• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Facility, Network Security, News

Locking Up Data: Simple Security Measures to Implement in Meeting Spaces

Today's meeting spaces feature a number of technologies connected to the network. Sensitive information is shared, and you need to make sure that your meeting security is up to par to keep it safe.

April 30, 2019 Phil Marechal Leave a Comment

Meetings today need to happen at the speed of business. This means users have to be able to quickly start and intuitively run meetings from any place, device, and platform. For organizations, there are many productivity and cost benefits for ensuring a conference experience that’s unfettered by cumbersome and poor-quality technology. In the quest for immediacy, however, participants can put data at risk easily and unknowingly. Typically, the job of ensuring data security has fallen to IT. Although heavy-lifters in securing the network, when it comes to safeguarding sensitive, confidential, or proprietary organizational data, the first line of defense involves everyone in the organization. In the conference room and other meeting places, there are some pragmatic steps end-users as well as integrators can take for best practices:

First, information that is exchanged during a confidential conversation, such as one around an HR issue or a company restructuring, needs to be restricted to select participants. Documents created in common applications such as such as Excel, PowerPoint, and Word, feature native tools that are often overlooked in providing a basic but valuable measure in security. Spreadsheets and word processing documents can be password protected while PowerPoints and similar files can be assigned permission levels for each user from the information rights management (IRM) profile.

Similar to digital right management (DRM) of the consumer world, IRM concentrates specifically on the protection of confidential or proprietary content for business purposes and helps enforce corporate policy governing the control and dissemination of that information. An IRM profile is even passed along in video and web conferencing platforms. For example, if a document is restricted to only a specific group of authorized people, the system will turn black upon transmission and prevent that it from being shared on another screens. While it’s certainly confusing when it happens, it limits content consumption from unintended audiences and puts security at the forefront.

The second area at risk is acoustical security. In most meeting spaces, it’s not uncommon for voices to leak out of the room and be heard by anyone nearby. Organizations can remedy this by adding seals around the door, or in more crucial cases, install a Yamaha sound masking system. Sound masking solutions generate sound that confuses intelligibility and prevents audio from carrying down the hall. One thing to keep in mind is that this impacts more than just the conference room environment. If sensitive information is being exchanged frequently in other areas, such as an executive office, sound masking or other acoustical barriers need to be considered here as well.

The third aspect is cloud security. Often with web conferencing, content is being streamed into cloud servers where it’s processed and resent without encryption. No matter what conferencing platform is being utilized, it is best practice for corporate IT departments and AV integrators to know the data retention policy of the server company. They should ask and know if data is encrypted once it is on the server. Typically, calls are recorded as MP3 files, which can be played by anyone with an MP3 player once they have the file. AV integrators can help customers by installing equipment that assures encryption and following up with the customer on how their web-based cloud collaboration service saves recorded data.

As the face of communications has evolved, Philip Marechal, VP of Business Development and Product Management at Yamaha Unified Communications has help steer the direction for product and technology enhancements. He draws upon his experience as a Cisco TelePresence product manager who helped earned four system patents and first experimented with AI as the integration of voice-activated calling — one of the early steps into AI for enterprise communication. He also brings with him knowledge from his extensive network and insightful dialogue with key technology partners.

In addition, AV integrators can partner with IT administrators to help enforce a company’s authentication and security practice framework, which should be applied globally to wide array of technologies and applications being used in the meeting todays. Like email, videoconferencing platforms and cloud services, such as file-sharing program, should be password protected, updated regularly, and utilize with strong passwords, i.e. capital letters, numbers, and special characters. Although these passwords are a nuisance for employees to remember, they’re effective against potential hacks. The maturation of AI will be of benefit in this area by automatically monitoring passwords and providing proactive alerts for updates and potential breaches.

In this day in age, data security is vital, but everyone can contribute. Businesses and other organizations can put their best foot forward by ensuring their users are following these simple best practices globally, starting with the tools that are readily available to them and examining how information is shared through the ranks. As organizations prioritize and train users, it’ll become as second nature as locking the front door before leaving home, making it more difficult to access data without a key.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Security, Meeting Space

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.