April 2, 2020

How to prevent Zoombombing

A-holes hijacking Zoom calls with grotesque images and noise

As Zoom grows due to the coronavirus induced work from home style of conducting business. Immature and nefarious actors are hijacking and listening in on business and personal meetings around the world. We've heard reports of Youtube videos of Neo-Nazi sort of content suddenly shown in meetings, to loud ear gouging noises played until people leave the session.

Zoom has encouraging people to use the waiting room, a meeting lock, and a limit on screen sharing features:

  • A waiting room is a virtual place where people gather before a Zoom meeting, a control in Zoom's web settings.
  • A meeting lock stops uninvited parties from joining, click the MANAGE PARTICIPANTS button at the bottom of the Zoom application window, hit MORE in the participant's pane near the bottom right corner of the window, and select LOCK MEETING.
  • The host can stop a participant's taking control of what everyone sees by enabling the restriction from the Zoom web settings.

Zoom is working with other companies to stop the disruption of meetings, but is it too late? The company's reputation as a secure and private solution to working from home and teleconferencing is diminishing. iTecs is advising clients to try different solutions if Zoom intrusion concerns are unacceptable. With a broad market of solutions out there, your business model, needs, and security goals will affect which product to use for your business.

Latest Posts

February 3, 2022

The Rise of SMS Phishing

After what seems like a lifetime of technology exposure, I still become saddened but not surprised when I hear about someone falling victim to a phishing attack. Most medium to large businesses, if not all, have invested heavily in employee awareness training as a means to improve their cybersecurity posture.

Read More
December 17, 2021

iTecs Enters Into A Partnership With Check Point

iTecs enters into a partnership with Check Point, a leader in enterprise and SMB cybersecurity products and solutions, to provide iTecs clients with efficacious cybersecurity protection. The collaboration between the two parties enables iTecs to deliver the various services and products to clients as a managed service.

Read More
September 8, 2021

How To Protect Crypto Exchange Accounts

Mitigate the chances that your crypto exchange accounts get hacked by following the tips below.‍You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.

Read More

You have questions, we have answers

What can we help you with?