Still using Zoom for Meetings? Want to keep using Zoom for Meetings?

To start, whatever you view of the information that has come to light about zoom over the past couple of weeks, or the potential exploits that can “break” into a Zoom meeting,  it still stands that Zoom is a great tool to use.

I am fan and I use it frequently and have done for quite a while. I also however use Microsoft Teams, Join.me, Skype and Face time. Depending on the need and requirements of the people I am speaking and working with.

Now that aside, you can still use Zoom and be secure while doing so. The conversation about end-to-end encryption is for another day, and the sending information to Facebook etc., so let’s focus on some specific things that can be done to be more secure and not lose control.

If posting a Zoom link in the public, then don’t use your Personal Meeting number, save that for specific meeting where you control the audience. Make sure you ALWAYS select the “Generate automatically” option.

Always set a Password for your meeting and if needed send that in a separate email to the meeting participants.

Ensure that you have set the Video to Off for both you as the Host and the Participants. This will ensure no video is on when entering the meeting. You can then determine if video should be used.

Utilize the “Advanced Options” and enable the waiting room, to keep people there until you are ready to allow them in and you have checked them. Mute participants on entry, this will stop anyone who was not paying attention and suddenly joins from sharing their personal conversation with the meeting. It will also ensure that if someone is there that should not be there, they won’t be initially heard. Then, to add some extra security, set the meeting to only authenticated users in, which means they have to sign into zoom to enter the meeting.

Once you are in a meeting as the Host you have some controls that I recommend you use too. The default settings are:

They should be changed to:

Lastly, when you are in the meeting and all attendees you are expecting to be there are in, then from the same menu click “Lock Meeting“. This will block anyone else from joining the meeting. It will display a message and when you click “OK” no-one else can enter.

Now these may seem like simple things, and that is true. Can you fix Zoom, when your machine has been compromised and it hacks the Zoom client? erm…nope, too late at that point.

Can you protect who joins your meetings and what control they and you can do? Definitely.

Hopefully this helps in some small way to you using Zoom, but being a little better and more secure.

Can we do anything about the end-to-end encryption thing? Nope and if that is a big issue for not using it, then I understand and recommend you choose a different tool. There are some greats ones available 🙂

Liam Cleary

Liam began his career as a Trainer of all things computer-related. He quickly realized that programming, breaking, and hacking was a lot more fun. He spent the next few years working within core infrastructure and security services until he found SharePoint. He is the founder and owner of SharePlicity, a consulting company that focuses on all areas of Technology. His role within SharePlicity is to help organizations implement technology that will enhance internal and external collaboration, document and records management, automate business processes, and of course security controls and protection. Liam also serves as the Principal Technology Advisor at Rencore, where he is helping to develop offerings that help organizations further understand and mitigate security and compliance risks, within SharePoint and Office 365 customization's. His core focus will is to identify, control, and protect whether they are full-fledged customization's or out-of-the-box Office 365 functionality. He is also a thirteen-time Microsoft MVP focusing on Architecture but also crosses the boundary into Development. He is also a Microsoft Certified Trainer (MCT). His specialty over the past few years has been security in SharePoint and its surrounding platforms. He can often be found at user groups or conferences speaking, offering advice, spending time in the community, teaching his kids how to code, raspberry PI programming, hacking the planet or building Lego robots.

You may also like...