I love Zoom, but like any tech, there are potential vulnerabilities for new users.
Protect your Zoom account and avoid Zoombombing (aka hacking) by following these suggestions:
- Be wary of links. Login at Zoom directly rather than using the meeting link. Enter the provided meeting ID to join a meeting.
- Set screen sharing to host only. Doing so prevents your meeting from being hijacked by a hacker.
- Use the waiting room feature to prescreen and approve attendees.
- Try Zoom webinars instead (this is the method I use for all my CLEs). Webinar settings offer advanced controls, including several approaches to prescreening attendees.
Read more about these safety tips here.
Are Zoom Conferences Recorded?
When I conduct Zoom CLE webinars, I record them. This is a setting I activate as host. It isn’t automatic.
Zoom meetings are recorded by default. Zoom help explains this and instructs hosts on how to change settings. This is one area where the USA Today article is misleading. For information on Zoom encryption, see this.
Give Others a Heads Up
No matter what you do, it is common sense to give clients and others a heads up on how your video meeting will be conducted. Advise if you plan to record. Let attendees know if your conference is listen only, whether they can raise their hand, or submit questions.
Documenting Your File
Recordings have their place. For example, preserving the meeting as part of your file. Advanced settings in Zoom allow you to include all participant names, add a time stamp, save chat files, and automatically transcribe audio.
All in all, Zoom is a pretty terrific tool.
All Rights Reserved 2020 Beverly Michaelis