What is Zoom Bombing?
Zoom bombing refers to the unwanted, disruptive behaviour of a participant(s) into a video conference call. In a typical Zoom bombing incident, a teleconferencing session is hijacked by participants engaging in behaviours that are lewd, obscene, racist, homophobic, offensive in nature or otherwise inappropriate, typically resulting in the shutdown of the session. This may include, but is not limited to, disrespectful gestures or body language, insults, display or sharing of offensive audio or visual material, inappropriate communication via chat, including sharing of malicious links or files.
Your Zoom meetings may be wide open to Zoom bombing if you don’t know how to set the host controls properly.
Review the following documents to learn how to stop bad actors and respect the privacy of meeting participants to keep your video calls on track.
Privacy and Security Guidelines for Staff
This document outlines the security and privacy safeguards that Algonquin College staff must implement when using Zoom for meetings with other colleagues or third party participants (e.g. vendors). Faculty should use the Zoom Security and Privacy Guidelines for Faculty when conducting online classes with learners.
ZOOM Security and Privacy Guidelines for Staff
Privacy and Security Guidelines for Faculty
This document outlines the security and privacy safeguards that Faculty must implement when using Zoom for conducting online classes with learners.
ZOOM Security and Privacy Guidelines for Faculty
Privacy and Security Guidelines for Employees using Zoom for Hosting Events Open to the Public
This document outlines the security and privacy safeguards that Algonquin College faculty and staff must implement to prevent and respond to Zoom bombing when using Zoom-meeting for conducting events open to the public.
Events open to the public involving a large audience are the preferred target of Zoom bombers. Where feasible and appropriate, these events should be conducted in a webinar format. If you plan to hold these events in a meeting format, follow this guide.
ZOOM Security and Privacy Guidelines for Events Open to the Public
There is no argument that social media has helped individuals, businesses, and causes attain exponential heights in publicity and profits in record times. Through micro-storytelling, social media has helped bring people together from all different backgrounds and origins and built many valuable friendships and relationships because of a common ground in interest or belief. But there is also no argument that social media has brought some people and businesses to depths they could never have anticipated. Businesses aren’t spending enough time researching the security implications of social media and subsequently training their staff on how to prevent compromises. This article will take you through a couple of things that you should know about particularly how social media has tricked you into thinking that a little sharing is harmless.
The College continues to experience the impact of users clicking on phishing e-mails. Within ten minutes of clicking on the links in the emails, malware is loaded onto your computer, followed by your computer “calling out” to hacktivists and criminal organizations. Then, your computer will be remotely controlled to start sending out thousands of spam messages to others all over the world – using your College email address. As you can imagine, not all recipients are going to be particularly happy about receiving the spam, and some will even send back emails to that effect. Imagine the damage to our wonderful name and brand that this can cause. It often takes many hours for ITS to clean up your e-mail account before you can have it back working as normal.