5 Steps for Safer Online Meetings

17/02/22 Wavenet
5 Steps for Safer Online Meetings placeholder thumbnail

In a world where most of our working day, including meetings, is conducted online, it's now more important than ever to be mindful of working safely and securely.

 

Microsoft Teams has continued to offer new features and enhancements to help keep us safe. Whether hosting a meeting company-wide for 200 people or a one-on-one with your team these improvements prioritise safety and user experience.

 

Pre-adjust meeting settings

 

Queue the awkward silence as you are frantically trying to work out three different things: giving your team members presenter permissions, double-checking your attendance list, and searching for the “Start recording” button. Rather than reactively adjusting your settings in meeting, you can use Meeting options to start off on the right foot!


Microsoft has introduced several new features to help you manage your meetings. Now you can enable/disable mic and camera use for your attendees. This is particularly useful for encouraging participation during a whiteboarding session or focused listening during a presentation. You can also announce when callers join or leave, as well as record your meeting automatically to refer back to your meeting once it has ended.


To customize your meeting, access Meeting options by going to your Teams “Calendar” and selecting the meeting. At the top right of the page, click on “Meeting options” and a pop-up window with all the options will appear. You can also access this in your Outlook calendar by finding “Meeting Options” under the “Meeting” tab. A quick note: some Meeting option defaults are set by your IT department.

Increase productivity and limit distractions

 

Microsoft introduced meeting options to help you set up your meeting for success, but sometimes there are things you just cannot anticipate. For example, you scheduled a team meeting during lunch hours and notice chewing noises in the background - someone’s microphone is accidentally unmuted. Rather than wait as they scramble to find the mute button, you and other presenters can easily mute the participant, all participants, and now even manually disable their camera and/or microphone. This new feature is especially useful if you want to completely avoid distractions coming from someone’s audio or video throughout your entire meeting.


Another disruption might occur when someone you are not expecting is in your meeting, has overstayed their invitation, or is being distracting – you and other presenters can now remove the attendee. You can find these in-meeting controls by opening up “More actions” next to the attendee you want to manage and selecting the action needed.

Delegate meeting roles

 

There are times when you might be too busy presenting to look for the right button to mute someone, or maybe you have a meeting with 100 attendees and need more help than expected moderating the meeting lobby. In the event you have too much on your plate to search for the right settings, you can quickly promote a meeting attendee, such as a trusted team member, to a presenter role to support you. They will be able to admit attendees or mute unusual noises while you confidently lead your meeting.

 

To determine who will have access to presenter permissions, click on “More actions” next to the attendee and select the option to “Make a presenter”. Coming soon will also be the option to designate someone as a meeting “co-organiser”. A co-organiser will have almost all of the capabilities of the organiser, including adjusting meeting options. This role is especially useful for your larger meetings such as a company all-hands.

Remove participants

 

For those weekly team meetings, there may be times where you invite a guest to speak but do not want that one-time participant to have access to the rest of the meeting series. Especially during leadership reviews, if external guests are brought in to present, you want the contents of that meeting and chat kept internal afterwards.

 

You can prevent one-time participants from accessing future meetings and chat by removing them from your Teams calendar or Outlook calendar participants list. Double-click the meeting you are trying to manage and remove the participant from the list by clicking the “X” next to their name. Once removed, they will still be able to access all meeting information and chat history from when they were included in the meeting but will not see anything new.

 

In the case that you added the one-time participant to a recurring meeting, you should go into the meeting invite to check that the attendee has been removed from the series. This is important to check for in case your meeting or meeting series was forwarded without approval.

End meeting for everyone

 

Finally, your meeting is over but you notice a few people are still hanging around in the call. They could have a question for you, or they might not have noticed the meeting has ended. In the latter case, instead of waiting for them to leave, you can wrap up the meeting for everyone by ending the meeting for all. This is a great way to ensure that for larger presentations – such as briefings or lectures – students and other attendees don’t hang around in the meeting room after it has ended.


To end the meeting for all attendees, simply click on the drop-down arrow next to the “Leave” button and select “End meeting”. Once confirmed, the meeting will end for everyone in attendance right away.

Unified Communications & Voice, Security & Compliance, Microsoft, Articles, Microsoft Teams

Latest blogs

See all posts
Placeholder thumbnail
Boardroom vs breach: 20 questions every IT leader should be asking about cyber security

Cyber threats are evolving faster than most organisations can keep up. Between new attack techniques, expanding digital estates, and the cyber skills shortage, even well-equipped IT teams are struggling to stay ahead. It’s no longer enough to tick compliance boxes or to simply deploy the latest tools. Real security starts with asking the right questions and acting on the answers. That’s why we’ve created Boardroom vs Breach, a 20-question self-assessment designed to help IT leaders and those responsible for cyber-security take a clear-eyed look at your current security posture, highlight blind spots, and spark critical conversations at board level. Why this matters The cost of a cyber breach isn’t just downtime – it’s trust, reputation, compliance fines, and lost revenue. Yet many companies don’t know if their defences are actually up to the task – do you? These 20 questions aren’t about theory; they reflect real-world weak points that we see every day. If you can’t answer them confidently, we can help. The 20 questions you need to answer Visibility & monitoring Do you have complete visibility of your IT assets? What visibility do you have into incidents and events across your infrastructure? How do you manage your security tooling? How many different tools are you running — and are they working together? Are your systems and endpoints patched regularly? Our advice: Gaining complete visibility starts with consolidating event data, automating alerts, and ensuring continuous oversight across your entire estate. Take a look at: Security Information and Event Management Vulnerability Management Managed Detection and Response Threat detection & response What happens if an incident occurs after hours? How do you find out? Who responds? When was your last penetration test? How regularly do you conduct them? What protections are in place for endpoints, email, and networks? What level of visibility do you have into potential breaches? Do you work with a partner that offers 24/7/365 response and real-world support? Our advice: Improve threat visibility and reduce response times by combining real-time monitoring with expert-led incident analysis and containment. Take a look at: 24/7/365 Managed Detection and Response Incident Response Retainers Penetration Testing and Red Teaming Cloud & modern IT risk Do you use public cloud services? Are you confident in how they’re secured? How do you manage and secure user devices remotely? What vendors are you currently relying on — and are they right for your risk profile? How do you secure your network beyond the firewall? Our advice: Extend visibility beyond the traditional perimeter by applying cloud-native monitoring, endpoint telemetry, and policy-based access control. Take a look at: Cloud Security Assessments Secure Access Service Edge (SASE) Endpoint Detection and Response (EDR) People, process & planning How are your users trained to detect attacks such as phishing? Do you have access to expert help in a crisis? What cyber expertise exists in-house — is there a dedicated security leader? How do you create a positive security culture, not just rules? What threats are most relevant to your industry? Are you meeting required regulations and compliance standards? Our advice: Build better situational awareness by aligning people and processes with continuous monitoring and clearly defined escalation paths. Take a look at: Security Awareness Training Virtual CISO Services Compliance and Risk Consulting And a bonus question, with potentially the most worrying answer of all… What would a breach cost your business — financially and operationally? Putting it all together While individual solutions can address specific security challenges, working with a trusted managed services and security partner ensures cohesive, round-the-clock support across every aspect of your cyber security posture — delivering greater efficiency, resilience, and long-term value. We work with IT and security leaders across all sectors to assess risk, build resilient cyber strategies, and deliver comprehensive protection that scales with your business. From real-world penetration testing to 24/7/365 threat detection, cloud security, and expert consultancy, we’re your trusted partner in securing the ‘now’ — and preparing for what’s next.

Read more

Stay service-savvy

Get all the latest news and insights straight to your inbox.