Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CERT in Advisory Note Zoom

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

4/3/2020 CERT-In Advisory Notes

CERT-In Advisory CIAD-2020-0010


Secure usage of Zoom video conferencing application

Original Issue Date: March 30, 2020

Description

Many organizations have allowed its staff to work from home to stop the spread of Coronavirus disease
(COVID-19). Online communication platforms such as Zoom, Microsoft Teams and Teams for
Education, Slack, Cisco WebEx etc. are being used for remote meetings and webinars.

Zoom is a popular video conferencing platform. Insecure usage of the platform may allow cyber
criminals to access sensitive information such as meeting details and conversations. Following measures
are advised for increasing the security of Zoom meetings and reducing risks-

Keep your Zoom software patched and up-to-date.


Always set strong, difficult-to-guess and unique passwords (make your password at least eight
characters long and use at least three of the following types of characters: lowercase letters,
uppercase letters, numbers, symbols) for all meetings and webinars. This is especially
recommended for any meetings where sensitive information may be discussed.

Enable "Waiting Room" Feature so that the call manager will have a better control over
participants. All participants can join a virtual "Waiting Room", but they will be approved by call
manager to be part of the actual meeting.

Disable Join Before Host Feature: The "Join Before Host" option lets others to continue with a
meeting in the absence of an actual host, but with this option enabled, the first person who joins the
meeting will automatically be made the host and will have full control over the meeting.
Alternatively, "Scheduling Privilege" may be given to a trusted participant to host the meeting in
the absence of an actual host.

If not required, restrict/disable file transfers.


From settings and controls, ensure removed participants are unable to rejoin meetings.
If not required, limit Screen Sharing to the Host only.
Lock the meeting session once all your attendees have joined.
Restrict the call record feature "Allow Record" to trusted participants only.

References

https://blog.checkpoint.com/2020/03/26/whos-zooming-who-guidelines-on-how-

1/2
4/3/2020 CERT-In Advisory Notes

to-use-zoom-safely/
https://it.cornell.edu/zoom/keep-zoom-meetings-private
https://www.inc.com/jason-aten/zoom-has-a-major-security-flaw-that-could-let-
malicious-websites-literally-spy-on-you.html
https://www.foxbusiness.com/technology/securely-host-zoom-meeting
https://www.forbes.com/sites/zakdoffman/2020/01/28/new-zoom-roulette-
security-warning-your-video-calls-at-risk-from-hackers-heres-what-you-
do/#591e905d7343

Disclaimer

The information provided herein is on "as is" basis, without warranty of any kind.

Contact Information

Email: info@cert-in.org.in
Phone: +91-11-24368572

Postal address

Indian Computer Emergency Response Team (CERT-In)


Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, CGO Complex, Lodhi Road,
New Delhi - 110 003
India

2/2

You might also like