Are Your Zoom Meetings Secure?
In my last blog post I helped you to understand the steps needed to regain control of your Zoom meeting if it gets “bombed”.
If you have been Zoombombed you may have questions about the security of the software and how these people got in to your meeting. Zoom is secure but much like many sites and apps it is only as secure as you enable it to be.
This blog is to share my top tips and best practice to help secure your meetings from Zoombombers. This is not a catchall and Zoom offer comprehensive training guides on how to get the best out of your Zoom account. It’s important to get to know what features are available to make your meeting as slick and secure as possible, so spend some time looking through your account settings (and setting up your virtual backgrounds).
1. Don't use your personal Meeting ID for public meetings. This ID never changes so every time you put it in the public domain someone else can find it. Instead use the “Schedule a new meeting” option which gives you a new meeting ID for each meeting.
3. Do regularly change recurring meeting links. Don't let your recurring meeting links run on for too long. The longer it is out in the public the more likely it is to be discovered or passed on to someone who should not have it.
2. Don't share your meeting link on the internet. Any link posted in the public domain can be found by people you may not want to have it. Meeting links should not be shared on public facing websites, public Twitter and Facebook accounts or forums. If you do have to put your meeting link in a public space then read on…
3. Do send out your meeting link as late as possible. Have people confirm their attendance by email, contact form or other means and then forward the link shortly before the meeting. The less time it is out in the public, the less time bombers have to find it and access it.
4. Do set a password. You can set a randomly generated password or make your own (but do not use a password you have used elsewhere). You can also turn off the feature that embeds the password within the public meeting link giving attendees a one-click access point. The more steps to access the meeting, the less likely someone with bad intentions will be to join your meeting.
5. Do make use of the registration features. Have your meeting attendees register to gain access to the meeting link. You can have attendees authenticate themselves and you can ask them questions on the form which will help establish who they are and will hopefully put off anyone dodgy.
6. Do enable the waiting room. As people arrive for your meeting Zoom lets you know who is waiting. You can choose to admit people, ask them questions or block them from the room.
7. Do disable features you don’t want participants to access. As the host you are in control. When setting up the call you can decide if participants are muted, have their videos on/off, control who can share their screen and who can talk to who in the chat function. Even if a bomber does gain access they’ll soon get bored if they can’t access any features to cause disruption.
8. Do delegate hosting to someone else. You’ve got a whole meeting to run, why not leave the administration and hosting duties to someone else. I regularly “host” meetings for my clients. I manage the attendees, their questions and the smooth running of the meeting leaving the clients to focus the job at hand.
Ultimately you want to make it as hard as possible for someone who shouldn’t be on your meeting to gain access. Putting these measures in place will take a moment or two more when setting up your meeting but could save you time and face with your clients and stakeholders.
I’d love to hear your thoughts on this and if you have any other tips you think need to be shared drop me a line and let me know. Leeanne@leaveitwithlava.com