What is Zoom?
Zoom is a cloud based peer-to-peer based application that provides an audio chat and video calling facility allowing up to 1,000 users from different locations to connect to the same video conference via a webcam or a phone.
A Zoom Room are physical conference room software and hardware that allow Zoom meetings to start easily and all video and audio is integrated into the conference room equipment. This facility requires higher levels of subscription and are most frequently used by larger companies.
What Is Zoombombing?
Zoombombing is a term given to when uninvited participants gain access to a Zoom meeting. Normally those uninvited guests will make unpleasant or offensive comments or will share images, including pornography to other legitimate participants of the group.
To access Zoom meeting, a link is required. If the Zoom meeting is to include a large group then the link will need to be disseminated to those and often the link can be found by unintended individuals.
For example, a public meeting can be held on Zoom and the individuals notified of the time/date and nature of the meeting may be advertised on a public forum along with the link provided so that they can access it. Anyone who found that link, including those with intention of disturbing it could then access it using the free Zoom subscription.
How to Make Zoombombing More Difficult
Zoom requires the user to enter a password in order to access a meeting. However, by default that password is included within the meeting link. If possible, access the software settings and deselect ‘Embed Password in Meeting Link for One-Click Join‘ and ensure that the ‘Require a Password When Scheduling New Meetings‘ is selected before sharing the link. Disseminate the password for the meeting privately, either within a separate publication or privately to the intended participants.
Also deselect the ‘Screen Sharing’ option so that any participants can only display the content of their webcam to the rest of the meeting, making irt more difficult for images to be displayed, that would more easily be displayed on a shared screen.
Deselect the ‘Remote Control’ option so that no other participants are able to take control of the system via the meeting.
Deselect the ‘File Transfer‘ function so that either only certain types of files can be shared or any sharing is prevented, meaning that any unexpected guests cannot disseminate unwanted files to the group.
Ensure that the option ‘Allow Removed Participants to Rejoin‘ is deselected so that any participants who have been removed from the meeting cannot simply rejoin it.
If the ‘Mute Participants Upon Entry’ option is selected ensure then any participants cannot talk to the meeting until they are enabled manually.
Ensure that the ‘Waiting Room‘ option is enabled. This permits the host to carry out a review of those waiting to join the meeting and potentially to prevent any unwanted guests from joining.
There are still avenues that determined individuals can take to access a meeting and cause issue, however, the use of the above settings can reduce that chance.
About Athena Forensics
For information on our digital forensic services or if you require any advice or assistance please contact a member of our team on 0330 123 4448 or
via email on email@example.com, further details are available on our contact us page.
Our client’s confidentiality is of the utmost importance. All correspondence is treated with discretion, from initial contact to the conclusion of any
computer forensic investigation.
Our digital forensics experts are fully aware of the significance and importance of the information that they encounter and we have been accredited
to ISO 9001 for 10 years.
Our forensic experts are all security cleared and we offer non-disclosure agreements if required. Our premises along with our security procedures have been inspected and approved by law enforcement agencies.
Athena Forensics do not disclose personal information to other companies or suppliers.