{"id":4247,"date":"2020-04-19T06:53:36","date_gmt":"2020-04-19T11:53:36","guid":{"rendered":"https:\/\/www.kraftgrp.com\/?p=4247"},"modified":"2020-04-19T06:53:36","modified_gmt":"2020-04-19T11:53:36","slug":"prevent-zoombombing","status":"publish","type":"post","link":"https:\/\/www.kraftgrp.com\/prevent-zoombombing\/","title":{"rendered":"Prevent Zoombombing From Disrupting Online Meetings"},"content":{"rendered":"
As more businesses and schools move to Zoom for videoconferencing, harmful disruptions are emerging. Here\u2019s how to protect your company from zoombombing.<\/strong><\/p>\n The FBI is warning users of a popular videoconferencing tool of new attacks.<\/p>\n The so-called ‘zoombombing’ assaults are disrupting school sessions and online meetings with music, pornography and inappropriate comments.<\/p>\n The FBI’ Boston Division reported several instances in late March, including:<\/p>\n While the first cases of zoombombing seemed to be mere pranks, they have increasingly become darker and more disruptive.<\/p>\n “While those incidents may have initially been regarded as pranks or trolling, they have since risen to the level of hate speech and harassment,” noted a recent\u00a0New York Times article<\/a>.<\/p>\n <\/p>\n While tracking zoombombing incidents is difficult, there are some other indicators of the prevalent trend. The Times, for example, counted 153 Instagram accounts and dozens of Twitter accounts and chats dedicated to harassment campaigns using Zoom exploits.<\/p>\n Zoombombers are using all of the tools and functions to their benefit, relying on the lack of familiarity with Zoom to further their activities.<\/p>\n For example, Zoom meetings can be created without the need for a password. That’s meant disruptors have used password generators to try and find actual meetings.<\/p>\n Other tools that can lead to abuse are screen sharing, chat, audio muting and video capabilities. All can be used easily to disrupt meetings, leaving facilitators, teachers and organizers to try and remove the offending parties. In huge Zoom gatherings, that can be difficult to pinpoint.<\/p>\n As Zoom usage has grown dramatically, the company has responded to these new changes in multiple ways. In early April, it changed its default settings to require a password and to create a waiting room before meetings start for its free and single professional accounts. The latter allows organizers to check who\u2019s there before a meeting begins. Any previously scheduled meetings will also have those settings changed.<\/p>\n The company has made several other changes and updated its privacy policy to address the security issues identified in recent weeks. Also, it\u2019s postponed releases of new features to focus on security and privacy issues.<\/p>\n Many companies now rely on Zoom to conduct business. Here are some tips to help employees avoid Zoom disruptions:<\/p>\n In this challenging time, Kraft Technology Group is here to help your business keep sensitive company data and apps secure and protected. We offer comprehensive security solutions that safeguard hardware, information and users. We can help with Zoom installation and removal and block suspicious activity. Learn more by\u00a0contacting us<\/a>\u00a0today.<\/p>\n","protected":false},"excerpt":{"rendered":" As more businesses and schools move to Zoom for videoconferencing, harmful disruptions are emerging. Here\u2019s how to protect your company from zoombombing.<\/p>\n","protected":false},"author":1,"featured_media":4249,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_mbp_gutenberg_autopost":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-4247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\n\n
How Prevalent Is Zoombombing?<\/h3>\n
What Is Zoom Doing to Address Zoombombing?<\/h3>\n
How Can I Protect Zoom Users?<\/h3>\n
\n