Zoom Video Conferencing – Who Gives a Sh*t About Security Anyway

by | Apr 14, 2020 | Covid-19, Security, Strategy


You’re stuck working at home like everyone else and your company suddenly needs to figure out how to handle team communication while the COVID-19 pandemic is happening. Someone does a quick search for tools and they find Zoom, a newer platform that is popular with millennials and getting some good press. Why go with some old dodgy system that has been around for many many years when you can use something cool, hip, and new? Zoom is super easy to use, looks cool (hey, I can have a funky background that lets me look like I’m on the beach), and is free or pretty darn inexpensive. I’m in!

During the COVID-19 pandemic, it’s still important to spend time vetting a new corporate system

Since so many people give a sh*t about cybersecurity because they think they have nothing that would make them a target, why look into the security of the new tool you plan on using for nearly all your company communications for meetings?! After all, there will be no sensitive discussions like finances, HR, strategy, sales, etc. via videoconference while we are sheltering in place for months.  So, if someone hacks in, it is no big deal, right?

Sadly, this seems to have been the predominant thinking behind video conferencing tool selection during the pandemic. Quick and easy is the most important selection criteria. Today, even Zoom wishes it had paid closer attention to cybersecurity. Remember what I’ve said about hacker trophy hunting? While Zoom has caught the ultimate demand wave during the pandemic, it has, unfortunately, been blatantly ignoring security within its own platform!!  Ultimately, this caused a perfect cybersecurity storm. Hacker sharks in the virtual waters causing panic and fiascos with a multitude of schools, companies, churches, and anyone else using the Zoom platform. Ouch!!

I’ve been accused of vulgarity. I say that’s bullsh*t.”  ― Mel Brooks

If you didn’t jump on the No-due-diligence Zoom bandwagon, good for you!

My guess is that when needed, you chose to work with a tried and true videoconferencing platform like Cisco Webex, GoToMeeting, or even your internal “boring” Microsoft Teams. These systems, for the most part, are not “cool” or cheap, but they are generally secure and reliable. They are now adding features to securely make them more fun to use too.

But, if you did…

If you are using Zoom, then at least use a passcode for all conferences and update the program to the latest version. With all the recent heat Zoom has received, it has been frantically pushing security updates and working overtime trying to rebuild its reputation as an enterprise-level solution. I hate to say it but I told you so: Cost of Ransomware Prevention Versus Recovery

The moral of the story is that security should be a part of your thinking—ALWAYS. About technology, about business, about pretty much everything these days. Make it a part of all your purchases and processes, even if you need to move fast and think it will not matter much. In the end, cybersecurity does matter and it seems to matter more with the mundane, easy, simple, little things.

Stay healthy and stay safe!


If you want some more recommendations, please contact me. I’ll be glad to give you the names of some of the tools our clients leverage. Shoot me an email (jahlberg[at]waident.com) or give me a call (630-547-7011)

(NOTE: We do NOT share our tool names via our posts. Cybersecurity best practices recommend NOT to because doing so creates unneeded risks as hackers are always searching for vulnerabilities).

Dig Deeper

COVID 19 + Working From Home = CyberRisk

Making Smarter Pandemic IT and Cybersecurity Decisions: Avoid Doing Good, Then Getting Hacked

Cybersecurity In The Days Of COVID-19





John Ahlberg
CEO, Waident

CIO in the corporate world and now for Waident clients. John injects order and technology into business process to keep employees productive, enterprises running, and data safe.


Related posts

The Pitfalls of Unwisely Retiring Old Office Technology

The Pitfalls of Unwisely Retiring Old Office Technology

Pursuing sustainability is a noble goal and more and more environmentally conscious businesses are rising to the challenge. A common example is upgrading and then reselling old technology like routers, firewalls, and switches to others who extract more life out of...

Charging your phone in a public place? Beware!

Charging your phone in a public place? Beware!

FBI recommends avoiding free charging stations in airports, hotels, or shopping centers, as it may put your security at risk. Recently on Twitter, the FBI cautioned that, “Bad actors have figured out ways to use public USB ports to introduce malware and monitoring...

Your Phishing Guide: How to protect your business

Your Phishing Guide: How to protect your business

One of the most common ways to breach business systems is phishing. All it takes is one employee, one email, one click and your business is at risk and your data vulnerable. Email phishing is a type of cyber-attack that has been around for many years and continues to...

Subscribe to our blog!

Get our latest thinking to keep your people productive, your enterprise running, and your data safe.

Accessibility Toolbar

Share This