The requirement to work for many employees has led to the explosion of videoconference application downloads.
Among the most popular programs currently used in the professional sphere, Zoom, the video meeting application has won over a number of new users. But not all of them use Zoom for productivity. Taking advantage of the new success of these applications, trolls and other hackers have found a new hobby: landing the improvist in a meeting (also called Zoom bombing), to abuse names or share pornographic content by exploiting the function of screen sharing.
To avoid these inconveniences, there are a certain number of good practices to adopt, and parameters to modify in the program. Here's everything you need to know to secure your video meetings in Zoom.
1. Do not share the link of a meeting on social networks
This may seem like common sense, but sharing the URL to join your video meeting on social media is probably not the idea of ??the century. Visible to all, the URL of a meeting will allow anyone to click on it to join a video conference, without you being able to prevent it.
Because to create a meeting, the host must launch it on his workstation, and share a link or a meeting identifier with his guests so that they can join the video call. So always opt for direct sharing of the link or the identifier by e-mail, SMS, or private instant messaging.
2. Use by your personal meeting ID
Creating meetings in Zoom can be done in two ways: from a virtual room randomly creates each meeting, with a new identifier for each session, or from a personal meeting room using your Personal Meeting ID (PMI).
So remember to check from the menu New meeting, that the option Use my personal meeting ID (PMI) is disabled.
This unique identifier is attached to your account. And once it is known to your closest collaborators, they only have to enter it directly in Zoom to join the video call. If you use it, use it with caution, and only share it with your trusted contacts.
3. Configure a password to join the meeting
By default, Zoom does not configure a password to join a meeting. You will therefore have to go to the advanced settings of the application to activate the option.
To do this, from the Zoom window, click on the icon with a notched wheel at the top right to enter the Parameters.
In the window that is displayed, tab General, click on Show more settings. Zoom should open the service's web interface. Log in to your account to access all of the advanced settings for your account.
Scroll through the settings and, if you have not already done so, activate the options Request a password when planning new meetings and Request password for instant meetings.
People who will try to access the meeting by manually entering their username in Zoom will have to enter the associated password to enter.
4. Deactivate the integration of the password in the link to join in one click
When password protection is activated, Zoom encrypts it and automatically integrates it into the meeting link to allow your guests to join the meeting in one click.
Disable this option to force people with the access link to enter the password. And if intruders happen to get their hands on the URL for the meeting, they will not be able to access it.
5. Activate the waiting room
This is arguably the most interesting option for blocking unexpected intrusions into a meeting. It allows you to manually validate the entry of each participant in the meeting.
The option is again found in the advanced settings of Zoom, accessible from the Web interface.
6. Limit screen sharing at the meeting host
To avoid the dissemination of inappropriate content, during your meeting it is better to take the lead and limit screen sharing to the only host of the meeting.
Scroll through the advanced Zoom settings until you reach the Screen Sharing section. line Who can share? Select Host only and save the changes.
7. Deactivate the annotation and remote control tools
As a host, when you share your screen or desktop, users in the meeting can add annotations, use a whiteboard, or control the shared screen distance.
If you don't need it, disable these three options, Annotation, Whiteboard and Remote control.
8. Disable file transfer
Hackers who successfully access your meeting will not want to share malicious files via the file transfer module built into the chat room.
To prevent participants from being able to transfer files, deactivate the File transfer option, or restrict certain file types only.