Skip to Content
Woman sitting alone at her desk in a dark office
Article

Zoom meetings: Prevent hacking with these simple steps

April 3, 2020 / 4 min read

COVID-19 is forcing businesses around the world to use collaboration technology to continue operations. As the use of tools like Zoom increases, so does cybercriminal activity. Luckily, Zoom has several features to limit your cyber risk.

From inappropriate interruptions and messages to more sinister attacks, hacker activity on Zoom is rising during the COVID-19 outbreak due to the uptick in its global use by businesses. Why now, why Zoom? Simply put, hackers go where people are because people are the gateway to systems, networks, and data. This is why we’ve always said: “Cybersecurity is a business issue, not just an IT issue!”

So, what should our clients do, and where should they focus their time? The ultimate defense against these attacks is for staff members to use Zoom cybersecurity settings and features. Read on for my personal favorites, with links to take you right to the setup instructions.

Manage your participants

Manage screensharing

Manage information-sharing

Manage sensitive or confidential topics

Other Zoom best practices for cybersecurity

Download and maintain the latest version of Zoom from the official Zoom website, since updates occur regularly and often include security upgrades. 

We’re not specifically recommending Zoom — or any other collaboration tool, but it’s still important to know these Zoom functions in case your business is using it or you’re invited to a Zoom meeting by someone else. If your business isn’t careful, you’ll face the uncomfortable possibility of losing customer or staff data, critical IP, or more. Employing these functions greatly reduces the common risks of using Zoom for business meetings, but it’s up to your staff, vendors, and contractors to learn and effectively use them.

Related Thinking

Business professional checking the multifactor authentication code on their cell phone.
August 30, 2024

Preparing for the inevitable: Navigating third-party tech failures

Article 6 min read
Person searching on their computer in a dimly lit room.
August 30, 2024

Addressing the vendor threat

In The News 5 min read
Cybersecurity professionals discussing managed IT.
August 23, 2024

Is managed IT right for your organization? Ask these 10 questions

Article 5 min read