{"id":20374,"date":"2020-04-08T15:37:54","date_gmt":"2020-04-08T10:07:54","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/zoom-security-ten-tips\/20374\/"},"modified":"2022-05-04T22:11:24","modified_gmt":"2022-05-04T16:41:24","slug":"zoom-security-ten-tips","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/zoom-security-ten-tips\/20374\/","title":{"rendered":"10 tips for Zoom security and privacy"},"content":{"rendered":"<p>With social distancing and quarantine measures implemented around the globe, people quickly started searching for effective means of communicating with each other. With its reported ease of use and attractive pricing, Zoom quickly rose in popularity \u2014 and people quickly figured out that Zoom\u2019s developers weren\u2019t fully prepared for the level of scrutiny it would receive.<\/p>\n<p>With so much use, Zoom\u2019s flaws came rapidly to light. The company handled the tremendous increase of workload seamlessly and quickly reacted to security researchers\u2019 discoveries. However, just like with each and every service, code updates will not address every complaint, but some issues are very much worth keeping in mind. So, here we offer 10 security and privacy tips for Zoom users.<\/p>\n<h2>1. Protect your account<\/h2>\n<p>A Zoom account is just another account, and in setting yours up, you should apply the basics of account protection. Use a <a href=\"https:\/\/www.kaspersky.com\/blog\/strong-password-day\/25519\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">strong and unique password<\/a>, and protect your account with <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/two-factor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">two-factor authentication<\/a>, which makes your account harder to hack and better protected, even if your account data leaks (though so far that hasn\u2019t happened).<\/p>\n<p>There\u2019s at least one more Zoom-specific catch: After you register, in addition to your login and password you get a Personal Meeting ID. Avoid making it public. And because Zoom offers an option to create public meetings with your Personal Meeting ID, it\u2019s quite easy to leak that ID. If you do, anyone who knows your PMI can join any meeting you host, so share this information prudently.<\/p>\n<h2>2. Use your work e-mail to register with Zoom<\/h2>\n<p>A <a href=\"https:\/\/www.theverge.com\/2020\/3\/31\/21201956\/zoom-leak-user-information-email-addresses-photos-contacts-directory\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">weird glitch in Zoom<\/a> (which at the time of this writing wasn\u2019t yet fixed) causes the service to consider e-mails of the same domain \u2014 unless it\u2019s a really common domain such as @gmail.com or @yahoo.com \u2014 as belonging to one company, and it shares their contact details with each member of that group. For example, that happened to users who registered Zoom accounts using e-mails ending with @yandex.kz, which is a public e-mail service in Kazakhstan, and it may happen again with e-mail addresses belonging to smaller public e-mail providers.<\/p>\n<p>So, to register with Zoom, use your work e-mail. Sharing your work contact details with your real colleagues should not be a big deal. If you don\u2019t have a work e-mail, use a burner account with a well-known public domain to keep your personal contact details private.<\/p>\n<h2>3. Don\u2019t fall for fake Zoom apps<\/h2>\n<p>As Kaspersky security researcher Denis Parinov discovered, this March the number of malicious files incorporating the names of popular video conference services (Webex, GoToMeeting, Zoom, and others) in their filenames had roughly tripled in comparison with the numbers he found month by month over the previous year. That most likely means malefactors are ramping up their abuse based on the popularity of Zoom and other apps of its kind, trying to disguise malware as videoconference clients.<\/p>\n<p>Don\u2019t fall for it! Use Zoom\u2019s official website \u2014 <a href=\"https:\/\/zoom.us\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">zoom.us<\/a> \u2014 to download Zoom safely for Mac and PC, and go to the <a href=\"https:\/\/apps.apple.com\/us\/app\/zoom-cloud-meetings\/id546505307\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">App Store<\/a> or <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=us.zoom.videomeetings&amp;hl=en\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Google Play<\/a> for your mobile devices.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<h2>4. Don\u2019t use social media to share conference links<\/h2>\n<p>Sometimes you want to host public events, and in many places online events are the only type of public events available these days, so Zoom is attracting more and more people. But even if your event is truly open to everyone, you should avoid sharing the link on social media.<\/p>\n<p>If you knew anything about Zoom before reading this post, you\u2019ve probably heard about so-called Zoombombing. It\u2019s a term <a href=\"https:\/\/techcrunch.com\/2020\/03\/17\/zoombombing\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><em>Techcrunch<\/em> journalist Josh Constine coined<\/a> to describe trolls disrupting Zoom meetings with offensive content. Right now, several chats on Discord and threads on 4Chan (both popular with trolls) are discussing targets for their next raids.<\/p>\n<p>Where do the trolls get information about upcoming events? That\u2019s right, they find them on social media. So, avoid publicly posting links to Zoom meetings. If for some reason you still want to, make sure you don\u2019t enable the <em>Use Personal Meeting ID<\/em> option.<\/p>\n<h2>5. Protect every meeting with a password<\/h2>\n<p>Setting up a password for your meeting remains the best means of ensuring that only the people you want in your meeting can attend it. Recently Zoom turned password protection on by default \u2014 a good move. That said, don\u2019t confuse the meeting password with your Zoom account password. And like meeting links, meeting passwords should never appear on social media or other public channels, or your efforts to protect your call from trolls will be in vain.<\/p>\n<h2>6. Enable Waiting Room<\/h2>\n<p>Another setting that gives you more control over the meeting, <em>Waiting Room<\/em> \u2014 recently enabled by default \u2014 makes participants wait in a \u201cwaiting room\u201d until the host approves each one. That gives you the ability to control who joins your meeting, even if someone who wasn\u2019t supposed to participate somehow got the password for it. It also lets you kick an unwanted person out of the meeting \u2014 and into the waiting room. We recommend leaving this box ticked.<\/p>\n<h2>7. Pay attention to screen-sharing features<\/h2>\n<p>Every normal videoconference app offers screen-sharing \u2014 the ability of one participant to show their screen to the others \u2014 and Zoom is no exception. Some settings that are worth keeping an eye on:<\/p>\n<p>Limiting screen-sharing ability to the host or extending it to everyone on the call. If you don\u2019t need other people to show their screens, you know which option to choose;<br>\nLetting multiple participants share screens simultaneously. If you can\u2019t immediately see why your meetings would need this capability, you\u2019ll probably never need it; just keep it in mind in case you ever need to enable it.<\/p>\n<h2>8. Stick with the Web client if possible<\/h2>\n<p>The various Zoom client apps have demonstrated a variety of flaws. Some versions <a href=\"https:\/\/threatpost.com\/two-zoom-zero-day-flaws-uncovered\/154337\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">let hackers access the device\u2019s camera and microphone<\/a>; others <a href=\"https:\/\/techcrunch.com\/2019\/07\/10\/apple-silent-update-zoom-app\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">let websites add users to calls without their consent<\/a>. Zoom was quick to fix the aforementioned problems, as well as other, similar ones, and it stopped sharing user data with Facebook and LinkedIn. However, given the absence of a proper security assessment, Zoom apps likely remain vulnerable, and they may still employ shady practices such as sharing data with third parties.<\/p>\n<p>For this reason we recommend using Zoom\u2019s Web interface instead of installing the app on your device, if possible. The Web version sits in a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/sandbox\/\" target=\"_blank\" rel=\"noopener noreferrer\">sandbox<\/a> in the browser and doesn\u2019t have the permissions an installed app has, limiting the amount of harm it can potentially cause.<\/p>\n<p>In some cases, however, even if you want to use the Web interface, you may find that Zoom has gone ahead and downloaded the installer, and there\u2019s just no other option to connect to the meeting but to install the client. In that case, you can at least limit the number of devices on which Zoom is installed to just one. Let it be your secondary smartphone or, say, a spare laptop. Choose a device with next to no personal information. We know that sounds somewhat paranoid, but better safe than sorry.<\/p>\n<p>By the way, if your company already uses Skype for Business (previously known as Lync), then you have another option. Skype for Business is compatible with Zoom and can handle Zoom conference calls just as well \u2014 without the aforementioned flaws.<\/p>\n<h2>9. Don\u2019t believe in Zoom\u2019s advertised end-to-end encryption<\/h2>\n<p>Zoom gained its market share not only for its prices and feature set, but also because it touted the product\u2019s end-to-end encryption. With end-to-end encryption, all communications between you and the people you\u2019re calling are encrypted in a way that only you and the people on the call can decrypt them. All other parties, including the service providers, cannot.<\/p>\n<p>Sounds cool, but it\u2019s next to impossible, as security researchers have pointed out. <a href=\"https:\/\/www.theverge.com\/2020\/3\/31\/21201234\/zoom-end-to-end-encryption-video-chats-meetings\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Zoom had to acknowledge that<\/a> in its case, the other <em>end<\/em> means the Zoom server \u2014 meaning the video is encrypted, but Zoom employees, and potentially law enforcement agencies, have access. The text in chats, though, seems to be really encrypted end-to-end. The encryption fudging is not necessarily a reason to abandon Zoom for good \u2014 other popular video conference services lack end-to-end encryption as well. But you should keep it in mind and avoid discussing personal or trade secrets on Zoom.<\/p>\n<h2>10. Think about what people can see or hear<\/h2>\n<p>This one applies to every videoconferencing service, not just Zoom. Before you jump on the call, take a moment to consider what people will see or hear when you join the call. Even if you\u2019re home alone, they may expect you to be fully dressed. Basic grooming is probably a good idea.<\/p>\n<p>The same holds true for your screen if you plan on sharing it. Close any windows you\u2019d rather others not see, whether it\u2019s a surprise gift you\u2019re buying online for another person on the Zoom call or a job search your boss doesn\u2019t need to know about. We\u2019ll leave other examples to your imagination.<\/p>\n<h2>Enjoy your Zoom<\/h2>\n<p>Self-isolation can be boring and lonely. On the bright side, imagine all of this stuff happening before broadband, videoconferences, and the ability of many to work remotely. We\u2019re glad such apps as Zoom exist, and now you know the right way to use it.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.<\/p>\n","protected":false},"author":2706,"featured_media":20375,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1897,2882,2911,1898,2918],"class_list":{"0":"post-20374","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-advice","9":"tag-coronavirus","10":"tag-remote-work","11":"tag-tips","12":"tag-zoom"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/zoom-security-ten-tips\/20374\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/zoom-security-ten-tips\/16317\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/zoom-security-ten-tips\/8063\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/zoom-security-ten-tips\/21374\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/zoom-security-ten-tips\/19615\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/zoom-security-ten-tips\/18363\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/zoom-security-ten-tips\/22366\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/zoom-security-ten-tips\/28096\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/zoom-security-ten-tips\/8077\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/zoom-security-ten-tips\/34729\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/zoom-security-ten-tips\/14619\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/zoom-security-ten-tips\/14711\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/zoom-security-ten-tips\/13301\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/zoom-security-ten-tips\/23660\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/zoom-security-ten-tips\/11363\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/zoom-security-ten-tips\/28055\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/zoom-security-ten-tips\/25269\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/zoom-security-ten-tips\/22047\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/zoom-security-ten-tips\/27230\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/zoom-security-ten-tips\/27066\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/remote-work\/","name":"remote work"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/20374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=20374"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/20374\/revisions"}],"predecessor-version":[{"id":24128,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/20374\/revisions\/24128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/20375"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=20374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=20374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=20374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}