2 min read

Zoom Releases Security Features to Fend off Zoom Bombers and Disruptive Participants

Alina BÎZGĂ

November 18, 2020

Promo Protect all your devices, without slowing them down.
Free 30-day trial
Zoom Releases Security Features to Fend off Zoom Bombers and Disruptive Participants

Popular video-conferencing app Zoom has introduced two new security features, allowing hosts to remove unwanted participants and alerting them if meetings have been leaked online.

This fresh rollout aiming to enhance the security for millions of users couldn”t be more welcome, considering the intense scrutiny surrounding the numerous vulnerabilities exposed during the platform”s rise to success amid the ongoing pandemic.

On top of its announcement of end-to-end encryption for all users and two-factor authentication to hinder account compromise released earlier this year, Zoom finally lets hosts and co-hosts remove disruptive participants such as Zoom bombers.

The “Suspend Participant Activity” feature lets conference moderators temporarily pause the meeting and remove any troublesome participants and report users for misconduct.

“The hosts or co-host will be asked if they would like to report a user from their meeting, share any details, and optionally include a screenshot,” Zoom explained in a blog post. “Once they click “Submit,” the reported user will be removed from their meeting, and Zoom”s Trust & Safety team will be notified.” 

The second feature, entitled “Report by Participants,” allows any attendees to report disruptive users by clicking a security-badge icon. However, this function may be disabled or enabled by the host and co-host during the meeting or webinar.

These options are bolstered by Zoom’s At-Risk Meeting Notifier which “scans public posts on social media sites and other public online resources for Zoom meeting links.” If the tool detects a meeting link with high risks of being disrupted or breached, it automatically alerts account owners via email, providing advice and security tips.

This way, users hosting a Zoom conference can immediately identify and risks, and chose to create a new meeting with enhanced security settings.

“These steps could include deleting the vulnerable meeting and creating a new one with a new meeting ID, enabling security settings, or using another Zoom solution, likeZoom Video Webinars or OnZoom,” the company added. “If you do get an email, it”s critical to take action or risk having your meeting disrupted.”

tags


Author


Alina BÎZGĂ

Alina is a history buff passionate about cybersecurity and anything sci-fi, advocating Bitdefender technologies and solutions. She spends most of her time between her two feline friends and traveling.

View all posts

You might also like

Bookmarks


loader