April 2, 2020

How to prevent Zoombombing

A-holes hijacking Zoom calls with grotesque images and noise

As Zoom grows due to the coronavirus induced work from home style of conducting business. Immature and nefarious actors are hijacking and listening in on business and personal meetings around the world. We've heard reports of Youtube videos of Neo-Nazi sort of content suddenly shown in meetings, to loud ear gouging noises played until people leave the session.

Zoom has encouraging people to use the waiting room, a meeting lock, and a limit on screen sharing features:

  • A waiting room is a virtual place where people gather before a Zoom meeting, a control in Zoom's web settings.
  • A meeting lock stops uninvited parties from joining, click the MANAGE PARTICIPANTS button at the bottom of the Zoom application window, hit MORE in the participant's pane near the bottom right corner of the window, and select LOCK MEETING.
  • The host can stop a participant's taking control of what everyone sees by enabling the restriction from the Zoom web settings.

Zoom is working with other companies to stop the disruption of meetings, but is it too late? The company's reputation as a secure and private solution to working from home and teleconferencing is diminishing. iTecs is advising clients to try different solutions if Zoom intrusion concerns are unacceptable. With a broad market of solutions out there, your business model, needs, and security goals will affect which product to use for your business.

Latest Posts

July 16, 2021

Why End Point Detection (EDR) Offers Better Security

The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.

Read More
July 12, 2021

What is a Crypto Wallet and How to Secure it

There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.‍

Read More
July 7, 2021

How to better defend against cyberattacks

The first and most crucial thing any company can do to reduce the likelihood of a cyberattack is to train their employees about cyberthreats and how to recognize them. This may seem obvious and intuitive, but the fact of the matter is that human error accounts for a large percentage of successful cyberattacks.

Read More

You have questions, we have answers

What can we help you with?