6 Zoom Safety Tips | How to Use Zoom Safely

Поделиться
HTML-код
  • Опубликовано: 30 июл 2024
  • Whether you are a teacher, business professional, or personal user, Zoom security settings and security features should be at the forefront of your mind when organizing a meeting in Zoom. In this episode, Adam will give you 6 Zoom safety tips to help keep your meetings private, secure, and safe against Zoom Bombers.
    How to use zoom safely:
    Tip 1: Generate Meeting ID Automatically @ 2:30
    Tip 2: Require meeting password @ 3:08
    Tip 3a: Enable waiting room @ 3:54
    Tip 3b: Only authenticated users can join a meeting @ 4:38
    Tip 4: Lock meeting after it begins @ 5:49
    Tip 5: Restrict participants (screen share, chat, & renaming) @ 7:18
    Tip 6a: Play enter/exit chime @ 8:35
    Tip 6b: Mute participants on entry @ 10:09
    Subscribe to get the latest videos: go.itpro.tv/subscribe
    Connect with Adam Gordon:
    Twitter: / adam_itprotv
    LinkedIn: / adam-gordon-0408981
    Blog: blog.itpro.tv
    Enjoying this show? Get access to more online IT skills and certification training from ITProTV. Home of binge-worthy learning, ITProTV offers teams and individuals 4000+ hours of engaging & effective on-demand video training for the latest technology skills. Watch live or on-demand daily. Start learning free at ITProTV: go.itpro.tv/start-learning-now
    #howtousezoomsafely #zoomsafetytips #zoomprivacy

Комментарии • 9

  • @LJ-qs3wq
    @LJ-qs3wq 5 месяцев назад

    Excellent. Comprehensive and very well explained. Thank you!👏

  • @brianbauer6361
    @brianbauer6361 4 года назад

    thanks Adam, will have to share this with my fellow collogues.

  • @ganeshdhalpe4392
    @ganeshdhalpe4392 4 года назад

    Thanks Sir.

    • @ITProTv
      @ITProTv  4 года назад

      Most welcome

  • @tanjirokamado923
    @tanjirokamado923 4 года назад

    Thanks

  • @shah7324
    @shah7324 4 года назад

    Can we trace that person location who is doing nonsense in zoom class meeting

    • @ITProTv
      @ITProTv  4 года назад +1

      Short answer on this one is No. The longer answer is that there are ways to potentially trace someone based on their IP address and other Metadata from the connection, but that requires advanced security and networking knowledge, and would not be something that a normal/non-it security professional would be able to do.