SlideShare a Scribd company logo
8 THINGS YOU CAN
DO TO MAKE ZOOM
MORE SECURE
zoom
SIMPLIFYSECURITY.CO.NZ
MAKE SURE YOU ARE
USING THE LATEST
VERSION.
This will ensure the latest security patches
are in place. Zoom will notify you if an
update is available or you can do it under
‘Check for Updates’.
#1
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
USE MEETING IDs AND SET
PASSWORD.
• Use a meeting ID and password when
you want to restrict your audience to
invited attendees
• Ensure you change the meeting ID for
each meeting.
• Send the ID and password via different
channels.
#2
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
ENABLE THE ‘WAITING
ROOM’ FEATURE.
This will put all participants in a staging area
until the host is ready, giving visibility over
who is trying to join the meeting.
#3
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
CONTROL WHO CAN JOIN
THE MEETING.
You can restrict the meeting to participants
who are signed in to Zoom. Access can be
further restricted to those with a specific set
of email address domains.
#4
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
IDENTIFY GUEST
PARTICIPANTS.
When this feature is enabled the host can
check no unauthorised participants are in
attendance. Any guest who is not signed in,
or who is signed in from a different email
domain from the host will be highlighted
orange.
#5
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
ENABLE IN MEETING
CONTROLS FOR
PARTICIPANTS.
Preventing participants from screen sharing,
stopping a participant’s video or removing
them from the meeting are all useful
features to know how to use in the event of
unauthorised or unruly participants.
#6
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
LOCK THE MEETING
ONCE IN PROGRESS.
To prevent anyone else joining the meeting
once you are underway (and may be
distracted from checking if they are
authorised attendees), lock the meeting.
#7
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all
ENABLE TWO-FACTOR
AUTHENTICATION.
Two-factor authentication (2FA) is a two-step
sign-in process that requires a generated
code on a mobile app in addition to a Zoom
username and strong password. This provides
an additional layer of security and keeps
unauthorised users out.
#8
SIMPLIFYSECURITY.CO.NZ
cc@simplifysecurity.co.nz
Making information security accessible to all

More Related Content

What's hot

app that hacks text messages
app that hacks text messagesapp that hacks text messages
app that hacks text messages
annony moxspy
 
Hacking Facebook Without Touching Phone
Hacking Facebook Without Touching Phone Hacking Facebook Without Touching Phone
Hacking Facebook Without Touching Phone
annony moxspy
 
Best Information Security Tips for Better Computing
Best Information Security Tips for Better ComputingBest Information Security Tips for Better Computing
Best Information Security Tips for Better Computing
Patten John
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
rafa_el_souza
 
Cyber Security Tricks One Should Know
Cyber Security Tricks One Should KnowCyber Security Tricks One Should Know
Cyber Security Tricks One Should Know
techexpert2345
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
F-Secure Corporation
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
F-Secure Corporation
 
Venkasure Total Security + Presentation
Venkasure Total Security + PresentationVenkasure Total Security + Presentation
Venkasure Total Security + Presentation
venkasureantivirus
 
Mobile security in smartphone
Mobile security in smartphone Mobile security in smartphone
Mobile security in smartphone
Chico Mobile
 
Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting
Tracy King
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
Quick Heal Technologies Ltd.
 

What's hot (11)

app that hacks text messages
app that hacks text messagesapp that hacks text messages
app that hacks text messages
 
Hacking Facebook Without Touching Phone
Hacking Facebook Without Touching Phone Hacking Facebook Without Touching Phone
Hacking Facebook Without Touching Phone
 
Best Information Security Tips for Better Computing
Best Information Security Tips for Better ComputingBest Information Security Tips for Better Computing
Best Information Security Tips for Better Computing
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
 
Cyber Security Tricks One Should Know
Cyber Security Tricks One Should KnowCyber Security Tricks One Should Know
Cyber Security Tricks One Should Know
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Venkasure Total Security + Presentation
Venkasure Total Security + PresentationVenkasure Total Security + Presentation
Venkasure Total Security + Presentation
 
Mobile security in smartphone
Mobile security in smartphone Mobile security in smartphone
Mobile security in smartphone
 
Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting Better VoIP Network Troubleshooting
Better VoIP Network Troubleshooting
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 

Similar to 8 things you can do to make zoom more secure

20210112 web conferencing tools
20210112 web conferencing tools20210112 web conferencing tools
20210112 web conferencing tools
Ramesh C. Sharma
 
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Inc
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
Amritansh Barnwal
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
101 Blockchains
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
Marc Vael
 
Security by Design for Law Firms
Security by Design for Law FirmsSecurity by Design for Law Firms
Security by Design for Law Firms
Clio - Cloud-Based Legal Technology
 
Zoom security and meeting participant management
Zoom security and meeting participant managementZoom security and meeting participant management
Zoom security and meeting participant management
Paul Richards
 
Making Meetings Simple: "It's Just A Meeting"
Making Meetings Simple:  "It's Just A Meeting" Making Meetings Simple:  "It's Just A Meeting"
Making Meetings Simple: "It's Just A Meeting"
Cisco Canada
 
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco Canada
 
assign3.docx
assign3.docxassign3.docx
assign3.docx
Captain898
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020
Royston Lobo
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
FIDO Alliance
 
Security in OPC UA ppt
Security in OPC UA pptSecurity in OPC UA ppt
Security in OPC UA ppt
Utthunga Technologies Pvt Ltd
 
Security in OPC UA ppt
Security in OPC UA pptSecurity in OPC UA ppt
Security in OPC UA ppt
Mallikarjuna Y C
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
Tatyana Kobets
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
Tatyana Kobets
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
Symptai Consulting Limited
 
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
VMware Tanzu
 
SecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise BrochureSecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise Brochure
BlackBerry
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara
 

Similar to 8 things you can do to make zoom more secure (20)

20210112 web conferencing tools
20210112 web conferencing tools20210112 web conferencing tools
20210112 web conferencing tools
 
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
Security by Design for Law Firms
Security by Design for Law FirmsSecurity by Design for Law Firms
Security by Design for Law Firms
 
Zoom security and meeting participant management
Zoom security and meeting participant managementZoom security and meeting participant management
Zoom security and meeting participant management
 
Making Meetings Simple: "It's Just A Meeting"
Making Meetings Simple:  "It's Just A Meeting" Making Meetings Simple:  "It's Just A Meeting"
Making Meetings Simple: "It's Just A Meeting"
 
Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2Cisco connect toronto 2015 mark zienkiewicz 2
Cisco connect toronto 2015 mark zienkiewicz 2
 
assign3.docx
assign3.docxassign3.docx
assign3.docx
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
Security in OPC UA ppt
Security in OPC UA pptSecurity in OPC UA ppt
Security in OPC UA ppt
 
Security in OPC UA ppt
Security in OPC UA pptSecurity in OPC UA ppt
Security in OPC UA ppt
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
Building Highly Secure Cloud-Native Applications on PAS with Ease - Jignesh S...
 
SecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise BrochureSecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise Brochure
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 

Recently uploaded

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

8 things you can do to make zoom more secure

  • 1. 8 THINGS YOU CAN DO TO MAKE ZOOM MORE SECURE zoom SIMPLIFYSECURITY.CO.NZ
  • 2. MAKE SURE YOU ARE USING THE LATEST VERSION. This will ensure the latest security patches are in place. Zoom will notify you if an update is available or you can do it under ‘Check for Updates’. #1 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 3. USE MEETING IDs AND SET PASSWORD. • Use a meeting ID and password when you want to restrict your audience to invited attendees • Ensure you change the meeting ID for each meeting. • Send the ID and password via different channels. #2 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 4. ENABLE THE ‘WAITING ROOM’ FEATURE. This will put all participants in a staging area until the host is ready, giving visibility over who is trying to join the meeting. #3 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 5. CONTROL WHO CAN JOIN THE MEETING. You can restrict the meeting to participants who are signed in to Zoom. Access can be further restricted to those with a specific set of email address domains. #4 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 6. IDENTIFY GUEST PARTICIPANTS. When this feature is enabled the host can check no unauthorised participants are in attendance. Any guest who is not signed in, or who is signed in from a different email domain from the host will be highlighted orange. #5 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 7. ENABLE IN MEETING CONTROLS FOR PARTICIPANTS. Preventing participants from screen sharing, stopping a participant’s video or removing them from the meeting are all useful features to know how to use in the event of unauthorised or unruly participants. #6 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 8. LOCK THE MEETING ONCE IN PROGRESS. To prevent anyone else joining the meeting once you are underway (and may be distracted from checking if they are authorised attendees), lock the meeting. #7 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all
  • 9. ENABLE TWO-FACTOR AUTHENTICATION. Two-factor authentication (2FA) is a two-step sign-in process that requires a generated code on a mobile app in addition to a Zoom username and strong password. This provides an additional layer of security and keeps unauthorised users out. #8 SIMPLIFYSECURITY.CO.NZ cc@simplifysecurity.co.nz Making information security accessible to all