Conference Call Security

Every business is concerned with security or at least should be. This is especially true when using the Internet. Protecting networks, computers, email, and software applications from the ever-present threat of virus and worm infection is part and parcel of doing business in a connected world.

And of course it goes without saying that physical security such as door locks, access codes and security badges are standard operating procedures at all organizations that take themselves seriously.

The passage of the Sarbanes-Oxley Act of 2002 has made such security and auditing procedures a requirement for anyone doing business. However, an area where many organizations let their guard down is with conference call security.

Would you let your key competitor sit in on a new product strategy meeting? This can very easily happen if an unscrupulous competitor obtained the access code and call-in number to one of your conference calls. Industrial espionage isn