Zoom Bombing: 5 Easy Ways to Protect your Meetings

By Rebecca McCracking, Assistant Professor of Practice, Commercial Aviation
Delta State University

The novel COVID-19 virus has impacted the world in ways never seen before. Initially, time stood still. March 2020 created many obstacles worldwide. In-person interactions had to be reevaluated. Almost a year later, businesses, including aviation, have overcome face-to-face requirements by utilizing new technologies like Zoom.

Zoom is an easy to use tool for live video and audio meetings. The meeting can be scheduled in advance. Reminders can be uploaded to your calendar. Participants can be located anywhere in the world. Information can be distributed easily by sharing your screen, adding documents and even drawing on your computer screen!

Unfortunately, there are some who seek to take advantage of meetings through “Zoom bombing.” It is possible for people to access your meeting and create embarrassments of crude language, interruptions and unwanted photos. Hackers, cyber terrorists and spammers are some names that can describe these rude actors.

Innocence and good intentions will not deter these criminals. Below are some easy steps to ensure that these Internet bullies do not ruin your meeting.

1. Never use your personal meeting ID when creating a meeting. Your personal ID can be searched for future meetings.

2. Always enable a security passcode. It is randomly generated by the system.

3. Share your meeting invitation with only those you want in the meeting. Email the “invitation” directly to each individual.

You must go into Settings to change the following meeting parameters:

4. Select “Host” as the only person who can screen share. Otherwise, anyone who gets access to your meeting can show any picture they choose. You can always make another presenter a “co-host.”

5. Finally, allow users to “report meeting participants for inappropriate behavior to Zoom’s Trust and Safety team for review” (Zoom, 2021). The Zoom Help Center has computer experts who are readily available to users.