Zoom is Really Working On Improving Security

Zoom is Really Working On Improving Security

Zoom is a video conferencing application that, as the coronavirus pandemic reared its ugly head, saw a considerable leap in popularity amongst organizations of every kind as well as private users. However, this leap also helped bring some serious security issues with the platform to light. Let’s check in and see how Zoom has since worked to improve their user protections.

The 90-Day Security Plan

After Zoom saw this huge level of adoption, many users experienced some serious security concerns. With many users sharing Zoom links on social media, these meetings were suddenly accessible to anyone who got their hands on that link. This led to the birth of what was coined “Zoombombing”—where unauthorized users would enter meetings, take them over, and share offensive content with the other participants.

After numerous organizations and users complained about their meetings being vandalized with inappropriate and often sexist or racist images and speech, Zoom decided to make some changes. Finally (and somewhat ironically), Zoom made a serious announcement on April 1st, 2020: all improvements to the platform were to be put on hold, apart from those dedicated to improving the platform’s security. These new features would include:

  • Passwords being required to access all meetings
  • Waiting Rooms (a space where a meeting’s guests had to wait to be approved by the host) enabled by default
  • The default settings only enabling the host to share their screen

Zoom doubled down on these improvements by acquiring Keybase and using its resources to incorporate end-to-end encryption across the platform. Other additions, like a new bug bounty program and more comprehensive penetration testing, join a litany of other security improvements.

This is Not Free of Controversy

These improvements have not freed Zoom of all criticism—in fact, it helped inspire some at one point. Back in June, CEO Eric Yuan mentioned that the end-to-end encryption feature would only be implemented for users who pay for the program. Understandably, users and security advocates promptly spoke up about this policy, to the point that Zoom withdrew their paid-only caveat. This capacity is still rolling out, and it might bump into some of Zoom’s other features, but Zoom is still planning future improvements.

So, is Zoom a Safe Solution?

If we’re considering where it was, it certainly is. However, security-savvy users will still think twice about what they plan to share on Zoom, just to be safe about it. When it comes to your business communications, safe is always better than sorry.

Whatever your technology needs may be, BNMC is here to help you fulfill them. Reach out to us at 978-482-2020 to find out more about what we can do for you.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 02 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Privacy Email Cloud Microsoft Network Security Software Hackers Efficiency Hosted Solutions Business Workplace Tips Data Computer Malware Communication Hardware Google IT Services IT Support Small Business Mobile Devices Smartphone Android Cloud Computing Internet Mobile Device Tech Term Managed IT Services Backup Data Recovery Smartphones Phishing Users Ransomware Innovation Windows VoIP Outsourced IT Saving Money Information Upgrade Network Windows 10 Facebook Data Backup Miscellaneous Cybersecurity Social Media communications Disaster Recovery Microsoft Office Business Management Browser Server Office 365 Business Continuity Passwords Productivity Managed IT Services Quick Tips Managed Service Internet of Things Data Management Windows 10 Collaboration Gadgets Word Save Money Vulnerability Remote Monitoring COVID-19 Apps Analytics App Gmail Infrastructure Encryption Conferencing Money Chrome Managed Service Provider Remote Work Government Artificial Intelligence Mobile Office BYOD Company Culture IT Support Display Spam Settings WiFi Tip of the week Remote Workers Information Technology Google Drive Networking Employer-Employee Relationship Virtual Reality Access Control VPN Applications Paperless Office Website Router Unified Threat Management Hacker Data storage Big Data Employee-Employer Relationship Firewall Maintenance Operating System Avoiding Downtime Robot Antivirus Development Document Management Bandwidth Automation Content Filtering End of Support HIPAA YouTube BDR Education Apple Risk Management Storage IT Management Data Security Office Tips Business Technology Virtual Private Network Computers The Internet of Things Tablet Data loss How To Telephone Systems Retail Alert Regulations desktop Managed Services Augmented Reality Computing Downtime MSP Outlook Two-factor Authentication Marketing Managing Stress Bring Your Own Device Social OneNote Monitors LiFi Managed IT Service Vendor Management Customer Relationship Management Scam Chromebook Hosted Solution Data Breach Humor Administration Best Practice Windows 7 IT Wireless Solid State Drive Software as a Service Mouse Break Fix Social Network Search Going Green Training Remote Computing Hard Disk Drive Mobile Security SaaS Printing Server Management Password Touchscreen Compliance Business Intelligence iOS Wi-Fi Virtualization Laptop Managed IT Holiday Dark Data Inventory Update Staff Leominster Human Error Memory Statistics Remote Modem FinTech Analysis Students Lenovo Language Value Mobile Device Management Virus Downloads Battery Deep Learning Scalability Mail Merge Blockchain Asset Management Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service Politics IoT Digital Payment Firefox Superfish Customer Service Shadow IT Cybercrime K-12 Schools Meetings Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Digital Alt Codes Mixed Reality Computing Infrastructure Professional Services LED Threats Office Files Samsung Social Networking Migration Consulting Address Permissions Memes Health Private Cloud PowerPoint User Error Management Chatbots eWaste Laptops Budget Patch Management Tech Support Star Wars Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Spyware Typing Alerts USB File Sharing Co-Managed IT Current Events Heating/Cooling Multi-Factor Security Social Engineering RMM Motherboard Cables Computer Care IBM Onboarding GDPR Time Management Printer Policy Twitter Halloween Identity Continuity Managed Services Provider Websites Fraud Cost Management Smart Office Print Toner Myths Black Friday Screen Reader Charging Identity Theft Slack Cryptocurrency Hard Disk Drives Holidays Licensing Dongle IT solutions Content Huawei Servers Google Calendar Safety Banking Wires Corporate Profile Messaging Google Docs Emergency Automobile Digital Signage Hacks Data Warehouse Network Management Procedure Scary Stories Solar G Suite Entertainment Vendor Dark Web Distribution Assessment Bitcoin Solid State Drives Network Congestion Running Cable Work Dell Shortcuts Google Wallet Mobile Management Cyber Monday Smart Tech Monitoring Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Legislation Reviews Buisness Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Virtual Desktop Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Writing PCI DSS Sports Legal Hybrid Cloud Microsoft Excel Logistics Hotspot Spying Windows 8 National Security Techology IT Technicians Optimization Unified Communications Security Cameras Drones Profiles Smart Technology Connectivity GPS Printers IT Consultant Computer Repair Relocation Cameras Mobile Data Recovery How To user treats Tracking Mobile Computing Cleaning Black Market CCTV Webcam Law Enforcement Financial Notifications Electronic Medical Records Error Physical Security Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Cortana 3D Printing Regulation Supercomputer CrashOverride Motion Sickness Staffing Administrator Processors Taxes Machine Learning Web Server what was your? Unsupported Software IT Budget

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3