By CAPosts 17 November, 2020 - 06:24am 55 views
Zoom introduced new security features to help eliminate and report problematic users. New tools give users and hosts more control over meetings.
Version 5.4.3 of Zoom includes the features Suspend Participant Activities and Report Participants. Both are available for Mac, PC, Linux, and mobile apps, with support for the VDI and web client, coming later this year
The Suspend Participant Activities feature allows hosts and co-hosts to temporarily stop the meeting, delete a problematic user and notify the Zoom Trust & Safety team of this issue
The company explains in a statement that when the meeting is suspended, all video, audio, meeting chat, screen swapping and recording will stop during that time. Once the host or co-host has reported a user, they can re-enable the frozen features
In the case of the Report Participants tool, members can now report a problem user directly from the Zoom client, by clicking on the security icon at the top left.
“Hosts and co-hosts can now report users from the Security icon, but now meeting participants can also report a disruptive user directly from the Zoom client by clicking the Security badge in the upper left corner ”, stands out on the company's official blog.
Zoom also created a Meeting at Risk Notifier. This tool scans public social media posts and other public online resources for Zoom meeting links.
When it finds published meeting information that indicates that a given meeting may be at high risk of being interrupted, a notification is sent to account owners and managers by email and provide advice on what to do. Suggestions could include deleting the vulnerable meeting and creating another with a new meeting ID, enabling security settings, or using another Zoom solution, such as Zoom Video Webinars or OnZoom.
It is also recalled in the post that one of the The best ways to keep your Zoom meeting safe is to never share your meeting ID or password in any public forum, including social media.
End-to-End Encryption Another measure that the video calling service incorporated with the aim of improving security was the incorporation of end-to-end encryption. This tool arrived at the end of October and is available for paid and free users . The encryption algorithm was not altered, but the place where the key is stored, which goes from being made on the Zoom servers, to the users' devices.
Zoom's end-to-end encrypted video calls use the 256 encryption system AES-GCM bits, the same as in the rest of the platform's meetings, and allows no one except the participants to know the keys of the call, not even the Zoom servers.
In normal video calls, Zoom generates the encryption keys of each meeting, but with the new system it is the host of the call who generates this data and distributes it to the rest of the participants in such a way that the company's servers never obtain the necessary information to access the contents
Administrators can activate end-to-end encrypted video calls in their accounts, being able to enable them by default for groups or select them individually for each meeting
(With inform ation of Portaltic)
- These are the passwords you should never choose
- What are the cybercrimes that could grow in 2021
- Over 100,000 Facebook account credentials were compromised in a global scam
- Zoom adds a new feature that allows you to kick and report annoying participants
- Cyberattacks on smart sex toys will increase in 2021