No Result
View All Result
Simon Angling
  • Home
  • About Me
  • Cyber Security
  • Productivity
  • Blog
    • Cyber Security
    • Design
    • Education
    • Learning Out Loud
    • Microsoft
    • Productivity
    • Technology
  • Contact Me
Simon Angling
  • Home
  • About Me
  • Cyber Security
  • Productivity
  • Blog
    • Cyber Security
    • Design
    • Education
    • Learning Out Loud
    • Microsoft
    • Productivity
    • Technology
  • Contact Me
No Result
View All Result
Simon Angling
No Result
View All Result
Home Technology

Understanding the Recent Security Changes in Zoom

Simon Angling by Simon Angling
April 7, 2020 - Updated on April 24, 2020
in Technology

With the global coronavirus pandemic, there is a huge increase in home working and people are turning to software like Microsoft Teams and Zoom to conduct business, consult with doctors, or keep in touch with friends.

There has been a lot of media in the last week about the security of Zoom meeting and whilst my advice is to migrate to Microsoft Teams I promised a colleague that I would send her the basics of security against what is been termed “Zoom Bombing”.

Zoom Bombing is essentially the ability of unwelcome ‘guests’ entering a conference and harassing attendees or otherwise disrupting a private meeting.

In the last few days Zoom has been rolling out changes to prevent this practice but I would still advise users to double-check their meetings going forward and some users maybe don’t understand why things have changed, so I hope to quickly explain what has changed and why.

The Zoom Bombing risk comes from the URL used to join meetings which has the Meeting ID embedded into the URL.

Join Zoom Meeting
https://us04web.zoom.us/j/316XXX0410
Meeting ID: 316 XXX 0410

Note: I have changed my meeting ID and turned off passwords for the purposes of this document.

Zoom Bombing is essentially guessing the meeting ID and ‘dropping in’ unannounced.

So, if you are using your Personal Meeting ID as shown above click edit and make sure that you set a password and Enable waiting room.

If you are scheduling meeting individually then the process is similar. Make sure you have a password and enable the waiting room.

The password is added to the end of your meeting URL in an encoded manner so clicking on the URL does not require the user to enter the password, but it does prevent unwanted guests.

Join Zoom Meeting
https://us04web.zoom.us/j/316XXX0410?pwd=SUlEcDYyQWNLSU9BZThFMzJvT1NPUT09
Meeting ID: 316 XXX 0410
Password: 12345

The waiting room gives you control over who enters the meeting.

When someone joins the meeting, they will receive a message that a host will let them in soon.

As the meeting host, you will receive notification that someone is in the meeting room and you can admit them straight away or view the waiting room.

If you view the waiting room, you will see a list of people waiting and you can admit or remove them.

Whilst in a meeting you can view the participants and put individuals back in the waiting room or remove them.

I hope that explains the changes and how the waiting room works and gives you the ability to manage your meeting work effectively.

Related

Tags: Microsoft TeamsWorking from Home
Previous Post

AZ-203 Developing Solutions for Microsoft Azure Exam

Next Post

GTD and InBox Zero with Microsoft Outlook

Next Post
GTD and InBox Zero with Microsoft Outlook

GTD and InBox Zero with Microsoft Outlook

Comments 1

  1. Erin Katherine says:
    4 years ago

    This is so helpful for those of us who have had to switch over to zoom for work! Thanks for the effort and clear information Simon! Much appreciated!

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts

GTD and InBox Zero with Microsoft Outlook

Microsoft Defender Products and Licensing Demystified

Understanding the Recent Security Changes in Zoom

Defender for Endpoint for Servers vs Defender for Cloud Server

Free Data Ingestion into Microsoft Sentinel Explained

Increasing upload_max_size in php.ini with Azure Web Apps

What is Security Orchestration, Automation, and Response (SOAR)

Azure Front Door Vanilla, Standard and Premium

What is Zero Trust, and how Microsoft implements it

Microsoft Cybersecurity Reference Architectures (MCRA) Updated

Categories

  • Africa Overland
  • Archive
  • Asides
  • Cyber Security
  • Design
  • Education
  • Learning Out Loud
  • Microsoft
  • Personal
  • Productivity
  • Quotes
  • South Africa
  • Technology
  • Travel
  • Web Development
  • Privacy Policy
  • Cookie Policy

© 2024 Simon Angling

No Result
View All Result
  • Home
  • About Me
  • Cyber Security
  • Productivity
  • Blog
    • Cyber Security
    • Design
    • Education
    • Learning Out Loud
    • Microsoft
    • Productivity
    • Technology
  • Contact Me

© 2024 Simon Angling