On 11-15 June, TrueConf took part in CeBIT Hannover 2018. As a part of the show, the company introduced next generation of client applications for Windows, macOS and Linux. The new applications are equipped with advanced collaboration tools and UI and provide effective conference management features.
With new version, TrueConf users can share their desktop or separate applications along with their self-view thanks to picture-in-picture mode (PIP). PIP allows users to share their content without losing the visual part of the video chat. Additionally, simultaneous sharing of content and video also works on legacy video conferencing endpoints which do not support content sharing.
One of the most anticipated features of TrueConf 7.3 is virtual background technology that allows you to display an image as your background during the conference. The new feature works correctly with plain colors (except skin tones) and is perfect even for painted office walls. With TrueConf, you can brand your real background to meet your needs.
Current release also features other important functions. Video call and conference recording has been added to the arsenal of collaboration tools. Users can copy images from clipboard directly into chat and view all group and personal conversations. Finally, TrueConf 7.3 supports remote control of user devices during group video conferences, including PTZ cameras.
“We are proud to present next generation of TrueConf cross platform applications equipped with UltraHD video conferencing and modern collaboration tools”, — says Dmitry Odintsov, Chief Business Development Officer at TrueConf. “We believe that currently on the market there are no analogues for our solution in terms of performance and functionality. TrueConf 7.3 will soon be integrated into TrueConf Server 4.4, replace our legacy app and become major video conferencing software for our customers.”
TrueConf 7.3 for Windows is available for download on TrueConf website.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.