Security is extremely important when it comes down to webinars. But security quickly becomes a technical issue, with terms like encryption, data transmission and hosting. Here are the eight most important questions about webinar security, answered simply and clearly.
1. Why is security so important?
This may seem obvious, but it’s important to think about. What if all of a sudden all the participants’ data are out on the street? Or someone hacks into the broadcast? As a company, you obviously don’t need that. That is why we go for maximum security, without losing sight of ease of use.
2. Where is my data stored?
We store data in a central location, a closed data centre in Europe. The data can only be accessed by designated employees of Online Seminar.
3. Who has access to my data and that of the viewers?
Only people with a direct interest are granted access, such as the director, the moderator and the relevant employees of the company that hosts the webinar. We use a system of roles and rights; depending on which role you have, you get rights to a part of the data. Access to data is always logged. Viewers only have access to their own account.
4. How is the data encrypted?
We follow the highest standards in our industry and use the latest technical options where possible. Data is further encrypted at different times and in different ways. None of the encryption is the same: during transport between the person and the server or database, when the data is stored and when it is backed up. Each time, we use a different encryption.
5. What is the importance of verifying accounts via e-mail addresses?
With the verification of e-mail addresses we know that the right person is linked to an e-mail address. The e-mail address must exist so that invitations and contact moments are sent to the right person. Furthermore, the e-mail address is also important in order to be able to reset the account if necessary.
6. What does it mean that Online Seminar is ISO certified?
Online Seminar is ISO 27001 certified. ISO 27001 is the standard for information security. This international standard has strict requirements for security measures. To meet this ISO norm, an organisation is obliged to set up and record adequate security measures. The aim is to protect information and offer confidence to stakeholders. Because we are ISO certified, you can be sure that we have implemented security in all aspects of our organisation. We are audited annually. We do this ourselves, but an audit is also compulsory and is carried out by an independent, accredited party.
7. What are pen tests and why are they carried out?
Pen tests stand for penetration tests. These are tests to test and scan our own systems to see if there are any weaknesses. If weaknesses are found, we can quickly remedy them and thus ensure security.
8. Do we make back-ups, in what way and how often?
We make back-ups continuously. In the event of a failure, you want to limit the loss of data as much as possible. Backups are stored in our data centre. In addition, the backups are also stored heavily encrypted at another secret location, in case something should happen to our data centre. This ensures that we always have access to the latest data and can guarantee continuity.