CIO Today HOME LATEST NEWS NEWSLETTERS SEARCH Search
  LATEST NEWS FOR TUESDAY MARCH 28

Close Search Box
CIO Today
COMPUTING
Cybersecurity: Why Conferences and Meetings Are at Risk
Posted January 18, 2017
Cybersecurity: Why Conferences and Meetings Are at Risk
Next Story
EARLIER
Microsoft Warns Businesses: Update to Windows 10 ASAP
THIS STORY
Cybersecurity: Why Conferences and Meetings Are at Risk
Next Story
LATER
Exec VP Reflects Microsoft's Strategy Shift on Business Dealings
YOU ARE HERE:   HOME arrow COMPUTING arrow THIS STORY
NEWS OPS

By Sue Pelletier. Updated January 18, 2017 7:42AM

SHARE

ALSO SEE

No one wants to think it could happen to them, but your chances of being hacked are growing every year. Here are five things you need to stop doing now to keep your meetings safer:

1. Allowing speakers to plug unknown presentation flashdrives into your system. Those flashdrives could pass on malware disguised as legitimate software, explained MaryAnne Bobrow, CAE, CMP, CMM, president of Bobrow Associates, and Jonathan Howe, Esq., founding partner and president of Howe and Hutton, Ltd., during a session at the American Society of Association Executives 2016 Annual Meeting. Make it mandatory that speakers have their flashdrives scanned for viruses. This could be done in the speaker-ready room.

2. Plastering your meeting’s Wi-Fi password all over the meeting venue. While it’s convenient to make the password obvious, it also makes it easy for cyber criminals to hack your system, said Bobrow and Howe. You may also want to remind attendees and vendors not to share the password with anyone who is not an official participant.

3. Using the hotel meeting passcode as your meeting’s Wi-Fi passcode. As technology meeting consultant Brandt Krueger says, “Even if the password is 12345 and you put it on every piece of paper in the venue, it’s still more secure than an open Wi-Fi.”

4. Allowing your staff members to download their own software. At the very least, train them on cybersecurity policies and procedures around downloading unapproved apps, both on their work devices and any personal device that could connect with a work device, that could pass along malware, said Bobrow and Howe.

5. Ignoring the issue. Burying your head in the sand only ensures that you’ll miss the early warning signs. Develop a policy and a plan for what you will do before, during, and after a breach, and train your staff so, should the worst occur, you know how to mitigate the risks.

© 2017 Corporate Meetings & Incentives syndicated under contract with NewsEdge/Acquire Media. All rights reserved.

Tell Us What You Think
Comment:

Name:

Ian Wright:
Posted: 2017-01-19 @ 12:13am PT
All of these are true. We have been facing such issues as well. We then got our selves an AV and a FW from a trusted source and PureVPN for all the IP issues.

MORE IN COMPUTING

Next Article >

INSIDE CIO TODAY NETWORK SITES SERVICES BENEFITS