How to prevent Zoombombing

August 22, 2024

How to prevent Zoombombing

A-holes hijacking Zoom calls with grotesque images and noise

As Zoom grows due to the coronavirus induced work from home style of conducting business. Immature and nefarious actors are hijacking and listening in on business and personal meetings around the world. We've heard reports of Youtube videos of Neo-Nazi sort of content suddenly shown in meetings, to loud ear gouging noises played until people leave the session.

Zoom has encouraging people to use the waiting room, a meeting lock, and a limit on screen sharing features:

  • A waiting room is a virtual place where people gather before a Zoom meeting, a control in Zoom's web settings.
  • A meeting lock stops uninvited parties from joining, click the MANAGE PARTICIPANTS button at the bottom of the Zoom application window, hit MORE in the participant's pane near the bottom right corner of the window, and select LOCK MEETING.
  • The host can stop a participant's taking control of what everyone sees by enabling the restriction from the Zoom web settings.

Zoom is working with other companies to stop the disruption of meetings, but is it too late? The company's reputation as a secure and private solution to working from home and teleconferencing is diminishing. iTecs is advising clients to try different solutions if Zoom intrusion concerns are unacceptable. With a broad market of solutions out there, your business model, needs, and security goals will affect which product to use for your business.

Latest posts

How to Deploy Self-Hosting DeepSeek-R1 Using Ollama Implementation Guide
April 19, 2025

How to Deploy Self-Hosting DeepSeek-R1 Using Ollama Implementation Guide

Our Self-Hosting DeepSeek-R1 Using Ollama guide provides organizations with a comprehensive technical roadmap for deploying AI models within their own infrastructure. From hardware selection and installation to performance optimization and security hardening, this guide covers the complete implementation process with expert insights at each critical phase. Learn how to select appropriate model sizes based on your hardware capabilities, implement web interfaces for user access, and properly secure your AI deployment. This guide demonstrates how organizations can leverage powerful AI capabilities while maintaining complete data privacy and control.
Shutup10 Privacy Settings Tool
April 14, 2025

Shutup10 Privacy Settings Tool

Anyone who has configured a new installation of Windows 10 has seen there are a large amount of privacy, location and performance settings in the operating system. The sheer amount of selections available to adjust can be discouraging to even an experienced IT professional. Considering the multitude of options available it can be difficult, if almost impossible, to find them again later on - much less to remember them all! Enter O&O Software’s humorously named O&O ShutUp10.
Scam robocalls pretending to be Apple
April 14, 2025

Scam robocalls pretending to be Apple

We've received reports that customers are receiving calls from a company claiming to be Apple informing them that their Apple ID has been compromised. The culprits are calling random numbers, mainly in the United States. If you follow their prompts to "secure your account" you'll be transferred to a call center in India who will then try to get as much personal information from you as possible; they will try to get your credit card information to charge a fee to secure the compromised account.