Skip navigation
How to Protect Your Meeting from Cyber Threats

How to Protect Your Meeting from Cyber Threats

As he began his presentation on cyber security at meetings, Michael Robinson showed a slide to the audience. “Recognize this?” he asked. We all did. It was the landing page for logging in to the hotel’s Wi-Fi network, with fields for a guest’s last name and room number. Robinson then told us that the page was a fake, one he’d set up within 15 minutes of getting into his hotel room. And with a router the size of a deck of cards, he could have quickly set up a

Register to view the full article

Register for and gain access to premium content including the CMI 25 Listing, our monthly digital edition, the MeetingsNet app, live and on-demand webinars, and much more.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.