The main ongoing privacy concern with Zoom is that the employees of Zoom can view people’s video/audio. This doesn’t mean they do, but architecturally they can. The same is also true for Teams, Skype and most other video conferencing systems.
Separate from the overall way that Zoom works, there have been several publicly disclosed vulnerabilities:
There have been some serious flaws affecting almost all Zoom products. And in some cases, the fixes that have been put in place have been undone by later patches. While Zoom does seem to have more than their fair share of vulnerabilities, it is not the only video conferencing tool with these kinds of flaws; for example, Cisco WebEx had an extremely critical code execution vulnerability that was found in 2017.
There is definitely an increased risk of using any application like Zoom/WebEx. But whether that risk is acceptable is up to the organisation. For some businesses, the features outweigh the risk, for others, the risk is too high no matter what the features are. Like anything – you have to take a risk-based approach to the tools and technologies used.
One point to also consider is that Zoom is getting a significant amount of attention and so far seem to be proactively responding and actively improving their security posture. There are many, many more flaws in many, many other products that are simply not even known about yet or haven’t had the attention for them to be found.
1) Ensure that any local Zoom clients and browser plugins are kept fully up to date.
2) Ensure that all Zoom meetings have strong passwords set which are not ‘shared’ between separate meetings.
3) Disable the ‘telephone dial-in’ option wherever possible. The reason for this is because you only need a meeting ID to connect via telephone dial-in, not the meeting ID and a password like you do for computer-based audio.
4) Monitor participants of the meeting and ensure that only those expected at present.
5) Ensure that the username and password you have set for you Zoom account are unique and not shared with any other system or service.
6) Enable two-factor authentication on your Zoom account.
To summarise, if the meeting/conversation is highly sensitive – consider the risks, aligned to your organisation’s risk methodology/process.
These tips are here to help you rather than scare. If you have questions or concerns, please email email@example.com, and we will do our best to assist you.
Or check out my other blog, which is a Q&A discussing COVID-19 risks during this WFH era, and includes the exposure consumer-grade video conferencing could bring as outlined above.
Check out our fireside virtual conversation on how to ‘Secure Your Cyber Baseline For The New Normal’ with Ian Glover (CREST) and our Risk Advisory Practice Director.