• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

The Latest Small Business Security SNAFU? Zoom

June 23, 2020

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.
With everyone now working from home and finding new ways to collaborate and get things done, Zoom has become one of the most popular video conferencing applications, reporting growth of 378% over just one year ago.

As its popularity has grown, so has the allure for hackers. The FBI in Boston reported that two online high school classes had been interrupted by individuals who began yelling obscenities and the address of the teacher to another which displayed swastika tattoos. So how does this happen?

To start, most recurring meetings use the same meeting IDs. Someone, in an effort to make sure other attendees were aware of the event, would share it in an unsecured way, such as on Facebook or other social media.

Hackers can pick up this information, and even after the event was over, they could use the same information to gain access to the next meeting. Fortune Magazine has reported that dark web dedicated forums have popped up on popular sites like Reddit, and all a hacker would need to do on Facebook is search for “zoom.us” to find any public post containing the targeted words.

So what is a business to do to secure their meetings and avoid the potential sharing of sensitive corporate information during this time of extensive virtual meetings? First, and foremost, set your meeting to private. This means that there is a password required for each participant to enter. Although Zoom has now changed this setting to be the default setting, some users are still opting to make the meeting public for the sake of convenience.

As inconvenient as it is to have invitees enter a password to get into their meeting, it’s even more inconvenient to have sensitive corporate information released. Also… and this might seem to be stating the obvious but do not share your meeting invite over social media.

No matter our security settings on social media profiles, it’s best to assume that nothing you say on there will stay private. Another way to ensure the security of your zoom meeting is to use the feature of the waiting room. This means that each invitee who logs in will first be placed into a room where the meeting host then has to approve their entry and allowing the host to assess each attendee before they enter the room.

Also, never use your personal ID. Each zoom user has a personal virtual meeting room assigned when they create an account. Defaulting to using your assigned virtual meeting room can make it easier for hackers to enter in from old meeting announcements.

You know the phrase, what happens in Vegas stays in Vegas? Yeah. When it comes to Zoom (and any virtual meeting for that matter) assume what happens in Zoom does not stay in Zoom. If the information that is going to be shared is of such critical nature, you should find another medium where you have no chance of being overheard.

Filed Under: COVID-19 Tagged With: COVID-19, online security, Zoom

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.