Secure Videoconferencing During Covid-19: Ten Tips to Prevent “Zoom Bombing”

With 300 million people using Zoom videoconferencing every day, the issue of Zoom meetings getting hijacked by a hacker, troll, or “Zoom bomber” has become a real and serious problem. Similar to traditional cyber attacks, the Zoom bomber finds a way to breach the Zoom conference and then disrupts the meeting with a rant or inappropriate message.

Syed Alam, Founder, and CEO accentedge
  1. Don’t share your Zoom Meeting link on social media. The more your Meeting ID number is out in the public, the more opportunity hackers can find access to it and crash your meeting. Posting your Zoom Meeting ID invite to your fitness class on Facebook is inviting hackers to join the class.
  2. Create a Waiting Room. When setting up your Zoom conference enables the “Waiting Room” option so you can see who is joining the conference and give them access. This feature allows the Host to see who has joined the room. A skilled hacker who wants to disrupt your meeting may still be able to get through, but this is one more hurdle to stop them. Zoom offers a new security option that allows you to set up a Waiting Room after the call has started. By enabling this Waiting Room feature you can prevent users from joining your call unexpectedly.
  3. Disable others from joining before the Host. By default, users will be unable to join before the host. This way the Host can see who has joined before the meeting starts and prevent unwanted visitors from joining. Check to make certain this feature is being used by clicking on the gear-shaped icon at the top right of the Zoom screen. This is one more control for Hosts to verify who is joining the call.
  4. Use a unique Personal Meeting ID for each Zoom Meeting. Each Zoom Meeting you set up creates a Personal Meeting ID number that is used to invite people to your meeting. You can use this number as a recurring access code for small groups and one-to-one meetings. This ID number never expires so it is easy for people to access your meeting without accessing a new number. However, using the same number each time makes your meeting more vulnerable to hackers. One solution is creating a unique Personal Meeting ID every time you schedule a new meeting. It may be less convenient for people accessing your Zoom meeting, but changing the ID number will make your meeting more secure.
  5. Create an “Invite Only” Meeting. If you have a paid Zoom account, you can control who joins your meeting by setting it up as an “Invite Only” meeting. With this type of meeting, the only people who can join are the ones you invite using the Meeting ID and the same email address that was used to invite them. Once you’ve set up the Authentication Profiles, any other user trying to join will get a message saying the meeting is restricted to authorized attendees only.
  6. Limit user access to Screen Sharing. Zoom Bombers are known to use the screen sharing option in Zoom to “hijack” the meeting with their message. When setting up your meeting, choose the option that limits screen sharing to “Host-Only.” You can enable these settings both before and during your call. Using the Zoom web portal, go to Personal>Settings>In Meeting>Screen Sharing, then check the option that only allows only the host to share. During the call, you can also access this feature on the “Share Screen” section under Advanced Sharing Options.
  7. Disable Remote Control and File Sharing. To further protect your meeting, you can disable the remote control function and for chats, disallow file sharing, annotations, and the autosave feature. Limiting these features give less accessibility to users, but allows for greater security.
  8. Set a Meeting Password. With the new Zoom 5.0 software, a password will be required to join the meeting. Using the Waiting Room feature, the host must approve users to join the meeting, and users are required to provide a password to enter. Requiring passwords will likely become a common feature for all meeting platform apps.
  9. Assign Co-Hosts and lock your meeting once it starts. In Zoom, you can assign Co-Hosts to assist you if unwanted visitors need to be removed. In addition, you can lock your meeting to outsiders once the meeting begins and everyone is in. To assign Co-Hosts, go to Settings>Meetings>Co-Host and make sure the Co-Host feature is enabled. Click “Turn On” if Zoom asks for verification. Then disable “Allow Removed Participants to Rejoin” to keep out unwanted users.