Video conferencing is now being used by millions of people for work and leisure, as lockdowns are imposed in many countries. One tool, in particular, has endured its fair share of criticism that seemed to come as a side-effect of its booming popularity in recent weeks – Zoom.

Zoom has been in the news for privacy concerns surrounding the phenomenon known as ‘Zoombombing’, where uninvited visitors were joining in-progress meetings by entering a random meeting ID.

In addition to the Zoombombing episodes, reports emerged that the company’s iPhone app leaked user data to Facebook.

Then, of course, there was the string of vulnerabilities reported concerning the service’s meeting ID privacy and its encryption.

According to founder Eric Yuan, Zoom ‘boomed’ from 10 million users at the end of December to more than 200 million in March this year. Our data also reflects this steep rise in recent months.

Zoom data usage across the Wandera network of protected work-enabled devices is 1,855% higher than it was during the first week of February. The increase in data used per connection eludes to more meetings, longer meetings, more people joining from separate locations, and more video being used in meetings as people struggle to maintain a sense of normalcy despite the disruptions to their previous way of working.

With this explosion in Zoom usage, the video conferencing company has been quick to address the accessibility of privacy and security features. However, it’s important to ensure your employees practice good security hygiene when using this service. Follow these tips to secure your Zoom meetings:

  1. Do not share the meeting link, meeting ID or photos containing the meeting ID on public platforms (a la Boris Johnson
  2. Don’t use a (single) personal meeting ID for all meetings, instead use the randomly generated ID for each meeting
  3. Create separate passwords to secure every meeting 
  4. Set screen sharing to “host-only” to avoid any meeting hijackers from sharing unwanted content 
  5. Disable file transfer so no sensitive files can be stolen or seen by unwanted parties
  6. Assign a meeting host, disable ‘join before host’ and enable a ‘waiting room’ for each meeting to maintain meeting control
  7. Inspect the list of participants regularly throughout the meeting to make sure there are no intruders
  8. Disable ‘allow removed participants to rejoin’ to keep unwanted parties off meetings
  9. Once everyone is in the meeting, lock the meeting to avoid unwanted parties from entering
  10. Use a security solution that provides app risk assessment to identify potential fake and out-of-date versions, scans for unauthorized network traffic, and blocks malicious connections.