Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Reviewing Zoom’s Efforts to Improve Its Security

Reviewing Zoom’s Efforts to Improve Its Security

As a communication tool, the video conferencing app Zoom saw a considerable bump in its popularity with both personal and business users as the coronavirus pandemic made other means of meeting no longer viable. However, this sudden increase in its user base also revealed some serious security issues with the platform. Let’s examine what Zoom has done to resolve these issues since then.

Zoom’s 90-Day Security Plan

On April 1, 2020, Zoom announced that it had a 90-day plan to address the numerous security concerns and criticisms that had plagued many users. The crux of the issue was that Zoom links were commonly being shared on social media… effectively opening these meetings to anyone who could find that link. As a result, the concept of “Zoombombing”—unauthorized users hijacking meetings and sharing offensive content—was born.

After numerous attacks were waged against organizations of all kinds, Zoom saw that it needed to make some changes. Therefore, on April 1st, the company announced that it would be pausing any new features to focus specifically on those related to the platform’s security. These include:

  • Passwords are now required to access all meetings
  • Waiting Rooms (a space where a meeting’s guests had to wait to be approved by the host) are enabled by default
  • The default settings only enable the host to share their screen

Furthermore, Zoom’s acquisition of Keybase has enabled them to incorporate end-to-end encryption. Other internal changes are also now in place including a bug bounty program, deeper penetration testing, and other security improvements.

Some Brief Controversy

However, Zoom has not escaped all criticism as it has made these changes. In June, CEO Eric Yuan shared that the end-to-end encryption feature would be exclusive to paying users. Once users and security advocates alike spoke out about this policy, Zoom quickly walked this policy back. While it is still rolling out this capacity, and it may interfere with some other features, Zoom is also actively planning for the future with its next improvements already planned out.

So, is Zoom Safe to Use?

Compared to where it was? Absolutely. However, you may still want to take what you plan on communicating into account when deciding whether to use Zoom for certain conversations, just to be safe. Erring on the side of caution is always the better option when your business communications are involved.

Whatever your business’ technology needs may be, FRS Pros can help you find and implement the solutions to fulfill them. To learn more about what we have to offer, give us a call at 561-795-2000 today.

Mobility a Crucial
How Important Is It to Keep Devices Charged Up?

By accepting you will be accessing a service provided by a third-party external to https://frspros.com/

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Hackers Internet Software User Tips Google Cloud Efficiency Innovation Hardware Data Microsoft Email Hosted Solutions Business Management Smartphones Mobile Devices Workplace Tips Business Communication Computer Windows 10 Android Cybersecurity Malware Data Backup Small Business IT Support Tech Term Backup IT Services Collaboration Smartphone Browser VoIP Data Recovery Disaster Recovery Phishing Outsourced IT Upgrade Users Office 365 Windows Communications Gadgets Ransomware Information Internet of Things Apps Covid-19 Cloud Computing Miscellaneous Data Security Network Quick Tips Cybercrime Business Continuity Saving Money Automation Managed IT Services Operating System Passwords Social Media Facebook Mobile Device Health Wireless Managed Service Mobile Device Management Microsoft Office OneNote Conferencing Employer-Employee Relationship Save Money Money Artificial Intelligence Blockchain Server Two-factor Authentication Information Technology Alert Law Enforcement Vulnerability Holiday Best Practice Networking Applications IT Support Chrome Managed IT Virtualization Managed IT Services Spam Mobile Office Data Storage Retail Password WiFi Wi-Fi Windows 7 Word Router Hacking Gmail Patch Management Google Drive Settings Windows 10 Project Management Managed Service Provider BDR Computers Bandwidth Data Breach BYOD Unsupported Software Augmented Reality Access Control App Printing Telephone Systems Bring Your Own Device Battery HIPAA Tech Support The Internet of Things Google Assistant User Error Touchscreen Telephony VPN iPhone Risk Management Hybrid Cloud Cortana Voice over Internet Protocol Remote Workers Data Loss History Business Technology Audit Update Hosted Solution Shortcut Software as a Service Data Protection Wireless Charging Politics Meetings Google Docs Search Hard Drive Display Devices Avoiding Downtime Mobility Human Resources YouTube IT Management Cost Management Payment Cards Marketing Budget Going Green Social WannaCry Wireless Technology Travel Commerce File Sharing Government Application Paperless Office Data Management Excel Management Apple Fraud Encryption Sales Robot Mobile Security Training Productivity Safety Vendor Proactive IT Sports Evernote SaaS Remote Hacker Compliance Break/Fix IT solutions Hosted Desktop FAQ Hyperlink Processor Regulations Compliance Chromecast Edge Instant Messaging Personal Information Fiber Optics Websites Identity Printers Development Telework NFL eWaste Emergency Machine Learning Identities Reputation Point of Sale Employee-Employer Relationship iOS WIndows Server 2008 Server Maintenance Remote Work Wireless Internet Saving Time Internet Exlporer Innovations Keyboard Medical IT Windows 10s HBO Smart Devices Charger Data storage Entertainment Value Wasting Time Benchmarks Policy Ciminal Screen Mirroring Holidays Uninterrupted Power Supply Data Theft Remote Computing Identity Theft Data Privacy Computer Care Nanotechnology Micrsosoft Audits Device Security Amazon Downtime Managed IT Service Remote Working Legislation Language Office Investment Net Neutrality Adobe Workers Gamification Keyboard Shortcuts Unified Threat Management 5G Solid State Drive Sabotage Troubleshooting Accessory Myths Procedure E-Commerce Emails Cast Copiers Gifts Computing Vendor Management Root Cause Analysis Business Intelligence Solutions Windows Ink Virtual Assistant Managed Services Provider DDoS Reviews Comparison Transportation Scam Testing Computer Fan ROI Internet Service Provider Files Licensing Updates Laptop Memory Upgrades Private Cloud Education Hard Disk Drive PC CRM Disaster Outlook Computer Forensics Peripheral Threats Recovery Video Conferencing Microsoft Excel IT budget Alexa for Business Inventory Credit Cards App store Samsung Chromebook Co-Managed Services Digital Signage Printer Google Maps Spyware Facebook Privacy Specifications Virus Camera Windows Server 2008 R2 Microsoft Word Touchpad Financial Payroll Employees IT Solutions AI Legal Scams Organization Administrator Employee Webinar Lithium-ion battery Antivirus Telephone Firewall PCI DSS Streaming Media eCommerce Proactive Projects Workstation Tablets Maintenance Humor Security Cameras Consultant Storage Social Engineering OneDrive Smartwatch Sync PowerPoint Admin Remote Monitoring Virtual Private Network Access Television CrashOverride Congratulations Company Culture Scalability PDF Analytics Mobile Computing Regulation Black Market Cleaning Automobile Text Messaging Big Data Managing Stress Twitter USB Worker How To Office tips Books Hiring/Firing Video Games Advertising Experience Work/Life Balance Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits es Phone System Cache Communitications End of Support HaaS Save Time Thank You Relocation Computer Accessories Monitors Smart Technology Flexibility Music