To create a more secure Zoom meeting environment we recommend the following:
- Require a password for all meetings and securely share that password only with your invited guests. Once set, guests must enter the passcode in order to enter the meeting. This will prevent unauthorized individuals from joining a meeting.
- Use waiting rooms. This allows the meeting host to verify those attempting to gain access to the meeting. Always verify the guest by name before admitting them to the room.
- Do not share your meeting IDs. These are unique to individual users and could be used to determine when a meeting is currently in progress.
- Send links to meetings directly to individuals and do not publicly post meeting links. This could allow unauthorized individuals access to your meeting, particularly when other security settings are not in place.
- Disable participant screen sharing or file sharing. This will prevent your meeting from being hijacked by others and allowing the sharing of inappropriate content.
- Lock meetings once everyone has joined. This will prevent unauthorized users from gaining entry while the call is in session.
- Avoid posting photos of your Zoom meetings. This could provide threat actors with the associated meeting ID and information on who is attending your meetings.
- Disable the “Allow Removed Participants to Rejoin” option. If an unauthorized participant is identified and removed, this will prevent them from regaining access to the meeting using the same account.
- Do not use your Facebook, yahoo, or Google account to sign into Zoom. Please sign up with your PCCC account. This will help protect your privacy by limiting the amount of information Zoom, Facebook, and Google can collect about you.
- Beware of Zoom-themed phishing emails. These may purport to be from Zoom and direct the recipient to open a malicious link or attachment in order to deliver malware or steal user credentials. Please report any emails by forwarding them to IT
- Keep Zoom updated. Enhanced security and privacy features may be applied. A recent update enabled meeting passwords by default, for example.
Report all suspicious activity to IT
Phone: (973) 684-6464 Option #2
Support services are available to students, faculty and staff via e-mail and limited phone service. All voice messages left will be responded to.
Please leave the following information in your messages to ensure we can get in touch with you:
- Call back phone number
- College e-mail address
- First name
- Last name
- Brief description of your request or issue