LikeLiked
About
Welcome to our latest TN Alert, Chris Montgomery, joins us to discuss the boom in Zoom. During these unprecedented times, Zoom has become a way for all of us to connect with co-workers, clients, family, and friends. This has led to the latest cybersecurity threat called Zoom Bombing. Learn how these threeats are gaining access to your Zoom video feed, how to prevent it, and what you should do if your video becomes compromised.

Video Transcript

My name is Chris Montgomery and welcome to this TN Alert. As more and more employees find themselves working from home, Zoom has become the go to method of communications and collaboration for individuals, businesses and schools since it works across virtually any device allowing you to conduct meetings from anywhere, anytime.

So, what is Zoom – exactly?

Zoom is the leader in modern enterprise video communications, with an easy, reliable cloud platform for video and audio conferencing, collaboration, chat, and webinars across mobile devices, desktops, telephones, and room systems. And Zoom Rooms is the original software-based conference room solution used around the world in board, conference, huddle, and training rooms, as well as executive offices and classrooms. Our alert today centers around a recent trend when using Zoom – specifically, Zoom Bombing.

Zoom bombing - otherwise known as Video Hijacking - occurs when conferences are hosted on public channels shared over the internet via URLs, making them accessible to anyone. Hijackers can sometimes guess the correct URL or meeting ID for a public Zoom session, giving them access to the feed.

Thus far there have only been a handful of Zoom Bombings, but those are just the ones that have been reported. I say this because the school my children attend have had this happen to them as well, but just didn’t report it. In the case of our local school, students are having regular meetings online to visit with their teachers and classmates during the stay at home order currently in effect throughout the US; however, a Zoom Bomber was either given or figured out the meeting ID and was able to join resulting in a bit of chaos. In reported incidents, Bombers will shout profanity in addition to sharing personal information about the teacher. The reason Zoom Bombers are so effective is that meetings are only protected from those Zoom Meeting ID auto dialers that have a set password. If the meeting doesn’t have a password, it’s just a matter of guessing the Meeting ID and pressing Join. To protect against this, you can do one of two things. First, you can simply require a password to join your meeting, but if you’d like to make this your default setting, simply select the option to “Embed password in meeting link for one-click join” as either one of these will prevent an actor from accessing your meeting without losing the usability of sharing a link to join.

Additional recommendations from the Better Business Bureau include:
  • Use a unique ID for large or public Zoom calls
  • Don’t share the unique ID’s publicly
  • Only allow hosts to share their screen
  • Create a waiting room
  • Create an invite-only meeting
  • Lock the meeting once it starts
  • Remove attendees or put them on hold if they become disruptive
  • Disable the unruly participant’s camera or all cameras assuming that’s an option
  • Make sure the Disable File Transfer setting is active
If you find yourself the victim of a ZoomBomb, please contact the authorities as the FBI has said that anyone who hacks into a teleconference meeting can be charged at the state and federal level. Charges can include the disruption of a public meeting, computer intrusion, using a computer to commit a crime, hate crimes, fraud, or transmitting threatening communications. These are punishable by fines and even imprisonment, according to the FBI. Thank you for joining me for this TN Alert. If you would like more information on how ThrottleNet can help you and your business, please reach out to us today at 866-829-5557 or visit us online at throttlenet.com

Share

Embed
<iframe src="https://www.throttlenet.com/wp-content/plugins/dzs-videogallery/bridge.php?action=view&dzsvideo=2701" style="width:100%; height:300px; overflow:hidden;" scrolling="no" frameborder="0"></iframe>
Russia's Hybrid War: What to Know About Hackers and Ukraine

16 Ways to Protect Your St. Louis Business From Cyberattacks

Free Download
15 Ways to Protect Your Business from Cyberattacks