Zoom bombing: Maybe you have heard this term but aren’t really sure what it means. Zoom bombing occurs when individuals enter a Zoom meeting for no other reason than to wreak havoc. Due to the nature of Zoom, where all you need to join a meeting, for the most part, is the meeting ID number, some people try to get into meetings by typing in random numbers until they find one that works. Once these people get into a meeting they are as disruptive as possible by sharing inappropriate images or by just being rude and vulgar. What motivates them to do this? Perhaps we will never know, but, there are a few things we can do to mitigate the problems that they may cause.
Randomize the Meeting ID
When setting up a meeting, you have a choice to use your own zoom ID number (which never changes) or to generate a random one. The most secure option is to go with the random one every time. First, it is harder for someone to guess a number that changes from meeting to meeting, and also if your personal number gets leaked out to undesirable people this offers an additional layer of protection.
Using a Meeting Password
This probably would not apply for a meeting meant to be open to a large number of the public, but anything more private should require some sort of a password. This can be enabled when sending meeting invites and it would be a wise move to send the password out either via a different email or other means of communication to help mitigate any sort of unwanted individuals receiving the meeting information and password at the same time.
Use the Waiting Room
When the meeting host enables the waiting room feature, each incoming meeting participant is placed into a separate space and has to wait for the host to let them into the meeting. If someone is not supposed to be there the host can just not let them in, as simple as that.
Limit the Capabilities of Participants
When setting up the meeting, hosts have the capability to disable the video for all participants besides the host. This will eliminate the possibility of anyone in the meeting displaying inappropriate content. Once the meeting has started hosts also have the ability to determine who has permission to share their screens and they can also mute the microphones for all meeting participants as well.
Sometimes, people can be unpredictable, but now that you are aware of the tools in place to help, you can protect your meetings and stay on task. So let’s get back to work!