Video Title:

Zoom Security Measures and Levels of Protection

Video Category:

Cyber Threats

Video Description:

What are the security measures you should be taking when on a Zoom call, and how can these different security levels help protect your personal and business data?

What Are the Best Cybersecurity Practices for Protecting Your Zoom Data?

Closed Captioning: 

Sound Notifications

  • Enable sound notifications to alert when attendees join meetings

Waiting Rooms

  • Configure approval settings for attendees

  • Use whitelisted domains to bypass waiting rooms and allow direct meeting access

Screen Sharing

  • Limit screen sharing to specific applications vs. entire desktops to prevent accidental data disclosures

Meeting Room Settings

  • Don't allow attendees to join a meeting before the host

  • Disable file transfers between attendees to prevent spreading malicious content

User Access

  • Require users to register with their e-mail, name, security questions, and meeting password

Chat and Voice Settings

  • Disable meeting chats to prevent users from saving private conversations

  • Mute/unmute all participants with the click of a button

Meeting IDs

  • For public meetings, use randomly generated meeting IDs to ensure only invited attendees can join


What Are the Top Security Recommendations for Registered Zoom Hosts?

Utilize Strong Passwords

  • Password length of 10-12 characters & special symbols

  • Require new users to change password upon first sign-in

  • Utilize enhanced weak password detection

  • Prevent users from reusing passwords

  • No consecutive characters (ex. 1234)

  • Set passwords to automatically expire

Virtual Background

  • Account owners and admins can enable and disable virtual backgrounds in the Zoom web portal for all users on their account

Encryption and Updates

  • Zoom provides end-to-end encryption, which can be configured at the account, group, and user levels

  • To ensure encryption, update your Zoom Desktop Client or utilize the Zoom Web Client

See How iCorps Was Able to Help These Clients: