Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around Deerfield Beach. Computer Services, Tech Support, IT Solutions and more!

How Can the Zoombombing Issue be Solved?

How Can the Zoombombing Issue be Solved?

Conferencing has played a crucial role for businesses, and never more than in the past year. Unfortunately, this has presented the opportunity for trolls to join in these remote collaboration efforts, interrupting them with inflammatory and vulgar content. Labelled “Zoombombing”, these attacks have led to the implementation of numerous privacy protections and countermeasures… but the question remains: how effectively do these protections defend a business’ efforts?

As a study has revealed, not effectively enough.

The Zoombombing Situation

With the remarkable increase in the use of conferencing as of late, it comes as little wonder that cybercriminals and other miscreants have used it to their advantage. With the popularity of Zoom for personal and professional communications particularly increasing, the phenomenon known as Zoombombing—when a Zoom conference is hijacked by an outside party and bombarded with spammy, offensive content—has had a field day.

Adult videos have been shared, while other unwelcome visitors have been content to simply shout vulgar language and derogatory slurs. Some people have Zoombombed meetings to expose themselves to the participants.

In response, Zoom and other software developers have upped the protections surrounding their solutions, with things like password-protected meeting spaces, requiring participants to be welcomed into the meeting space, and recommending that businesses refrain from publicly sharing their meeting times.

A Lot of Zoombombing is Enabled by Insiders

Unfortunately, these efforts are limited in their efficacy by the unfortunate reality that many Zoombombing attacks are enabled by one of the participants working as an insider. By sharing the verified password to the meeting space, one of your users could easily hand out the keys to the castle, and they could share some names so attackers can hide in these waiting rooms.

This is all exacerbated when a meeting has a lot of participants, making these kinds of inconsistencies harder to catch and vetting each participant no longer feasible.

How Can This Be Fixed?

Two words: individual links.

As a disclaimer, not many services have this feature, but one very effective way that this could be remedied is for a conferencing solution to generate a unique access link for each participant. That way, the participant is required to log in, which allows the platform to cross-reference its records and check if that link was sent to the user who used it… as well as helping to identify which user may have leaked their link.

Furthermore, these links would only accept one user to make use of it at a time, meaning that a link in use by your actual user couldn’t also be used by a would-be Zoombomber.

With any luck, more platforms will adopt these options, helping to make conference meetings more secure, and more productive as a result. In the meantime, Direct Technology Group is here to help you with the rest of your security. Give us a call at 954-739-4700 for assistance.

How to Work with Web-Based Images, Part 1: File Ty...
Tip of the Week: Keeping Tabs on Your Chrome Brows...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 02 March 2021

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Google Hackers Network Security Data Microsoft Malware Workplace Tips Communication Software User Tips Innovation Hardware Smartphones Business Email Miscellaneous Backup IT Support Hosted Solutions Mobile Devices Internet Small Business Android Collaboration communications Computer Users Mobile Device Smartphone Ransomware Business Management Cybersecurity Network VoIP Social Media Productivity Windows Managed IT Services Outsourced IT Upgrade Browser Windows 10 Passwords IT Services Tech Term Holiday Managed Service Microsoft Office Save Money Gadgets Windows 10 Employer-Employee Relationship Bandwidth Apps Business Continuity Automation Remote Cloud Computing Covid-19 Quick Tips Phishing Internet of Things Managed IT Services Disaster Recovery Office Facebook Data Backup Chrome Data Recovery Saving Money Marketing Gmail Mobile Device Management Wi-Fi Networking Information Server Wireless IT Support Apple Health Analytics Applications Office 365 Router Alert Password Remote Computing WiFi Settings Hacking Retail Virtualization Cybercrime Government VPN Patch Management Business Intelligence Data Breach Mobility App Office Tips Managed Service Provider Computers Access Control Twitter Laptop Remote Work Physical Security BYOD Application Data Management Blockchain Law Enforcement Website BDR Operating System iPhone Remote Monitoring Battery Recovery Excel Going Green Entertainment Compliance Lithium-ion battery Big Data Google Drive Safety Spam Workers Voice over Internet Protocol Mobile Office Telephone Systems Virus Net Neutrality Paperless Office Value Biometrics Information Technology Conferencing Politics Social Engineering History Mouse Word Printer Artificial Intelligence Humor End of Support Mobile Computing VoIP Bring Your Own Device Managed IT Service Employee-Employer Relationship Environment Maintenance Images 101 User Error Data Security G Suite Best Practice Vendor Employees Virtual Reality Shortcut Tablet HIPAA Social Network Medical IT Hybrid Cloud Connectivity Sports Telephone System Cost Management Human Resources Batteries PowerPoint Dark Web Cleaning Wireless Charging Meetings DDoS Robot IT solutions Tip of the week Hard Drives Tech Support YouTube Scam Content Filtering Payment Cards Customer Relationship Management Virtual Assistant Smart Technology Shadow IT Risk Management Data Protection Customer Service Internet Exlporer How To Windows 7 Files Tech Terms Fax Server Training Remote Workers Data storage Streaming Media Printer Server The Internet of Things Remote Monitoring and Management Managing Stress SharePoint Two-factor Authentication Current Events RAM Encryption Search Business Technology Vulnerability Hosted Solution Free Resource eWaste Cortana Processor Education Healthcare Company Culture Telephony Managed Services Provider HP Live Streaming Electronic Health Records Private Cloud Update Flexibility Paper Hosted Desktop Telecommute Sales Display Personal Information Multi-Factor Security Windows 8 Cabling e-waste Voice over IP Document Management WhatsApp Botnet Reporting Broadband Public Cloud Outlook Legal Ink Firewall Touchpad Data loss Wearable Technology Knowledge Benchmarks Social SaaS E-Commerce Cables PCI DSS Bluetooth eCommerce Digital People News Solid State Drive Bloatware Managed IT internet consultant Profitability Profiles Staff Running Cable Comparison Recycling Copy Payment Windows XP Regulations Compliance Relocation USB Uninterrupted Power Supply Online Shopping disposal Distribution Edge Hard Disk Drive Entrepreneur GDPR PDF Eliminating Downtime Video Games Downloads Computer Repair Websites Specifications Social Networking Paste instant Messaging Tablets Innovations Fleet Management Video Storage Wireless Internet Trends IT Service Black Market Dongle Consultant Bitcoin Computer Accessories Lead Generation Vulnerabilities Webcam Amazon Tip of the Week/Security Multi-Factor Authentication IT budget Remote Support OneNote Hiring/Firing Error Worker Remote Control Help Desk Alerts A.I. Mobile Best Available Distributed Denial of Service Cameras Budget Cryptocurrency Memory Plug-In Reviews Database Holidays NarrowBand IT Management Windows Server 2008 R2 Staffing Touchscreen Spam Blocking Certification Work/Life Balance Movies Downtime Technology Tips User Tip Threats WannaCry Avoiding Downtime Proactive IT Gig Economy Tactics Virtual Private Network Wireless Technology WIndows 7 File Sharing Taskbar Unified Threat Management Programming Automobile Microsoft Office 365 Email Management Unified Communications Backup and Disaster Recovery Telecommuting Scams Hard Drive Time Management Windows Media Player Gifts Internet Explorer Co-Managed IT Chromecast Network Attached Storage User Security National Security Authentication Project Management Access Security Cameras Monitor SSD Millennials Processors Licensing Chrome OS Analyitcs Analysis Customer relationships Internet exploMicrosoft Authorization Techology Threat Memes Server Management Updates Antivirus Gadget Insurance Printers Wearables Hacker Microsoft Teams Management Reputation Inventory Notifications File Management Spyware Travel Google Maps Advertising Troubleshooting HaaS Printing IT Machine Learning Phone System Science Spotify Remote Working Customer Mobile Security User

Mobile? Grab this Article!

QR-Code dieser Seite