Are Your Zoom Meetings Secure?
Zoom is a video conferencing solution that allows up to 1,000 attendees to get together in a single virtual meeting. It has become widely popular throughout the COVID-19 pandemic, both for professional purposes as well as social ones.
Unfortunately, when technology becomes this popular this quickly, it attracts attention from cybercriminals looking to exploit unaware, new users. This uptick in activity has led to several ongoing security concerns:
- Zoom-Bombing: Users have been reporting an increased rate of something called “Zoom-bombing,” which occurs when someone intrudes on your meeting to cause disruptions or eavesdrop on your conversation.
- Stolen Credentials: Cyber risk assessment firm Cyble has discovered more than half a million stolen Zoom credentials being sold on the Dark Web for almost nothing. The stolen info included usernames, passwords, meeting IDs, and host keys.
Will Zoom Always Be A Risk?
The good news is that Zoom is busy working on a security update that will enhance its cybersecurity capabilities. These updates will include:
- AES 256-bit encryption for increased privacy protection
- An improved user interface, allowing for easier access to security settings
- Greater control is given to users as to where their data is routed
- More complex cloud recording passwords
These updates are slated to roll out over the next few weeks – but that doesn’t mean your Zoom meetings have to stay unsecured in the meantime. There are several steps you can take to enhance Zoom security right now:
- Password-Protect Your Meetings: In Zoom’s settings, you can enable a password requirement for all instant meetings.
- Use A Unique Meeting ID: It can be convenient to use your personal meeting ID (PMI), but it’s not the safest option. This number is the same every time, so as soon as the wrong person gets their hands on it, all your future meetings are compromised. Instead, you can have Zoom generate a unique ID for each meeting.
- Don’t Share Meeting Info On Social Media: Again, it may be easier to get the word out about your next big meeting by using social media, but without the right security settings in place, anyone can get that info. If you need to share an invite, do it directly over email.
- Use The Waiting Room: Zoom’s Waiting Room feature allows hosts to screen attendees as they come into the meeting, providing an extra level of protection against intruders.
- Limit Screen Share To Hosts: One of the key ways that intruders disrupt meetings is by displaying inappropriate content through screen share. Make sure to select “only the host can share” under the settings.
Avoid being a victim of hacking with our services! Click here to get in touch with our cybersecurity experts!
ICS is a Texas-based 40-year-old technology company specializing in Managed IT, VoIP, Video Conferencing and Video Surveillance solutions for US and International businesses. ICS has over 4000 regional installations and specializes in multi-site businesses between 25 and 2500 employees. ICS’s customers enjoy the experience of ICS’s Total Care program which provides clients flat fee services with obsolescence and growth protection. Whether a customer elects to deploy their IT, Video Conferencing or VoIP in the cloud or on the customer’s premise, ICS can provide a full turn-key solution for our clients under one flat monthly fee.