The document outlines 8 things that can be done to make Zoom more secure. These include: 1) Using the latest version of Zoom to ensure all security patches are installed, 2) Using meeting IDs and passwords to restrict access to invited attendees, and 3) Enabling features like the waiting room and identifying guest participants to control who can join meetings.
The 7 Things I Know About Cyber Security After 25 Years | April 2024
8 things you can do to make zoom more secure
1. 8 THINGS YOU CAN
DO TO MAKE ZOOM
MORE SECURE
zoom
SIMPLIFYSECURITY.CO.NZ
2. MAKE SURE YOU ARE
USING THE LATEST
VERSION.
This will ensure the latest security patches
are in place. Zoom will notify you if an
update is available or you can do it under
‘Check for Updates’.
#1
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
3. USE MEETING IDs AND SET
PASSWORD.
• Use a meeting ID and password when
you want to restrict your audience to
invited attendees
• Ensure you change the meeting ID for
each meeting.
• Send the ID and password via different
channels.
#2
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
4. ENABLE THE ‘WAITING
ROOM’ FEATURE.
This will put all participants in a staging area
until the host is ready, giving visibility over
who is trying to join the meeting.
#3
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
5. CONTROL WHO CAN JOIN
THE MEETING.
You can restrict the meeting to participants
who are signed in to Zoom. Access can be
further restricted to those with a specific set
of email address domains.
#4
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
6. IDENTIFY GUEST
PARTICIPANTS.
When this feature is enabled the host can
check no unauthorised participants are in
attendance. Any guest who is not signed in,
or who is signed in from a different email
domain from the host will be highlighted
orange.
#5
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
7. ENABLE IN MEETING
CONTROLS FOR
PARTICIPANTS.
Preventing participants from screen sharing,
stopping a participant’s video or removing
them from the meeting are all useful
features to know how to use in the event of
unauthorised or unruly participants.
#6
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
8. LOCK THE MEETING
ONCE IN PROGRESS.
To prevent anyone else joining the meeting
once you are underway (and may be
distracted from checking if they are
authorised attendees), lock the meeting.
#7
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
9. ENABLE TWO-FACTOR
AUTHENTICATION.
Two-factor authentication (2FA) is a two-step
sign-in process that requires a generated
code on a mobile app in addition to a Zoom
username and strong password. This provides
an additional layer of security and keeps
unauthorised users out.
#8
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all