How to Set It Up Right – Mundo Online



[ad_1]

The Zoom tool adapts to huge global demand and sudden success during the almost global social isolation caused by COVID-19. ESET in Latin America provides key points for the user to configure and thus improve the privacy and security of their video calls.

“The sudden success took Zoom by surprise: the company had a business model and privacy policy to support a free service, and suddenly they became the default tool for millions of organizations that have discovered the need to use. video conferencing service. Have had numerous privacy and security concernsand they will need time to adapt. This can be seen in the company’s recent updates to solve problems and recent changes to its privacy policy, ”said Camilo Gutierrez, Head of ESET Research Laboratory in Latin America.

When using this popular tool, ESET shares recommendations to avoid security issues:

  • Always use automatic generation, so each meeting will have its own “Meeting ID”. If the meeting ID is compromised, it will be used only for one meeting, and not for all that you organize.

This does not mean that a password is required to join the meeting. The password requirement must remain verified. However, to be effective, the ability to embed a password must be disabled.

  • Starting a meeting with the camera turned off can help avoid an awkward moment. In this sense, users will be better off turning on the camera during a meeting if they want to or want to.
  • Take each participant to the conference room. Thus, complete control over visitors is in the hands of the owner.

In addition, you should consider the additional options available in the web client, and not in the application. After logging into the system in the “Settings” section in the “Personal” section of ESET, it is recommended to change the default settings for the following option:

  • Delete the parameter with one click and prevent the password from being inserted into the meeting link. This means that each participant must enter a password to join the meeting. It is also important to set the following configuration points when creating a collection:
  • Screen share. The organizer can transfer the management of the meeting to another participant and make it possible. This recommendation may not be ideal for all scenarios. For example, those who use an educational tool may not want to transfer host control to a student. Therefore, it is important to consider the consequences of giving all participants access to the screen or, if it is better to limit this option only to the host.
  • Turn off the background view feature to avoid inadvertently displaying sensitive content in a public place, such as a cafe.
  • Activate the “waiting room” so that users can go through the post filter before accessing the meeting.
  • Prevent sensitive data from being displayed in the task switcher, especially for Apple iOS devices that take screenshots of open applications.

“The above recommendations do not replace the reader’s need to review Zoom’s privacy policy to ensure that it meets their requirements. Individuals and organizations must make their own decisions about which platform best suits their needs. From ESET, we always rely on education and awareness as the first security barrier to the safe use of the Internet. ” Gutierrez concludes,



[ad_2]