iVenture : 20 Years of Business Friendly IT

4 Tips To Prevent Zoom Bombing & Other Video Chat Risks

You’ve probably read recent news articles about video chat risks. But you don’t have to worry. With these 4 cybersecurity tips, you can video chat safely.

4 Tips To Prevent Zoom Bombing and Other Video Chat Risks

Zoom Bombing and Other Video Chat Risks

For businesses looking to keep communication strong while remote, video chat is a great tool.

There are plenty of options out there too. From Zoom and GoToMeeting to Microsoft Teams — which is what we use. Check out more tools we use to work remote successfully

But you’ve probably read recent news articles about the dangers of video chat. Like almost all cybersecurity risks, the danger comes from unawareness.

For many people, using video chat in the workplace is new. So it’s understandable that there’s unfamiliarity with security features and risks.

This has led to a number of security problems. Most notably, zoom bombing.

Zoom Bombing: When someone (or a number of people) hijack your Zoom meeting.

The concern is at best, these “bombers” can take over the screen to show illicit, inappropriate content. At worst, your private company information can be stolen, including trade secrets, passwords and personal data.

Protect Your Business

So what should you do? Get familiar with your platform. Prevent security hacks with these four tips.

1. Encryption

Definition: converting information into secret code so it can’t be read by hackers.

This is the first security feature to look for on video chat. Most platforms allow you to choose the level of encryption. For example, you can encrypt entire meetings or just the chat room.

If encryption isn’t an option for you, refrain from sharing private information over video chat. This includes financial talk, trade secrets and any personally identifiable information (PII).

2. Lock the Meeting

Just like you lock a door, you can restrict access to meetings. There are a number of ways to do this:

  • By organization
  • By link
  • By password
  • By meeting code

You can even restrict access based on email address. For example, only people with @iventuresolutions.com can join a meeting.

Locking meetings prevents anonymous access. If you don’t have a lobby or waiting room, this is especially important (more on this below). Caution: don’t give hackers a free pass by sharing your password, code or link publicly.

3. Use the Lobby/Waiting Room Feature

Enabling the Lobby feature gives you a few security checkpoints.

  1. It requires the host to be present before the meeting can start
  2. The host must admit every person individually from the lobby to the meeting
  3. People in the lobby can’t communicate with each other

This feature is helpful when you can’t lock the meeting or prevent anonymous access.

4. Be Cautious

This is the most important tip. Without cautiousness, any security features you use will be stunted. You’ve got to be aware of your digital surroundings.

This means practicing suspicion with links, log-in pages and emails. Always double check web and email addresses. Ignore links you aren’t expecting and when in doubt, ignore them.

You can always reach out to the sender directly for confirmation.

While in a video chat, don’t mention passwords and PII and don’t write them in chat boxes. As Zoom and other video platforms work to heighten security, you have to be your own advocate.

But you don’t have to do it alone. Your IT provider can answer questions and provide security guidance. We’re supporting businesses just like yours right now.

Get on board. We’re open and ready to handle your IT needs.

iVenture Solutions is an award-winning managed service provider delivering superior IT solutions to clients across Florida.

As a leading-edge IT firm for small and medium-sized businesses, we provide a diverse range of services covering the entire scope of IT including maintenance, support, hosting and more.

Through rapid response time, reduction of chaos and the right people, our expert team of IT professionals will fulfill your technology needs. At iVenture, we give you more time to do what matters most.

New call-to-action

Back to Blog

Recommended For You


Latest Article

A safe with many chains locking it up. The text to the right of it reads "Data Backup: The Bare Necessities".

Data Backup Strategy: The Bare Necessities

In the past year, many businesses have experienced loss or theft of sensitive and critical data. Don’t let your business be one of them.

The Mistake-free way to end remote work

The Mistake-Free Way To Bring “Dirty” Computers Back To Work

A must-read for IT managers. Learn the mistake-free way to bring unsecure, risky computers back to the workplace after remote use. Find out what security steps to take.

Where Is Cybersecurity Headed: 2020 and Beyond

It may be the end Cybersecurity Awareness Month, but cyber-defense never stops.

What you're missing about cybersecurity

What You’re Missing: Cybersecurity 101

There’s a lot of info out there on cybersecurity. And most is jargon-filled nonsense that doesn’t apply to real life. Not here.