How do I ensure that the people I have invited are the only ones who can access my meeting?
There has been some press coverage about uninvited people entering and disrupting Zoom meetings. This is linked to how the meeting has been setup rather than a problem with Zoom itself. To be safe, always use a unique meeting ID (not your personal Zoom ID). The new Zoom update (v5) which came into effect on the 30th May now enables password access to the meeting by default. Waiting rooms are now also a default feature. The waiting room option is a holding page that tells people who are trying to join the meeting that the host will allow them access soon. As host only you can admit people to the meeting. The host can now quickly access the security features within a meeting via the security button in the menu bar. This allows the host to lock meetings, remove participants, restrict screen sharing and chatting, and report a user, all from within the meeting.
Is my computer at risk of a malware attack by using Zoom?
Zoom does not pose a greater risk to malware attacks than other online programmes.
Malware is usually downloaded by clicking on attachments that have been sent to you by email. The best way to protect your computer against them is by not clicking on any email attachments, unless you are sure who has sent it. Virus scanners also provide good protection against malware attacks and you can also block all file transfer via Zoom.
Is Zoom end-to-end encrypted? And what does that mean?
All communication over the internet takes information from one person to another. To stop that information falling into the wrong hands it can be encrypted (i.e. put into a secret code) by the sender so that only the recipient can read it. This is called end-to-end encryption. Lots of internet services (email, websites, video conferencing) use this, but there is a weakness if the time your message spends in transit is not fully secure. This can make a service vulnerable to a ‘man in the middle’ attack.
A good service will be encrypted all the way through the process and not just at either end. Zoom is not end-to-end encrypted, in fact, there are very few conference call software programmes that are. The only commonly used one we found in our research was FaceTime, but that requires everyone to have Apple products.
It’s also important to remember that it’s really hard to hack into a message, even one that isn’t end to end encrypted. The chances of anyone making the effort to break the encryption of a Big Local message or video are very small.
It’s important to be aware of what you’re sharing over Zoom; similarly to how you would act in a public place with others around that might overhear, don’t share passwords, credit card details or other sensitive information.
Can I dial into a Zoom meeting?
Yes you can. When Zoom meetings are created there will also be the option to share phone numbers to enable people to dial into that meeting. Please be aware that calls will be charged at your local providers rate.