Zoom Has Touched Up Its Security. Will You Benefit From It?

Jun 29, 2020 | Cyber Security, IT News

Video conferencing programs, such as Zoom, are all the rage right now. That shouldn’t come as much of a surprise. It’s a great piece of technology, and being forced to work from home during the COVID-19 pandemic has suddenly elevated these tools, in particular this platform, to a stature that it’s never seen before. Unfortunately, Zoom was never quite prepared for this level of popularity. This became immediately apparent when Zoom-bombing began showing its ugly face in all the worst ways. Hackers are even posting Zoom user account credentials on the Dark Web.

The good news is, Zoom finally bumped up its security. But these improvements are not without a few bumps of their own.

Zoom Finally Has Actual Encryption

Zoom added a new encryption standard, called AES 256-bit GCM encryption. It’s considered the gold standard of encryption and is even used by the U.S. government to secure data. True end-to-end encryption, however, is only available to paying customers. The reason for this is due to warnings from safety experts and law enforcement who have warned that sexual predators and other criminals are increasingly using encrypted communications to avoid detection. As a paid tier of service, charging a premium for encryption is meant to help combat this. It’s not a perfect solution, but it’s definitely one that businesses and organizations can now look into.

You Can Now Report a Zoom User

In Zoom 5.0, hosts now have the ability to report a user to Zoom with a new security button. It sounds like a useful feature, but it will be interesting to see how effective it will be — particularly if a free user can create multiple accounts. One also has to wonder how Zoom itself handles these reports, and who deals with them.

Zoom Now Has a “Waiting Room”

The Zoom app now defaults users to a new “waiting room” feature. How this basically works is, anyone who seeks to enter a meeting must be approved first. Additionally, all meetings will now require a password to enter. While passwords and an approval system both sound like things that should have been standard fare, they should prove effective, provided your meeting password isn’t leaked.

Zoom Resolved a Major Security Bug

Unfortunately, Zoom-bombing was only one of the major issues the app had received criticism over. There have been a few incredibly serious bugs discovered in recent months, including one that would allow a hacker to take full control of the user’s computer. To address these concerns, Zoom has overhauled its bug bounty program, incentivizing security professionals to alert them to bugs before hackers can exploit them.

While these small updates to Zoom were badly needed, it remains to be seen whether they will have a lasting effect on IT security at home for remote workers. Is Zoom the right remote work solution for your organization, or is it time to look at alternatives? Call us today for a consultation, and we can help you make that determination.

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

From Policy to Practice: Why Cybersecurity Fails Without Daily Execution

Cybersecurity policies and tools do not protect businesses unless they are executed consistently. This blog explains why daily operational discipline matters and how MSP support helps turn security into repeatable routines.

Why Professional Services Firms Are Prime Cyber Targets in 2026 and How MSPs Help Reduce Risk

Law firms, accounting firms, engineering companies, nonprofits, and healthcare organizations are increasingly targeted by cybercriminals. This blog explains why professional services firms face higher risk in 2026 and how MSPs help secure operations without slowing productivity.

The True Cost of In-House IT in 2026 and Why More SMBs Are Outsourcing

Rising labor costs, cybersecurity requirements, and insurance pressures are making in-house IT harder for SMBs to sustain. This blog breaks down the true cost of internal IT and why more businesses are outsourcing in 2026.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic