SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
8 THINGS YOU CAN
DO TO MAKE ZOOM
MORE SECURE
zoom
SIMPLIFYSECURITY.CO.NZ
MAKE SURE YOU ARE
USING THE LATEST
VERSION.
This will ensure the latest security patches
are in place. Zoom will notify you if an
update is available or you can do it under
‘Check for Updates’.
#1
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
USE MEETING IDs AND SET
PASSWORD.
• Use a meeting ID and password when
you want to restrict your audience to
invited attendees
• Ensure you change the meeting ID for
each meeting.
• Send the ID and password via different
channels.
#2
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
ENABLE THE ‘WAITING
ROOM’ FEATURE.
This will put all participants in a staging area
until the host is ready, giving visibility over
who is trying to join the meeting.
#3
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
CONTROL WHO CAN JOIN
THE MEETING.
You can restrict the meeting to participants
who are signed in to Zoom. Access can be
further restricted to those with a specific set
of email address domains.
#4
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
IDENTIFY GUEST
PARTICIPANTS.
When this feature is enabled the host can
check no unauthorised participants are in
attendance. Any guest who is not signed in,
or who is signed in from a different email
domain from the host will be highlighted
orange.
#5
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
ENABLE IN MEETING
CONTROLS FOR
PARTICIPANTS.
Preventing participants from screen sharing,
stopping a participant’s video or removing
them from the meeting are all useful
features to know how to use in the event of
unauthorised or unruly participants.
#6
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
LOCK THE MEETING
ONCE IN PROGRESS.
To prevent anyone else joining the meeting
once you are underway (and may be
distracted from checking if they are
authorised attendees), lock the meeting.
#7
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
ENABLE TWO-FACTOR
AUTHENTICATION.
Two-factor authentication (2FA) is a two-step
sign-in process that requires a generated
code on a mobile app in addition to a Zoom
username and strong password. This provides
an additional layer of security and keeps
unauthorised users out.
#8
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all

Contenu connexe

Tendances

My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
rafa_el_souza
 

Tendances (11)

app that hacks text messages
app that hacks text messagesapp that hacks text messages
app that hacks text messages
 
Hacking Facebook Without Touching Phone
Hacking Facebook Without Touching Phone Hacking Facebook Without Touching Phone
Hacking Facebook Without Touching Phone
 
Best Information Security Tips for Better Computing
Best Information Security Tips for Better ComputingBest Information Security Tips for Better Computing
Best Information Security Tips for Better Computing
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
 
Cyber Security Tricks One Should Know
Cyber Security Tricks One Should KnowCyber Security Tricks One Should Know
Cyber Security Tricks One Should Know
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Venkasure Total Security + Presentation
Venkasure Total Security + PresentationVenkasure Total Security + Presentation
Venkasure Total Security + Presentation
 
Mobile security in smartphone
Mobile security in smartphone Mobile security in smartphone
Mobile security in smartphone
 
Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 

Similaire à 8 things you can do to make zoom more secure

Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
101 Blockchains
 
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco Canada
 
Making Meetings Simple: "It's Just A Meeting"
Making Meetings Simple:  "It's Just A Meeting" Making Meetings Simple:  "It's Just A Meeting"
Making Meetings Simple: "It's Just A Meeting"
Cisco Canada
 

Similaire à 8 things you can do to make zoom more secure (20)

20210112 web conferencing tools
20210112 web conferencing tools20210112 web conferencing tools
20210112 web conferencing tools
 
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
Security by Design for Law Firms
Security by Design for Law FirmsSecurity by Design for Law Firms
Security by Design for Law Firms
 
Zoom security and meeting participant management
Zoom security and meeting participant managementZoom security and meeting participant management
Zoom security and meeting participant management
 
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2
 
Making Meetings Simple: "It's Just A Meeting"
Making Meetings Simple:  "It's Just A Meeting" Making Meetings Simple:  "It's Just A Meeting"
Making Meetings Simple: "It's Just A Meeting"
 
assign3.docx
assign3.docxassign3.docx
assign3.docx
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
Security in OPC UA ppt
Security in OPC UA pptSecurity in OPC UA ppt
Security in OPC UA ppt
 
Security in OPC UA ppt
Security in OPC UA pptSecurity in OPC UA ppt
Security in OPC UA ppt
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
 
SecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise BrochureSecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise Brochure
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 
Empower your business with TeamViewer 13
Empower your business with TeamViewer 13Empower your business with TeamViewer 13
Empower your business with TeamViewer 13
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

8 things you can do to make zoom more secure

  • 1. 8 THINGS YOU CAN DO TO MAKE ZOOM MORE SECURE zoom SIMPLIFYSECURITY.CO.NZ
  • 2. MAKE SURE YOU ARE USING THE LATEST VERSION. This will ensure the latest security patches are in place. Zoom will notify you if an update is available or you can do it under ‘Check for Updates’. #1 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 3. USE MEETING IDs AND SET PASSWORD. • Use a meeting ID and password when you want to restrict your audience to invited attendees • Ensure you change the meeting ID for each meeting. • Send the ID and password via different channels. #2 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 4. ENABLE THE ‘WAITING ROOM’ FEATURE. This will put all participants in a staging area until the host is ready, giving visibility over who is trying to join the meeting. #3 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 5. CONTROL WHO CAN JOIN THE MEETING. You can restrict the meeting to participants who are signed in to Zoom. Access can be further restricted to those with a specific set of email address domains. #4 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 6. IDENTIFY GUEST PARTICIPANTS. When this feature is enabled the host can check no unauthorised participants are in attendance. Any guest who is not signed in, or who is signed in from a different email domain from the host will be highlighted orange. #5 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 7. ENABLE IN MEETING CONTROLS FOR PARTICIPANTS. Preventing participants from screen sharing, stopping a participant’s video or removing them from the meeting are all useful features to know how to use in the event of unauthorised or unruly participants. #6 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 8. LOCK THE MEETING ONCE IN PROGRESS. To prevent anyone else joining the meeting once you are underway (and may be distracted from checking if they are authorised attendees), lock the meeting. #7 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 9. ENABLE TWO-FACTOR AUTHENTICATION. Two-factor authentication (2FA) is a two-step sign-in process that requires a generated code on a mobile app in addition to a Zoom username and strong password. This provides an additional layer of security and keeps unauthorised users out. #8 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all