iVenture : 20 Years of Business Friendly IT

4 Tips To Prevent Zoom Bombing & Other Video Chat Risks

You’ve probably read recent news articles about video chat risks. But you don’t have to worry. With these 4 cybersecurity tips, you can video chat safely.

4 Tips To Prevent Zoom Bombing and Other Video Chat Risks

Zoom Bombing and Other Video Chat Risks

For businesses looking to keep communication strong while remote, video chat is a great tool.

There are plenty of options out there too. From Zoom and GoToMeeting to Microsoft Teams — which is what we use. Check out more tools we use to work remote successfully

But you’ve probably read recent news articles about the dangers of video chat. Like almost all cybersecurity risks, the danger comes from unawareness.

For many people, using video chat in the workplace is new. So it’s understandable that there’s unfamiliarity with security features and risks.

This has led to a number of security problems. Most notably, zoom bombing.

Zoom Bombing: When someone (or a number of people) hijack your Zoom meeting.

The concern is at best, these “bombers” can take over the screen to show illicit, inappropriate content. At worst, your private company information can be stolen, including trade secrets, passwords and personal data.

Protect Your Business

So what should you do? Get familiar with your platform. Prevent security hacks with these four tips.

1. Encryption

Definition: converting information into secret code so it can’t be read by hackers.

This is the first security feature to look for on video chat. Most platforms allow you to choose the level of encryption. For example, you can encrypt entire meetings or just the chat room.

If encryption isn’t an option for you, refrain from sharing private information over video chat. This includes financial talk, trade secrets and any personally identifiable information (PII).

2. Lock the Meeting

Just like you lock a door, you can restrict access to meetings. There are a number of ways to do this:

  • By organization
  • By link
  • By password
  • By meeting code

You can even restrict access based on email address. For example, only people with @iventuresolutions.com can join a meeting.

Locking meetings prevents anonymous access. If you don’t have a lobby or waiting room, this is especially important (more on this below). Caution: don’t give hackers a free pass by sharing your password, code or link publicly.

3. Use the Lobby/Waiting Room Feature

Enabling the Lobby feature gives you a few security checkpoints.

  1. It requires the host to be present before the meeting can start
  2. The host must admit every person individually from the lobby to the meeting
  3. People in the lobby can’t communicate with each other

This feature is helpful when you can’t lock the meeting or prevent anonymous access.

4. Be Cautious

This is the most important tip. Without cautiousness, any security features you use will be stunted. You’ve got to be aware of your digital surroundings.

This means practicing suspicion with links, log-in pages and emails. Always double check web and email addresses. Ignore links you aren’t expecting and when in doubt, ignore them.

You can always reach out to the sender directly for confirmation.

While in a video chat, don’t mention passwords and PII and don’t write them in chat boxes. As Zoom and other video platforms work to heighten security, you have to be your own advocate.

But you don’t have to do it alone. Your IT provider can answer questions and provide security guidance. We’re supporting businesses just like yours right now.

Get on board. We’re open and ready to handle your IT needs.

iVenture Solutions is an award-winning managed service provider delivering superior IT solutions to clients across Florida.

As a leading-edge IT firm for small and medium-sized businesses, we provide a diverse range of services covering the entire scope of IT including maintenance, support, hosting and more.

Through rapid response time, reduction of chaos and the right people, our expert team of IT professionals will fulfill your technology needs. At iVenture, we give you more time to do what matters most.

New call-to-action

Back to Blog

Recommended For You


Latest Article

4 ways to improve company culture

4 Ways To Improve Company Culture

Improve your company culture in these 4 ways. We spoke with a director of people operations to understand what what makes a company culture great.

What you're missing about cybersecurity

What You’re Missing: Cybersecurity 101

There’s a lot of info out there on cybersecurity. And most is jargon-filled nonsense that doesn’t apply to real life. Not here.

Is Your business mature enough for cmmc

Why A Mature Service Operation Matters for CMMC

Operational maturity is foundational to passing CMMC compliance. Here’s what mature service operation looks like and how your business can have one too.

Have You Heard of These Weird Cybersecurity Risks?

As internet users, we’re all aware that sometimes the web isn’t so…