Hacker’s Court Hearing Disrupted By Porn Clip — CyberHoot

How Did This Happen?

Secure Your Meetings

  • If you are the host of the meeting, make the meeting private, requiring a password or private link to join the conference call;
  • When the meeting is made private, control access to the meeting by enabling the “waiting room” feature so you can manually let authorized people into the meeting; you would get a message similar to, “Bob Johnson would like to join the meeting” and would need to approve;
  • Do a roll call and keep track of the amount of users that are supposed to be in the meeting, if you invited 8 users and there are 10 in the meeting, you may want to check out who the two (2) extra users are;
  • Don’t share the meeting ID, password, or meeting link on a public platform, such as your website or related social media site;
  • Once every authorized user has joined the meeting, lock the meeting so nobody else can join;
  • Only allow the Conference Host to have control of screen sharing;
  • Disable file-sharing so people aren’t flooded with content.

Specific Zoom Settings to Examine

  • Participant video off on join
  • Join before host off
  • Require a password when scheduling new meetings on
  • Require password for participants joining by phone on
  • Mute participants upon entry on
  • Chat on (group chat)
  • Private Chat off
  • Co-host on
  • Allow host to put attendee on hold on
  • Allow removed participants to rejoin off
  • Waiting room on

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ty Mezquita — CyberHoot

A writer for CyberHoot, a cybersecurity company that helps society become more aware and more secure: https://cyberhoot.com/