Zoom Cyber Attack Milwaukee Chicago

How to Secure Your Zoom Meeting From Cyber Attack

Secure Your Zoom Meeting From a Cyber Attack

Once again, a new cyber threat has invaded our businesses, schools, and social media groups. This ominous menace is called Zoombombing or Zoom Raiding. It is a new style of cyberattack affecting virtual meetings and can create a nuisance or be outright lewd and inappropriate.

The threat is so pervasive that state and federal agencies, major companies, and governments outside the United States have prohibited the use of Zoom. This includes Google, Space X, NASA, the German Foreign Ministry, the United States Senate, Australian Defense Force, and the Taiwanese and Canadian governments.

In a nutshell, uninvited attendees or strangers crash your Zoom meeting. They wreak havoc by hijacking your video conference and display offensive content or material. The intrusion is so prevalent that the Federal Bureau of Investigation has stepped in and is advising all users of the threats.

At Core Vision, we’re always on the lookout for how to improve your security. Working with hundreds of small and mid-sized businesses, we identify and maintain best practices that keep our clients safe. In that spirit, we hope the following guidelines will help you be secure and maintain your reputation.

4 Easy Steps to Shield Your Zoom Video Meetings

If you watched our Secure Your Zoom Meetings From Cybercriminals video, Mike makes a great point regarding the conditions being ripe for these attacks. Many professionals are working from home for the first time, which means that they’re away from those strict cybersecurity standards in their offices. Instead, their security protection at home and on their personal computers is limited and possibly vulnerable.

So if you are using Zoom for your business meetings, these simple steps that will help you keep them protected:

Review and Change Your Zoom Settings

Before you begin any zoom meeting, you need to review your account and meeting settings first. These changes allow you to reduce any possible intrusion or disruption during a session.

  • Avoid Personal Meeting ID – Only Use a Per-Meeting ID. Treat every meeting as unique. From this point forward, only use a Per-Meeting ID and never use your Personal Meeting ID again. That approach gives you complete control over each meeting as after the meeting, the Per-Meeting ID expires too.
  • Always Setup a Waiting Room. Before your initial meeting, set up your Waiting Room. That feature allows you to see who is attempting to join the meeting. If you do not recognize the attendee, they remain blocked from entering.
  • Review and Disable Unnecessary Options. Disable screen-sharing for non-hosts. Do the same with file transferring, annotations, the autosave feature for chats, and the remote-control function.
  • Allow Only Signed-In Users. Allow only users who’ve been invited through their email to join. This single step becomes a massive blockade for strangers or would-be attendees trying to gain access.

Lock The Meeting to Outsiders

Once those authorized to be in your meeting have arrived, lock the session preventing access to others. By assigning two meeting co-hosts, they, too, can monitor the discussion for any possible bypass attempts.

Always Update Zoom

Always have the latest version of Zoom installed. Like all software, new releases and improved security features get updated. You can get updates from within the application or download the program from Zoom’s official website.

Mute Audio and Disable Video Except for the Host

Once the meeting has started, mute audio for all attendees. That feature is at the bottom of the bar and labeled Manage Participants. Check ‘Mute Participants On Entry,’ and uncheck ‘Allow Participants to Unmute Themselves.’

What should I do if someone Zoombombs my meeting?

First, don’t panic. Things like this are bound to happen as your team gets familiar with using new tools like Zoom. The good news is that you don’t have to end the session entirely.

Here are the main actions to take:

  • HOLD. You can choose to put the entire meeting on hold to stop all audio and video from being shared. This will buy you time while you determine the next steps.
  • MUTE. You can mute all participants to stop anyone from sending audio or video thru while you continue with the meeting. This is a good option for presentations as a default and can be set up with the meeting options.
  • REMOVE. To kick the user out of the meeting, just go to the navigation bar, then scroll down the Participants List and click the ‘Remove’ option.

Virtual meeting platforms like Zoom, BlueJeans, Teams, and others provide a great platform for virtual meetings and online education. Unfortunately, they also offer an excellent opportunity for cybercriminals to try to identify a weakness to attack.

Core Vision helps thwart those attacks by assisting our clients with an awareness of the security options available. Working with clients throughout the Milwaukee and Chicago metro areas, we focus on the security of your network, data, and users – no matter where they might be.

For even more Zoom recommendations and options, here’s an expanded list of options.