Zoom has become extremely popular as a video conferencing solution during the COVID-19 pandemic, and cybercriminals have noticed. Are you sure your Zoom meetings are properly secured against intruders?
Zoom is a video conferencing solution that allows up to 1,000 attendees to get together in a single virtual meeting. It has become widely popular throughout the COVID-19 pandemic, both for professional purposes as well as social ones.
Unfortunately, when technology becomes this popular this quickly, it attracts attention from cybercriminals looking to exploit unaware, new users. This uptick in activity has led to several ongoing security concerns:
Zoom-Bombing: Users have been reporting an increased rate of something called “Zoom-bombing,” which occurs when someone intrudes on your meeting to cause disruptions or eavesdrop on your conversation.
The good news is that Zoom is busy working on a security update that will enhance its cybersecurity capabilities. These updates will include:
AES 256-bit encryption for increased privacy protection
An improved user interface, allowing for easier access to security settings
Greater control is given to users as to where their data is routed
More complex cloud recording passwords
These updates are slated to roll out over the next few weeks – but that doesn’t mean your Zoom meetings have to stay unsecured in the meantime. There are several steps you can take to enhance Zoom security right now:
Password-Protect Your Meetings: In Zoom’s settings, you can enable a password requirement for all instant meetings.
Use A Unique Meeting ID: It can be convenient to use your personal meeting ID (PMI), but it’s not the safest option. This number is the same every time, so as soon as the wrong person gets their hands on it, all your future meetings are compromised. Instead, you can have Zoom generate a unique ID for each meeting.
Don’t Share Meeting Info On Social Media: Again, it may be easier to get the word out about your next big meeting by using social media, but without the right security settings in place, anyone can get that info. If you need to share an invite, do it directly over email.
Use The Waiting Room: Zoom’s Waiting Room feature allows hosts to screen attendees as they come into the meeting, providing an extra level of protection against intruders.
Limit Screen Share To Hosts: One of the key ways that intruders disrupt meetings is by displaying inappropriate content through screen share. Make sure to select “only the host can share” under the settings.
ICS is a Texas-based 40-year-old technology company specializing in Managed IT, VoIP, Video Conferencing and Video Surveillance solutions for US and International businesses. ICS has over 4000 regional installations and specializes in multi-site businesses between 25 and 2500 employees. ICS’s customers enjoy the experience of ICS’s Total Care program which provides clients flat fee services with obsolescence and growth protection. Whether a customer elects to deploy their IT, Video Conferencing or VoIP in the cloud or on the customer’s premise, ICS can provide a full turn-key solution for our clients under one flat monthly fee.
ICS Specializes In Managed IT Services, Business Telephones, Video Conferencing & More.
Book your initial consultation with ICS using the form below.
ICS will never sell, rent, share or distribute your personal details with anyone. In addition, we will never spam you.
Get Started with a 60-Day, Risk-Free Trial with our IT Services
We offer managed IT services for large to small organizations at a flat-rate monthly fee. You can get started now with a 60-day, risk-free trial. If you’re not 100% satisfied with our services, you’re able to cancel your contract – no questions asked. ICS works hard to earn the trust of each and every business we work alongside.