{"id":16552,"date":"2020-04-28T13:48:12","date_gmt":"2020-04-28T17:48:12","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/videoconference-software-security\/16552\/"},"modified":"2020-09-02T21:31:18","modified_gmt":"2020-09-02T17:31:18","slug":"videoconference-software-security","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/videoconference-software-security\/16552\/","title":{"rendered":"The problems with videoconferencing apps"},"content":{"rendered":"<p>#stayhome is not just a popular tag around social networks these days, but also a harsh reality for businesses forced by the coronavirus pandemic to send most of their staff home to work remotely. Face-to-face meetings have been replaced by video calls. But corporate conferences are there to discuss more than just the weather, so before you commit to a videoconferencing app, take a look at its data protection mechanisms. \u00a0To be clear, we have not conducted lab-based testing on these apps; we browsed publicly available sources for information about known problems in the most widely used software.<\/p>\n<h2>Google Meet and Google Duo<\/h2>\n<p>Google offers two video call services: Meet and Duo. The first is an app that integrates with Google\u2019s other services (the G Suite). If your company uses those, Hangouts Meet will fit in nicely.<\/p>\n<h4>Security \u2014 Google Meet<\/h4>\n<p>Among Meet\u2019s advantages, <a href=\"https:\/\/gsuite.google.com\/products\/meet\/\" target=\"_blank\" rel=\"noopener nofollow\">the vendor cites<\/a> reliable data-processing infrastructure, encryption (not end-to-end, though) and a set of protection tools, all active by default. Like most other business products, G Suite, including Google Meet, conforms to advanced security standards and offers configuration and access-rights-management options among its <a href=\"https:\/\/support.google.com\/a\/answer\/7582940?hl=en\" target=\"_blank\" rel=\"noopener nofollow\">features<\/a>.<\/p>\n<h4>Security \u2014 Google Duo<\/h4>\n<p>The mobile app <a href=\"https:\/\/support.google.com\/duo\/answer\/6376137?hl=en&amp;ref_topic=6376099\" target=\"_blank\" rel=\"noopener nofollow\">Duo<\/a>, on the other hand, protects data using end-to-end encryption. However, it is an application designed for private users, not for businesses. Its conferences can accommodate only up to 12 participants.<\/p>\n<h4>Vulnerabilities and downsides<\/h4>\n<p>Other than some messages reminding us all that Google collects user data and therefore can be a threat to trade secrets we were unable to find concrete information about these apps\u2019 security performance. That does not mean that Google services are flawless, but they are backed by a very strong security team that tends to fix problems before they cause any trouble.<\/p>\n<h2>Slack<\/h2>\n<p>In Slack, you can create multiple chat workspaces for teams, conveniently shown in one window, plus channels inside your workspace dedicated to different projects. Conferencing is limited to 15 participants.<\/p>\n<h4>Security<\/h4>\n<p>Slack complies with <a href=\"https:\/\/slack.com\/intl\/en-ru\/security\" target=\"_blank\" rel=\"noopener nofollow\">a bunch of international security standards<\/a>, including SOC 2. The service can be configured to work with medical and financial data and allows companies to select a region for data storage. And joining a Slack workspace <a href=\"https:\/\/slack.com\/intl\/en-ru\/help\/articles\/212675257-Join-a-Slack-workspace\" target=\"_blank\" rel=\"noopener nofollow\">requires either an invitation or an e-mail address using the corporate domain<\/a>.<\/p>\n<p>Slack also offers its customers flexible risk management instruments, integration with Data Loss Prevention (DLP) solutions, and data-access-control tools. For example, administrators can <a href=\"https:\/\/slack.com\/intl\/en-ru\/resources\/why-use-slack\/slacks-enterprise-security-features?eu_nc=1\" target=\"_blank\" rel=\"noopener nofollow\">restrict<\/a> the use of Slack from personal devices and the copying of information from its channels.<\/p>\n<h4>Vulnerabilities and downsides<\/h4>\n<p>According to Slack\u2019s developers, <a href=\"https:\/\/www.computerworld.com\/article\/3368503\/slack-rolls-out-enterprise-key-management-but-has-no-plans-for-end-to-end-encryption.html\" target=\"_blank\" rel=\"noopener nofollow\">only a limited number of businesses<\/a> really need end-to-end encryption, and implementation of the feature can limit functionality. Therefore, Slack apparently has no plans to add end-to-end encryption.<\/p>\n<p>Slack also lets you integrate third-party apps, whose security is not Slack\u2019s responsibility.<\/p>\n<p>Also, researchers have found vulnerabilities \u2014 serious ones \u2014 in Slack. Slack has patched the following: a bug that <a href=\"https:\/\/www.techrepublic.com\/article\/slack-vulnerability-allows-attackers-to-intercept-modify-downloads\/\" target=\"_blank\" rel=\"noopener nofollow\">allowed attackers to steal data<\/a> and one enabling <a href=\"https:\/\/www.securityweek.com\/slack-vulnerability-allowed-hackers-hijack-accounts\" target=\"_blank\" rel=\"noopener nofollow\">interception of a user\u2019s session<\/a>.<\/p>\n<h2>Teams<\/h2>\n<p>Microsoft Teams integrates with Office 365, which is its main advantage for a corporate user. In response to the increased demand for work from home tools, Microsoft is now offering a free six-month Microsoft Teams trial, but free users will <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/differences-between-microsoft-teams-and-microsoft-teams-free-0b69cf39-eb52-49af-b255-60d46fdf8a9c?ui=en-us&amp;rs=en-us&amp;ad=us\" target=\"_blank\" rel=\"noopener nofollow\">not be able to configure<\/a> user settings and policies \u2014 a potential security compromise.<\/p>\n<h4>Security<\/h4>\n<p>Teams <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/security-compliance-overview\" target=\"_blank\" rel=\"noopener nofollow\">complies<\/a> with a number of international standards, can be set up to work with confidential medical data, and boasts flexible security management options. Under some service plans, additional tools, such as DLP or outgoing file scanning, can be integrated into Teams. <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/microsoft-office-365-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kso365___\" target=\"_blank\" rel=\"noopener nofollow\">Our solution for protecting MS Office 365<\/a> scans the data exchanged through Teams to prevent malware from spreading through the corporate network.<\/p>\n<p>Data sent to the server, whether chats or video calls, is encrypted, but again we are <em>not<\/em> talking about end-to-end encryption. Speaking of storage and processing, the information never leaves the region in which your company operates.<\/p>\n<h4>Vulnerabilities<\/h4>\n<p>It is a good idea to monitor vulnerabilities in Teams. Microsoft typically patches vulnerabilities quickly, but they do arise from time to time. For example, <a href=\"https:\/\/threatpost.com\/single-malicious-gif-opened-microsoft-teams-to-nasty-attack\/155155\/\" target=\"_blank\" rel=\"noopener nofollow\">researchers recently found a vulnerability<\/a> (since patched) that enabled account takeover.<\/p>\n<h2>Skype for Business<\/h2>\n<p>The cloud version of <a href=\"https:\/\/docs.microsoft.com\/en-us\/SkypeForBusiness\/skype-for-business-online\" target=\"_blank\" rel=\"noopener nofollow\">Skype for Business<\/a> \u2014 the predecessor of Teams in Office 365 \u2014 is gradually becoming a thing of the past, but you can still <a href=\"https:\/\/docs.microsoft.com\/en-us\/SkypeForBusiness\/skype-for-business-server-2019\" target=\"_blank\" rel=\"noopener nofollow\">install it locally<\/a>. Some users find it more convenient than Teams, and Microsoft will continue to support the local version of Skype for the next couple of years.<\/p>\n<h4>Security<\/h4>\n<p>Skype for Business encrypts information, but not end-to-end, and the service\u2019s protection is configurable. It also uses local server software, so video calls and other data never leave the corporate network \u2014 an obvious advantage.<\/p>\n<h4>Vulnerabilities and downsides<\/h4>\n<p>The product won\u2019t be supported forever. Unless Microsoft changes its plans, support for the application will end in July 2021, and Skype for Business Server 2019 will be on extended support until October 14, 2025.<\/p>\n<h2>WebEx Meetings and WebEx Teams<\/h2>\n<p>Cisco WebEx Meetings is quite a narrow-focus service for videoconferencing.\u00a0 Cisco WebEx Teams is a full-featured coworking service that, among other things, supports video calls. As far as the scope of this post, the difference is in encryption approach.<\/p>\n<h4>Security<\/h4>\n<p>Cisco WebEx Meetings includes business-class services and end-to-end encryption. (The option is off by default, but <a href=\"https:\/\/help.webex.com\/en-us\/WBX44739\/What-Does-End-to-End-Encryption-Do\" target=\"_blank\" rel=\"noopener nofollow\">the provider will activate it<\/a> on request. Doing so somewhat limits the utility\u2019s functionality, but if your employees deal with confidential information in meetings, it is certainly a good option to consider.) Cisco WebEx Teams provides end-to-end encryption <a href=\"https:\/\/help.webex.com\/en-us\/vf2yaz\/Cisco-Webex-Teams-App-Security\" target=\"_blank\" rel=\"noopener nofollow\">only for correspondence and documents<\/a>;, whereas video and audio calls are decrypted at Cisco\u2019s servers.<\/p>\n<h4>Vulnerabilities and downsides<\/h4>\n<p>Only this March, the vendor patched <a href=\"https:\/\/threatpost.com\/high-severity-cisco-webex-flaws-fixed\/153462\/\" target=\"_blank\" rel=\"noopener nofollow\">two WebEx Meetings vulnerabilities<\/a> threatening remote execution of code. And early last year, a serious bug was found in <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190123-webex-rce\" target=\"_blank\" rel=\"noopener nofollow\">WebEx Teams client<\/a>. It allowed the execution of commands with the current user\u2019s privileges. Cisco is known to be serious about security, though, and updates its services quickly.<\/p>\n<h2>WhatsApp<\/h2>\n<p>WhatsApp was built for social communication, not business, but the free app can cover the videoconferencing needs of small companies or teams. The program is not suitable for large business; videoconferencing is available <a href=\"https:\/\/faq.whatsapp.com\/en\/android\/26000026\" target=\"_blank\" rel=\"noopener nofollow\">only for up to four participants at a time<\/a>.<\/p>\n<h4>Security<\/h4>\n<p>WhatsApp has the indisputable advantage of <a href=\"https:\/\/www.whatsapp.com\/security\/\" target=\"_blank\" rel=\"noopener nofollow\">true end-to-end encryption<\/a>. That means neither third parties nor WhatsApp\u2019s employees can view your video calls. But unlike business apps, WhatsApp offers almost no chat and call security management options, only what\u2019s built in.<\/p>\n<h4>Vulnerabilities and downsides<\/h4>\n<p>Just last year, <a href=\"https:\/\/www.kaspersky.com\/blog\/whatsapp-call-zeroday\/\" target=\"_blank\" rel=\"noopener nofollow\">attackers distributed Pegasus spyware<\/a> through WhatsApp video calls. The bug was fixed, but remember, the app is not meant to offer business-class protection, so at the very least, users should follow cybersecurity news carefully.<\/p>\n<h2>Zoom<\/h2>\n<p>The cloud-based videoconferencing platform Zoom has been in the news since the beginning of the epidemic. Its flexible pricing (with free 40-minute conferences up to 100 participants) and user friendliness have attracted tons of users, but the platform\u2019s foibles have also attracted <a href=\"https:\/\/www.kaspersky.com\/blog\/zoom-security-ten-tips\/34729\/\" target=\"_blank\" rel=\"noopener nofollow\">tons of attention<\/a>.<\/p>\n<h4>Security<\/h4>\n<p>The service complies with the <a href=\"https:\/\/www.kaspersky.com\/blog\/soc2-audit\/\" target=\"_blank\" rel=\"noopener nofollow\">SOC 2<\/a> international security standard, offers a separate HIPAA-compliant service plan for health-care providers, and has flexible configuration. Session organizers can block out participants even if they have the right hyperlink and password, ban recording, and more. If needed, Zoom can be set up in such a way that no traffic leaves the company.<\/p>\n<p>Zoom has been actively addressing reported vulnerability issues, and the company says it plans to <a href=\"https:\/\/www.digitaltrends.com\/computing\/zoom-privacy-feature-freeze-active-users\/\" target=\"_blank\" rel=\"noopener nofollow\">prioritize product security<\/a> over adding new features.<\/p>\n<h4>Vulnerabilities and downsides<\/h4>\n<p>Zoom claims to have implemented end-to-end encryption, but the claim is not quite justified. With end-to-end encryption, no one other than the sender and the recipient can read transmitted data, whereas Zoom <a href=\"https:\/\/theintercept.com\/2020\/03\/31\/zoom-meeting-encryption\/\" target=\"_blank\" rel=\"noopener nofollow\">decrypts video data on its servers<\/a>, and <a href=\"https:\/\/www.businessinsider.com\/china-zoom-data-2020-4\" target=\"_blank\" rel=\"noopener nofollow\">not always in your company\u2019s home country<\/a>, either.<\/p>\n<p>Vulnerabilities of varying severity have been discovered in Zoom applications. Zoom\u2019s <a href=\"https:\/\/twitter.com\/hackerfantastic\/status\/1245133371262619654\" target=\"_blank\" rel=\"noopener nofollow\">Windows<\/a> and <a href=\"https:\/\/twitter.com\/SymbianSyMoh\/status\/1245319353932922881\" target=\"_blank\" rel=\"noopener nofollow\">macOS<\/a> clients were reported to have a bug (already <a href=\"https:\/\/www.pcworld.com\/article\/3535373\/report-hackers-can-steal-windows-credentials-via-links-in-zoom-chat.html\" target=\"_blank\" rel=\"noopener nofollow\">fixed<\/a>) that let hackers steal the computer\u2019s account data. <a href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2020\/04\/01\/zoom-users-beware-heres-how-a-flaw-allows-attackers-to-take-over-your-mac-microphone-and-webcam\/#77bdbbb62fbe\" target=\"_blank\" rel=\"noopener nofollow\">Two more bugs in the macOS app<\/a> potentially allow attackers to completely take over the device.<\/p>\n<p>In addition, many reports surfaced of <a href=\"https:\/\/techcrunch.com\/2020\/03\/17\/zoombombing\/\" target=\"_blank\" rel=\"noopener nofollow\">Internet trolls<\/a> visiting open conferences, unprotected with passwords, to post dubious comments and share screens with obscene content. On the whole, you can fix the problem by <a href=\"https:\/\/www.kaspersky.com\/blog\/zoom-security-ten-tips\/\" target=\"_blank\" rel=\"noopener nofollow\">configuring your conference<\/a> properly, but Zoom has also <a href=\"https:\/\/support.zoom.us\/hc\/en-us\/articles\/360033331271-Account-Setting-Update-Password-Default-for-Meeting-and-Webinar\" target=\"_blank\" rel=\"noopener nofollow\">added default password protection<\/a> to be on the safe side.<\/p>\n<p>Amid news of security issues in Zoom, large players have disparaged the service. But all services have vulnerabilities, and in Zoom\u2019s case, explosive popularity has brought tremendous scrutiny.<\/p>\n<h2>Choose the app that suits you best<\/h2>\n<p>There is no such thing as a perfectly secure videoconferencing app \u2014 or any other kind of app, for that matter. Choose a service whose downsides are not problematic for your business. And remember, choosing the right app is only step 1.<\/p>\n<ul>\n<li>Take the time to properly configure the service. Permissive settings have enabled many a leak.<\/li>\n<li>Update your apps promptly to seal vulnerabilities as soon as possible.<\/li>\n<li>Make sure your employees have at least basic safe Internet behavior skills. If not, arrange for a remote training class through our <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a><\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>How secure are the most popular videoconferencing apps?<\/p>\n","protected":false},"author":2509,"featured_media":16555,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[2260,2254,2259,2282],"class_list":{"0":"post-16552","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-remote-work","10":"tag-remote-working","11":"tag-telecommuting","12":"tag-videoconferencing"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/videoconference-software-security\/16552\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/videoconference-software-security\/20980\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/videoconference-software-security\/8182\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/videoconference-software-security\/21703\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/videoconference-software-security\/19851\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/videoconference-software-security\/18578\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/videoconference-software-security\/22549\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/videoconference-software-security\/21507\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/videoconference-software-security\/28287\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/videoconference-software-security\/8182\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/videoconference-software-security\/35196\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/videoconference-software-security\/14763\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/videoconference-software-security\/15125\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/videoconference-software-security\/13407\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/videoconference-software-security\/23861\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/videoconference-software-security\/28229\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/videoconference-software-security\/25365\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/videoconference-software-security\/22190\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/videoconference-software-security\/27455\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/videoconference-software-security\/27291\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/remote-work\/","name":"remote work"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2509"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=16552"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16552\/revisions"}],"predecessor-version":[{"id":16598,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16552\/revisions\/16598"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16555"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=16552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=16552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=16552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}