Zoom Bombing Solutions
Recommended plan of action: Use both Passwords and Waiting Rooms
SECURITY TIPS for standard ZOOM set-up in “settings” in Zoom account
SECURITY TIPS while in a Zoom meeting
What to do if Zoom bombed
Zoom user management tips
Restricted Domain (only pmfs email) | Passwords | Waiting Room | |||
+ | – | + | – | + | – |
Very hard to circumvent | Need to assign email address and email access to every student | Passwords are now auto-generated by Zoom. You can choose for these to be embedded in the invitation link for 1-click login in by invitees. | Embedded links give password access to anyone with the link, so participants should not share them. | It is an effective way to screen participants. | A person unknown to the host (such as a parent’s work email) might be screened out. |
It will mean that Zoom links can’t come from parent or personal emails who are not part of the school | It’s more work for the host to monitor those in the waiting room and approve as needed, particularly once a class or meeting is happening. | ||||
There may be a way to add approved emails to a restricted domain, so that parent emails would be approved. | Those entering the waiting room see a message on screen that they are in the waiting room, and will be admitted soon. |
*Note: One article recommended that schools use a single sign-on provisioning tool so that school technology administrators can control permissions and privileges for staff accounts, and disable features that are unnecessary or inappropriate. These are services by various types of data management and/or IT security companies provided to institutions for a fee, usually on an annual subscription basis.