BEI Blog

BEI has been serving the Ohio area since 1991, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

How Can the Zoombombing Issue be Solved?

How Can the Zoombombing Issue be Solved?

Conferencing has played a crucial role for businesses, and never more than in the past year. Unfortunately, this has presented the opportunity for trolls to join in these remote collaboration efforts, interrupting them with inflammatory and vulgar content. Labelled “Zoombombing”, these attacks have led to the implementation of numerous privacy protections and countermeasures… but the question remains: how effectively do these protections defend a business’ efforts?

As a study has revealed, not effectively enough.

The Zoombombing Situation

With the remarkable increase in the use of conferencing as of late, it comes as little wonder that cybercriminals and other miscreants have used it to their advantage. With the popularity of Zoom for personal and professional communications particularly increasing, the phenomenon known as Zoombombing—when a Zoom conference is hijacked by an outside party and bombarded with spammy, offensive content—has had a field day.

Adult videos have been shared, while other unwelcome visitors have been content to simply shout vulgar language and derogatory slurs. Some people have Zoombombed meetings to expose themselves to the participants.

In response, Zoom and other software developers have upped the protections surrounding their solutions, with things like password-protected meeting spaces, requiring participants to be welcomed into the meeting space, and recommending that businesses refrain from publicly sharing their meeting times.

A Lot of Zoombombing is Enabled by Insiders

Unfortunately, these efforts are limited in their efficacy by the unfortunate reality that many Zoombombing attacks are enabled by one of the participants working as an insider. By sharing the verified password to the meeting space, one of your users could easily hand out the keys to the castle, and they could share some names so attackers can hide in these waiting rooms.

This is all exacerbated when a meeting has a lot of participants, making these kinds of inconsistencies harder to catch and vetting each participant no longer feasible.

How Can This Be Fixed?

Two words: individual links.

As a disclaimer, not many services have this feature, but one very effective way that this could be remedied is for a conferencing solution to generate a unique access link for each participant. That way, the participant is required to log in, which allows the platform to cross-reference its records and check if that link was sent to the user who used it… as well as helping to identify which user may have leaked their link.

Furthermore, these links would only accept one user to make use of it at a time, meaning that a link in use by your actual user couldn’t also be used by a would-be Zoombomber.

With any luck, more platforms will adopt these options, helping to make conference meetings more secure, and more productive as a result. In the meantime, BEI is here to help you with the rest of your security. Give us a call at (844) BIZ-EDGE for assistance.

How to Work with Web-Based Images, Part 1: File Ty...
Tip of the Week: Keeping Tabs on Your Chrome Brows...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Friday, December 27, 2024

Captcha Image

News & Updates

BEI is proud to announce the launch of our new website at www.biz-edge.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Contact Us

Learn more about what BEI can do for your business.

BEI
4700 Rockside Road Ste 625
Independence, Ohio 44131