This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities!
To prevent participants from screen sharing during a call, use the host controls at the bottom, click the arrow next to Share Screen, and then Advanced Sharing Options.
Under “Who can share?” choose “Only Host” and close the window.
Image Source: Zoom Blog
The meeting host can also lock the Screen Share by default for all meetings in web settings as shown below.
Image Source: Zoom Blog
Image Source: Zoom Blog
To lock the meeting, kindly follow the below steps :
Click Participants at the bottom of the Zoom window and in the Participants pop-up, click the button that says Lock Meeting.
Image Source: keepteaching.usc.edu
Settings > Navigate to the Meeting tab and verify the password settings that you would like to use for your meetings.
Image Source: Zoom Blog
Click on Manage Participants in the host controls > Scroll over the name of the attendee you want to put on hold. Click More, then Put on hold > Click Takeoff hold in the participants’ list whenever you are ready to bring them back into the meeting.
Image Source: Zoom Blog
Image Source: Zoom Blog
Select Manage Participants > Select Mute All > Click on Allow participants to unmute themselves. Clicking Continue will mute all current and new participants.
Image Source: Zoom Blog
Click on Account Management > Click on Account Settings and scroll down. Under the File Transfer option, Disable it.
Image source: Gadgetsnow.com
The Waiting Room is a virtual staging area that stops guests from joining until the host is ready to allow them. This feature is especially beneficial to make the meeting more secure. It also gives security plus added visibility into who is trying to join.
Click on the Meeting Advanced option > Search or scroll to find the Waiting Room option > Enable the Waiting Room feature.
Image Source: Zoom Blog
After enabling the Waiting Room feature, the host can choose to send all participants to the Waiting Room or to send only some participants (external accounts) to the Waiting Room.
Image Source: Zoom Blog
Note – Read about Zooming Security Vulnerabilities in Part 1 in our article zooming Security Vulnerabilities Part – 1.
Blog Authors –
Poornima J. / Ashish M.
Security Consultants – Varutra Managed SOC
Introduction In the era of digitalization, data security has become a paramount concern. Every day,…
I.Introduction Bluetooth has become an integral technology for billions of smartphones, computers, wearables, and other…
I. Introduction In today's ever-evolving cybersecurity landscape, staying ahead of adversaries has become a challenge.…
Introduction In an increasingly interconnected world, the financial industry is becoming more vulnerable to cyber…
Introduction In today's interconnected world, where smartphones are an extension of our lives, ensuring the…
Introduction Unseen and unpredictable, zero-day threats loom as a constant menace to modern businesses. Detecting…