![]() ![]() In their security update, the teleconference software provider added passwords by default for meetings and disabled the ability to randomly scan for meetings to join. In January 2020, Zoom updated their software. Ensure users are using the updated version of remote access/meeting applications.In Zoom, change screensharing to “Host Only.” Provide the link directly to specific people. Do not share a link to a teleconference or classroom on an unrestricted publicly available social media post.In Zoom, there are two options to make a meeting private: require a meeting password or use the waiting room feature and control the admittance of guests. Do not make meetings or classrooms public.In the wake of reports of this activity being reported to the FBI’s Internet Crime Complaints Center (IC3), they have published the following recommendations: The FBI has received multiple reports of conferences being disrupted by pornographic and/or hate images and threatening language. On March 30, 2020, the FBI released an article, warning users of teleconferencing sessions being hijacked (also being referred to as “Zoombombing”) all over the nation. Message from the Multi-State Information Sharing and Analysis Center ® On the Zoom control panel, click on “Participants”, then select “More”, “Remove” the participant. If you find yourself with a disruptive participant in your meeting, you can remove them.To learn more on how to set up Zoom in TITANium, please click here. When using Zoom for classes, provide the link in TITANium.Require a password to join your meeting.You can lock a Zoom meeting once it has started and all your expected participants have joined. Instead, Zoom suggests using random meeting IDs for your large meetings. Avoid hosting large meetings or ‘public’ events using your Personal Meeting ID (PMI).Zoombombing is a new form of trolling in which a participant uses Zoom’s screensharing feature to interrupt and disrupt meetings and classes. Uninvited attendees join random Zoom sessions to cause mischief and potentially to listen in on meetings to gain sensitive information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |