Nowadays, remote work has become widespread with the effect of coronavirus. Although online meetings provide great convenience, it brings with it large cyber risks. Zoom is often preferred especially for online meetings. It is very important to take measures against cyber attacks for online meetings. In this process, I prepared some precautions with the experiences I gained while using Zoom. Here are some precautions for cyber attacks.
When organizing a meeting, it should be password protected. It can be more effective against intruders, thanks to password protection,. These passwords should not be shared on social media.
Waiting Room is a perfect feature I use in Zoom should be activated. When someone wants to attend the meeting, it must wait in the waiting room until admin approve it. It can be activated by visiting meeting settings page.
If everyone who should have attended the meeting has attended, the meeting may be locked. In this way, even if he knows the password, an intruder cannot attend the meeting.
Sharing invitation links on social media can be a huge mistake. With the spread of online meetings, trolls have increased considerably. Unfortunately, there are a lot of people who attend meetings with these invitation links and disrupt the meeting.Usage of Personal ID
Personal ID is always the same and fixed. If a meeting is organized using a personal ID, the ID will be the same for each meeting. This will cause it to be an easy target. Therefore, a new ID may be preferred for each meeting.
If admin wants that participants cannot share their screens, this feature can be used easily. After clicking Manage Participants from the menu below, the necessary limitations can be set.
It may be a good idea to review the list of participants periodically during meeting. When there is uninvited someone on the list, clicking Remove is enough.
Passwords containing strong and complex characters must be selected for the account.
When organizing or attending a meeting, make sure that it has an official website address. Also, for mobile devices, only official applications should be downloaded from the relevant store.
The desktop or mobile application used must be kept up to date. The last update released may contain significant security improvements.