Zoombombing: What it is and how you can prevent it in Zoom video chat

Monterey technical support

Table of Contents

Video-conferencing software Zoom has been drawing attention from researchers and journalists lately for a number of potential privacy and security issues, as use of the platform surges due to an increase in coronavirus-related remote working. One of the biggest security issues facing Zoom is the surge in “Zoombombing,” when uninvited attendees break into and disrupt your meeting. 

It can be easy to Zoombomb a meeting. In many cases, a simple Google search for URLs that include “Zoom.us” can turn up the unprotected links of multiple meetings that anyone can jump into. Similarly, links to public meetings can be found scattered across organizational pages on social media.

Zoom settings you should change now

There are some easy settings you can change before your Zoom meeting begins that will allow you to reduce the likelihood of intrusion by uninvited guests, and generally bolster your privacy overall. 

1. Don’t use your Personal Meeting ID for the meeting. Instead, use a per-meeting ID, exclusive to a single meeting. Zoom’s support page offers a video walk-through on how to generate a random meeting ID for extra security.

2. Enable the “Waiting Room” feature so that you can see who is attempting to join the meeting before allowing them access. Like many other privacy functions, a skillful disrupter can sometimes bypass this control, but it helps to put another hurdle in their route to chaos. 

Zoom offers a support article here as well. To enable the Waiting Room feature, go to Account Management > Account Settings. Click on Meeting, then click Waiting Room to enable the setting. 

3. Disable other options, including the ability for others to Join Before Host (it should be disabled by default, but check to be sure — see below). Then disable screen-sharing for nonhosts, and also the remote control function. Finally, disable all file transferring, annotations and the autosave feature for chats.  

To disable most of these features, click on the gear-shaped Settings icon on the upper-right side of the page after you’ve logged in. From there, you’ll see the option to turn off most of the listed features. 

Disabling screen-sharing is a bit different, but just as easy. Go to the host controls at the bottom of your screen, and you’ll see an arrow next to Share Screen. Click the arrow, then click Advanced Sharing Options. Go to Who can share? Click Only Host, then close the window. 

4. Once the meeting begins and everyone is in, lock the meeting to outsiders and assign at least two meeting co-hosts. The co-hosts will be able to help control the situation in case anyone bypasses your efforts and gets into the meeting.

To deputize your co-hosts, go to the same Settings icon, then to the Meetings tab. Scroll down to Co-host and make sure it is enabled. If Zoom asks you for verification, click Turn On.  

Adaptive Information Systems was founded with the mission to help businesses get the most out of their technology investments. We provide Monterey technical support, we are ready to manage your IT needs so you can focus on running your business.

831-644-0300

Facebook
Twitter
LinkedIn

We're Here To Listen and Help. Connect With Adaptive Information Systems

If you have technology needs, Adaptive Information Systems can help. Contact us and a consultant will call you ASAP.

Name(Required)
This field is for validation purposes and should be left unchanged.