Video Meetings

Watch the video from our Video Meetings course, where Linda accidentally shares confidential information in her video conference.

You can access the entire course on our e-learning platform by logging in here.
If you do not have an account, you can try it for free.

The course

About the course

This course will take you through the risk of data breaches when sharing your screen during a video conference. This can happen if you forget to close background applications, files, and windows that contain confidential information or personal data before the meeting.

Hjemmearbejde

Want to learn more?

With working from home becoming more of a norm, video meetings have become a vital tool in many organisations. During these videos, we can accidentally leak some confidential or private information. In this blogpost, we will give you a few tips on how to avoid security breaches in video meetings.

Want to learn more?

With working from home becoming more of a norm, video meetings have become a vital tool in many organisations. During these videos, we can accidentally leak some confidential or private information. In this blog, we will give you a few tips on how to avoid security breaches in video meetings.

Hjemmearbejde

Other material

We have created some posters regarding the topic of video meetings. You can download the posters and hang them on your walls in your organisation.

In this way your employees willl be reminded of what to be aware of when they see a the posters.

video meetings posters

Related courses

Update 2.0
Category: Cyber security

Updates

Learning objectives: Why updates are necessary for good IT security, and what you need to be aware of in relation to updates

Read More »
Processing personal data

Processing personal data

Learning objectives: What processing means in relation to personal data, when exactly you process data and what it means to grant other people access to personal data

Read More »
Top

Contact us

You are always welcome to contact us
for an initial and informal chat about your cyber security challenges.