Zoom case - are users unprotected?

In recent weeks, information security experts have begun to discover a series of loopholes and flaws in the platform that have raised doubts about Zoom, as I explored in this blog post. The company's shares, which had risen 125% since the beginning of the year, fell 25% from March 27 to April 7.

But do the vulnerabilities found make Zoom totally insecure? Should people stop using it?

Not necessarily. Although we have several alternatives on the market, such as Webex itself, which was the source of Zoom's inspiration, or Microsoft Skype, if you like Zoom's simplicity and want to stick with it, that's fine. But maybe it won't be so simple anymore. Because in order to use it in a minimally secure way, you'll have to take steps that will require you to reconfigure the tool. Nothing too complex, but it will force you to change your routine with the application.

Let's get to the tips:

1 - Disable guest screen sharing

Zoom allows all participants in a meeting or conference to share their computer screen, as long as they have the host's permission. Disable this option so that only the moderator shares screens during conferences.

2 - The meeting should start with only the moderator present

Configure the platform so that the meeting only starts when the host is present. Some people open the room so that guests can enter even before the moderator arrives. This is useful when the moderator is running a few minutes late, but it opens the door to intruders. It's best to set up Zoom so that the conversation only starts when the host is present.

3 - The ID must not be shared

Create a personal identification, called a meeting ID, that is personal and unique, and be careful not to share it publicly. When you call a conference, only send this ID to the people you are actually inviting.

4 - Use a password

Zoom in to ask anyone entering the meeting for a password. This way, only those who know the combination, shared by you, will be able to enter.

5 - Use the waiting room

You can set up a waiting room for your guests until you authorize them to enter the meeting. This helps prevent intruders.

It's important to remember that even if you take all these steps, there's no guarantee that you won't run into problems.

Firstly, because when it comes to data protection, the concept of 100% security simply doesn't exist. And secondly, because the vulnerabilities identified now, during the period of social isolation, are far from the first that Zoom has to face in this field.

In recent times, the tool has been shown to send users' personal data to social networks such as Facebook and LinkedIn without authorization. In addition, it was known that users of macOS operating systems who chose to uninstall Zoom were, in a way, deceived, as the application remained installed in a hidden way, without the knowledge of the computer's owner.

So what Zoom is experiencing today is a crisis of confidence. Although its CEO has gone public and announced that for 90 days he will not be launching any new features and will dedicate himself to resolving the security issues, it is still too early to say that the application will become reliable. However, with these precautions, you will certainly be better protected. And you'll be able to continue using the beloved platform during the quarantine period at less risk.

By Allan Costa