How to Protect Your Meeting from Cyber Threats

How to Protect Your Meeting from Cyber Threats

As he began his presentation on cyber security at meetings, Michael Robinson showed a slide to the audience. “Recognize this?” he asked. We all did. It was the landing page for logging in to the hotel’s Wi-Fi network, with fields for a guest’s last name and room number. Robinson then told us that the page was a fake, one he’d set up within 15 minutes of getting into his hotel room. And with a router the size of a deck of cards, he could have quickly set up a

Register to view the full article

Register for and gain access to premium content including the CMI 25 Listing, our monthly digital edition, the MeetingsNet app, live and on-demand webinars, and much more.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.