Communications Blog • 4 MIN READ

Keeping Zoom secure

Michael Watson

Written by Michael Watson

Remote working has become a way of life, enabled in large part by communication and collaboration platforms like Zoom.

Zoom’s simple, accessible interface has made it the default meeting and conferencing platform for millions, including enterprise level businesses. However, Zoom has had to overcome some well publicized security and privacy issues that have threatened to derail its popularity.

As a result, Zoom has plunged headlong into making changes and updates to its security practices and privacy promises. Recently, they added two-factor authentication (2FA) as an account security option. But even though they’ve made security a priority, Zoom lacks the capability of providing clear insight and actual visibility into security settings.

To ensure success with Zoom, it’s important businesses have the insight to stay in complete control of privacy and security, avoid breaches and be safe.

Zoom’s most concerning security issues

Zoom remains one of the best productivity tools in the business world, but lets take a look at some of its most concerning challenges, and the measures you can take to address them.


A variant of internet trolling, Zoombombing is the practice of hijacking and disrupting video meetings by uninvited parties.

Data leakages

Reportedly, attackers can use Zoom’s Windows client group chat feature to share links leaking the Windows network credentials of those who click on them.

Privacy issues

Zoom has been accused of passing on user data to third parties without notifying them.

Zoom’s security levels

Zoom security level settings are highly configurable and can be adjusted to suit individual requirements. Zoom has 3 levels of security;

Account level – set the default values and lock settings for the entire account.

Group level – If some users require different settings, these can be managed by User Groups. Group settings are inherited from Account level and if they’re not locked, can be changed.

User level – There are the settings for an individual Zoom user. User level settings are inherited from Group level and if not locked at previous levels, can be changed.

The most important steps to ensure security of your meetings

  1. The most obvious first step is to secure a meeting by making sure participants need a password to access it.
  2. Enable the Waiting Room option. Users are put on hold here before you give them specific approval to join. This feature can help to block out anyone you weren't expecting.
  3. Restrict screen sharing. You can do this in Zoom settings in the Screen Sharing option to stop anyone except the host from sharing the desktops or apps on their computer.
  4. Lock a meeting once you're sure that everyone who needs to join has joined.
  5. Make sure you have the most up to date Zoom client installed.
  6. Avoid using Personal Meeting ID (PMI) to host public events.
  7. Spend some time acquainting yourself with Zoom’s settings and features to have a full understanding of how to protect your virtual space when you need to.

The importance of monitoring your Zoom security settings

It’s important to be able to monitor the security settings being used to host meetings to ensure they meet company security policy.

IR’s new Zoom monitoring solution provides specific dashboards that give you deep insights into the security of your Zoom meetings.

Our Zoom monitoring solution is designed to ensure a consistent, positive user experience with better security, and faster problem resolution.

Want to try our Zoom experience management solution free for 30 days? Contact our team today to find out more about our Zoom Forward promotion.

Topics: Communications UCaaS management Zoom

Subscribe to our blog

Stay up to date with the latest
Communications, Payments and HP Nonstop
industry news and expert insights from IR.

We're committed to your privacy. IR uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our privacy policy.