An employee seated at his desk with videoconference attendees displayed on a laptop.

Zishing (Cont'd)

Another form of zishing can happen in a video conference meeting during which an imposter conceals their identity to socially engineer other attendees.

Imposters may also infiltrate larger meetings where they could steal company secrets or gather information to launch further attacks.

Click for security measures recommended by Zoom to prevent imposters from infiltrating your meetings.

Zoom Tools

The following Zoom capabilities are available to you as the meeting host:

  • Encrypt meetings by default with optional E2EE encryption,
  • Create Waiting Rooms for attendees,
  • Require the host to be present before the meeting starts,
  • Expell a participant or all participants,
  • Suspend participant activities,
  • Lock a meeting,
  • Screen share watermarks,
  • Audio signatures,
  • Enable/disable a participant or all participants to record,
  • Temporary pause screen-sharing when a new window is opened,
  • Use a passcode to protect a meeting, and
  • Only allow individuals with a given email domain to join.