IT Security in the Work-From-Home Age: A Checklist for Securing Zoom Meetings

IT Security in the Work-From-Home Age: A Checklist for Securing Zoom Meetings

As the COVID-19 pandemic continues to breed uncertainty, more and more people are being mandated to stay home. Social distancing measures mean that many workers and students are now trying to get work done from home while staying connected with colleagues using online technologies. Zoom has become one of the benchmark technologies used by teachers, students, and workers of all stripes.

While Zoom makes virtual meetings a breeze, teachers, students, and working-from-home employees in all sectors should be informed about the potential security issues they could face in this constantly-evolving ‘new normal.’ Like all virtual technologies, Zoom is not immune to security risks, but with the right tips and tricks in mind, Zoom users can be sure their meetings remain highly secured.

Secure Zoom Meetings In Denver

Why You Should Take Zoom Security Seriously

With so much uncertainty going on, adding Zoom security to your pandemic checklist may seem daunting or beyond your technological scope. However, keeping your Zoom meetings secure doesn’t have to be a highly technical or confusing task. Not to mention, making sure your virtual meetings are kept secure is a critical part of keeping business running as usual in these uncertain times.

Maintaining Zoom security is so important because unfortunately, the internet is filled with malicious actors. As more and more people make the switch to working and learning online, hackers and trolls are waiting in the wings to disrupt education and business any way they can. The last thing you need in a time like this is to have your virtual boardroom or classroom invaded by strangers with bad intentions.

Whether they aim to shut down your virtual productivity or interrupt meetings with insulting and inappropriate behavior, keeping internet trolls from ‘Zoom-bombing’ your meetings is a critically important part of protecting team participants and maintaining strong morale amidst the pandemic uncertainty.

A Fool-Proof Checklist for Maintaining Strong Zoom Security

The good news is this: protecting your Zoom meetings and participants isn’t as hard as you might think. The truth is, it’s all about being proactive and vigilant. Below we’ve created a list of easy security tips and tricks that you can deploy to ensure your Zoom meetings aren’t invaded by offensive and tech-savvy trolls and pranksters.

Here are the best ways to keep your Zoom meetings secure + appropriate:

Password-protect your meetings

The easiest way to keep trolls out of your virtual workspace is to set passwords for your meetings. Be sure to choose strategic passwords that only your team participants will know. Also, be sure to share password information privately and change them regularly to prevent hacking.

Keep meeting announcements private + internal

If you have a meeting scheduled, be sure to notify participants privately, through internal email servers or over the phone. Never announce meetings using public mediums like social media – this makes it easier for trolls to know when you’re meeting.

Monitor participant lists regularly

Whenever you have a chance be sure to review the list of participants in meetings and ensure that only authorized team members are included on the participant list.

Screen-share carefully

Screen-sharing is an important part of working collaboratively online. However, to make sure only appropriate and professional screen content is shared with participants, use the Zoom screen-sharing settings to control who can screen-share. Your best bet is only to grant screen-sharing access to those who need it and disable the function for those who don’t.

Disable the ‘Join-Before-Host’ function

By turning off the ‘Join-Before-Host’ function, you’ll ensure that only the authorized meeting organizer is in control of the meeting.

Lock your meetings

Once a meeting is underway, use the ‘Manage Participants’ control panel to lock meetings down and prevent additional participants from joining.

Keep your camera view professional

This one should go without saying, but part of keeping Zoom meetings appropriate and professional falls on your shoulders too. Be sure that nothing in your camera view is inappropriate or detrimental to a productive and secure working environment.

There’s no denying that these are uncertain and challenging times. However, around the globe, teachers, students, and workers alike are all lucky to have virtual technologies like Zoom at the ready to keep business and learning moving – even while the world stops. While security issues can be a hassle, a little proactivity and vigilance can go a long way. Stay informed and use these tips and tricks to make sure your virtual workspace is protected from risk.

Is Your IT Services Company In Denver Protecting Your Data?

Do Your IT Services In Denver Protect Your Data?

Data is the lifeblood of the modern business world. Without it, you couldn’t do your work, sell your products, deliver your services… everything would grind to a halt.

That’s why you need to make sure your data is properly protected. Are you confident it is? Are your IT services in Denver playing a role in its protection?

IT Services Utilized In Denver Business Securing Their Network

5 Cybersecurity Questions To Answer With Your IT Services In Denver

1. Do You Have An Inventory Of Your Data Assets?

You have to start from a place of understanding. Begin by taking stock of your data – what it is, where it is stored, etc. With that information, you can then move forward in protecting it.

2. What Would Happen If You Lost Those Data Assets?

You also have to consider the worst-case scenario. What would it mean to you if you lost your data right now? Do you have a backup plan? Do you have redundancies and contingencies in place?

3. Is Your Data Backed Up?

Do you have a data backup policy in place?

If not, then you’re vulnerable, right now, to ransomware. If you have a data backup solution, then it doesn’t matter if your data has been encrypted by ransomware. You can just replace it with your backup, simple as that.

That’s why you should make a considerable investment in a comprehensive backup data recovery solution so that you can restore your data at a moment’s notice when necessary.

Be sure to:

  • Back up data on a regular basis (at least daily).
  • Inspect your backups to verify that they maintain their integrity.
  • Secure your backups and keep them independent from the networks and computers they are backing up.

4. Does Your Staff Help Protect Your Data?

A comprehensive cybersecurity training program will teach your staff how to handle a range of potential situations:

  • How to identify and address suspicious emails, phishing attempts, social engineering tactics, and more.
  • How to use business technology without exposing data and other assets to external threats by accident.
  • How to respond when you suspect that an attack is occurring or has occurred.

5. Can You Detect Intrusions?

Security information and event management (SIEM) technology is a secure cloud service that provides 24/7 security and operation monitoring to oversee a given business’ security needs. A SIEM solution offers a monitoring service, with adaptive threat protection that identifies active cyberattacks and takes action in real-time to protect your business.

By integrating intelligence from global threat monitoring feeds, this solution responds to network-based zero-day exploit attempts, drive-by downloads, and advanced malware that routinely bypass conventional firewall and antivirus technologies.

This works in concert with a Security Operations Center (SOC) – this is a team of people, employing a range of proven processes and using carefully implemented technologies (such as SIEM) which are often centralized. They gather and analyze user reports and a range of data sources – such as logs — from information systems and cybersecurity controls.

Typically, the main point of a SOC in the business setting is to identify, address and eliminate cybersecurity events that could negatively impact an organization’s information systems or data.

Like this article? Check out the following blogs to learn more:

 

Auto-Lock Your Computer In Windows 10

 

Auto-Lock Your Computer In Windows 10

You may have been using Windows 10 for some time now, but it’s likely that you haven’t mastered all of its features just yet.

Do you know how to get your computer to automatically lock while you’re away from it?

It’s a feature included with Windows Hello. While you may already be using Windows Hello to unlock your computer with face recognition, you may not know about Dynamic Lock.

Here’s how it works – you configure Dynamic Lock to recognize a Bluetooth enabled device you keep on your person, such as your phone. After starting up, if that device goes out of range for longer than 30 seconds, your computer will automatically lock itself.

This feature allows you to get up and leave your computer unattended for short periods without having to worry about someone else snooping around your data.

Liking our weekly Windows 10 tips?  Let us know by replying to this email.