Zoom trust issues – Can it be hacked?
Zoom, the most demanding video conferencing app has found itself the go-to way for people and businesses to connect while under lockdown.
With most of the world working from home due to the spread of COVID-19 (coronavirus), we’re finding new ways to communicate with our colleagues virtually, from chatting on Slack to hanging out on Google.
But perhaps no service has prospered more during the pandemic than Zoom, which has seen its global daily active users skyrocket 67 percent since the start of the year.
In the space of just a few weeks, Zoom has seen its user numbers sky-rocket as hospitals, schools, and even governments make use of its free service to host virtual meetings and remain operational.
The huge surge in popularity has brought with it a new level of scrutiny, with the US-based firm now forced to juggle lawsuits and federal warnings alongside the massive strain on its servers brought about by new users.
Questions have inevitably been raised about how safe Zoom actually is and whether it can be trusted.
Is Zoom secure?
Zoom’s website and security white paper state that security is “the highest priority in the operations of its suite of products and services”. It boasts “Firewall compatibility”, “role-based user security” and “end-to-end chat encryption”.
Can Zoom be hacked?
Nearly all online apps and services are vulnerable to being compromised through attacks like phishing, whereby login information is elicited through duplicitous websites and emails. The open nature of Zoom means it is particularly vulnerable to other types of sabotage. To prevent it from happening, users are urged to make meetings or classrooms private and password-protected.
How to use Zoom safely
While there will always be risks with any online app, there are ways to ensure the maximum level of security by adjusting the platform’s settings
To avoid being ‘Zoom-bombed’, users should avoid sharing the link or meeting ID on social media or other public websites.
This was done by Prime Minister Boris Johnson when he shared a screenshot of his virtual cabinet meeting on Twitter, though fortunately, the meeting was password protected.
Along with using a strong meeting password, users should also set screen sharing to “host-only” where possible.