Secure Your Virtual Meetings Against Hackers and Zoom-Bombers with Proactive IT Consulting in Oregon
With states across the US enforcing stay-at-home orders during the coronavirus pandemic, Zoom videoconferencing software has become a popular way for businesses to keep in touch with clients, suppliers and remote workers.
Proactive IT Consulting in Oregon Helps Overcome Cybersecurity Challenges with Zoom
With the onset of COVID-19, cybercriminals are exploiting the exponential increase in Zoom meetings as a gateway to gain access to intellectual property and other sensitive data. In the first three months of 2020, more than 1,700 domains have been registered using the word Zoom. Many of these domains are a front for cybercriminals to gain unauthorized access to Zoom meetings. They ask recipients of a Zoom invitation to head to a fake login page and enter their corporate credentials. With Zoom’s rise in popularity, a type of attack called ‘Zoom-bombing’ has also seen more activity from internet trolls. Zoom-bombing is like Photobombing and it’s a growing disruption in the videoconferencing space. Zoom-bombers gain unauthorized access to a Zoom meeting to harass the meeting participants in various ways. The FBI has received multiple reports of zoom meetings being disrupted by hijackers sharing hate images, pornographic material and threatening language.
If you have employees working remotely, how will you secure your virtual meetings against hackers and Zoom-bombers?
10 Tips to Secure Your Virtual Meetings Against Hackers And Zoom-Bombers
- Update your Zoom app to access the new security option in your meeting toolbar.
- Prevent Zoom-Bombing by using the new security options during an active call by enabling or disabling the right settings in advance.
- Use a unique ID and password for calls.
- Never use your personal Zoom meeting ID to host a meeting. Have Zoom automatically generate a unique meeting ID for your invitations.
- Always use a meeting password. Zoom will generate one for your invitees when you check the box.
- Protect your personal Zoom meeting ID as you would any password.
- Only allow authenticated users to join. To gain entry, invited users will need to have a Zoom user account (they’re free) and log into Zoom.
- Create a waiting room where attendees are held until all attendees are present and identified as authentic invitees.
- Require attendees to leave video cameras turned on until the host can identify all the participants in the meeting and confirm they were invited.
- Lock the meeting after all invited attendees have joined to prevent latecomers.
Working with any video streaming service can be tricky over a corporate network. While the basic setup is enough to get one session running, have your IT professional check what happens when multiple streams are open. Be aware that remote workers connecting the internet using a Virtual Private Network (VPN) can cause bandwidth problems affecting video streaming performance. If you haven’t invested in a business continuity strategy during the COVID-19 crisis, it’s not too late to take the steps needed to keep your businesses functioning despite social distancing. Working with a professional team providing IT consulting in Oregon such as SureTec helps ensure that your technology solutions are performing at the levels needed to reduce risk and enhance business operations. Contact the team of IT experts at SureTec by calling (503) 389-8015 in the Portland Metro area or 937-240-2881 in Cincinnati, Dayton or Columbus to schedule a complimentary initial consultation.