Estimated reading time: 6 minutes, 53 seconds

As businesses turn to Zoom for videoconferencing, a new generation of security threats has emerged. Among them is ZoomBombing in which intruders invade sessions and disrupt them.


Among the disruptions are the sharing of porn videos by the unwelcome guests. One of the important ways to prevent problems is by use of passwords to allow participants into session.

Zoom itself advises the use of the Waiting Room feature via which a meeting host can control when participants join a meeting. That way the host can screen out participants not on the Zoom account or not signed in.

The company also says hosts should not give up control of the screen. They can utilize Advanced Screen Sharing choosing “Only Host” under “Who can share?”, along with locking Screen Share by default for all meetings under web settings.

Participants can also be managed by allowing only signed-in users to join while meetings can be locked to prevent anyone from joining, including those with a meeting ID and password, from joining after the meeting has started. Two-factor authentication can also be required.

Other controls that can help are these:                                                                                                                                                                                                                                                                  Disable “Allow Removed Participants to Rejoin” to keep miscreants from returning.                                                                                                                                                                                          Remove Unwanted or Disruptive Participants by clicking Remove under the Participants menu.                                                                                                                                                                       Disable Video                                                                                                                                                                                                                                                                                                             Mute Participants                                                                                                                                                                                                                                                                                                        Turn off file transfer to prevent unwanted content such as pictures or memes.                                                                                                                                                                                                           Turn off Annotation                                                                                                                                                                                                                                                                                                 Disable Private Chat.

In addition, software security company Norton has another series of recommendations for videoconferencing more securely. These start with following a company’s policy, including making sure a device is secure if the user is bringing their own device.  Companies should provide training, ensure endpoints and networks are secure and capable of handling teleworkers’ devices and communication.

Norton says users must establish home network security be configuring firewalls and making sure routers are secure. They should also stay up-to-date with security patches. A secure-wi-fi with strong encryption should be used.

Norton also recommends participants change their video backgrounds so other members of video calls cannot see into their homes and to remember to turn off the webcast at the end of the call or at least cover it with something opaque, such as tape, paper or a sliding webcam cover.

A Virtual Private Network  also provides greater security because it masks IP addresses, location, and search history to prevent things like location tracking.




Bob Scott
Bob Scott has provided information to the tax and accounting community since 1991, first as technology editor of Accounting Today, and from 1997 through 2009 as editor of its sister publication, Accounting Technology. He is known throughout the industry for his depth of knowledge and for his high journalistic standards.  Scott has made frequent appearances as a speaker, moderator and panelist and events serving tax and accounting professionals. He  has a strong background in computer journalism as an editor with two former trade publications, Computer+Software News and MIS Week and spent several years with weekly and daily newspapers in Morris County New Jersey prior to that.  A graduate of Indiana University with a degree in journalism, Bob is a native of Madison, Ind
Last modified on Thursday, 02 April 2020
Read 767 times
Rate this item
(0 votes)

Visit other PMG Sites:

click me
PMG360 is committed to protecting the privacy of the personal data we collect from our subscribers/agents/customers/exhibitors and sponsors. On May 25th, the European's GDPR policy will be enforced. Nothing is changing about your current settings or how your information is processed, however, we have made a few changes. We have updated our Privacy Policy and Cookie Policy to make it easier for you to understand what information we collect, how and why we collect it.
Ok Decline