1. Use a Password
Protecting meetings with passwords is a recommended method to start. Zoom Bombers target meeting that there is no password setup. Also, users tend to post the meeting ID online with no protection, making life so much easier for the Bombers.
Despite the fact you have a password setup, as recommended, never shares the link or meeting ID publicly. Otherwise, it will defeat the entire point, and make sure to disable the option (Embed password in meeting link for one-click join). It will force the users to enter the credentials.
Zoom support has an article called, “Meeting and webinar passwords”, where they explain in details how to use and set up the passwords.
2. Waiting Rooms
One other recommendation that can stop Zoom Bombers is the Waiting Room feature. This feature controls when a participant joins the meeting. As a meeting host, you can admit attendees one by one, or all of them at once.
The below video from Zoom channel shows you how to use the Wanting Room feature.
3. Protect your Personal Meeting ID
Avoid sharing your personal meeting ID (PMI) online. Whoever has it can join any meeting that you are hosting. It is recommendable when setting up new meetings that you allow Zoom to generate a random ID for each one.
Make sure to disable the option “Use Personal Meeting ID when scheduling a meeting”, and Zoom will generate a random ID.
4. Require a host to be present
meeting before the host. That is a useful feature to have if you, as a host, is running late or cannot attend the meeting.
However, if you want to have your zoom meetings protected is recommended to turn this feature off. By doing that, you know that no one can start the meeting. Whoever joins the meeting before you, will face a message saying “Please wait for the host to start this meeting”.
Reach out to us!
We offer a broad range of services and packages that be customised to your needs. Send us a message today, and we can start you on a path to success.
Cyber Security