As the world is shifting to work from home, zoom is becoming one of the most essential tools for companies to organize meetings and to keep in touch. However some companies have reported security breach – where random people are joining zoom meetings and sharing their screen with adult content.
Steps To Secure Your Zoom Meeting
  1. Open your zoom application and log in to Zoom,
  2. Click on the Schedule icon.
  3. Set Meeting Options. See below for details
    • For privacy concerns, the key option is to select a password:
    • Under Meeting Options, check Require meeting password.
    • We reccomend that you choose a complex password for maximum security.

4.Click Schedule.

The waiting room allows the host to control when a participant joins the meeting.

How to use the waiting room

  1. Enable the meeting room:
    1. Go to My Meeting Settings
    2. Check the box next to Waiting Room
      My Meeting Settings screen shot
    3. Click Save Changes.
  2. Use the waiting room in a meeting:
    1. Click Manage Participants
      Manage participants screen shot
    2. Click More, select Put attendee in waiting room.
      Put attendee in waiting room screen shot
    3. Once a participant joins, you will see the option to either Admit or Remove the user.
      Admit person waiting screen shot
    4. Select Admit to allow them to join the meeting.

To prevent participants from screen sharing:

  1. In the host controls, click the arrow next to Share Screen and click Advanced Sharing Options.
  2. Under Who can share? choose Only Host.
  3. Close the window.

  • Lock Your Meeting

At the bottom of the attendee list select, the More tab and check the Lock option from the options listed.

 

  • Disabling In-Meeting Chat
    • You can turn chat for all of your meetings and webinars from your Profile Settings, if you do not want to use the chat in your meetings and webinars. This will prevent the host, co-hosts, and participants from chatting for any meetings you host. The Chat option will no longer appear in the Meeting Controls.

      You can disable the Private Chat, which will prevent participants from sending messages to individuals instead of the entire group.

    • Sign in to the Zoom web portal.
    • Click Settings.
    • Click the Chat and Private Chat toggles to disable in-meeting chat.
    • Click Save Changes.

 

  • Turn Off Join Before Host
    • here are multiple ways to turn of the Join Before Host feature:
      1. From the Zoom Client for Meetings select the down arrow next to your account name, go to My Profile, select My Meeting Settings and slide the button to the left to turn off Join Before Host.
      2. From the Zoom Client for Meetings select the Schedule tab, go to Meeting Options, select Advanced Options, uncheck the Join Before Host
      3. You can also turn off Join Before Host for any scheduled meeting by selecting Meetings at the bottom of the Zoom Client for Meetings, hover over the meeting, select Edit, select Advanced Options, uncheck Join Before Host and click Save.
      4. From the Zoom web portal, sign in, select My Meeting Settings and slide the button next to Join Before Host to the left to turn it off.

 

  • Remove Unwanted Attendees From Your Meetings
    • Select Manage Participants on the host controls bar, hover over or right click on the attendee, select the More tab, select Remove at the bottom of the list of options to dismiss the attendee.
Company-Wide Zoom Security Options
  1. Sign into the Zoom web portal.
  2. As the owner or admin click on Account Management then click Account Settings.
  3. Navigate to the Meeting tab and verify that the password settings that you would like to use for your account are enabled.

    If the setting is disabled, click the Status toggle to enable it. If a verification dialog displays, choose Turn On to verify the change.
  4. If you want to make this setting mandatory for all users in your account, click the lock icon, and then click Lock to confirm the setting.

Call Now for a Free Consultation

646-970-4645

Or drop us a line and we'll get back to you in no time!

Contact Us

We've got you covered

Cloud Computing
IT Security
Network Repair
Network Design
Data Backup and Recovery
Cyber Security
Strategic Planning
Share This