8 tips to protect your ZOOM video calls

Deepak Gupta
Deepak Gupta January 22, 2022
Updated 2022/01/22 at 3:33 PM

8 tips to protect your Zoom video calls

Avoid unpleasant surprises by configuring advanced zoom settings so that no intruder can pollute your videoconference without your knowledge,

The need to communicate with many employees has caused the download of video conferencing applications to explode.

Today video dating app such as zoom video callsis one of the most used programs in the professional world of Zoom and won over many new users. But not everyone uses enhancements for performance. Trolls and other hackers are taking advantage of the app’s newfound success and have found a new pastime: unexpected landing (also known as zooming), misuse of names, or distributing pornographic content using screen sharing features .

To avoid this loss, a number of good practices and parameters must be implemented to change the program. That’s all you need to know to secure your video conferencing for expansion.

This may sound reasonable, but sharing a URL to attend your meeting or video calls on social networks may not be the idea of ​​the century. Anyone can click on the meeting URL that is visible to everyone to join the video conference without being able to prevent it.

To make an appointment, the host needs to boot into their computer and share the meeting or meeting ID with their invitees so they can join the video call. So always choose a link or ID directly via email, SMS or private instant message.

2 – Don’t use your personal meeting ID

Large meetings can be organized in two ways: from a virtual room created randomly at each meeting, with a new identifier for each session, or from a private meeting room using your personal identification number (PMI).

In the New appointment drop-down menu, check if Use my personal meeting (PMI) is disabled.

This unique identifier is associated with your account. Once your closest colleague knows, just zoom in to join the video call. If you use it, handle it with care and only pass it on to your trusted contacts.

3 – Configure the password to attend the meeting

By default, Zoom does not configure passwords for joining meetings. Therefore, you need to access the advanced settings of the app to enable the options.

To do this, click the gear icon in the upper right corner of the zoom window to display the call settings.

In the General window that appears, click Show more settings. Zoom should open the service’s web interface. Log in to your account to access all of your account’s advanced settings.

Scroll through the settings. If you haven’t done so already, enable the password request when you schedule a new appointment and request a password for the instant meeting option.

Anyone trying to join a meeting by manually entering the Zoom username must enter their password to log in.

When password protection is enabled, Zoom automatically encrypts and embeds it in the meeting link so that your invitation can join the meeting with just one click.

Uncheck this option to force people with an access link to enter their password. And if intruders accidentally reach the meeting URL, they won’t be able to access it.

5 – Activate the waiting room

This is perhaps the most interesting option for blocking unexpected meetings. You can manually check each participant’s entry to the meeting.

This option is also available in an extended zoom setting, accessible through the web interface.

6 – Limit screen sharing to meeting hosts

To avoid sending inappropriate content, we recommend recording and sharing limited screens only for meeting hosts during your meeting.

Scroll through the advanced zoom settings until you reach the screen sharing area. Online Who can share? Select Host Only and save your changes.

7 – Disable annotations and remote control

When you share your screen or desktop as a host, meeting users can add notes, use a whiteboard, or control the shared screen remotely.

If you don’t need it, disable these three options: annotation, whiteboard and remote control.

8 – Disable file transfer. Hackers who have managed to gain access to your meeting will not hesitate to share malicious files with a file transfer engine built into chat conversations during meetings.

Disable file transfer options or restrict certain file types to prevent attendees from transferring files.

Share this Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *