundation of protecting this data in transit. 

End-to-end encryption – which is vital for privacy and security and will now soon be available via even the most basic video conferencing solutions – is not enough to meet the high standards many businesses require.  Instead, authentication is the key to ensuring the growing adoption of video conferencing meets the same high standards delivered to clients, customers or partners in-person. 

Authentication provides a double layer of trust, ensuring both parties can be confident that they are speaking to the right person within an entirely confidential virtual space.  Only by ensuring video conversations are both end-to-end encrypted and authenticated can businesses provide the highest levels of privacy and security.  This ensures the identity of every conference participant is fully authenticated before the conference is initiated. 

Securing the digital future


The video conferencing authentication process is simple, but hugely effective.  It represents the first step in a more digital, video-driven future for businesses.  For many, 2020 will be remembered as a year of change – extraordinary, challenging but also transformational.  Digital transformation has been the key driver for CIOs and business leaders – to ensure business continuity, agility and continued commercial success in a fundamentally changed world.  Equipping teams with the tools to work effectively and efficiently from any location has been crucial – but business leaders must ensure that this doesn’t come at the cost of security.  

Privacy and security must be built into the digital future.  Businesses need to ensure they are laying the right foundations for continued innovation.  Without question, video conferencing and digital meetings will continue to play a significant role for businesses in 2021.  Ensuring security and privacy are at the heart of this will be crucial. 


Amit Walia

An entrepreneur with global business and consulting experience. Focusing on strategic growth and global expansion within the Enterprise sector. Amit has held executive positions for other Unified Communication providers such as Tely Labs, Teliris.

How E-commerce Marketers Can Win Black Friday

Sue Azari • 11th November 2024

As new global eCommerce players expand their influence across both European and US markets, traditional brands are navigating a rapidly shifting landscape. These fast-growing Asian platforms have gained traction by offering ultra-low prices, rapid product turnarounds, heavy investment in paid user acquisition, and leveraging viral social media trends to create demand almost in real-time. This...

Why microgrids are big news

Craig Tropea • 31st October 2024

As the world continues its march towards a greener future, businesses, communities, and individuals alike are all increasingly turning towards renewable energy sources to power their operations. What is most interesting, though, is how many of them are taking the pro-active position of researching, selecting, and implementing their preferred solutions without the assistance of traditional...

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...

Automated Testing Tools and Their Impact on Software Quality

Natalia Yanchii • 09th October 2024

Test automation refers to using specialized software tools and frameworks to automate the execution of test cases, thereby reducing the time and effort required for manual testing. This approach ensures that automation tests run quickly and consistently, allowing development teams to identify and resolve defects more effectively. Test automation provides greater accuracy by eliminating human...

Custom Software Development

Natalia Yanchii • 04th October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 04th October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing. At Testlum, we met many software development teams who were pressured to deliver new features and updates at a faster pace. The manual...