{"id":12649,"date":"2020-06-10T15:30:35","date_gmt":"2020-06-10T19:30:35","guid":{"rendered":"https:\/\/www.resourcepro.com\/how-insurance-organizations-can-maintain-security-on-zoom\/"},"modified":"2024-07-15T10:14:52","modified_gmt":"2024-07-15T14:14:52","slug":"how-insurance-organizations-can-maintain-security-on-zoom","status":"publish","type":"post","link":"https:\/\/www.resourcepro.com\/blog\/how-insurance-organizations-can-maintain-security-on-zoom\/","title":{"rendered":"How to Manage Security on Zoom for Your Insurance Organization"},"content":{"rendered":"\n<p><em>Chris Watkins leads ReSource Pro\u2019s Global Technology division, including information security, infrastructure, enterprise applications, and innovation, overseeing a team of over 120 technology professionals.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Stay Secure While Leveraging Virtual Work-From-Home Meetings<\/strong><\/h2>\n\n\n\n<p>Since the beginning of the coronavirus pandemic and transition to a new <a href=\"https:\/\/www.resourcepro.com\/blog\/new-normal-of-remote-work-in-insurance\/\" target=\"_blank\" rel=\"noreferrer noopener\">work-from-home normal<\/a>, Zoom has reported a <a href=\"https:\/\/www.cnbc.com\/2020\/04\/03\/how-zoom-rose-to-the-top-during-the-coronavirus-pandemic.html\" target=\"_blank\" rel=\"noreferrer noopener\">1,900% increase in daily users<\/a>, making it one of the most popular video conferencing tools on the web. Its newfound ubiquity has made it a prime target for malicious users, who have not only popularized \u201cZoombombing,\u201d or the act of entering a meeting uninvited and causing harm, but discovered <a href=\"https:\/\/www.cnet.com\/news\/zoom-security-issues-zoom-buys-security-company-aims-for-end-to-end-encryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">various other vulnerabilities<\/a> like unsecured call records.<\/p>\n\n\n\n<p>In recent months, Zoom has moved to implement new security protocols and in-meeting controls that allow for greater safety during public and private conferences. But while Zoom is certainly more secure than it was before, you\u2019ll still want to take additional steps in order to keep party-crashers out for good.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.resourcepro.com\/wp-content\/uploads\/2020\/06\/dfdf.gif\" alt=\"\" class=\"wp-image-33422\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Protecting Yourself, Your Colleagues, Your Clients<\/strong> on Zoom<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Use the Security Button<\/strong> \u2014 Zoom\u2019s security controls appear as a checkered shield in the bottom left corner of the Zoom window and are only visible to the meeting host. Here, you can give participants permission to share their screen, use chat features, and change their name. You can also lock the meeting to prevent anyone else from joining or enable a waiting room, which requires participants to wait for your approval before they can join. It\u2019s a good practice to lock the meeting when all expected participants have joined and, unless you have a specific reason not to, disable screen sharing for everyone but yourself.<\/li><li><strong>Remove Unknown Guests <\/strong>\u2014 When a meeting participant is not signed into Zoom or is signed in with an email that differs from the host\u2019s account, they will be marked as a guest. You can identify guests by viewing the participants window and looking for an orange highlight on a participant\u2019s name. If you cannot verify the guest\u2019s identity, then it\u2019s best to remove them from the meeting by hovering the mouse over their name and selecting \u201cRemove.\u201d<\/li><li><strong>Use Randomly Generated Meeting IDs for Public Meetings <\/strong>\u2014 Only share your Personal Meeting ID (PMI) with people who you know and trust. Once someone has your PMI, they can join your personal meeting room whenever it\u2019s active. Because of this, you should be sure to disable the Use Personal Meeting ID option when scheduling any public meetings.<\/li><li><strong>Disable \u2018Join Before Host\u2019 <\/strong>\u2014 <a rel=\"noreferrer noopener\" href=\"https:\/\/support.zoom.us\/hc\/en-us\/articles\/202828525-Join-Before-Host\" target=\"_blank\">Disabling this option<\/a> will prevent participants from joining before you, allowing you to finish setting up any further permissions or restrictions before the meeting begins.<\/li><li><strong>Disable Annotations<\/strong>  \u2014 <a rel=\"noreferrer noopener\" href=\"https:\/\/support.zoom.us\/hc\/en-us\/articles\/115005706806-Using-annotation-tools-on-a-shared-screen-or-whiteboard\" target=\"_blank\">Using annotations<\/a> is a great way for participants to communicate visually during a screen sharing session, but it can also allow malicious users to share inappropriate imagery or messages. For that reason, it\u2019s generally a good idea to disable annotations by going to Settings&gt;Meeting (Basic) unless absolutely necessary.<\/li><li><strong>Disable File Transfers <\/strong>\u2014 <a rel=\"noreferrer noopener\" href=\"https:\/\/support.zoom.us\/hc\/en-us\/articles\/209605493-In-meeting-file-transfer\" target=\"_blank\">File Transfer<\/a> allows meeting participants to share files through Zoom\u2019s in-meeting chat. Unless you actively use this feature, the safest option is to disable it altogether by going to your Settings page. If you do use it, it\u2019s wise to limit the type of files that can be transferred in this way. Left unmonitored, a malicious file could be spread to all meeting participants.<\/li><li><strong>Download the Zoom for Outlook add-in<\/strong> \u2014 If you are using Microsoft Outlook, get the official Zoom add-in by going to Manage Add-ins&gt;Add from the Office Store, then searching \u201cZoom for Outlook.\u201d This add-in will not only allow you to schedule meetings in Zoom directly through Outlook, but help prevent private meeting IDs from being shared in unsecured spaces.<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><em>To learn more about insurance best practices in response to COVID-19, check out our <\/em><a rel=\"noreferrer noopener\" href=\"http:\/\/lp.resourcepro.com\/covid-19-updates.html\" target=\"_blank\"><em>resources<\/em><\/a><em> or <\/em><a href=\"https:\/\/www.resourcepro.com\/contact-us\/business-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>contact us<\/em><\/a><em> today.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Now that we basically live on Zoom, what measures should you be taking to protect yourself, your company, and your clients? Take a look at our best practices.<\/p>\n","protected":false},"author":14,"featured_media":12650,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"news-category":[],"insurance-segment":[],"services":[],"type-of-content":[38],"resource-type":[],"class_list":["post-12649","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","type-of-content-blogs"],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-04-19 17:59:23","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/posts\/12649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/comments?post=12649"}],"version-history":[{"count":1,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/posts\/12649\/revisions"}],"predecessor-version":[{"id":13749,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/posts\/12649\/revisions\/13749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/media\/12650"}],"wp:attachment":[{"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/media?parent=12649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/categories?post=12649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/tags?post=12649"},{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/news-category?post=12649"},{"taxonomy":"insurance-segment","embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/insurance-segment?post=12649"},{"taxonomy":"services","embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/services?post=12649"},{"taxonomy":"type-of-content","embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/type-of-content?post=12649"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.resourcepro.com\/wp-json\/wp\/v2\/resource-type?post=12649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}