Over the past year or so, Zoom has established itself as the de facto solution for online meetings. Zoom avoids the long outages and latency issues that often plague other solutions. In short, it was ready to pick up the slack when the pandemic locked us all indoors. The company ended the fiscal year 2020 with a net profit of $671 million; up from just $22 million the previous year.

The rapid transition to the remote workplace has, however, created a new target for bad actors, insider threats, and third-party risks. Cyber criminals go where users go, and will seek to compromise Zoom user security with nefarious tactics.

As a result, security, compliance, and legal teams must have defenses in place to protect against social engineering, malicious links, and data leakage. This has forced them to search for ways to optimize their Zoom governance with the platform now such an essential part of their tech stack. What are the best practices for Zoom security that companies should leverage?

Zoom Security Risk Protection

Bad actors will constantly try and find ways to compromise people online, no matter what tool you use. Zoom is not an exception. And so, it falls on you to secure your communication and collaboration tools, Zoom included.

Some of the ways to protect yourself and your Zoom meetings is to follow these security best practices:

  • Don’t use your Personal Meeting ID (PMI) for public meetings.
  • Require a passcode to join.
  • Only allow registered or domain-verified users.
  • Master the Security menu.

However, bad actors can still try to find ways to circumvent these security measures for Zoom. The best approach is to deploy a robust cybersecurity solution that covers all your bases by providing:

  1. Secure and compliant internal group collaboration
  2. Automated security and compliance tools
  3. Scalability for any region and language
  4. Immutable archive with customizable retention rules
  5. An improved customer experience that matches Zoom’s ease of use

New call-to-action

Platform: Learn more about how to secure Zoom for your company.

Seek out a Zoom cyber security solution that has the following capabilities:

Meeting & Account Security

Detect meetings that do not meet the Zoom security best practices of requiring passwords, ensuring users cannot join before hosts, and confirming hosts have waiting rooms enabled for selective admittance. Meetings that lack these configurations are much more likely to be joined by unwanted participants.

Your cybersecurity solution should verify all meeting and account settings for security, and trigger alerts and auto-rollback for non-compliant settings. Suspicious sign-ins can be quickly identified and disabled through our platform.

Cyber Defense

Monitor all in-meeting and IM chats for malicious links and social engineering attacks. Risk teams can now detect and respond to suspicious sign-ons, data loss, malware, and compliance risks. Apply advanced sandbox analysis for spear-phishing and malware.

Enhanced Compliance, No Recording Required

Automate supervision of all chats and audio transcripts for all recorded meetings. The solution should also capture in-meeting chat, audio, and video content for all meetings, regardless of whether they have been recorded or not, including private chats, not just the chats visible to meeting hosts. This allows administrators to preserve all Zoom content for subsequent compliance review and evidence should the need arise.

Data Protection

Access immutable cloud archiving of meeting contents, chats, and metadata, and maintain a chain of data custody for evidentiary purposes. Apply customizable data retention rules.

App-to-App Collaboration

Gain consistent enforcement of security and compliance policies across collaboration apps that integrate with Zoom, including Slack and Microsoft Teams. Zoom is incredibly useful. However, like all tools, it also has its share of risks and issues. Leveraging a cybersecurity solution that protects you and your employees from Zoom third-party risks is a smart move.

Request a Demo

 

Related Content