VSEC experts said that for each conference, Zoom will generate an ID of 9-11 characters that are random numbers. With brute force attacks - a technique for testing possible results to detect meeting IDs, hackers can steal IDs easily and infiltrate a conference without the host's knowledge. This attack occurs in the event that the conference does not set a password.
To avoid the above problems, Zoom offers the option to create a password for the meeting. So when strangers know the ID of the meeting, it is still necessary to have a password before joining the meeting.
3. Using the "Waiting room" feature
To ensure that user meetings include only the participants that the host wishes. Zoom adds control of meeting participants - waiting room. After enabling this feature, each new participant will be on standby to allow the host to approve the right to attend the meeting.
4. Manage screen sharing
To give the host more control as well as prevent participants from sharing screens with unwanted content. Zoom has provided the "Only Host" feature in the "Advanced Sharing Options" tab, which means that only the host can share content during the meeting.
In addition to some of the safety tips mentioned above, VSEC experts also recommend that users should be aware of Phishing attacks - disguising reputable individuals and organizations to steal information. your personal.
If you are using Zoom for the first time, make sure you are downloading directly from the zoom.us site, not any other domain (z00m.us, etc.). In addition, users do not download the Zoom software installer through any third party software provider.