Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

New Zoom Features Tackle Meeting Disruptions

Zoom over the weekend rolled out two new features that are aimed at tackling meeting disruptions.

Zoom over the weekend rolled out two new features that are aimed at tackling meeting disruptions.

The video conferencing platform has seen a lot of backlash in 2020, after numerous security issues were identified amid worldwide adoption during the coronavirus pandemic. In fact, federal regulators are saying that the company mislead users regarding the security of meetings.

Over the past year, Zoom has significantly intensified its efforts to improve the security of video meetings, and the newly rolled-out features represent the latest step in this direction.

Courtesy of these new additions, Zoom is making it easy to remove and report disruptive meeting participants, and is also aiming to prevent meeting disruptions even before they actually happen.

While in a meeting on Zoom, hosts and co-hosts can now pause meetings to remove disruptive participants. A new “Suspend Participant Activities” option is available under the Security icon, allowing for all “video, audio, in-meeting chat, annotation, screen sharing, and recording” to stop and for the Breakout Rooms to end.

The hosts or co-hosts will have the option to report any user from the meeting and share any details, accompanied by an optional screenshot, which will result in the reported user being automatically removed from the meeting.

The host/co-host will then be able to resume the meeting by individually re-enabling the features they want to use. Zoom will email them for additional information on the incident.

Advertisement. Scroll to continue reading.

Zoom also announced that it will enable the new Suspend Participant Activities feature by default for all free and paid Zoom users.

Courtesy of the new features, meeting participants too can now report disruptive users, straight from the Zoom client, from the top-left Security badge.

Account owners and administrators now have the option to enable the reporting capabilities for non-hosts, from the web settings.

The new features are available in the Zoom desktop clients for Windows, Mac, and Linux, as well as in the Zoom mobile apps. Support for the web client and VDI are planned for later this year.

Zoom also reveals that a new tool deployed this fall is helping it identify Zoom Meeting links that might have been publicly shared. The At-Risk Meeting Notifier is meant to discover meetings that might be at risk of disruption and alerts the account owner via email.

Recommended action steps include deleting the meeting and creating another one with a new ID, adjusting security settings, or switching to another Zoom solution, such as Zoom Video Webinars or OnZoom.

“If you do get an email, it’s critical to take action or risk having your meeting disrupted. As a reminder – one of the best ways to keep your Zoom meeting secure is to never share your meeting ID or passcode on any public forum, including social media,” Zoom says.

Related: FTC Says Zoom Misled Users on Its Security for Meetings

Related: Zoom Announces Technical Preview of End-to-End Encryption

Related: Zoom Rolls Out 2FA Support for All Accounts

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...