Posts by Category

man on a computer in his living room
How to co-edit using screen sharing

What do you most closely associate with screen sharing?

Perhaps the inescapable phrase, “Can everyone see my screen?” is the first thing to spring to mind, or maybe you recall all the slide deck walk-throughs you sat through in the past. But with the right software, screen sharing can be much more convenient and versatile than either of those associations would imply.

In a screen sharing solution, you can also synchronously coedit documents, which is a major upgrade from the old back-and-forth of exchanging emails and navigating through tracked changes. By taking advantage of the real-time collaboration features of screen sharing software, workers in and out of the office can more easily get on the same page, understand feedback, and produce an agreed-upon version of the assets in question.

How does coediting work on a screen share platform?

Screen sharing is a great opportunity for all participants in the session to see and contribute to a document at the same time. The workflow itself will vary based on the platform being used, but generally the process is pretty straightforward:

  1. The presenter pulls up a text document, spreadsheet, presentation, or other asset (e.g., a code repository) on their device.
  2. They then share it with the others in the meeting, either by sharing their entire screen or just that particular piece of content.
  3. The presenter can take feedback from viewers on what needs to be changed or added. Alternatively, multiple participants can pull up the same document, like a file in SharePoint Online or Google Drive, and work on it in parallel during the meeting.
  4. After the screen share session ends, the meeting organizer can send a recording of it to everyone. They can also re-share the edited document in a messaging channel such as Webex Teams and, with the right permissions enabled, have it open in an appropriate application for further work.

In some cases, a team may choose only to perform the fourth step, opting to do all edits outside of a dedicated meeting with a screen share session. However, there are some distinct advantages to setting up a screen share, especially as more workers begin operating outside of traditional corporate offices.

Why should you use a screen share for coediting?

Screen sharing isn’t just for presenting or lecturing. As a form of real-time collaboration, it’s also a great forum for exchanging ideas and implementing feedback. Let’s dig into some of the specific reasons for editing via a free screen share:

Fewer runarounds and delays

We mentioned emails and documents with tracked changes earlier, as both are staples of most modern editing workflows. Even when someone makes a small update to a shared Google Doc, for instance, contributors usually find out via an email. Keeping track of everything can be taxing. McKinsey & Company has estimated that professionals spend 28% of their time each week on email.

Screen sharing can simplify the editing workflow, in turn reducing the amount of email to sort through. Meeting participants can see the latest changes and suggestions being made in real time and ask questions on the spot, instead of needing to request clarification later or search their inbox for the right version to follow.

Integrated audio and video

Sometimes it can feel like you’re stuck or at a loss for how to proceed with a document, whether it’s a heavily edited version of a PDF or something like a repository of computer code in need of some big updates. This situation can lead to setting up a separate call to go through the next steps — but why not eliminate this extra stage and get direct guidance while you have your collaborators on the line?

In a screen share, you can do more than just share content. You can also interact via high-quality audio and video, allowing for more nuanced communications than email exchanges would ever enable. The integrated video, audio, and content sharing in a platform like Webex makes it easier to avoid subsequent rounds of edits and costly miscommunications.

An officelike experience from any location

Opening up a document to begin applying edits or comments, or to accept or reject someone else’s, can feel very impersonal. If you’re working remotely, it can seem like you’re on an island, far removed from what everyone else is thinking and doing.

Indeed, loneliness is a frequently cited challenge among telecommuters, being at the top of the list of remote work challenges in a 2020 Buffer survey. But with a screen share, workers can feel like they’re all together collaborating in the same space, even if they’re still physically far apart:

  • The screen share itself can simulate the feeling of a presentation or conference room discussion.
  • The high-quality audio allows participants to discuss feedback and changes as they happen.
  • Video can allow for additional clarity, for example in the form of a visual demo or simply through a presenter’s body language and reactions.

Upgrade your screen sharing experience

Screen sharing is a versatile mode of collaboration, with utility far beyond the standard slide-based presentation.

Get started with Webex for free today

Learn more

Screen sharing how-to guide: Tips for better real-time collaboration

Personalize your team meetings with these top four screen sharing features

Why screen sharing works better for sales than traditional conference calls

Still need help?

Join a Webex online meeting

Learn more about Webex, join one of our upcoming training sessions

Explore daily product demonstrations

Best Practices: How to Work Remotely [Live Class]

Sign up for Webex

Visit our home page or contact us directly for assistance.

Read more
Healthcare and cyber security
What healthcare providers should do this National Cybersecurity Awareness Month

Challenges for healthcare providers

October is National Cybersecurity Awareness Month (NCSAM) each year in the U.S. The 2020 edition is the 17th annual NCSAM, and although it continues a long tradition of attempting to boost public awareness of common threats — this year’s theme is “Do Your Part. #BeCyberSmart”* — it’s also an occasion unlike any of its predecessors, due to the ongoing COVID-19 pandemic.

The stakes for effective cybersecurity have risen dramatically as a result of the outbreak, as more day-to-day work has moved beyond traditional corporate campuses and into remote workspaces. End-users connecting to company applications from personal devices still need the robust security protections and dependable performance they got in the office, except now within the scaled-down IT environment of the home — a tricky needle to thread without solutions such as SD-WAN and secure video and audio conferencing in place.

Telework for healthcare workers

For healthcare workers in particular, the overall challenge of telework is even tougher. Applicable U.S. regulations like the Health Insurance Portability and Accountability Act (HIPAA) complicate the flow of information between remote sites. Moreover, the healthcare sector as a whole has historically been slow to take up remote work due to a combination of practical considerations related to patient care, liability considerations, and technological limitations.

However, these hurdles can be overcome with the right combination of tools and strategy.

What remote work challenges do healthcare workers face?

Hospitals, physician offices, clinics, and other healthcare providers must deliver high-quality care while keeping everyone as safe as possible. That, in turn, requires mitigating a variety of risks related to remote work, including:

HIPAA compliance

As the initial pandemic grew, the U.S. Department of Health and Human Services’ Office of Civil Rights relaxed its enforcement of HIPAA noncompliance penalties* for activities such as video conferencing. Still, this was a temporary and discretionary measure. In the long term, healthcare organizations will need to balance the flexibility of remote work with the strictures of HIPAA, particularly when delivering telehealth services.

Healthcare providers must still comply with HIPAA regardless of where their workforces are actually located. In the past, organizations have been found liable for HIPAA violations related to the improper disclosure of protected health information (PHI) by remote workers, according to a Middle Tennessee State University professor interviewed by Relias Media. Avoiding these penalties requires assiduously tracking and controlling who has remote access to critical systems, which brings us to our next issue.*

Remote telehealth worker

Technology

More remote work means heavier utilization of virtual private network (VPN) licenses for secure access. All VPNs in use by a healthcare organization should be scaled to meet current usage, as well as properly updated and patched. Chances are that any existing VPN implementation will need to be greatly expanded and more carefully managed than in the past.

Likewise, the expansion of both remote work sites and temporary facilities (e.g., outdoor tent deployments) by healthcare providers means that their WANs must handle more traffic than ever before, and from a wider variety of locations and clients. Additional infrastructure and bandwidth may be needed, alongside a possible upgrade to an SD-WAN architecture that delivers performance and security far beyond what a conventional MPLS WAN offers. Check out more information on Video conference with security you can trust

Cybersecurity

Speaking of security, healthcare organizations have always been among the most common targets of cyberattacks, and the shift to telecommuting has only worsened this long-standing problem. The U.S. Department of Homeland Security, which sponsors NCSAM, identified the rise of advanced persistent threats* looking to harvest sensitive data from providers.

With more systems hosted in the cloud and remotely accessible via an Internet Protocol network, measures such as two-factor authentication (2FA) are pivotal. Implementing 2FA plus appropriate anti-malware and network security protections will help shield PHI from unauthorized access.

What can healthcare providers do to stay safer?

Fending off security threats while maintaining HIPAA compliance and meeting end-user needs is a complicated balancing act. But it’s not impossible. Let’s explore some concrete steps that healthcare firms can take toward safer, more scalable operations.

1) Educate and train staff

Many workers, especially in healthcare, have not routinely worked remotely in the past, meaning that they may need hands-on guidance during the transition. More specifically, it’s critical to remind everyone that regulations such HIPAA apply regardless of location and that remote work environments are prone to a unique set of cybersecurity risks.

It’s prudent to provide a detailed remote work policy with clear protocols about which video and audio conferencing services to use for telehealth and for internal communications, how to avoid common cybersecurity threats, and what to keep in mind regarding regulatory compliance (e.g., is PHI exposed on a desktop during a screen share?). Here are Best practices for clinicians using video conferencing

train healthcare staff

2) Shore up security infrastructure

While VPNs are integral to remote work security in particular, they’re not the only critical components of cybersecurity posture. Healthcare firms should also keep an eye on:

  • Identity and access management (IAM): Who is authorized to access critical resources, and in which ways? Mission-critical platforms like electronic health records solutions are often accessed beyond the provider’s main network, but must be tightly secured via IAM measures for strong authentication and role-based access.
  • Encryption: Data at rest and in transit should be encrypted as needed, both to prevent interception and to maintain HIPAA compliance. While encryption isn’t required by the HIPAA Security Rule, using it is often the most practical way to safely and compliantly transmit health information.
  • Patch management: VPNs, security software and other applications and services must be kept up to date, in order to avoid the exploitation of any known vulnerabilities.
  • SD-WAN: An SD-WAN solution can provide edge network security that connects end users to cloud applications without compromising user experience.

3) Use secure communications platforms

Video conferencing and VoIP, among other applications, play pivotal parts in enabling telehealth. Any such solution must not only provide high quality picture and sound, but also be strengthened against a variety of cybersecurity threats.

Advanced meeting controls, data encryption, and secure supporting data center infrastructure are all vital to effective remote collaboration in this context. With Webex, you can get a safe and productive experience.

Learn more by getting started with a free offer today.

Sources

Do Your Part. #BeCyberSmart

Notification of Enforcement Discretion for Telehealth Remote Communications During COVID-19

APT Hackers Targeting Healthcare, Essential Services Amid COVID-19

HIPAA Compliance a Concern as Working from Home Becomes Norm

Learn more

Preparing for screen sharing: How to reduce risk when sharing your screen 

Healthcare Cybersecurity: What’s at Stake?

Securing Internet- Connected Devices in the New Era of Healthcare

Still need help?

What’s new in Webex: November 2020

Join a Webex online meeting

Learn more about Webex, join one of our upcoming training sessions

Explore daily product demonstrations

Sign up for Webex

Visit our home page or contact us directly for assistance.

Read more
Closeup of man tying on a laptop keyboard while holding on one hand a lock like transparent object. Focus is on the lock symbol meaning online information security
Preparing for screen sharing: How to reduce risk when sharing your screen

Reducing the risk of delays when sharing your screen

As more workers move outside of traditional offices, they’re also outgrowing the collaboration tools that were once staples of those environments, namely email and in-person meetings. Taking the place of those modes of communication are newer forms of teamwork, centered on real-time services for voice, video , and screen sharing.

The screen share in particular is a vital replacement for the old workflow of gathering everyone into a room and turning on a projector to walk them through a slide deck or other asset. But it’s not without its potential complications. Distractions, technical hiccups, or simply choosing confusingly designed software can waste a lot of time.

What can you do to reduce the risk of delays when sharing your screen? Fortunately, there’s no shortage of options for leading a more focused session. Let’s look at some of the most dependable tips for a risk-free screen share.

Share just one window or application

Sharing your entire screen probably feels like the easiest and most practical way to lead a screen share, and in some cases, it is. For example, if you’re leading an in-depth demonstration of how to use a certain built-in feature in macOS or Microsoft Windows, then sharing the full desktop is logical, as you’ll need to walk the audience through where to find everything.

However, this type of screen sharing can also be risky, since it puts everything into public view. Watchers may be able to see what’s on your desktop, notifications from your apps, and even sensitive information like login credentials if you open your password manager.

To avoid these pitfalls, consider sharing just one application or desktop at a time. This way, you limit what can be seen while still being able to share the content you need to show. Webex Teams makes it straightforward to select which screen or app to show at any time.

Take advantage of meeting controls

Your screen share is going great — and then someone strange joins the meeting and starts talking or trying to show their own screen or video feed. Such disruptions have become more common as remote work in general and video conferencing applications in particular have both risen in popularity.

For this reason, it’s important to use built-in meeting controls to keep proceedings on track with as few distractions as possible. Some of the most important practices include:

  • Enforce password entry: Make sure to enable password requirements as needed to reduce the risk of unauthorized logins.
  • Lock the meeting once everyone is in it: Similarly, you can prevent anyone else from joining by locking the session. If you need to let legitimate attendees in later, you can unlock temporarily.
  • Control who the presenter is: As the host, you have the power to change the presenter or reclaim the role for yourself at any time.
  • Mute audio: Is someone’s excessive background noise making the screen share unbearable? Curbing it is as simple as using a mute button to silence their audio.

Turn off notifications

Notifications are important, but they can usually wait until after the screen share is over. A notification that arrives in the middle of a screen share can not only be a huge distraction, but a data leakage risk as well.

Think about all the notifications related to sensitive matters like one-time login codes and two-factor authentication, as well as online purchases, and personal messages. If they’re not turned off, you’re rolling the dice each time you lead a screen share.

Notifications can be turned off systemwide or app-by-app on all modern operating systems. Once the screen share is over, you can easily re-enable them.

Organize desktop and browser appearance

A disorganized desktop or a browser with a bunch of tabs open can be much more than an eyesore — it can also be a data security hazard, for the same reasons as unchecked notifications. A stray tab or document can divulge sensitive information. Plus, in the case of the browser, it can take a toll on system performance, too.

Consider cleaning up your desktop prior to leading a screen share. This can be as simple as using a feature like Stacks in macOS, or just creating a separate clean desktop on Windows and then presenting from there.

Fine-tune application performance

Screen sharing is a real-time process, making technical performance paramount. Software for screen sharing is usually well optimized for displaying the presenter’s screen and video, but multiple issues are still possible and can affect the presentation.

To get the best possible performance, first consider closing any unneeded applications and background processes, as the ongoing syncing of cloud services like Google Drive or Microsoft OneDrive can consume a lot of bandwidth. Also make sure you’re close enough to your Wi-Fi router or access point, or have an Ethernet connection set up for the most reliable connectivity.

Get started with better screen sharing in Webex

Webex provides an immersive screen sharing experience that lets you connect with as many, or as few, participants as you need to and lead them through a crystal-clear presentation.

To try it for yourself, get started for free today.

Learn More

Screen sharing how-to guide: Tips for better real-time collaboration

Personalize your team meetings with these top four screen sharing features

Why screen sharing works better for sales than traditional conference calls

Still Need help?

Join a Webex online meeting

Learn more about Webex, join one of our upcoming training sessions

Explore daily product demonstrations

Sign up for Webex

Visit our home page or contact us directly for assistance.

Read more