Zoom Issues and Best Practices

Zoom, depending on what you read, has gone from a reported 10 million users to over 350 million worldwide in a matter of weeks. It’s little surprise that it has had its share of issues and vulnerabilities. This article discussed video conference security and how you can protect yourself and your business.

Some 600,000 downloads and accounts created took place just last weekend.

From public outings in the press around disclosure of personal details to 500,000 zoom accounts being listed for sale on the Dark Web

We have put this short blog together to help businesses make the informed decisions around using Zoom, in general video conference security, and making sure that the meetings you do have are secured to the best ability.

We have seen reports on the dark web, as well as accounts being sold, of just 30 accounts being up for us, all tested and valid, and comments in the threads talking about how the meetings will be trolled and recorded for Dark Web consumption.

 

Protect Your Video Conference

Users using a VC

  1. Firstly secure your meetings with a password, with no exceptions. Having a password means that it is difficult for someone not supposed to be in your meeting to get access.
  2. Never use the personal meeting ID to start meetings, always use the random generator. If someone has your personal ID and you actively use it, it means those with the details can jump on the meeting at any time.
  3. Where you can, never reuse meeting IDs. A lot of recurring meetings take place in Business, where you can, regularly change these meeting IDs out.
  4. Use the waiting room feature and admit people as you go along, that way you know who is in your room. It allows you to admit those only who are supposed to be there. It gives the meeting host the ability to control who joins your meeting. So even if someone who wasn’t supposed to participate has your meeting password, they cant get access. Also, it allows you to remove an unwanted attendee out of the meeting before it starts. We highly recommend leaving this box ticked.
  5. Once all participants are in the room, lock the room to prevent any further access to the room. This helps with Security, and prevents anyone dialling in over the phone also to just jump in.
  6. Utilise Multi-Factor Authentication on your account, and advise others to do the same. Secure your account effectively. It utilises two of the most popular MFA generators out there, Google & Microsoft.
  7. Always download the apps from the related App stores. Always go to Zoom.US to download your clients, or directly from your phone vendors appropriate application store, There are valid installers out there waiting to be downloaded from third party sites, but have malware loaded ready to go. Zoom will work fine, your machine could be infected.
  8. Never share links outside of the invitees. Keep meetings as closed as you can and just share with the attendees you are expecting.
  9. Never share information on public forums such as Social Media. People see a link, its human nature to click it and see what your meeting is all about.webinar 3199164 960 720
  10. Never add links to the comments if you are using it inside of the business and sharing local paths such as network drives
  11. It is perfectly possible to increase elements of security such as preventing screen sharing. Screen sharing restrictions to be in place to prevent others sharing screens that no one wants to see.
  12. If you are using this with colleagues, and sharing links to a network drive. Keep these out of the chat window. There have been cases where usernames and passwords have been obtained by a third party as when you click access, hashed credentials can be passed in the path which can be harvested
  13. Where you can, sign up using your business email address. There have been reported cases where domains like gmail.com or hotmail.co.uk have been treated as the same company and information is shared.
  14. Always use the latest client when it comes to video conference security. At the time of writing Zoom have just patched an issue where, in certain conditions on LinkedIn, it publicly shared information from Sales Navigator with all some attendees, even though they weren’t connected. A privacy issue. Zoom regularly now patch fixes its client as it goes along, and after this privacy issue was publicly outed, they have introduced a 90 day moratorium on new features and releases in the attempt to not introduce any issues.
  15. Don’t forget about the Web version of Zoom. It is just as functional except doesn’t have the security issues and vulnerabilities that we have talked about above.
  16. Think about what people in the Zoom, other varieties are available, conference can see or hear.
  17. Be aware that under certain conditions, the full end to end encryption doesn’t necessarily mean just that. For example using a phone to dial in to a meeting can render the meeting accessible through not being encrypted.

 

 

Past Blogs

benefits of cybersecurity

Benefits of CyberSecurity

The benefits of cybersecurity. With vast amounts of information are stored online, the benefits of robust cybersecurity are more vital than ever. At Network &...
what is dmarc

What is DMARC

What is DMARC and Why Does Your Business Need It? When it comes to protecting your business from cyber threats, email security is often overlooked. Yet, email is one of...
Why is password management software important

Why is Password Management Software Important

Why is Password Management Software Important for Your Business? In today’s digital world, passwords are the keys to your business’s most sensitive information. From...
What is Email Filtering ?

What is Email Filtering and Why Every Business Needs It

Email is the lifeblood of business communication, but it’s also one of the most vulnerable entry points for cyberattacks. According to research, 96% of cyber threats...
What’s your business’s view on Return to Office?

What’s your business’s view on Return to Office?

Do you love keeping your employees happy by allowing them to work remotely? Or do you think everyone is more productive in the office? Businesses are divided on this...
Outdated backup systems could leave your business vulnerable

Outdated backup systems could leave your business vulnerable

When did you last review your business’s backup tools? Outdated backup systems can fail to protect you from modern threats, like ransomware attacks. If you want a...
Microsoft’s fixing this annoying Windows 11 fault

Microsoft’s fixing this annoying Windows 11 fault

Fed up seeing useless “Recommendations” in the Windows 11 Start menu? Good news – Microsoft’s making them more helpful. Here’s how the improvements could help your team...
Beware that corrupted email attachment: It could be a scam

Beware that corrupted email attachment: It could be a scam

Cyber criminals get more creative every day. The latest scam designed to steal your business data uses corrupted Word files – and getting fooled is easier than you...
Are your employees your security’s weakest link?

Are your employees your security’s weakest link?

Great employees have the same goals you do. But while they’re working hard to help your business succeed, they could accidentally be opening the door to cyber...
The two big threats of doing business on public Wi-Fi

The two big threats of doing business on public Wi-Fi

Public Wi-Fi can be a lifesaver when you must send an urgent email while out of the office. But did you know it can also put your business data at risk? These are the...