{"id":2360,"date":"2020-05-11T07:00:32","date_gmt":"2020-05-11T07:00:32","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=2302"},"modified":"2022-12-02T15:02:25","modified_gmt":"2022-12-02T09:32:25","slug":"zooming-security-vulnerabilities-part-2","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/","title":{"rendered":"Zooming Security Vulnerabilities [Part \u2013 2]"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300-1024x512.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"intro - Varutra Consulting\"><\/p>\n<p style=\"text-align: left\">This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities!<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>1. Ensure the Host can manage Screen Sharing &#8211;<\/strong><\/h3>\n<p>To prevent participants from screen sharing during a call, use the host controls at the bottom, click the arrow next to Share Screen, and then Advanced Sharing Options.<\/p>\n<p><em>Under \u201cWho can share?\u201d choose \u201cOnly Host\u201d and close the window.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2305\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/one.png\" alt=\"Host can manage Screen Sharing - Zooming Security Vulnerabilities\" width=\"793\" height=\"120\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Zoom Blog<\/em><\/p>\n<p>The meeting host can also lock the Screen Share by default for all meetings in web settings as shown below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2306\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/two.png\" alt=\"\" width=\"815\" height=\"161\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Zoom Blog<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>2. Ensure the Host can manage Meeting participants &#8211;<\/strong><\/h3>\n<ul>\n<li><strong>Allow only signed-in users to join:<\/strong> If someone apart from the invitees, tries to join the meeting and is not logged into Zoom with the email they were invited through, they will receive the message:<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2307\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/three.png\" alt=\"Allow only signed-in users to join\" width=\"468\" height=\"178\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Zoom Blog<\/em><\/p>\n<ul>\n<li><strong>Lock the Meeting when intended participants are in<\/strong>: This setting will ensure that no new participants can join, even if they have the meeting ID and password once the host locks the meeting.<\/li>\n<\/ul>\n<p style=\"text-align: left\">To lock the meeting, kindly follow the below steps :<\/p>\n<p style=\"text-align: left\"><em>Click Participants at the bottom of the Zoom window and in the Participants pop-up, click the button that says Lock Meeting.<\/em><\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2308\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/four.jpg\" alt=\"Lock Meeting.\" width=\"585\" height=\"296\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: <\/em><a href=\"http:\/\/keepteaching.usc.edu\"><em>keepteaching.usc.edu<\/em><\/a><\/p>\n<ul>\n<li><strong>Ensure to set a password for Meeting:<\/strong> Generate a random Meeting ID when scheduling the event and requires a password to join.<em><br \/>\n<\/em><\/li>\n<\/ul>\n<p style=\"text-align: left\"><em>Settings &gt; Navigate to the Meeting tab and verify the password settings that you would like to use for your meetings.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2309 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/06\/Style-of-Attacks.png\" alt=\"Ensure to set a password for Meeting\" width=\"714\" height=\"343\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/06\/Style-of-Attacks.png 714w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/06\/Style-of-Attacks-300x144.png 300w\" sizes=\"(max-width: 714px) 100vw, 714px\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Zoom Blog<\/em><\/p>\n<ul>\n<li><strong>Put the Participants on hold (if required)<\/strong>: Click on the participant\u2019s video thumbnail and select <em>Start Attendee On Hold<\/em> to activate this feature. Click Take Off Hold in the Participant\u2019s list when you are ready to have them back.<\/li>\n<\/ul>\n<p style=\"text-align: left\"><em>Click on Manage Participants in the host controls &gt; Scroll over the name of the attendee you want to put on hold. Click More, then Put on hold &gt; Click Takeoff hold in the participants&#8217; list whenever you are ready to bring them back into the meeting.<\/em><\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2310 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/06\/Security-Considerations.png\" alt=\"Put on hold\" width=\"573\" height=\"359\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/06\/Security-Considerations.png 573w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/06\/Security-Considerations-300x188.png 300w\" sizes=\"(max-width: 573px) 100vw, 573px\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Zoom Blog<\/em><\/p>\n<ul>\n<li style=\"text-align: left\"><strong>Disable Video (if required)<\/strong>: Hosts can turn participant\u2019s videos off using <em>manage participants<\/em> This will allow hosts to block unwanted, distracting, or inappropriate gestures on video.<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2311 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/seven.png\" alt=\"stop video\" width=\"292\" height=\"324\" \/><\/li>\n<\/ul>\n<p style=\"text-align: center\"><em>Image Source: Zoom Blog<\/em><\/p>\n<ul>\n<li style=\"text-align: center\"><strong>Mute Video (If required): <\/strong>Hosts can mute\/unmute individual participants or all of them at once under the manage participants option.<\/li>\n<\/ul>\n<p><em>Select Manage Participants &gt; Select Mute All &gt; Click on Allow participants to unmute themselves. Clicking Continue will mute all current and new participants.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2312\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/eight.png\" alt=\"Mute all\" width=\"549\" height=\"234\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Zoom Blog<\/em><\/p>\n<ul>\n<li><strong>Disable File-Transfer:<\/strong> Zoom allows participants to share files through the in-meeting chat. The host can disable this from getting bombarded with unsolicited pics, GIFs, memes, and other content.<\/li>\n<\/ul>\n<p style=\"text-align: left\"><em>Click on Account Management &gt; Click on Account Settings and scroll down. Under the File Transfer option, Disable it.<\/em><\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2313\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/nine.png\" alt=\"Disable file transfer\" width=\"527\" height=\"294\" \/><\/p>\n<p style=\"text-align: center\"><em>Image source: Gadgetsnow.com<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>3. Try the option \u2018Waiting Room\u2019 &#8211;<\/strong><\/h3>\n<p>The Waiting Room is a virtual staging area that stops guests from joining until the host is ready to allow them. This feature is especially beneficial to make the meeting more secure. It also gives security plus added visibility into who is trying to join.<\/p>\n<p style=\"text-align: left\"><em>Click on the Meeting Advanced option &gt; Search or scroll to find the Waiting Room option &gt; Enable the Waiting Room feature.<\/em><\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2314\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/ten.png\" alt=\"\" width=\"815\" height=\"184\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Zoom Blog<\/em><\/p>\n<p style=\"text-align: left\">After enabling the Waiting Room feature, the host can choose to send all participants to the Waiting Room or to send only some participants (external accounts) to the Waiting Room.<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2315 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/eleven.png\" alt=\"Enable waiting room\" width=\"548\" height=\"323\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Zoom Blog<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Secure Zoom Meetings Setup Quick Bytes \u2013<\/strong><\/h3>\n<ul>\n<li>Ensure the Host can manage screen sharing options<\/li>\n<li>Ensure the Host can manage meeting participants<\/li>\n<li>Ensure to set &#8211; require a password for the meeting<\/li>\n<li>Protect your zoom account with a strong password<\/li>\n<li>Lock the meeting when intended participants are in<\/li>\n<li>Do not use social media to share conference links<\/li>\n<li>Do not use your personal Zoom Meeting ID<\/li>\n<li>Leave &#8216;Enable join before host&#8217; unchecked<\/li>\n<li>Prefer to turn host and participant video off by default<\/li>\n<li>Mute participants on entry<\/li>\n<li style=\"text-align: left\">Try the Waiting Room option<\/li>\n<\/ul>\n<p><strong>Note &#8211; <\/strong><em>Read about Zooming Security Vulnerabilities in Part 1 in our article <a href=\"https:\/\/www.varutra.com\/zooming-security-vulnerabilities-part-1\/)\">zooming Security Vulnerabilities Part &#8211; 1.<\/a><br \/>\n<\/em><\/p>\n<p><em>Blog Authors &#8211;<\/em><\/p>\n<p><em>Poornima J. \/ Ashish M.<\/em><\/p>\n<p><em>Security Consultants &#8211; Varutra Managed SOC<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities! &nbsp; 1. Ensure the Host can&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3113,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[277,266,273],"tags":[],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Worried about evolving Zooming Security Vulnerabilities? Here are steps for setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Zooming Security Vulnerabilities - Setting Zoom Meetings\" \/>\n\t\t<meta property=\"og:description\" content=\"Worried about evolving Zooming Security Vulnerabilities? Here are steps for setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t\t<meta property=\"article:section\" content=\"Data Privacy\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-05-11T07:00:32+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T09:32:25+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Zooming Security Vulnerabilities - Setting Zoom Meetings\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Worried about evolving Zooming Security Vulnerabilities? Here are steps for setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#article\",\"name\":\"Zooming Security Vulnerabilities - Setting Zoom Meetings\",\"headline\":\"Zooming Security Vulnerabilities [Part \\u2013 2]\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/intro-2-wpp1596605589300.png\",\"width\":1200,\"height\":600,\"caption\":\"Zooming Security Vulnerabilities\"},\"datePublished\":\"2020-05-11T07:00:32+05:30\",\"dateModified\":\"2022-12-02T15:02:25+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#webpage\"},\"articleSection\":\"Data Privacy, Security Advisory, Security Best Practices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#listItem\",\"position\":2,\"name\":\"Zooming Security Vulnerabilities [Part \\u2013 2]\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/\",\"name\":\"Zooming Security Vulnerabilities - Setting Zoom Meetings\",\"description\":\"Worried about evolving Zooming Security Vulnerabilities? Here are steps for setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/intro-2-wpp1596605589300.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#mainImage\",\"width\":1200,\"height\":600,\"caption\":\"Zooming Security Vulnerabilities\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-2\\\/#mainImage\"},\"datePublished\":\"2020-05-11T07:00:32+05:30\",\"dateModified\":\"2022-12-02T15:02:25+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Zooming Security Vulnerabilities - Setting Zoom Meetings<\/title>\n\n","aioseo_head_json":{"title":"Zooming Security Vulnerabilities - Setting Zoom Meetings","description":"Worried about evolving Zooming Security Vulnerabilities? Here are steps for setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Zooming Security Vulnerabilities - Setting Zoom Meetings","og:description":"Worried about evolving Zooming Security Vulnerabilities? Here are steps for setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300.png","og:image:width":"1200","og:image:height":"600","article:section":"Data Privacy","article:published_time":"2020-05-11T07:00:32+00:00","article:modified_time":"2022-12-02T09:32:25+00:00","twitter:card":"summary_large_image","twitter:title":"Zooming Security Vulnerabilities - Setting Zoom Meetings","twitter:description":"Worried about evolving Zooming Security Vulnerabilities? Here are steps for setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300.png","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"4 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#article","name":"Zooming Security Vulnerabilities - Setting Zoom Meetings","headline":"Zooming Security Vulnerabilities [Part \u2013 2]","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300.png","width":1200,"height":600,"caption":"Zooming Security Vulnerabilities"},"datePublished":"2020-05-11T07:00:32+05:30","dateModified":"2022-12-02T15:02:25+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#webpage"},"articleSection":"Data Privacy, Security Advisory, Security Best Practices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#listItem","position":2,"name":"Zooming Security Vulnerabilities [Part \u2013 2]","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/","name":"Zooming Security Vulnerabilities - Setting Zoom Meetings","description":"Worried about evolving Zooming Security Vulnerabilities? Here are steps for setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#mainImage","width":1200,"height":600,"caption":"Zooming Security Vulnerabilities"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/#mainImage"},"datePublished":"2020-05-11T07:00:32+05:30","dateModified":"2022-12-02T15:02:25+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"2360","title":"Zooming Security Vulnerabilities - Setting Zoom Meetings","description":"Worried about evolving Zooming Security Vulnerabilities? Here are steps for setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Zooming Security Vulnerabilities\",\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use your focus keyphrase more in your H2 and H3 subheadings.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}},\"score\":90},\"additional\":[{\"keyphrase\":\"Security Vulnerabilities\",\"score\":100,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Zoom Meetings\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/05\/intro-2-wpp1596605589300.png","og_image_width":"1200","og_image_height":"600","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Data Privacy","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:16:26","updated":"2022-12-02 09:45:09"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/data-privacy\/\" title=\"Data Privacy\">Data Privacy<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tZooming Security Vulnerabilities [Part \u2013 2]\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Data Privacy","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/data-privacy\/"},{"label":"Zooming Security Vulnerabilities [Part \u2013 2]","link":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-2\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2360"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=2360"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2360\/revisions"}],"predecessor-version":[{"id":20335,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2360\/revisions\/20335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/3113"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=2360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=2360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=2360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}