Posts

Must-have features of video conferencing for UC

Quality video conferencing solutions are essential for most modern-day offices. Web conferencing keeps remote team members engaged, enables seamless collaboration, and connects your business on a more personal basis with partners and clients over the internet.

So, if you’re in the market for an online meeting platform, let’s discuss the six top must-have features.

1. Easy document sharing

Whether you’re chatting with a team member or meeting with a potential client, easy, in-built document sharing is a must. You shouldn’t have to resort to emailing an agenda, presentation, or brochure.

It’s also worth looking for flexible document sharing features as there may be times when you want to share a document with a select segment of video conference participants.

2. Flexible chat

All web conferencing software offers some sort of chat, giving attendees the ability to type messages, share links, and collaborate effectively. But some lack the flexibility to enable specific types of chat. For example, you may wish to send private messages to individual attendees, or you may need to moderate chat messages before they are visible to all participants.

3. Practical reporting tools

Practical reporting tools can give you access to the information you need (such as attendance and typed messages) to optimize your web conferencing practices. Even better, you should be able to export this data to your file sharing platform, a Microsoft Excel format or your CRM system.  

4. Desktop sharing

Screen sharing is an essential part of video conferencing, but it’s not as simple as mirroring your desktop. There are three key factors to consider:

  • Speed. Oftentimes, desktop sharing results in a drastic slowdown of your computer’s performance and can impact the quality and reliability of the video conference.
  • Power. Desktop sharing shouldn’t use up too much of your computer’s CPU, as this can also drastically reduce the quality and experience of your presentation.
  • Accessible. Desktop sharing should pass through most firewalls.

5. No software installs required

If you’re looking to work with an individual or group outside of your team, make it easy and convenient for remote collaborators and attendees to connect via video conferencing.

To do this, opt for a video conferencing platform that allows others to connect in minimal steps. For example, many platforms offer a browser-based option, so outside parties don’t need to download any software onto their devices.

6. Reliability

Reliability is perhaps the most important feature of any web conferencing solution. Regardless of tools and capabilities, if the platform you choose is unable to offer near 100% uptime and automatic correction of connectivity issues, it just isn’t worth it. 

Near-enough isn’t good enough when it comes to video conferencing. After all, what would you do if your video dropped out halfway through an important meeting or webinar?

Bonus tips for finding the right video conferencing solution for your business

Now that you know which features to keep an eye out for, here are some additional tips to ensure the video conferencing solution you choose meets your business needs. Your managed IT services provider can help you work through these tips.

1. How many participants will you be hosting?

Consider how many participants you will likely be hosting on a regular basis. Some services offer a cheaper rate for a web conferencing solution with a smaller attendee capacity. Other services specialize in large groups and options vary accordingly. If you don’t consider the number of participants you’ll be hosting, you could end up paying for features you don’t need or missing the ones you don’t have.

2. What types of meetings will you be hosting?

Do you need video conferencing software to connect remote team members to the central office? Or, do you need video conferencing software to host larger-scale webinars, Q&A forums, or sales presentations? If you host a variety of meeting types, look for a conferencing solution that can cater to all of these needs.

3. Is mobile experience important?

If it’s your remote team you are trying to connect, chances are that mobile compatibility is important. What’s more, if host regular webinars, offering your presentation on mobile could increase your attendance rate.

Is blockchain the antidote to all cybersecurity woes?

Blockchain has been turning heads since it was first unveiled in 2008 to become the backbone of then relatively unknown cryptocurrency, bitcoin. Since then, blockchain and Bitcoin have skyrocketed in public awareness, with the latter becoming the most successful cryptocurrency in history. A large portion of bitcoin's success is due to its blockchain infrastructure, which prevents the duplication of funds (preventing double-spending) and automatically time-stamps every transaction.

The developer (or developers) behind blockchain created the software to be resistant to alteration or hacking, making it one of the more inherently secure systems that companies can use to manage secure infrastructures. Some have heralded blockchain as the ultimate tool to promote cybersecurity and reduce the risk of data breaches.

Then bitcoin, in addition to several other cryptocurrencies, were hacked. According to CNN, the attack erased the equivalent of billions of dollars and sent the value of the affected cryptocurrencies plunging. The incident has many questioning just how secure blockchain is and whether the software was simply a temporary fix, like so many others, against the ever-present threat of cyberattacks.

"Blockchain can give each registered device a specific SSL certificate for authentication."

The case for blockchain
While buzzwords are common in the tech industry, there are several legitimate reasons why blockchain has been celebrated as a secure platform. According to Info Security Magazine, one of blockchain's primary appeals is its decentralized data storage. While users can access blockchain data on a computer or mobile device, the program itself is typically stored throughout the network.

If one access point – or block – is targeted by hackers, then the other blocks will react to it. The attempted cyberattack will likely alter the data on the block in a way that is immediately noticeable by the rest of the chain. This block will then simply be disconnected, isolating the malicious data before it can impact the system.

Another helpful advantage of blockchain is its effectiveness against dedicated denial of service attacks. These cyberattacks target the domain name system, flooding it with so much data traffic that it essentially shuts down. Using blockchain software would allow the DNS to spread its contents to more nodes, reducing the effectiveness of the DDoS attack before it reaches a crippling stage.

Networks using a blockchain infrastructure can also bypass the need for passwords in certain situations. Instead of using the human-oriented password system, blockchain can give each registered device a specific SSL certificate. This mode of authentication is a lot more difficult for outside sources to access, reducing the likelihood of a hack.

Removing dependence on passwords may sound less secure but it is actually seen as an improvement. Employees can be careless with their login information or choose passwords that can be easily deduced by third parties. Eliminating the human factor from authentication actually goes a long way by removing one of the most common exploit points.

However, no system is 100 percent secure.

The McAfee Report
While many companies preach the value of blockchain, global computer security software company McAfee recently released a critical report on the software, stating that industries have every reason to expect cyberattacks. McAfee looked at early blockchain adapters, namely cryptocurrencies, and studied the types of cyberattacks still occurring within these companies.

The report identified four primary attack types: implementation exploits, malware, phishing and general technology vulnerabilities. Certain cryptocurrencies themselves have been used to help the spread of advanced malware, including ransomware. Coin miner malware alone grew by 629 percent in the first quarter of 2018, according to McAfee data.

Cybercriminals have also been using cryptocurrencies to mask their identities, taking advantage of blockchain's secure features to help them evade the law.

Blockchain builds its infrastructure securely, but not in a manner that is invulnerable. Blockchain builds its infrastructure securely, but not in a manner that is invulnerable.

What companies can learn from the cryptocurrency attack
Lastly, however, the attack of the cryptocurrencies themselves should highlight the limitations of blockchain. While the program may be innately secure, it is not an excuse to abandon other forms of caution. Technology is spreading at a rapid pace with information security specialists struggling to catch up.

In short, blockchain should be seen as just another tool and not a cure-all for cyberattacks. Its architecture can be helpful but must be implemented in a thorough, professional manner. Even then, it should also be paired with other programs and employee training to best reduce the risk of cybercrime.