Zoom’s Cyber Security Issues: Lessons Learned

TABLE OF CONTENTS

Zoom’s Triage and Escalation Process

Misleading Claims of End-to-End (E2E) Encryption

Zoom’s Data Routing Concerns

Preventing Zoombombing

WAITING ROOM

ROOM ID

SCREEN SHARING OPTIONS

LOCKING THE MEETING ROOM

Final Thoughts

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store