Zoom Case - who uses it is unprotected? - ISH Technology

Zoom Case - who uses it is unprotected?

In recent weeks, information security experts have begun to discover a series of breaches and flaws in the platform that have raised questions around Zoom, as I explored in this piece here on the blog. The company's shares, which had risen 125% since the beginning of the year, saw a 25% drop from 27 March to 7 April.

But do the vulnerabilities found make Zoom totally insecure? Should people stop using it?

Not necessarily. Although we have several alternatives on the market, like Webex itself, which was the source of inspiration for Zoom, or Microsoft Skype, if you like the simplicity of Zoom and want to stick with it, that's fine. But maybe it won't be so simple anymore. Because to use it in a minimally safe way, you will need to take steps that will require you to make some reconfigurations in the tool. Nothing too complex, but that will force you to change the routine you had with the application.

Let's get to the tips:

1 - Disable guest screen sharing

Zoom allows all participants in a meeting or conference to share their own computer screen, as long as there is permission from the host. Disable this option so that only the moderator shares screens during conferences.

2 - The meeting must start only with the presence of the moderator

Configure the platform so that the meeting is only started when the host is present. Some people open the room so that guests can enter even before the moderator arrives. This is useful when he is a few minutes late, but it opens up loopholes for intruders. It is best to configure Zoom so that the conversation only starts with the presence of the person who summoned it.

3 - The ID should not be shared

Create a personal identification, called a meeting ID, that is personal and unique, and be careful not to share it publicly. When you call a conference, send this ID only to the people you are actually inviting.

4 - Use password

Zoom in to prompt whoever is entering the meeting for a password. That way, only those who know the combination, shared by you, can enter.

5 - Use the waiting room

You can set up a waiting room for your guests until you authorise them to enter the meeting. This helps to avoid intruders.

It is important to remember that even if you take all these steps, there is no guarantee that you will not have problems.

First, because when we talk about data protection, the concept of 100% secure simply does not exist. And second, because the vulnerabilities identified now, during the social isolation period, are far from being the first that Zoom must face in this field.

In recent times, the tool has been proven to send users' personal data to social networks such as Facebook and LinkedIn without authorisation. In addition, it was known that users of macOS operating systems who chose to uninstall Zoom were somewhat deceived, as the application remained installed in a hidden manner without the computer owner's knowledge.

So what Zoom is experiencing today is a crisis of confidence. Although its CEO has come public to announce that for 90 days it will not launch new features and will dedicate itself to solving security issues, it is still too early to say that the app will become reliable. However, with these precautions, you will certainly be more protected. And you can continue using the beloved platform of the quarantined times, running fewer risks.

By Allan Costa