Don't Forget to Share this Post

9 Tips to Keep Zoom Secure & Help Prevent Zoombombing

By Mary Beth Hamilton | Wednesday, April 8th, 2020

Zoom is making headlines with a variety of privacy and security issues, including Zoombombing. The risks are real, so we sat down with a few of our security experts to capture this list of tips and recommendations.

Before a Zoom Meeting: The Security Basics

  • Avoid Public Links: Remember that a public meeting link is public, so don’t share it with anyone you don’t trust.
  • Personal Meeting IDs: The same goes for your Personal Meeting ID, which is essentially a personal phone number that people can “drop in” on at any time. Instead of your Personal Meeting ID, consider using a per-meeting ID that is exclusive to the single meeting.
  • Passwords: Always set up a password for participants to verify their entry before joining a meeting. Additionally, consider using two-factor authentication, which requires a generated code on a mobile app in addition to a Zoom username and password. This provides an additional layer of security since users will need access to their phone to sign in.
  • Waiting Rooms: Enabling the Waiting Room feature allows you to see who is trying to join the meeting before allowing access.
  • Screen Sharing: Set Screen Sharing to “Only Host” unless you specifically need to grant participants the option. Also consider using the “enable watermark when viewing the shared screen” feature to watermark your screen.
  • Know the Controls: Before running your first Zoom meeting, become familiar with the Controls for Hosts and Managing Participants. Key controls include: Mute all Participants, Lock Meeting and Remove Participants. That way you can easily remove unwanted or disruptive participants, disable video for participants, and disable private chat.

When in the Meeting, You’ll Want To:

  • Manage screen sharing by ensuring you’re the only person in control of the meeting. To do this, click on “Who Can Share?” and confirm that “Host” is the only button clicked.
  • Manage participants by ensuring only signed-in participants can join the call. This way you know who people are if they’re behaving badly. Additionally you can ‘Lock Meeting’ once all participants have joined to stop further participants from entering and to be able to remove participants.
  • Say something if you see something. You can report unwanted activity, harassment, and cyberattacks to Zoom directly.
At Eze Castle Integration we support clients across a multitude of applications and technology environments. For security and privacy reasons, we typically recommend businesses use Microsoft Teams for virtual meetings and chats. However, regardless of the tool selected, ensuring it is appropriately secured at every level is essential. 
 

COVID resource center

Don't Forget to Share this Post

Related Posts

How Can Eze Castle Integration help you?Contact us today!

Contact Us