Maximize your protection, eliminate business risks.
Optimize and modernize with cloud transformation.
Empower your people to work securely from anywhere.
Let us handle IT so you can focus on growing your business.
Get multichannel 24/7/365 expert end-user support.
Stay ahead of attacks with 24/7 protection and monitoring.
Maximize uptime with with industry-leading DRaaS.
Improve efficiency, productivity and outcomes with cloud.
Ensure all mobile devices, everywhere, are secure.
Gain a competitive edge with strategic IT solutions.
This battle-tested checklist enables your team to swiftly initiate a ransomware response.
IT for businesses of all sizes, in any industry.
Empower institution growth with custom IT solutions.
Ensure your firm is always in compliance.
Improve patient care and staff morale.
Deal with pressing legal matters, not IT.
Keep up with the evolving digital landscape.
Focus on your mission by outsourcing IT.
Accelerate PE client deals and secure data.
Leverage your technology as a strategic asset.
Execute initiatives and develop IT strategies.
Get the latest industry insights and trends.
Join us at events in person and online.
Hear from clients and learn more about strategic IT.
See how Dataprise can make IT your greatest asset.
Get informative technical resources from IT experts.
Stay on stop of emerging cybersecurity threats.
Discover the key areas of DR your organization needs to address to ensure downtime is minimized.
Gain a strategic asset by bringing harmony to IT.
Ensure 24/7 support and security with dedicated teams.
Drive business forward by partnering with Dataprise.
Meet our one-of-a-kind leadership team.
Discover the recognition Dataprise has earned.
Help us help businesses with strategic IT.
Embracing different perspectives and backgrounds.
Find a Dataprise location near you.
Dataprise is committed to empowering more women to consider a career in technology.
Posts
By: Justin Weeks
Table of content
Wondering how to prevent a potential Zoom security risk? With the significant increase of remote work due to COVID-19, there have been some concerns regarding the security of online meetings hosted in Zoom. With threats such as Zoombombing, the act of intruding on another individuals or organization’s call and disrupting, to the potential data threats that have come to light, it’s up to you to ensure that your organization and end-users are protected.
Some of the in-meeting security capabilities that are available to the meeting host include:
Here are five easy steps to follow to further secure your Zoom meetings:
When you set up Zoom, you are given a Personal Meeting ID. This means that as a meeting host you have a dedicated meeting room that never changes. To keep your Zoom meetings secure, generate a random meeting ID each time. To do so, go to your Zoom Web Settings and select Schedule a Meeting:
To further secure your Zoom meeting, you can then enable the Waiting Room option for your meeting, which provides a holding area and the ability to customize a message with guidelines on who is allowed to join. Under Settings, select In Meeting (Advanced) then Waiting Room.
You can select who is allowed to share their screen during the meeting. In Web Settings, go to In Meeting (Basic) and lock the Screen Sharing as a default option.
To prevent a potential Zoom security risk while in the meeting, click on Share Screen, click Advanced Options, and then select Only Host can share.
Unless there is a very specific reason, you can disable file sharing. Go to Settings, click In Meeting (Basic), then disable File Transfer.
You can also strictly control who joins the meetings (i.e., if they are not on the list, they cannot get in). Go to Web Settings, click Schedule Meeting, and then enable Only Authenticated Users Can Join Meetings. Even if someone finds the meeting links and password, they still need to be logged in to Zoom. You can also lock down further by restricting Zoom meeting access to users on a specific domain.
While some of these tips may seem basic, it can be difficult for new users (of which now there are many) to know that these features exist and ultimately where to find and use them. Though this article won’t be able to eliminate the risk of using Zoom, or any video conferencing platform, it should serve as a stepping stone toward a robust security policy and cybersecurity program.
To help prevent a potential Zoom security risk for yourself or your organization, download this easily shareable PDF for reference. If your organization has determined that it is sensible to move away from the Zoom platform, there are several alternative low to no-cost conferencing options available.
INSIGHTS
Subscribe to our blog to learn about the latest IT trends and technology best practices.